Systems, Man & Cybernetics - July 2015 - 34

Despotovic, G. Moro, and S. Bergamaschi, Eds. Berlin, Germany: Springer-Verlag,

[26] E. A. Kendal, "Role model design and implementation with aspect-oriented

2012, pp. 104-114.

programming," in Proc. 14th ACM SIGPLAN Conf. Object-Oriented Programming,

[6] A. Caetano, A. R. Silva, and J. Tribolet, "A role-based enterprise architecture

Systems, Languages, Applications, Oct. 1999, vol. 34, no. 10, pp. 353-369.

framework," in Proc. 24th Annu. ACM Symp. Applied Computing, Honolulu, HI, Mar.

[27] T. Kühn, M. Leuthäuser, S. Götz, C. Seidl, and U. Aßmann, "A metamodel fam-

8-12, 2009, pp. 253-258.

ily for role-based modeling and programming languages," in Software Language

[7] A. Campbell and A. S. Wu, "Multi-agent role allocation: Issues, approaches, and

Engineering (Lecture Notes in Computer Science, vol. 8706), B. Combemale, D. J.

multiple perspectives," Auton. Agent Multi-Agent Syst., vol. 22, no. 2, pp. 317-355, 2011.

Pearce, O. Barais, and J. J. Vinju, Eds. Berlin, Germany: Springer-Verlag, 2014, pp.

[8] R. W. Conway, W. L. Maxwell, and L. W. Miller, Theory of Scheduling. New York:

141-160.

Courier Dover Publications, Aug. 2012.

[28] X. Mao, M. Dong, and H. Zhu, "A two-layer approach to developing self-adaptive

[9] Z.-P. Fan, W.-L. Suo, B. Feng, and Y. Liu, "Trust estimation in a virtual team: A deci-

multi-agent systems in open environment," Int. J. Agent Technol. Syst., vol. 6, no. 1, pp.

sion support method," Expert Syst. Applicat., vol. 38, no. 8, pp. 10240-10251, Aug. 2011.

65-85, Jan.-Mar. 2014.

[10] X. Fan and J. Yen, "Modeling cognitive loads for evolving shared mental models

[29] R. Nair, M. Tambe, and S. Marsella. (2003). Role allocation and reallocation in

in human-agent collaboration," IEEE Trans. Syst. Man, Cybern. B, vol. 41, no. 2, pp.

multiagent teams: Towards a practical analysis. presented at 2nd Int. Joint Conf.

354-367, Apr. 2011.

Autonomous Agents Multiagent Systems ACM. pp. 552-559. [Online]. Available: http://

[11] J. Ferber, O. Gutknecht, and F. Michel, "From agents to organizations: An orga-

teamcore.usc.edu/papers/2003/nair-aamas03.pdf

nizational view of multi-agent systems," in Agent-Oriented Software Engineering IV

[30] J. J. Odell, H. van Dyke Parunak, S. Brueckner, and J. Sauter, "Changing roles," J.

(Lecture Notes in Computer Science, vol. 2935), P. Giorgini, J. Müller, and J. Odell,

Object Technol., vol. 2, no. 5, pp. 77-86, Sept.-Oct. 2003.

Eds. Berlin, Germany: Springer-Verlag, 2004, pp. 214-230.

[31] M. Ould, Business Processes-Modelling and Analysis for Re-Engineering and

[12] L. Ferrari and H. Zhu, "Autonomous role discovery for collaborating agents," J.

Improvement. Chichester, West Sussex: Wiley, 1995.

Softw.-Pract. Exp., vol. 42, no. 6, pp. 707-731, June 2012.

[32] L. Padgham, M. Winikoff, S. DeLoach, and M. Cossentino, "A unified graphical

[13] L. Ferrari and H. Zhu, "Enabling dynamic roles for agents," in Proc. ACM/IEEE Int.

notation for AOSE," in Agent-Oriented Software Engineering IX (Lecture Notes in

Conf. Collaborative Technologies Systems, Philadelphia, PA, May 23-27, 2011, pp. 500-507.

Computer Science, vol. 5386), M. Luck, and J. J. Gomez-Sanz, Eds. Berlin, Germany:

[14] L. Ferrari and H. Zhu, "Making Agent roles perceivable through proxy bytecode

Springer-Verlag, 2009, pp. 116-130.

manipulation," in Proc. ACM/IEEE Int. Symp. Collaborative Technologies Systems,

[33] M. Pradel, J. Henriksson, and U. Aßmann, "A good role model for ontologies," in

Baltimore, MD, 2009, pp. 408-416.

Enterprise Information Systems and Advancing Business Solutions, M. Tavana, Eds.

[15] W. Harrison and H. Ossher, "Subject-oriented programming-A critique of pure

Hershey, PA: IGI Global, 2012, pp. 225-235.

objects," in Proc. 8th Annu. Conf. Object-Oriented Programming Systems, Languag-

[34] R. Pressman, Software Engineering: A Practitioner's Approach. New York:

es, Applications, 1993, pp. 411-428.

McGraw-Hill, July 30, 2007.

[16] E. A. Gomez and K. Passerini, "Service-based crisis management: Local and global

[35] R. L. Rardin, Optimization in Operations Research. Englewood Cliffs, NJ: Pren-

community roles and communication options," Int. J. Intell. Control Syst., vol. 12, no.

tice Hall, 1997.

2, pp. 198-207, June 2007.

[36] D. Riehle and T. Gross, "Role model based framework design and integration," in

[17] M. Hou, H. Zhu, M. Zhou, and G. R. Arrabito, "Optimizing operator-agent interac-

Proc. ACM Conf. Object-Oriented Programming Languages, Systems, Applications,

tion in intelligent adaptive interface design," IEEE Trans. Syst. Man, Cybern. C, vol.

1998, pp. 117-133.

41, no. 2, pp. 161-178, 2011.

[37] W. Seo, J. Yoon, J. Lee, and K. Kim, "A state-driven modeling approach to human

[18] A. Lang and Y. Pigneur, "Digital trade of human competencies," in Proc. IEEE

interactions for knowledge intensive services," Expert Syst. Applicat., vol. 38, no. 3,

32nd Annu. Hawaii Int. Conf. System Sciences, Maui, HI, 1999, pp. 1-9.

pp. 1917-1930, Mar. 2011.

[19] X. Li, Y. Chen, and Z. Dong, "Qualitative description and quantitative optimization

[38] H. Shen and C. Sun, "Achieving data consistency by contextualization in web-

of tactical reconnaissance agents system organization," Int. J. Comput. Intell. Syst.,

based collaborative applications," ACM Trans. Internet Technol., vol. 10, no. 4, pp.

vol. 5, no. 4, pp. 723-734, 2012.

13-37, Mar. 2011.

[20] D. Liu, S. Teng, H. Zhu, and Y. Tang, "Minimal role playing logic in role-based col-

[39] Y. Sheng, H. Zhu, X. Zhou, and L. Feng, "Effective approaches to adaptive collabo-

laboration," in Proc. IEEE Int. Conf. Systems, Man Cybernetics, San Diego, CA, Oct.

ration," in Proc. IEEE Int. Conf. Networking, Sensing Control, Miami, FL, Apr. 13-16,

5-8, 2014, pp. 1439-1444.

2014, pp. 297-302.

[21] H. Liu, H. Yu, Y. Li, and Y. Sun, "A role modelling approach for crowd animation in

[40] Y. Sheng, H. Zhu, X. Zhou, and Y. Wang, "Effective approaches to group role assign-

a multi-agent cooperative system," in Proc. 15th Int. Conf. Computer Supported Coop-

ment with a flexible formation," in Proc. IEEE Int. Conf. Systems, Man Cybernetics,

erative Work Design, Lausanne, Switzerland, June 2011, pp. 304-310.

San Diego, CA, Oct. 5-8, 2014, pp. 1445-1450.

[22] L. Liu, H. Zhu, and Z. Huang, "Analysis of minimal privacy disclosure in web

[41] P. Sousa, A. Caetano, and J. Tribolet, "Enterprise architecture modelling with the

services collaboration with role mechanisms," Expert Syst. Applicat., vol. 38, no. 4,

unified modelling language," in Enterprise Modelling and Computing with UML, P.

pp. 4540-4549, Apr. 2011.

Rittgen, Eds. Hershey, PA: Idea Group Inc., 2006, pp. 67-94.

[23] L. Liu, Z. Huang, and H. Zhu, "A privacy access control framework for web services

[42] F. Steimann, "On the representation of roles in object-oriented and conceptual

collaboration with role mechanisms," in Advanced Research on Electronic Commerce,

modelling," Data Knowl. Eng., vol. 35, no. 1, pp. 83-106, 2000.

Web Application, and Communication (Series Communications in Computer and

[43] F. Steimann. (2008). Role + counter-role = relationship + collaboration. presented

Information Science, vol. 144). Berlin, Germany: Springer-Verlag, 2011, pp. 258-263.

at Workshop of Relationships and Associations in Object-Oriented Languages. OOPSLA.

[24] Y. Lu and T. Käkölä, "A dynamic life-cycle model for the provisioning of software test-

[Online]. Available: http://deposit.fernuni-hagen.de/2201/1/Role_Counter_Role _Rela-

ing services," Syst. Sci. Control Eng.: An Open Access J., vol. 2, no. 1, pp. 549-561, 2014.

tionship_Collaboration.pdf

[25] W. Luo and Y. A. Tung, "A framework for selecting business process modeling

[44] L. Tao and M. Zhang, "Understanding an online classroom system," IEEE Trans.

methods," Ind. Manage. Data Syst., vol. 99, no. 7, pp. 312-319, 1999.

Hum.-Mach. Syst., vol. 43, no. 5, pp. 465-477, Sept. 2013.

34

IEEE Systems, Man, & Cybernetics Magazine July 2015 	


http://http:// http://teamcore.usc.edu/papers/2003/nair-aamas03.pdf http://deposit.fernuni-hagen.de/2201/1/Role_Counter_Role

Table of Contents for the Digital Edition of Systems, Man & Cybernetics - July 2015

Systems, Man & Cybernetics - July 2015 - Cover1
Systems, Man & Cybernetics - July 2015 - Cover2
Systems, Man & Cybernetics - July 2015 - 1
Systems, Man & Cybernetics - July 2015 - 2
Systems, Man & Cybernetics - July 2015 - 3
Systems, Man & Cybernetics - July 2015 - 4
Systems, Man & Cybernetics - July 2015 - 5
Systems, Man & Cybernetics - July 2015 - 6
Systems, Man & Cybernetics - July 2015 - 7
Systems, Man & Cybernetics - July 2015 - 8
Systems, Man & Cybernetics - July 2015 - 9
Systems, Man & Cybernetics - July 2015 - 10
Systems, Man & Cybernetics - July 2015 - 11
Systems, Man & Cybernetics - July 2015 - 12
Systems, Man & Cybernetics - July 2015 - 13
Systems, Man & Cybernetics - July 2015 - 14
Systems, Man & Cybernetics - July 2015 - 15
Systems, Man & Cybernetics - July 2015 - 16
Systems, Man & Cybernetics - July 2015 - 17
Systems, Man & Cybernetics - July 2015 - 18
Systems, Man & Cybernetics - July 2015 - 19
Systems, Man & Cybernetics - July 2015 - 20
Systems, Man & Cybernetics - July 2015 - 21
Systems, Man & Cybernetics - July 2015 - 22
Systems, Man & Cybernetics - July 2015 - 23
Systems, Man & Cybernetics - July 2015 - 24
Systems, Man & Cybernetics - July 2015 - 25
Systems, Man & Cybernetics - July 2015 - 26
Systems, Man & Cybernetics - July 2015 - 27
Systems, Man & Cybernetics - July 2015 - 28
Systems, Man & Cybernetics - July 2015 - 29
Systems, Man & Cybernetics - July 2015 - 30
Systems, Man & Cybernetics - July 2015 - 31
Systems, Man & Cybernetics - July 2015 - 32
Systems, Man & Cybernetics - July 2015 - 33
Systems, Man & Cybernetics - July 2015 - 34
Systems, Man & Cybernetics - July 2015 - 35
Systems, Man & Cybernetics - July 2015 - 36
Systems, Man & Cybernetics - July 2015 - 37
Systems, Man & Cybernetics - July 2015 - 38
Systems, Man & Cybernetics - July 2015 - 39
Systems, Man & Cybernetics - July 2015 - 40
Systems, Man & Cybernetics - July 2015 - 41
Systems, Man & Cybernetics - July 2015 - 42
Systems, Man & Cybernetics - July 2015 - 43
Systems, Man & Cybernetics - July 2015 - 44
Systems, Man & Cybernetics - July 2015 - 45
Systems, Man & Cybernetics - July 2015 - 46
Systems, Man & Cybernetics - July 2015 - 47
Systems, Man & Cybernetics - July 2015 - 48
Systems, Man & Cybernetics - July 2015 - 49
Systems, Man & Cybernetics - July 2015 - 50
Systems, Man & Cybernetics - July 2015 - 51
Systems, Man & Cybernetics - July 2015 - 52
Systems, Man & Cybernetics - July 2015 - 53
Systems, Man & Cybernetics - July 2015 - 54
Systems, Man & Cybernetics - July 2015 - 55
Systems, Man & Cybernetics - July 2015 - 56
Systems, Man & Cybernetics - July 2015 - 57
Systems, Man & Cybernetics - July 2015 - 58
Systems, Man & Cybernetics - July 2015 - 59
Systems, Man & Cybernetics - July 2015 - 60
Systems, Man & Cybernetics - July 2015 - 61
Systems, Man & Cybernetics - July 2015 - 62
Systems, Man & Cybernetics - July 2015 - 63
Systems, Man & Cybernetics - July 2015 - 64
Systems, Man & Cybernetics - July 2015 - 65
Systems, Man & Cybernetics - July 2015 - 66
Systems, Man & Cybernetics - July 2015 - 67
Systems, Man & Cybernetics - July 2015 - 68
Systems, Man & Cybernetics - July 2015 - 69
Systems, Man & Cybernetics - July 2015 - 70
Systems, Man & Cybernetics - July 2015 - 71
Systems, Man & Cybernetics - July 2015 - 72
Systems, Man & Cybernetics - July 2015 - Cover3
Systems, Man & Cybernetics - July 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com