Multi-Agent Systems

Engineering the Next Generation of Multi-Agent Systems: A Community Roadmap from EMAS 2025

This paper presents the outcomes of an open-floor session held at the 13th International Workshop on Engineering Multi-Agent Systems (EMAS 2025), aimed at co-developing a research roadmap for the EMAS community. Participants collaboratively …

Towards Engineering LLM-Enhanced Multi-Agent Systems: A Critical Examination of Roles

This paper proposes a structured approach to integrating Large Language Models (LLMs) into Multi-Agent Systems (MAS) by revisiting and extending the fundamental Agent-Oriented Software Engineering (AOSE) concept of "roles." Traditional AOSE …

RTF: a Reputation-based Team Formation Approach for Enhancing Dependable Critical Multi-UAV Operations

The development of autonomous multi-unmanned aerial vehicles, or multi-UAVs, represents significant progress in various fields, including the military, business, and civilian sectors. As this innovative field develops, the necessity of creating …

Agent-Oriented Engineering with Generative AI: Report from the Agent Toolkits 2025 Community Session

Intelligent agents have been a cornerstone of Artificial Intelligence (AI) since its early days—and received significant attention in the 1990s when the notion of autonomous agent was established, giving rise to research on Engineering Multi-Agent …

UAV Marketplace Simulation Tool for BVLOS Operations

We present a simulation tool for evaluating team formation in autonomous multi-UAV (Unmanned Aerial Vehicle) missions that operate Beyond Visual Line of Sight (BVLOS). The tool models UAV collaboration and mission execution in dynamic and adversarial …

The Coral Protocol: Open Infrastructure Connecting The Internet of Agents

Coral Protocol is an open and decentralized collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. It addresses the growing need for interoperability in a world where organizations are …

Taxonomie des Vulnérabilités d'Incitations dans la Blockchain

Ce papier présente une taxonomie des vulnérabilités d'incitations qui peuvent affecter les blockchains publiques et consortium. Cette taxonomie a pour but d'aider les chercheurs et développeurs a mieux comprendre les différentes menaces qui pèsent …

Fully Autonomous Trustworthy Unmanned Aerial Vehicle Teamwork: A Research Guideline Using Level 2 Blockchain

The vast range of possible fully autonomous multiunmanned aerial vehicle (multi-UAV) operations is creating a new and expanding market where technological advances are happening at a breakneck pace. The integration of UAVs in airspaces (not just for …

Proof-of-Work is a Stigmergic Consensus Algorithm: Unlocking Its Potential

The proof-of-work (PoW) algorithm has been initially used in Bitcoin and is now one of the mainstream consensus algorithms to create immutable ledgers of transactions. However, it is still not very well understood, and as such, its entire strength …

Special Issue on the Blockchain in Intelligent Robotics and Automation Applications