{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:15:39Z","timestamp":1777853739793,"version":"3.51.4"},"reference-count":17,"publisher":"SAGE Publications","issue":"3-4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JID"],"published-print":{"date-parts":[[2023,10,13]]},"abstract":"<jats:p>The design of real-world industrial systems is subject to a natural tendency towards modularization in order to manage complexity. In addition, this article considers that patterns of self-similarity in many problem domains have made many such solutions naturally representable as holarchies. Likewise, the increasing need for autonomous local decision making as well as the demand to produce solutions at scale has increased the relevance of the multi-agent paradigm to the creation of modern software systems. A variety of software development patterns are explored for their compatibility with holonic multi-agency. The current skill sets required by software development workers and concomitant training activities focus on instilling computational thinking abilities, a set of related cognitive competencies useful in the development of such systems. Intelligent systems play an increasingly important role in modern development and often benefit from computational intelligence techniques for the purpose of parameter tuning. This position paper explores the intersections between holonic multi-agency, modern information systems development, the computational intelligence which train them and the computational thinking skills those developers should be trained in.<\/jats:p>","DOI":"10.3233\/jid-220009","type":"journal-article","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T13:00:27Z","timestamp":1655211627000},"page":"369-391","source":"Crossref","is-referenced-by-count":1,"title":["The convergence of computational thinking, computational intelligence, and multi-agency"],"prefix":"10.1177","volume":"26","author":[{"given":"Duncan Anthony","family":"Coulter","sequence":"first","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, Johannesburg, South Africa"}]}],"member":"179","reference":[{"key":"10.3233\/JID-220009_ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31646-4"},{"issue":"8","key":"10.3233\/JID-220009_ref5","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TPDS.2017.2654246","article-title":"Evaluating scalable distributed erlang for scalability and reliability","volume":"28","author":"Chechina,","year":"2017","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.3233\/JID-220009_ref6","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1146\/annurev-statistics-031219-041220","article-title":"Q-learning: Theory and applications","volume":"7","author":"Clifton,","year":"2020","journal-title":"Annual Review of Statistics and Its Application"},{"issue":"3","key":"10.3233\/JID-220009_ref11","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/362929.362947","article-title":"Go To Statement Considered Harmful","volume":"11","author":"Dijkstra,","year":"1968","journal-title":"Communications of the ACM"},{"key":"10.3233\/JID-220009_ref12","doi-asserted-by":"publisher","first-page":"28573","DOI":"10.1109\/ACCESS.2018.2831228","article-title":"Multi-Agent Systems: A Survey","volume":"6","author":"Dorri,","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JID-220009_ref13","unstructured":"Foundation for Intelligent Physical Agents. (2002). FIPA ACL Message Structure Specification. Document ID SC00061."},{"key":"10.3233\/JID-220009_ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314250"},{"key":"10.3233\/JID-220009_ref16","doi-asserted-by":"publisher","DOI":"10.3233\/JID190006"},{"key":"10.3233\/JID-220009_ref17","doi-asserted-by":"publisher","DOI":"10.1353\/pbm.0.0167"},{"key":"10.3233\/JID-220009_ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319746"},{"key":"10.3233\/JID-220009_ref19","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-030-03427-6_19","article-title":"Verification of operating system monolithic kernels without extensions","volume":"11247","author":"Novikov,","year":"2018","journal-title":"Lecture Notes in Computer Science"},{"issue":"7","key":"10.3233\/JID-220009_ref20","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1109\/TLA.2016.7587632","article-title":"MultiAgent systems in power system protection: Review, classification and perspectives","volume":"14","author":"Presente,","year":"2015","journal-title":"IEEE Latin America Transactions"},{"key":"10.3233\/JID-220009_ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-8964-1"},{"key":"10.3233\/JID-220009_ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31646-4"},{"issue":"5","key":"10.3233\/JID-220009_ref33","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.intell.2006.04.006","article-title":"G and the measurement of Multiple Intelligences: A response to Gardner","volume":"34","author":"Visser,","year":"2006","journal-title":"Intelligence"},{"issue":"3","key":"10.3233\/JID-220009_ref34","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1118178.1118215","article-title":"Computational thinking","volume":"49","author":"Wing,","year":"2006","journal-title":"Communications of the ACM"},{"issue":"1881","key":"10.3233\/JID-220009_ref35","doi-asserted-by":"publisher","first-page":"3717","DOI":"10.1098\/rsta.2008.0118","article-title":"Computational thinking and thinking about computing","volume":"366","author":"Wing,","year":"2008","journal-title":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences"}],"container-title":["Journal of Integrated Design and Process Science"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JID-220009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:56:31Z","timestamp":1777503391000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JID-220009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,13]]},"references-count":17,"journal-issue":{"issue":"3-4"},"URL":"https:\/\/doi.org\/10.3233\/jid-220009","relation":{},"ISSN":["1092-0617","1875-8959"],"issn-type":[{"value":"1092-0617","type":"print"},{"value":"1875-8959","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,13]]}}}