Abstract
Shared interests often serve as the basis for the formation of community. Yet it is often difficult to find others on the net who share one’s interests, due to the large size of the network, the difficulty of finding newsgroups, mailing lists, and discussion groups that reflect possibly unusual interests, and because most people do not often post.
To address these issues, I have designed and am implementing Yenta, a system that safely and securely introduces people on the Internet who share some similar interests, and that enables the automatic formation of interest groups based on these shared interests. Yenta is a system of distributed, individual agents, each instantiation of which is run by an individual user. Each user’s Yenta discovers its user’s interests by direct examination of the user’s personal files. It then finds groups of similar users without divulging sensitive information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ackerman, Mark S., and Palen, Laysia, “The Zephyr Help Instance: Promoting Ongoing Activity in a CSCW System,” Proceedings of the Association of Computing Machinery’s Conference on Human Factors in Computing Systems (CHI’ 96), pp. 269–275, ACM Press, Vancouver, British Columbia, Canada, 1996.
Balkovich, E., Lerman, S. R., and Parmelee, R. P., “Computing in Higher Education: The Athena Experience,” Communications of the ACM, volume 28, issue 11, pp. 1214–1224, ACM, November, 1985.
Chaum, David, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, volume 23 number 2, February, 1981.
Cornell, Gary and Horstmann, Cay, Core Java, SunSoft Press, 1996.
Crabtree, Barry, and Jennings, Nick, eds., Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, The Practical Application Company, 1996.
Crowston, Keven and Malone, Thomas, “Intelligent Software Agents,” BYTE, pp. 267–271, December 1988.
Cupid Networks, Inc, http://www.yenta.email.com/.
Dean, Drew, Felten, Edward W., and Wallach, Dan S., “Java Security: From HotJava to Netscape and Beyond,” Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6–8, 1996.
Dellafera, C. A., Eichin, M. W., French, R. S., Jedlinksy, D. C., Kohl, J. T., and Sommerfeld, W. E., “The Zephyr Notification System,” Proceedings of the Winter 1988 Usenix Technical Conference, February 1988, pp. 213–219.
Demazeau, Y. and Müller, J. P., eds., Decentralized AI, Volumes 1, 2, and 3, North-Holland, 1991, 1992, and 1993.
Electric Classifieds, Inc, http://www.match.com/.
Feldman, Paul, and Micali, Silvio, “Optimal Algorithms for Byzantine Agreement,” 20th STOC, pp. 148–161, ACM, New York, 1988.
Foner, Leonard N., “Clustering and Information Sharing in an Ecology of Cooperating Agents,” AAAI Spring Symposium on Information Gathering from Distributed, Heterogeneous Environments, Knoblock & Levy, eds., Stanford, CA, March, 1995.
Foner, Leonard, “Clustering and Information Sharing in an Ecology of Cooperating Agents, or How to Gossip without Spilling the Beans,” Proceedings of the Conference on Computers, Freedom, and Privacy’ 95 Student Paper Winner, Burlingame, CA, 1995.
Foner, Leonard N., “A Multi-Agent System for Matchmaking,” Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, Barry Crabtree and Nick Jennings, eds., The Practical Application Company, 1996.
Foner, Leonard, “A Security Architecture for a Multi-Agent Matchmaker,” The First International Conference on Autonomous Agents’ 97, Marina del Rey, 1997.
Foner, Leonard N., “Entertaining Agents: A Sociological Case Study,” Proceedings of the First International Conference on Autonomous Agents, W. Lewis Johnson, ed. Also available as “Agents Memo 93-01”, http://foner.www.media.mit.edu/people/ foner/Julia/.
Gosling, James, and McGilton, H., The Java Language Environment, Sun Microsystems, May 1995. http://java.sun.com/whitePaper/javawhitepaper_1.html
Huberman, B.A., ed., The Ecology of Computation, North-Holland, 1988.
Ingemarsson, I., and Simmons, G. J., “A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party,” Advances in Cryptology—EUROCRYPT’ 90 Proceedings, pp. 266–282, Springer-Verlag, 1991.
International Traffic in Arms Regulations, 58 Federal Register 39,280 (1993) (to be codified at 22 C.F.R.§§120-128, 130).
Kautz, Henry, Milewski, Al, and Selman Bart, “Agent Amplified Communication,” AAAI’ 95 Spring Symposium Workshop Notes on Information Gathering in Distributed, Heterogeneous Environments, Stanford, CA.
Kaliski, Bert, “Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services,” RFC1424, February 10, 1993, ftp://ds.internic. net:/rfc/rfc1424.txt)
Kuokka, Daniel, and Harada, Larry, “Matchmaking for Information Agents,” Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)’ 95, 1995.
Kuokka, Daniel and Harada, Larry, “On Using KQML for Matchmaking,” Proceedings of the First International Conference on Multiagent Systems, Victor Lesser, MIT Press, 1995.
Lashkari, Yezdi, Metral, Max, and Maes Pattie, “Collaborative Interface Agents,” Proceedings of the Twelfth National Conference on Artificial Intelligence, MIT Press, Cambridge, MA, 1994.
MacroView Communications Corp, http://www.sixdegrees.com/.
Maxwell, Joseph A., Qualitative Research Design: An Interactive Approach (Applied Social Research Methods Series), Sage Publications, 1996.
McQuillan, J., “Software Checksumming in the IMP and Network Reliability,” RFC528, June 20, 1973, ftp://ds.internic.net/rfc/rfc528.txt
Miles, Matthew B. and Huberman, A. Michael, Qualitative Data Analysis: An Expanded Sourcebook, SAGE Publications, Inc, Thousand Oaks, CA, 1994.
Murray, Janet, Hamlet on the Holodeck, The Free Press, Simon & Shuster, 1997.
Pease, Marshall, Shostak, Robert, Lamport, Leslie, “Reaching Agreement in the Presence of Faults,” Journal of the ACM 27/2, pp. 228–234, 1980.
Quist, Anton Braun, Excuse Me, What Was That? Confused Recollections of Things That Didn’t Go Exactly Right, Dilithium Press, 1982.
Sage Enterprises, Inc, http://www.planetall.com/.
Shardanand, Upendra. Social Information Filtering for Music Recommendation, S.M. Thesis, Program in Media Arts and Sciences, 1994.
Shardanand, Upendra and Maes, Pattie, “Social Information Filtering: Algorithms for Automating’ Word of Mouth,’” Proceedings of CHI’95, ACM Press, 1995.
Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second edition, John Wiley & Sons, 1996.
Thirunavukkarasu, Chelliah, Fini, Tom, and Mayfield, James, “Secret Agents—A Security Architecture for the KQML Agent Communication Language,” submitted to the CIKM’ 95 Intelligent Information Agents Workshop, Baltimore, MD, December 1995.
Turkle, Sherry, Life on the Screen: Identity in the Age of the Internet, Simon & Shuster, 1995.
Wolcott, Harry F., Writing Up Qualitative Research, SAGE Publications, Inc, Newbury Park, CA, 1990.
The Wall Street Journal, page B1, April 11, 1995.
Zimmermann, Philip, The Official PGP User’s Guide, MIT Press, 1995.
Zumoff, Joel, “Users Manual for the SMART Information Retrieval System,” Cornell Technical Report 71-95.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Foner, L.N. (1998). Community Formation via a Distributed, Privacy-Protecting Matchmaking System. In: Ishida, T. (eds) Community Computing and Support Systems. Lecture Notes in Computer Science, vol 1519. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49247-X_24
Download citation
DOI: https://doi.org/10.1007/3-540-49247-X_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65475-9
Online ISBN: 978-3-540-49247-4
eBook Packages: Springer Book Archive