paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1709.07224
2
1709
2018-07-18T08:39:08
Local Communication Protocols for Learning Complex Swarm Behaviors with Deep Reinforcement Learning
[ "cs.MA", "cs.AI", "cs.LG", "eess.SY", "stat.ML" ]
Swarm systems constitute a challenging problem for reinforcement learning (RL) as the algorithm needs to learn decentralized control policies that can cope with limited local sensing and communication abilities of the agents. While it is often difficult to directly define the behavior of the agents, simple communication protocols can be defined more easily using prior knowledge about the given task. In this paper, we propose a number of simple communication protocols that can be exploited by deep reinforcement learning to find decentralized control policies in a multi-robot swarm environment. The protocols are based on histograms that encode the local neighborhood relations of the agents and can also transmit task-specific information, such as the shortest distance and direction to a desired target. In our framework, we use an adaptation of Trust Region Policy Optimization to learn complex collaborative tasks, such as formation building and building a communication link. We evaluate our findings in a simulated 2D-physics environment, and compare the implications of different communication protocols.
cs.MA
cs
Local Communication Protocols for Learning Complex Swarm Behaviors with Deep Reinforcement Learning Maximilian Hüttenrauch1, Adrian Šošić2, and Gerhard Neumann1 1 School of Computer Science, University of Lincoln, Lincoln, UK {mhuettenrauch,gneumann}@lincoln.ac.uk 2 Department of Electrical Engineering, Technische Universität Darmstadt, Darmstadt, Germany [email protected] Abstract. Swarm systems constitute a challenging problem for rein- forcement learning (RL) as the algorithm needs to learn decentralized control policies that can cope with limited local sensing and communica- tion abilities of the agents. While it is often difficult to directly define the behavior of the agents, simple communication protocols can be defined more easily using prior knowledge about the given task. In this paper, we propose a number of simple communication protocols that can be exploited by deep reinforcement learning to find decentralized control policies in a multi-robot swarm environment. The protocols are based on histograms that encode the local neighborhood relations of the agents and can also transmit task-specific information, such as the shortest dis- tance and direction to a desired target. In our framework, we use an adaptation of Trust Region Policy Optimization to learn complex collab- orative tasks, such as formation building and building a communication link. We evaluate our findings in a simulated 2D-physics environment, and compare the implications of different communication protocols. 1 Introduction Nature provides many examples where the performance of a collective of limited beings exceeds the capabilities of one individual. Ants transport prey of the size no single ant could carry, termites build nests of up to nine meters in height, and bees are able to regulate the temperature of a hive. Common to all these phenomena is the fact that each individual has only basic and local sensing of its environment and limited communication capabilities to its neighbors. Inspired by these biological processes, swarm robotics [4,1,5] tries to emulate such complex behavior with a collective of rather simple entities. Typically, these robots have limited movement and communication capabilities and can sense only a local neighborhood of their environment, such as distances and bearings to neighbored agents. Moreover, these agents have limited memory systems, such that the agents can only access a short horizon of their perception. As a consequence, the design of control policies that are capable of solving complex cooperative tasks becomes a non-trivial problem. 2 Hüttenrauch et al. In this paper, we want to learn swarm behavior using deep reinforcement learning [21,17,22,23,10] based on the locally sensed information of the agents such that the desired behavior can be defined by a reward function instead of hand-tuning controllers of the agents. Swarm systems constitute a challenging problem for reinforcement learning as the algorithm needs to learn decentralized control policies that can cope with limited local sensing and communication abilities of the agents. Most collective tasks require some form of active cooperation between the agents. For efficient cooperation, the agents need to implement basic communi- cation protocols such that they can transmit their local sensory information to neighbored agents. Using prior knowledge about the given task, simple commu- nication protocols can be defined much more easily than directly defining the behavior. In this paper, we propose and evaluate several communication proto- cols that can be exploited by deep reinforcement learning to find decentralized control policies in a multi robot swarm environment. Our communication protocols are based on local histograms that encode the neighborhood relation of an agent to other agents and can also transmit task- specific information such as the shortest distance and direction to a desired target. The histograms can deal with the varying number of neighbors that can be sensed by a single agent depending on its current neighborhood configura- tion. These protocols are used to generate high dimensional observations for the individual agents that is in turn exploited by deep reinforcement learning to ef- ficiently learn complex swarm behavior. In particular, we choose an adaptation of Trust Region Policy Optimization [21] to learn decentralized policies. In summary, our method addresses the emerging challenges of decentralized swarm control in the following way: 1. Homogeneity: explicit sharing of policy parameters between the agents 2. Partial observability: efficient processing of action-observation histories through windowing and parameter sharing 3. Communication: usage of histogram-based communication protocols over simple features To demonstrate our approach, we formulate two cooperative learning tasks in a simulated swarm environment. The environment is inspired by the Colias robot [2], a modular platform with two wheel motor-driven movement and various sensing systems. Paper Outline In Section 2, we review the concepts of Trust Region Policy Opti- mization and describe our problem domain. In Section 3, we show in detail how we tackle the challenges of modeling observations and the policy in the partially observable swarm context, and how to adapt Trust Region Policy Optimization to our setup. In Section 4, we present the model and parameters of our agents and introduce two tasks on which we evaluate our proposed observation models and policies. Local Communication Protocols 3 2 Background In this section, we provide a short summary of Trust Region Policy Optimization and formalize our learning problem domain. 2.1 Trust Region Policy Optimization achieved over a certain period of time. Trust Region Policy Optimization (TRPO) is an algorithm to optimize control policies in single-agent reinforcement learning problems [21]. These problems are formulated as Markov decision processes (MDP) which are compactly written as a tuple (cid:104)S,A, P, R, γ(cid:105). In an MDP, an agent chooses an action a ∈ A via some policy π(a s), based on its current state s ∈ S, and progresses to state ∈ S according to a transition function P (s(cid:48) s(cid:48) s, a). After each step, the agent is the expected cumulative reward E[(cid:80)∞ assigned a reward r = R(s, a), provided by a reward function R which judges the quality of its decision. The goal of the agent is to find a policy which maximizes k=t γk−tR(sk, ak)], discounted by factor γ, In TRPO, the policy is parametrized by a parameter vector θ containing weights and biases of a neural network. In the following, we denote this parame- terized policy as πθ. The reinforcement learning objective is expressed as finding a new policy that maximizes the expected advantage function of the current pol- , where A is an estimate of the advantage func- old(s). tion of the current policy πold which is defined as A(s, a) = Qπold(s, a)− V π Herein, state-action value function Qπold (s, a) is typically estimated by a single trajectory rollout while for the value function V πold (s) rather simple baselines are used that are fitted to the monte-carlo returns. The objective is to be maxi- mized subject to a fixed constraint on the Kullback-Leibler (KL) divergence of the policy before and after the parameter update, which ensures the updates to the new policy's parameters θ are bounded, in order to avoid divergence of the learning process. The overall optimization problem is summarized as icy, i.e., J TRPO = E(cid:104) πθ A(s, a) (cid:105) πθold (cid:20) πθ (cid:21) E θ maximize subject to E[DKL(πθoldπθ)] ≤ δ. A(s, a) πθold The problem is approximately solved using the conjugate gradient optimizer after linearizing the objective and quadratizing the constraint. 2.2 Problem Domain Building upon the theory of single-agent reinforcement learning, we can now formulate the problem domain for our swarm environments. Because of their limited sensory input, each agent can only obtain a local observation o from the vicinity of its environment. We formulate the swarm system as a swarm MDP (see [24] for a similar definition) which can be seen as a special case of a decentralized 4 Hüttenrauch et al. partially observed Markov decision process (Dec-POMDP) [20]. An agent in the swarm MDP is defined as a tuple A = (cid:104)S,O,A, O(cid:105), where, S is a set of local states, O is the space of local observations, and A is a set of local actions for each agent. The observation model O(os, i) defines the observation probabilities for agent i given the global state s. Note that the system is invariant to the order of the agents, i.e., given the same local state of two agents, the observation probabilities will be the same. The swarm MDP is then defined as (cid:104)N,E, A, P, R(cid:105), where N is the number of agents, E is the global environment state consisting of all local states S N of the agents and possibly of additional states of the environment, and P : S N ×S N ×AN → [0,∞) is the transition density function. Each agent maintains a truncated history hi t) of the current and past observations oi ∈ O and actions ai ∈ A of length η. All swarm agents are assumed to be identical and therefore use the same distributed policy π (now defined as π(a h)) which yields a sample for the action of each agent given its current history of actions and observations. The reward function R of the swarm MDP depends on the global state and, optionally, all actions of the swarm agents, i.e., R : S N ×AN → R. Instead of considering only one single agent, we consider multiple agents of the same type, which interact in the same environment. The global system state is in this case comprised of the local states of all agents and additional attributes of the environment. The global task of the agents is encoded in the reward function R(s, a), where we from now on write a to denote the joint action vector of the whole swarm. t−η+1, . . . , ai t−1, oi t = (ai t−η, oi 2.3 Related Work A common approach to program swarm robotic systems is by extracting rules from the observed behavior of their natural counterparts. Kube et al [13], for example, investigate the cooperative prey retrieval of ants to infer rules on how a swarm of robots can fulfill the task of cooperative box-pushing. Similar work can be found e.g. in [16], [12], [19]. However, extracting these rules can be tedious and the complexity of the tasks that we can solve via explicit programming is limited. More examples of rule based behavior are found in [5] where a group of swarming robots transports an object to a goal. Further comparable work can be found in [6] for aggregation, [18] for flocking, or [9] for foraging. In deep RL, currently, there are only few approaches tackling the multi-agent problem. One of these approaches can be found in [15], where the authors use a variation of the deep deterministic policy gradient algorithm [14] to learn a centralized Q-function for each policy, which, as a downside, leads to a linear increase in dimensionality of the joint observation and action spaces therefore scales poorly. Another algorithm, tackling the credit assignment problem, can be found in [8]. Here, a baseline of other agents' behavior is subtracted from a centralized critic to reason about the quality of a single agent's behavior. However, this approach is only possible in scenarios with discrete action spaces since it requires marginalization over the agents' action space. Finally, a different line of work concerning the learning of communication models between agents can be found in [7]. Local Communication Protocols 5 d (b) range histogram d (a) local agent config- uration φ bearing (c) togram his- φ (d) joint histogram Fig. 1: This Figure shows an illustration of the histogram-based observation model. Figure 1a shows an agent in the center of a circle whose neighborhood relations are to be captured by the histogram representation. The shaded green area is highlighted as a reference for Figures 1c and 1d. Figure 1b hereby shows the one dimensional histogram of agents over the neighborhood range d into four bins, whereas Figure 1c shows the histogram over the bearing angles φ into eight bins. Figure 1d finally shows the two dimensional joint histogram over range and bearing. 3 Multi-Agent Learning with Local Communication Protocols In this section, we introduce different communication protocols based on neigh- borhood histograms that can be used in combination to solve complex swarm behaviors. Our algorithm relies on deep neural network policies of special ar- chitecture that can exploit the structure of the high-dimensional observation histories. We present this network model and subsequently discuss small adap- tations we had to make to the TRPO algorithm in order to apply it to this cooperative multi-agent setting. 3.1 Communication Protocols Our communication protocols are based on histograms that can either encode neighborhood relations or distance relations to different points of interest. Neighborhood Histograms The individual agents can observe distance and bearing to neighbored agents if they communicate with this agent. We assume that the agents are constantly sending a signal, such that neighbored agents can localize the sources. The arising neighborhood configuration is an important source of information and can be used as observations of the individual agents. One of the arising difficulties in this case is to handle changing number of neighbors which would result in a variable length of the observation vector. Most policy representations, such as neural networks, expect a fixed input dimension. One possible solution to this problem is to allocate a fixed number of neighbor relations for each agent. If an agent experiences fewer neighborhood relations, 6 Hüttenrauch et al. standard values could be used such as a very high distance and 0 bearing. How- ever, such an approach comes with several drawbacks. First of all, the size of the resulting representation scales linearly with the number of agents in the system and so does the number of parameters to be learned. Second, the execution of the learned policy will be limited to scenarios with the exact same number of agents as present during training. Third, a fixed allocation of the neighbor relation in- evitably destroys the homogeneity of the swarm, since the agents are no longer treated interchangeably. In particular, using a fixed allocation rule requires that the agents must be able to discriminate between their neighbors, which might not even be possible in the first place. To solve these problems, we propose to use histograms over observed neigh- borhood relations, e.g., distances and bearing angles. Such a representation in- herently respects the agent homogeneity and naturally comes with a fixed di- mensionality. Hence, it is the canonical choice for the swarm setting. For our experiments, we consider two different types of representations: 1) concatenated one-dimensional histograms of distance and bearing and 2) multidimensional histograms. Both types are illustrated in Figure 1. The one-dimensional repre- sentation has the advantage of scalability, as it grows linearly with the number of features. The downside is that potential dependencies between the features are completely ignored. Shortest Path Partitions In many applications, it is important to transmit the location of a point of interest to neighbored agents that can currently not observe this point due to their limited sensing ability. We assume that an agent can observe bearing and distance to a point of interest if it is within its communication radius. The agent then transmits the observed distance to other agents. Agents that can not see the point of interest might in this case observe a message from another agent containing the distance to the point of interest. The distance of the sending agent is added to the received distance to obtain the distance to the point of interest if we would use the sending agent as a via point. Each agent might now compute several of such distances and transmits the minimum distance it has computed to indicate the length of the shortest path it has seen. The location of neighbored agents including their distance of the shortest path information is important knowledge for the policy, e.g. for navigating to the point of interest. Hence, we adapt the histogram representation. Each partition now contains the minimum received shortest path distance of an agent that is located in this position. 3.2 Weight Sharing for Policy Networks The policy maps sequences of past actions and observations to a new action. We use histories of a fixed length as input to our policy and a feed-forward deep neural network as architecture. To cope with such high input dimensionality, we Local Communication Protocols 7 propose a weight sharing approach. Each action-observation pair in an agent's history is first processed independently with a network using the same weights. After this initial reduction in dimensionality, the hidden states are concatenated in a subsequent layer and finally mapped to an output. The homogeneity of agents is achieved by using the same set of parameters for all policies. A diagram of the architecture is shown in Figure 2. Fig. 2: This diagram shows a model of our proposed policy with three hidden layers. The numbers inside the boxes denote the dimensionalities of the hid- den layers. The plus sign de- notes concatenation of vectors. 3.3 Adaptations to TRPO In order to apply TRPO to our multi-agent setup, some small changes to the original algorithm have to be made, similar to the formulation of [11]. First, since we assume homogeneous agents, we can have one set of parameters of the policy shared by all agents. Since the agents cannot rely on the global state, the advantage function is redefined as A(h, a). In order to estimate this function, each agent is assigned the same global reward r in each time step and all transitions are treated as if they were executed by a single agent. 4 Experimental Setup In this section, we briefly discuss the used model and state representation of a single agent. Subsequently, we describe our two experimental setups and the policy architecture used for the experiments. 4.1 Agent Model The local state of a single agent is modeled by its 2D position and orientation, i.e., si = [xi, yi, φi] ∈ S = {[x, y, φ] ∈ R3 : 0 ≤ x ≤ xmax, 0 ≤ y ≤ ymax, 0 ≤ φ ≤ 2π}. The robot can only control the speed of its wheels. Therefore, we apply a force to the left and right side of the agent, similarly to the wheels of the real robot. Our model of a single agent is inspired by the Colias robot 128at−η,ot−η+116128at−η+1,ot−η+216128at−1,ot16......16×η2actionl0,1l1,1l2,1l0,2l1,2l2,2l0,ηl1,ηl2,ηm0m1m2 8 Hüttenrauch et al. (a detailed description of the robot specifications can be found in [2]), but the underlying principles can be straightforwardly applied to other swarm settings with limited observations. Generally, our observation model is comprised of the sensor readings of the short and long range IR sensors (later denoted as 'sensor' in the evaluations). Furthermore, we augment this observation representation with the communication protocols developed in the following section. Our simulation is using a 2D physics engine (Box2D), allowing for correct physical interaction of the bodies of the agents. 4.2 Tasks The focus of our experiments is on tasks where agents need to collaborate to achieve a common goal. For this purpose, we designed the following two scenarios: Task 1: Building a Graph In the first task, the goal of the agents is to find and maintain a certain distance to each other. This kind of behavior is required, for example, in surveillance tasks, where a group of autonomous agents needs to maximize the coverage of a target area while maintaining their communication links. We formulate the task as a graph problem, where the agents (i.e. the nodes) try to maximize the number of active edges in the graph. Herein, an edge is considered active whenever the distance between the corresponding agent lies in certain range. The setting is visualized in Figure 3a. In our experiment, we provide a positive reward for each edge in a range between 10 cm and 16 cm, and further give negative feedback for distances smaller than 7 cm. Accordingly, the reward function is 1[0.1 m, 0.16 m](di m) − 5 1[0 m, 0.07 m](di m), (1) M(cid:88) M(cid:88) i=1 m>i M(cid:88) M(cid:88) i=1 m>i R(s, a) = (cid:112) where di the centers of agent i and agent m and (xi − xm)2 + (yi − ym)2 denotes the Euclidean distance between m = (cid:40) 1 if x ∈ [a, b], 0 else 1[a,b](x) = is an indicator function. Note that we omit the dependence of di state s to keep the notion simple. m on the system Task 2: Establishing a Communication Link The second task adds another layer of difficulty. While maintaining a network, the agents have to locate and connect two randomly placed points in the state space. A link is only established successfully if there are communicating agents connecting the two points. Figure 3b shows an example with an active link Local Communication Protocols 9 spanned by three agents between the two points. The task resembles the problem of establishing a connection between two nodes in a wireless ad hoc network [3,25]. In our experiments, the distance of the two points is chosen to be larger than 75 cm, requiring at least three agents to bridge the gap in between. The reward is determined by the length of the shortest distance between the two points dopt (i.e. a straight line) and the length of the shortest active link dsp spanned by the agents, (cid:40) dopt R(s, a) = dsp 0 if link is established otherwise. In this task, we use the shortest path partitions as communication protocol. Each agent communicates the shortest path it knows to both points of interests, resulting in two 2-D partitions that are used as observation input for a single time step. 4.3 Policy Architecture We decided for a policy model with three hidden layers. The first two layers process the observation-action pairs (ak−1, ok) of each timestep in a history in- dividually and map it into hidden layers of size 128 and 16. The output of the second layer is then concatenated to form the input of the third hidden layer which eventually maps to the two actions for the left and right motor. (a) edge task (b) link task Fig. 3: Illustration of the two cooperative tasks used in this paper. The green dots represent the agents, where the green ring segments located next to the agents indicate the short range IR front sensors. The outer green circles illustrate the maximum range in which distances / bearings to other agents can be observed, depending on the used observation model. (a) Edge task: The red rings show the penalty zones where the agents are punished, the outer green rings indicate the zones where legal edges are formed. (b) Link task: The red dots correspond to the two points that need to be connected by the agents. 10 Hüttenrauch et al. 5 Results We evaluate each task in a standardized environment of size 1 m × 1 m where we initialize ten agents randomly in the scene. Of special interest is how the amount of information provided to the agents affects the overall system per- formance. Herein, we have to keep in mind the general information-complexity trade-off, i.e., high-dimensional local observations generally provide more infor- mation about the global system state but, at the same time, result in a more complex learning task. Recall that the information content is mostly influenced by two factors: 1) the length of the history, and 2) the composition of the obser- vation. 5.1 Edge Task First, we evaluate how the history length η affects the system performance. Figure 4a shows an evaluation for η = {2, 4, 8} and a weight sharing policy using a two-dimensional histogram over distances and bearings. Interestingly, we observe that longer observation histories do not show an increase in the performance. Either the increase in information could not counter the effect of increased learning complexity, or a history length of η = 2 is already sufficient to solve the task. We use these findings and set the history length to η = 2 for the remainder of the experiments. Next, we analyze the impact of the observation model. Figure 4b shows the results of the learning process for different observation modalities. The first ob- servation is that, irrespective of the used mode, the agents are able to establish a certain number of edges. Naturally, a complete information of distances and bearing yields the best performance. However, the independent histogram rep- resentation yields comparable results to the two dimensional histogram. Again, this is due to the aforementioned complexity trade-off where a higher amount of information makes the learning process more difficult. 5.2 Link Task We evaluate the link task with raw sensor measurements, count based histograms over distance and bearing, and the more advanced shortest path histograms over distance and bearing. Based on the findings of the edge task we keep the history length at η = 2. Figure 4c shows the results of the learning process where each observation model was again tested and averaged over 8 trials. Since at least three agents are necessary to establish a link between the two points, the models without shortest path information struggle to reliably establish the connection. Their only chance is to spread as wide as possible and, thus, cover the area between both points. Again, it is interesting to see that independent histograms over counts seem to be favorable over the 2D histogram. However, both versions are surpassed by the 2D histogram over shortest paths which yields information about the current state of the whole network of agents, currently connected to each of the points. Local Communication Protocols 11 (a) Comparison of differ- ent history lengths η. (2D histogram) (b) Edge task: Compari- son of different observa- tion models. (η = 2) (c) Link task: Compari- son of different observa- tion models. (η = 2) Fig. 4: Learning curves for (a), (b) the edge task and (c) the link task. The curves show the mean values of the average undiscounted return of an episode (i.e. the sum of rewards of one episode, averaged over the number of episodes for one learning iteration) over the learning process plus / minus one standard deviation, computed from eight learning trials. Intuitively, the return in the edge task corresponds to the number of edges formed during an episode of length 500 steps. In the link task, it is a measure for the quality of the link. Legend: 2DSP: two dimensional histogram over shortest paths, 2D: two-dimensional histogram over distances and bearings, 1D: two independent histograms over distances and bearing, d: distance only histogram, b: bearing only histogram, sensor: no histogram. 6 Conclusions and Future Work In this paper, we demonstrated that histograms over simple local features can be an effective way for processing information in robot swarms. The central aspect of this new model is its ability to handle arbitrary system sizes without discrim- inating between agents, which makes it perfectly suitable to the swarm setting where all agents are identical and the number of agents in the neighborhood varies with time. We use these protocols and an adaptation of TRPO for the swarm setup to learn cooperative decentralized control policies for a number of challenging cooperative task. The evaluation of our approach showed that this histogram-based model leads the agents to reliably fulfill the tasks. Interesting future directions include, for example, the learning of an explicit communication protocol. Furthermore, we expect that assigning credit to agents taking useful actions should speedup our learning algorithm. Acknowledgments. The research leading to these results has received funding from EPSRC under grant agreement EP/R02572X/1 (National Center for Nu- clear Robotics). Calculations for this research were conducted on the Lichtenberg high performance computer of the TU Darmstadt. 0200400600800100002,0004,0006,0008,000TRPOIterationsAverageReturnη=2.0η=4.0η=8.00200400600800100002,0004,0006,0008,000TRPOIterationsAverageReturns2D1Ddbsensor020040060080010000100200300400TRPOIterationsAverageReturns2DSP2D1Dsensor 12 Hüttenrauch et al. References 1. Alonso-Mora, J., Montijano, E., Schwager, M., Rus, D.: Distributed multi-robot formation control among obstacles: A geometric and optimization approach with consensus. In: Proceedings of the IEEE International Conference on Robotics and Automation. pp. 5356–5363 (2016) 2. Arvin, F., Murray, J., Zhang, C., Yue, S.: Colias: An autonomous micro robot for swarm robotic applications. International Journal of Advanced Robotic Systems 11(7), 113 (2014) 3. Basu, P., Redi, J.: Movement control algorithms for realization of fault-tolerant ad hoc robot networks. IEEE Network 18(4), 36–44 (2004) 4. Bayındır, L.: A review of swarm robotics tasks. Neurocomputing 172(C), 292 – 321 (2016) 5. Chen, J., Gauci, M., Gross, R.: A strategy for transporting tall objects with a swarm of miniature mobile robots. In: Proceedings of the IEEE International Conference on Robotics and Automation. pp. 863–869 (2013) 6. Correll, N., Martinoli, A.: Modeling and designing self-organized aggregation in a swarm of miniature robots. The International Journal of Robotics Research 30(5), 615–626 (2011) 7. Foerster, J., Assael, Y.M., de Freitas, N., Whiteson, S.: Learning to communicate with deep multi-agent reinforcement learning. In: Advances in Neural Information Processing Systems 29, pp. 2137–2145 (2016) 8. Foerster, J., Farquhar, G., Afouras, T., Nardelli, N., Whiteson, S.: Counterfactual multi-agent policy gradients. arXiv:1705.08926 (2017) 9. Goldberg, D., Mataric, M.J.: Robust behavior-based control for distributed multi- robot collection tasks (2000) 10. Gu, S., Lillicrap, T., Ghahramani, Z., Turner, R.E., Levine, S.: Q-prop: Sample- efficient policy gradient with an off-policy critic. In: Proceedings of the 5th Inter- national Conference on Learning Representations (2017) 11. Gupta, J.K., Egorov, M., Kochenderfer, M.: Cooperative multi-agent control using deep reinforcement learning. In: Proceedings of the Adaptive and Learning Agents Workshop (2017) 12. Hoff, N.R., Sagoff, A., Wood, R.J., Nagpal, R.: Two foraging algorithms for robot swarms using only local communication. In: Proceedings of the IEEE International Conference on Robotics and Biomimetics. pp. 123–130 (2010) 13. Kube, C., Bonabeau, E.: Cooperative transport by ants and robots. Robotics and Autonomous Systems 30(1), 85 – 101 (2000) 14. Lillicrap, T.P., Hunt, J.J., Pritzel, A., Heess, N., Erez, T., Tassa, Y., Sil- ver, D., Wierstra, D.: Continuous control with deep reinforcement learning. arXiv:1509.02971 (2015) 15. Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, P., Mordatch, I.: Multi-agent actor- critic for mixed cooperative-competitive environments. arXiv:1706.02275 (2017) 16. Martinoli, A., Easton, K., Agassounon, W.: Modeling swarm robotic systems: a case study in collaborative distributed manipulation. The International Journal of Robotics Research 23(4-5), 415–436 (2004) 17. Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015) 18. Moeslinger, C., Schmickl, T., Crailsheim, K.: Emergent flocking with low-end swarm robots, pp. 424–431 (2010) Local Communication Protocols 13 19. Nouyan, S., Gross, R., Bonani, M., Mondada, F., Dorigo, M.: Teamwork in self- organized robot colonies. IEEE Transactions on Evolutionary Computation 13(4), 695–711 (2009) 20. Oliehoek, F.A.: Decentralized POMDPs, pp. 471–503. Springer Berlin Heidelberg (2012) 21. Schulman, J., Levine, S., Moritz, P., Jordan, M., Abbeel, P.: Trust region policy optimization. In: Proceedings of the 32nd International Conference on Machine Learning. pp. 1889–1897 (2015) 22. Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: Proximal policy optimization algorithms. arXiv:1707.06347 (2017) 23. Teh, Y.W., Bapst, V., Czarnecki, W.M., Quan, J., Kirkpatrick, J., Hadsell, R., Heess, N., Pascanu, R.: Distral: robust multitask reinforcement learning. arXiv:1707.04175 (2017) 24. ŠoŠić, A., KhudaBukhsh, W.R., Zoubir, A.M., Koeppl, H.: Inverse reinforcement learning in swarm systems. In: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. pp. 1413–1421 (2017) 25. Witkowski, U., El Habbal, M.A.M., Herbrechtsmeier, S., Tanoto, A., Penders, J., Alboul, L., Gazi, V.: Ad-hoc network communication infrastructure for multi-robot systems in disaster scenarios. In: Proceedings of the IARP/EURON Workshop on Robotics for Risky Interventions and Environmental Surveillance (2008)
1905.13191
2
1905
2019-08-13T13:06:20
Ridesharing with Driver Location Preferences
[ "cs.MA", "cs.GT" ]
We study revenue-optimal pricing and driver compensation in ridesharing platforms when drivers have heterogeneous preferences over locations. If a platform ignores drivers' location preferences, it may make inefficient trip dispatches; moreover, drivers may strategize so as to route towards their preferred locations. In a model with stationary and continuous demand and supply, we present a mechanism that incentivizes drivers to both (i) report their location preferences truthfully and (ii) always provide service. In settings with unconstrained driver supply or symmetric demand patterns, our mechanism achieves (full-information) first-best revenue. Under supply constraints and unbalanced demand, we show via simulation that our mechanism improves over existing mechanisms and has performance close to the first-best.
cs.MA
cs
Ridesharing with Driver Location Preferences∗ Duncan Rheingans-Yoo1 , Scott Duke Kominers2 , Hongyao Ma3 and David C. Parkes3 1Harvard College 2Harvard Business School and Department of Economics 3Harvard School of Engineering and Applied Sciences {d rheingansyoo@college, kominers@fas, hma@seas, parkes@eecs}.harvard.edu 9 1 0 2 g u A 3 1 ] A M . s c [ 2 v 1 9 1 3 1 . 5 0 9 1 : v i X r a Abstract We study revenue-optimal pricing and driver com- pensation in ridesharing platforms when drivers have heterogeneous preferences over locations. If a platform ignores drivers' location preferences, it may make inefficient trip dispatches; moreover, drivers may strategize so as to route towards their preferred locations. In a model with stationary and continuous demand and supply, we present a mech- anism that incentivizes drivers to both (i) report their location preferences truthfully and (ii) always provide service. In settings with unconstrained driver supply or symmetric demand patterns, our mechanism achieves the full-information, first-best revenue. Under supply constraints and unbalanced demand, we show via simulation that our mecha- nism improves over existing mechanisms and has performance close to the first-best. 1 Introduction Uber connected its first rider to a driver in the summer of 2009,1 and since then, ridesharing platforms have dramat- ically changed the way people get around in urban areas. Ridesharing platforms allow a wide array of people to be- come drivers and -- in contrast to traditional taxi systems -- use dynamic "surge pricing" at times when demand exceeds supply. Properly designed, dynamic pricing improves sys- tem efficiency [Castillo et al., 2017], increases driver sup- ply [Chen and Sheldon, 2015], and makes the system reliable for riders [Hall et al., 2015]. A growing literature studies how to structure prices for rid- ers and compensation for drivers so as to optimally account for variation in supply and demand [Banerjee et al., 2015; Bimpikis et al., 2016; Castillo et al., 2017; Ma et al., 2019]. However, existing models leave aside driver heterogeneity. In practice, some drivers may prefer to drive in the city and oth- ers in the suburbs, and many prefer to end their days close to home. A matching system that treats drivers as homogeneous makes inefficient dispatches, with drivers preferring to fulfill each other's dispatches instead of their own. ∗The full version of this paper is available at arXiv:1905.13191. 1https://www.uber.com/newsroom/history/, visited 02/25/2019. The problem goes beyond simple efficiency loss. A core feature of ridesharing platforms is that drivers retain the flex- ibility to choose when and where to provide service. Every ride the platform proposes needs to be accepted voluntarily, forming an optimal response for the driver [Ma et al., 2019]. This incentive alignment simplifies participation for drivers and also makes behavior more predictable. Without account- ing for heterogeneity, a platform cannot fully understand a driver's preferences or achieve full incentive alignment. Indeed, platforms have experimented with methods to in- corporate driver heterogeneity. As of Summer 2019, Uber al- lows drivers to indicate -- twice a day -- that they would like to take trips in the direction of a particular location.2 However, mechanisms that account for driver preferences can also have unintended consequences if not designed properly. By saying "I want to drive South," a driver biases her dispatches in a way that could in principle promote more profitable trips.3 In this paper, we introduce the study of driver location pref- erence in a mechanism design framework. In Section 2, we adapt a model originally conceived by Bimpikis et al. [2016] to an economy where drivers prefer a particular location. In Section 3, we present the Preference-Attentive Rideshar- ing Mechanism (PARM), which elicits driver preferences and sets a revenue-optimal pricing policy. We show that PARM is incentive-compatible, and that it achieves the full- information, first-best revenue when supply is unconstrained or when demand is symmetric. In Section 4, we study set- tings with constrained supply and asymmetric demand, using simulations to compare the revenue and welfare performance of PARM to existing ridesharing mechanisms. We show that PARM achieves close to first-best revenue and typically out- performs even the best case for preference-oblivious pricing (where strategic behavior hurts efficiency). Proofs not pre- sented in the text are deferred to Appendix A of the full paper. 1.1 Related Work Existing research on pricing and dispatching in ridesharing platforms does not account for driver heterogeneity. We build on work of Bimpikis et al. [2016], who show that under a continuum model, and with stationary demand and 2https://help.uber.com/partners/article/set-a-driver-destination? nodeId=f3df375b-5bd4-4460-a5e9-afd84ba439b9, visited 2/25/19. 3https://therideshareguy.com/uber-drops-destination-filters- back-to-2-trips-per-day/, visited 2/25/19. unlimited supply, a ridesharing platform's revenue is maxi- mized when the demand pattern across different locations is balanced. They show via simulation that in comparison to set- ting a uniform price for all locations, pricing trips differently depending on trip origins improves revenue. Relative to the Bimpikis et al. [2016] model, we allow limited driver supply; moreover, each driver in our model has a preferred location. We thus introduce a reporting phase, in which drivers report their preferred locations. We then modify the matching and pricing formulations in order to align incentives. Ma et al. [2019] study the incentive alignment of drivers in the presence of spatial imbalance and temporal variation of supply and demand. Castillo et al. [2017] show that dy- namic pricing mitigates inefficient "wild goose chase" phe- nomena for platforms that employ myopic dispatching strate- gies. Modeling a shared vehicle system as a continuous-time Markov chain, Banerjee et al. [2017] establish approxima- tion guarantees for a static, state-independent pricing pol- icy. Ostrovsky and Schwarz [2019] study the economy of self-driving cars, focusing on car-pooling and market equilib- rium. Queuing-theoretic approaches have also been adopted: Banerjee et al. [2015] show the robustness of dynamic pric- ing; Af`eche et al. [2018] study the impact of driver autonomy and platform control; and Besbes et al. [2018] analyze the relationship between capacity and performance. (cid:80) There are various empirical studies, analyzing the impact of dynamic pricing [Hall et al., 2015; Chen and Sheldon, 2015], the labor market for drivers [Hall and Krueger, 2016; Hall et al., 2017], consumer surplus [Cohen et al., 2016], the value of flexible work [Chen et al., 2017], the gender earnings gap [Cook et al., 2018], and the commission vs. medallion lease-based compensation models [Angrist et al., 2017]. 2 Model We consider a discrete time, infinite horizon model of a ridesharing network with discrete locations, L = {1, . . . , n}. Following the baseline model of Bimpikis et al. [2016], we assume unit distances, i.e., it takes one period of time to travel in between any pair of locations. At the beginning of each time period, for each location i ∈ L, there is a continuous mass θi ≥ 0 of riders requesting trips from i. The fraction of riders at i with destination j ∈ L is given by αij ∈ [0, 1] (thus j∈L αij = 1). We assume that the components of rider de- mand θ = {θi}i∈L and α = {αij}i,j∈L are stationary and do not change over time. Riders' willingness to pay for trips are i.i.d. random variables with CDF F . Thus, for any i, j ∈ L, the number of trips demanded from i to j at price pij ≥ 0 would be θiαij(1 − F (pij)). (Riders who are unwilling to pay the stated prices for their rides leave the market.) Each driver has a preferred location τ ∈ L. Drivers receive I ≥ 0 additional utility whenever they start a period in their preferred locations (irrespective of whether they have a rider); this preferred location is private information and represents a driver's type. For each location τ ∈ L, the total mass of avail- able drivers of type τ is given by s(τ ) ≥ 0. Drivers have a discount factor of δ ∈ (0, 1), and an outside option that deliv- t=0 δtI = I/(1 − δ) < w, 4Throughout the paper, we consider δ to be very close to 1 -- this ers utility w ≥ 0.4 We assume(cid:80)∞ meaning that the utility from being in one's favorite location at all times does not outweigh the outside opportunity. A ridesharing mechanism elicits drivers' preferred loca- tions, matches drivers and riders to trips, sets riders' trip prices and drivers' compensation, and (potentially) imposes drivers' penalties for strategic behavior. Before the beginning of the first time period, the mechanism elicits the preferred locations from potential drivers. At the beginning of each period, a driver whose previous trip ended at location i chooses whether or not to provide ser- vice at location i. If a driver provides service, the mecha- nism may dispatch that driver to (i) pick up some rider with trip origin i, (ii) relocate to some location, or (iii) stay in the same location. If a rider going from i to j is picked up by some driver, then the rider pays the platform the trip price pij ≥ 0. If a driver of reported type τ is dispatched from i to ij ≥ 0, regardless of if her dis- j, the platform pays them c(τ ) patch was to pick up a rider or relocate.5 Drivers who choose not to provide service in a period can relocate to any loca- tion j in the network, are not compensated by the mechanism in this period, and may be charged a penalty Pj.6 Denote p (cid:44) {pij}i,j∈L, c (cid:44) {c(τ ) ij }i,j,τ∈L and P (cid:44) {Pj}j∈L. Based on rider demand (θ, α) and the reported supply of drivers of each type, a mechanism determines rider and driver flow, trip prices p, driver compensation c, and driver penalties P . Drivers decide whether or not to participate, consider- ing pricing, penalties, and their outside options. Given entry decisions by drivers, and decisions made by drivers since en- try, the platform then dispatches drivers to trips and processes payments and penalties accordingly in each period. 2.1 Steady-State Equilibrium In this section we will analyze a steady-state equilibrium while ignoring penalties. This will be helpful because it es- tablishes that under truthful reporting of types, drivers will always follow the proposed dispatches. We will separately handle incentives to report truthful types, considering the ef- fect of penalties on aligning these incentives. It will turn out that drivers are only charged penalties for the first time they deviate, not for future deviations. i i (cid:80) i∈L x(τ ) At the beginning of each period, let x(τ ) be the number of drivers of reported type τ at location i, and let x(τ ) (cid:44) denote the total number of drivers of reported type ij }i,j,τ∈L, ij ≥ 0 is the number of riders from i to j assigned ij ≥ 0 be the mass of drivers is natural, since an annual interest rate of 4% implies an exponential discount factor of 0.9999992 over the course of ten minutes. τ on the platform. Let the trip flow be f (cid:44) {f (τ ) where f (τ ) to drivers of type τ. Let y(τ ) 5It bears mentioning that c(τ ) ij need not be a fixed proportion of pij. In fact, Bimpikis et al. [2016] find that for certain types of net- works, making driver compensation a fixed proportion of trip price drastically reduces platform revenue. 6Drivers only choose whether to provide service at a location and cannot decline dispatches based on the trip destination. This is consistent with current ridesharing platforms, which hide trip desti- nations because of concern that drivers will cherry pick rides. i ij ≤ x(τ ) i }i,τ∈L and y (cid:44) {y(τ ) ij + y(τ ) ij ≤ θiαij(1 − F (pij)) and for all i, j ∈ L. j∈L f (τ ) τ∈L f (τ ) For a trip with origin i and destination j, of type τ at i who are dispatched to relocate to j without a rider, and set x (cid:44) {x(τ ) ij }i,j,τ∈L. No driver or rider can be matched multiple times in the same pe- riod, so assuming drivers always provide service, we have for all i ∈ L and all τ ∈ L, and (cid:80) (cid:80) rider demand exceeds driver supply (i.e., if (cid:80) timization, we can assume without loss that (cid:80) if the total τ∈L f (τ ) ij < θiαij(1−F (pij))), the mechanism may increase the trip price pij and achieve higher revenue. Therefore for revenue op- ij = θiαij(1 − F (pij)). When x(τ ) i > 0, meaning that some drivers with reported type τ are at location i, the probability that a given driver of reported type τ is dispatched to destina- tion j is (f (τ ) . Assuming a driver of type τ has truthfully reported her type and will provide service in all pe- riods, her lifetime expected utility for starting from location i is of the form ij + y(τ ) ij )/x(τ ) τ∈L f (τ ) i π(τ ) i = (c(τ ) ij + δπ(τ ) j ) f (τ ) ij + y(τ ) ij x(τ ) i + I · 1{i = τ}, (1) where 1{·} is the indicator function. The first term in (1) is the expected compensation and future utility a driver gets when dispatched to one of the n possible destinations. The second term corresponds to the idiosyncratic utility drivers get from starting trips in their favorite locations. Definition 1 (Steady-State Equilibrium). A steady-state equilibrium under pricing policy (p, c) is a tuple (f, x, y) s.t.: (C1) (Driver best-response) Drivers providing service always i > 0 ⇒ maximizes their payoff, i.e. ∀i, τ ∈ L, x(τ ) ∀k ∈ L, π(τ ) i ≥ I · 1{i = τ} + δπ(τ ) k . (C2) (Flow balance) For all locations i ∈ L and driver types (cid:88) j∈L i =(cid:80) (C3) (Market-clearing)(cid:80) τ ∈ L, x(τ ) j∈L f (τ ) ji + y(τ ) ji . τ∈L f (τ ) ij = θiαij(1 − F (pij)). (C4) (Individually rational driver entry) Participating drivers get at least their outside option w; with excess supply of drivers with type τ, all participating type-τ drivers get exactly their outside option w. ij , x(τ ) ij , y(τ ) i.e., ∀i, j, τ ∈ L, f (τ ) straints are satisfied, i.e., ∀τ ∈ L,(cid:80) (C5) (Feasibility) Rider and driver flows are non-negative, i ≥ 0; the supply con- i ≤ s(τ ). The full information first best revenue (FB) is the highest revenue a mechanism can achieve in stationary-state equilib- rium, if the mechanism has full knowledge of driver types (therefore does not need to determine dispatching and com- pensation in order to incentivize truthful reporting of types): i∈L x(τ ) pij · f (τ ) ij − c(τ ) ij (f (τ ) ij + y(τ ) ij ) (2) (cid:88) (cid:88) (cid:88) i∈L j∈L τ∈L max p,c s.t. (f, x, y) is a steady-state equilibrium under (p, c). The design problem is to compute rider prices p, driver compensation c, and driver penalties P to optimize plat- form revenue in the steady state equilibrium, in a way that drivers will truthfully report their location preferences and will choose to always provide service. 3 The Preference-Attentive Ridesharing Mechanism (PARM) We now introduce our Preference-Attentive Ridesharing Mechanism (PARM) and show that this mechanism (i) truth- fully elicits drivers' location preferences, (ii) incentivizes drivers to provide service, and (iii) achieves first-best revenue when supply is unconstrained or when demand is symmetric. 3.1 Alternate Form of the Optimization The optimization problem (2) need not be convex, and more- over, even when an optimal solution can be found, it may not incentivize drivers to report their types truthfully. Denoting W (cid:44) w(1 − δ), we present an alternative problem (3), which guarantees that any optimal solution can be converted into an optimal solution for (2) using compensation scheme (4) -- while preserving the objective. Specifically, we consider: max p,f,x,y s.t. x(τ ) i = (cid:16) (cid:88) i,j,τ∈L x(τ ) τ f (τ ) ij pij x(τ ) i + I (cid:17)− W (cid:88) (cid:88) (cid:88) i,τ∈L ji , ∀i ∈ L, ∀τ ∈ L y(τ ) (cid:88) j∈L ij = θiαij(1 − F (pij)), ∀i, j ∈ L f (τ ) i ≤ s(τ ), ∀τ ∈ L x(τ ) f (τ ) ji + τ∈L j∈L (3) i −(cid:88) j∈L ij = x(τ ) y(τ ) ij , ∀i ∈ L, ∀τ ∈ L f (τ ) j∈L f (τ ) ij , y(τ ) ij , x(τ ) i ≥ 0, ∀i, j ∈ L, ∀τ ∈ L. (cid:88) (cid:88) (cid:88) i∈L τ∈L Our approach is analogous to a similar move by Bimpikis et al. [2016] -- assuming that F is distributed U[0, 1], the solution space is convex, and the optimization problem is quadratic. We also go a step further by accounting for driver heterogeneity and the possibility of zero demand at a location, the latter by paying drivers for relocation dispatches. Consider the following compensation scheme: ij =W− I · 1{i = τ},∀i, j, τ ∈ L. c(τ ) (4) Lemma 1. Consider an optimal solution (p, f, x, y) to prob- lem (3), and let c be the compensation scheme (4). Then: (i) (p, c) is an optimal solution to optimization problem (2) with steady-state equilibrium (f, x, y); and (ii) The expected lifetime utility (payment and location value) of a truthful driver is exactly w starting from ev- ery location, i.e. π(τ ) i = w for all i, τ ∈ L. Briefly, feasible solutions to (3) satisfy conditions (C2), (C3) and (C5). Moreover, with W > I, the compensation c as in (4) is non-negative. Given (4), drivers receive utility W in expectation per period (so w over their lifetimes); this implies (C1) and (C4). Furthermore, the solution is optimal, since no compensation scheme can lower the total payment to drivers while fulfilling the same rider trip flow f. 3.2 Constructing PARM Definition 2. Given rider demand (θ, α), the Preference- Attentive Ridesharing Mechanism (PARM): 1. Elicits the location preferences from drivers. 2. Solves (3) with an additional constraint τ ≥ x(τ ) x(τ ) , ∀i ∈ L, ∀τ ∈ L i (5) for dispatching and pricing, and determine driver compen- sation by (4). 3. If a driver with reported type-τ did not provide service and relocated to location i (cid:54)= τ ∈ L, the platform treats her as a type-i driver from then on. If this is the first deviation for this driver, the driver pays penalty Pτ (cid:44) max{maxk∈L{P k→τ}, 0} for P k→τ as solved for in the following linear system: W + δ (cid:88) j f (τ ) ij + y(τ ) ij πk→τ j x(τ ) i  + πk→τ i =1{i (cid:54)= τ} (cid:88) 1{i = τ}(δw− P k→τ ) + 1{i = k}I, ∀i, k ∈ L; (6) i /x(τ ), ∀k ∈ L. x(τ ) πk→τ i w = i i The system (6) has n2 + n linear equations and n2 + n and n of the P k→τ ). Intuitively, unknowns (n2 of the πk→τ πk→τ is the expected utility of a driver of type k pretend- i ing to be of type τ and providing service everywhere except τ, where she instead relocates to k. By construction, P k→τ is the minimum penalty needed to equalize driver earnings between this deviation and truth telling plus always provid- ing service. We take the maximum over such penalties so no driver can benefit from pretending to be of type τ and employ this strategy. 7 If a driver declines to provide service but relocates to her reported preferred location, she is charged no penalty. A driver might have a legitimate (idiosyncratic) reason for not being able to provide service in a period, but if she relocates to a location she did not report as preferred, that is taken as an indication that her original report was not truthful. We now prove, under the assumption that drivers always provide service and as a result are never charged any penalty, that imposing (5) is sufficient to guarantee truthful reporting. Theorem 1. Assuming all drivers always provide service, it is a dominant strategy for drivers to report their location pref- erences truthfully under PARM. Proof. Observe that by being truthful, each driver gets utility W = w(1 − δ) per period -- getting paid W − I at preferred 7 The penalty Pτ is set to zero if P k→τ < 0 for all k ∈ L. This case arises if this deviation is itself bad for drivers of all types, in which case the only way to make the deviating drivers' utility equal to w is to pay those drivers. locations, and W at every other location. As a result, π(τ ) i = w for all i, τ ∈ L. Suppose an infinitesimal driver of type k ∈ L reports she is of type τ (cid:54)= k. At all i (cid:54)= k, τ she gains utility W per period. At k, she makes W + I because the platform, treating her as a type-τ driver, is still paying her W . At τ, she is paid W − I and does not get the extra utility I. With δ → 1, misreporting τ in place of k leads to an in- crease in the expected payoff in static steady-state equilib- rium if and only if in equilibrium, the driver with reported type τ spends more time in location k than in location τ. Considering the location of a driver with reported type τ as a Markov chain, then {x(τ ) i /x(τ )}i∈L is the stationary distri- bution. (5) then guarantees that a driver with reported type τ spends a plurality of her time at location τ, therefore no driver benefits from misreporting her type if all drivers always pro- vide service. We now consider drivers who may strategically decline to provide service and show such deviations are not useful under PARM, which updates its belief about a driver's type after deviations and imposes a penalty on the first such deviation. Theorem 2. Under PARM, it is an ex post Nash equilibrium for drivers to report their types truthfully and to always pro- vide service. Briefly, Theorem 1 and the following Lemma 2 imply that (i) a profitable misreport must be paired with post-reporting deviation(s), and (ii) the most profitable deviation must be the driver providing service everywhere except her reported preferred location. The penalties ensure the driver does not get a utility higher than w from this deviation (or any other), so there does not exist a profitable deviation. Drivers are never charged any penalty under the equilib- rium outcome, but the threat of a penalty is necessary to en- sure truthful reporting. In certain special economies, a misre- porting driver might spend many periods at her true preferred location before being sent to her reported preferred location. Without penalties, she may simply decline service and relo- cate back to her actual preferred location, thereby sacrificing one period of income for the possibility of many periods of extra idiosyncratic utility. See Appendix B of the full paper for an example and discussions. Lemma 2. Consider a driver of true type k ∈ L and re- ported type τ ∈ L, and assume that the rest of the drivers always provide service. If τ = k (truthful), always providing service is a best response. If τ (cid:54)= k, one of the following is a best-response: (i) always providing service, or (ii) providing service at every location except τ, where the driver instead drives to k. We now outline the proof of Lemma 2. We first show that a truthful driver earns W at every location, and it is always op- timal for her to provide service.An untruthful driver gets the least utility when at her reported preferred location τ, so relo- cating to τ is worse than providing service; in any period, she should either provide service or relocate to a location i (cid:54)= τ. In fact, because she is charged the same penalty for relocating to any location i (cid:54)= τ, her optimal relocation is her true pre- ferred location k. Intuitively, if she relocates to i, she will be at i and treated as type i from then on, which is sub-optimal for her unless i = k. Given that the optimal relocation is then her true preferred location -- after which she will make W ev- ery period -- the only location where she might profitably not provide service is τ, her reported preferred location and the only place she currently makes less than W in-period. 3.3 Cases with First-Best Revenue and No Penalty Although the IC constraint (5) may reduce revenue, we can characterize some settings where imposing IC does not lead to a revenue loss: when supply is unconstrained, or when rider demand is symmetric, PARM achieves the full- information first-best revenue. Furthermore, no penalty is necessary to ensure incentive compatibility. Theorem 3. Suppose s(τ ) = ∞ for all τ ∈ L. Then PARM achieves full-information first-best revenue, and no penalty is necessary to ensure incentive compatibility. Briefly, the IC constraint (5) does not bind because drivers cost less to the platform when at their preferred locations. If there are more drivers with reported type τ at location i than at τ, the platform can improve its revenue by replacing the type-τ drivers with type-i drivers (there are unlimited type-i drivers). Incentive compatibility holds without penalties be- cause each driver visits her reported preferred location before visiting any other location too many times. Thus, she cannot profitably use a misreport-plus-deviation to sacrifice one pe- riod of income for many periods of idiosyncratic utility (as described following Theorem 2). Note that the preceding ar- gument makes no assumption on the demand pattern and re- quires only the availability of supply. Definition 3. Rider demand (θ, α) is symmetric if ∀i, j, k, l ∈ L we have θi = θk and αij = αkl. Theorem 4. Suppose that rider demand is symmetric. Then we can construct a solution to optimization problem (3) with incentive compatibility constraint (5) such that PARM achieves full-information first-best revenue, and no penalty is necessary to ensure incentive compatibility. To understand Theorem 4, we prove two additional lemmas. Lemma 3. With symmetric demand, any optimal solution to (3) satisfies f (τ ) τ τ for all i, τ ∈ L. τ τ + y(τ ) ii ≤ f (τ ) ii + y(τ ) Intuitively, type-τ drivers cost less when at location τ, so it is optimal for the marginal ride they give at location τ to have a lower price than at other locations. If demand is symmetric, this means drivers with reported type-τ provide more rides at location τ than at any other location. Lemma 4. If the demand pattern is symmetric, we can con- struct an optimal solution to (3) such that for all i, j ∈ L and all τ ∈ L, f (τ ) ji and y(τ ) ij = f (τ ) ij = y(τ ) ji = 0. Intuitively, there is no need for drivers to relocate when demand is fully symmetric. Moreover, given any optimal so- lution to (3), we can construct an alternative optimal solution, where the flow of drivers of each type can be decomposed as cycles with length 2, i.e., f (τ ) ij = f (τ ) We can now sketch the proof of Theorem 4. With symmet- ric demand, Lemma 3 implies driver flow for within-location . ji trips satisfies the IC constraint (5). For all inter-location trips, Lemma 4 lets us focus only on bilateral driver flow between pairs of locations i and j. Type-τ drivers cost less at τ, so they will naturally fill more rides between τ and j than be- tween i and j -- and this holds for all j, so type-τ drivers fill more rides in and out of τ than i. Combining the two cases, drivers of type τ do not spend more time at another location i (cid:54)= τ than they do at τ, so imposing the IC constraint (5) is without loss of revenue. As in Theorem 3, incentive compat- ibility holds without penalties because each driver will visit her reported preferred location before visiting any other too many times. Thus, she cannot profitably use a misreport-plus- deviation to sacrifice one period of income for many periods of idiosyncratic utility (as described following Theorem 2). 4 Simulation Results In this section, we use simulations to analyze the revenue and social welfare under PARM for settings outside the cases cov- ered by Theorems 3 and 4 -- i.e., settings with limited supply and unbalanced demand. Social welfare is defined as the total rider value plus drivers' utilities from being in their preferred locations, mi- nus the total opportunity costs incurred by drivers. We compare PARM with the full-information first-best, and also a Preference-Oblivious Ridesharing Mechanism (PORM) which sets prices as in Bimpikis et al. [2016] without con- sidering drivers' location preferences, while assuming that drivers always follow dispatches. In Section 4.2, we also study the equilibrium outcome under PORM, allowing driver autonomy. For ease of illustration, we consider two locations L = {0, 1} throughout the analysis. 4.1 Varying Demand Patterns Suppose that there are an equal number of drivers favoring each location: s(0) = s(1) = 100. Drivers have outside option w =40, discount factor δ = 0.99, and gain utility I = 0.2W = 0.2w(1−δ) per period from being in their preferred locations. Each rider has value independently drawn ∼ U[0, 1]. Varying Total Demand. We first assume an unbalanced trip flow α00 = α10 = 0.25 and α01 = α11 = 0.75 (i.e., three quarters of riders from each location would like to go to lo- cation 1). Fixing the total demand at location 1 at θ1 = 1000, and varying θ0 from 0 to 1000, the revenue and welfare under PARM and benchmarks are as in Figure 1. Although PARM only necessarily achieves first-best revenue when θ0 = 1000 (symmetric demand), we see that PARM achieves the first- best and outperforms PORM unless θ0 is very small, such that demand from the two locations is highly asymmetric. When θ0 (cid:28) θ1, almost all rides originate and terminate at location 1, thus the first-best and PORM dispatch most drivers of both types to provide service at location 1. Fig- ure 2 illustrates the rider trip flows fulfilled by drivers of each type under different mechanisms, when θ0 = 50. To satisfy PARM's incentive compatibility (IC) constraint, how- ever, drivers of type 0 must spend a plurality of their time at location 0. Therefore, PARM completes fewer trips at loca- tion 1, dispatches more type 0 drivers to fulfill (the less prof- itable) between-location trips, and asks many type 0 drivers to (a) Revenue (b) Welfare (a) Revenue (b) Welfare Figure 1: Revenue and welfare varying demand θ0 at location 0. Figure 4: Equilibrium revenue and welfare varying I/W . 3.3 65.4 6.2 6.2 1.4 84.0 15.7 0 1 15.7 35.0 0 1 18.8 + 16.2 0 7.3 7.3 1 (a) Type 0: FB (b) Type 0: PARM (c) Type 0: PORM 0.0 100.0 0.0 100.0 1.4 84.0 0 0.0 0.0 1 0 0.0 0.0 1 0 7.3 7.3 1 (d) Type 1: FB (e) Type 1: PARM (f) Type 1: PORM Figure 2: Total rider trips fulfilled by drivers of each type, with (αi0, αi1) = (0.25, 0.75), θ = (50, 1000), and s = (100, 100). (a) Revenue (b) Welfare Figure 3: Revenue and welfare varying αi0 for i = 0, 1. relocate back to 1 once they arrive at location 0 (the numbers after the "+" sign represent driver relocation flow), resulting in lower revenue and social welfare. Varying Imbalance in Demand. Fixing θ0 = θ1 = 1000 and varying αi0 for i = 0, 1 (i.e., changing the proportion of rides with destination 0), the revenue and welfare achieved by different mechanisms are shown in Figure 3. Similar to Figure 1, PARM achieves first-best revenue and outperforms PORM for a wide range of αi0 (although demand is only symmetric when αi0 = 0.5). For similar reasons as in the above scenario, we see a decline of revenue and welfare under PARM when demand becomes highly unbalanced -- in this case, when αi0 approaches 0 or 1 and almost all riders have the same destination. 4.2 PORM in Equilibrium In this section, we analyze a scenario for which we are able to compute the equilibrium outcome given the pricing under PORM, and under the setting where drivers are given the flex- ibility to decide how to drive. Consider two locations L = 80 0 120 100 100 75 100 + 25 1 0 1 0 1 (a) Type 1: PARM Figure 5: Rider trips fulfilled by type-1 drivers, with s = (0, 200), θ = (1000, 1000), α00 = α11 = 1, α01 = α10 = 0, and I = 0.2W . (c) Type 1: PORM Eq. (b) Type 1: PORM {0, 1} and drivers of type 1 only: s(0) = 0, s(1) = 200. All trips start and end in the same location, i.e., α00 = α11 = 1. Being oblivious to drivers' preferences, PORM sets the same trip price for the two locations and expects the spatial distri- bution of drivers to be proportional to the distribution of de- mand. In equilibrium, however, more drivers decide to drive in location 1 (the preferred location), such that in each period drivers in 1 are dispatched with probability less than 1 and achieve the same expected utility as drivers in 0. Varying Location Preference I. In Figure 4, we fix de- mand θ0 = θ1 = 1000 and plot revenue and welfare as I, the idiosyncratic driver utility, varies from 0 to W . As I in- creases, welfare and revenue under PARM coincide with the first-best and increase as expected. However, revenue under PORM (assuming driver compliance) remains constant since the mechanism is oblivious to drivers' preferences. We also see a decrease in welfare and revenue achieved in equilib- rium under PORM, since more drivers decide to supply in location 1, instead of in location 0 as dispatched, resulting in unfulfilled rides in 0 and idle drivers in 1. Beyond I = 0.5W , revenue and welfare remain constant, since all drivers are al- ready supplying location 1. Figure 5 illustrates rider trip flow fulfilled by the type 1 drivers when I = 0.2W . PARM assigns more drivers to lo- cation 1 than location 0, but PORM does not. However, in equilibrium more drivers end up at location 1 anyway, lead- ing to 25 units of drivers idling at location 1. Varying Demand Ratio θ0/θ1. In Figure 6, we fix θ1 = 1000, I/W = 0.2, and vary θ0 from 0 to 2000. We see that PARM revenue coincides with the first-best and significantly exceeds the revenue of PORM. The revenue and welfare of the equilibrium outcome under PORM is much lower, how- ever, because drivers over-supply the preferred location 1, leaving rider trips in 0 unfulfilled. It is curious that with highly unbalanced demand, an increase in θ0 initially leads to reduced equilibrium revenue and welfare -- this is because with higher demand at location 0, PORM sets a higher price at location 1 and accepts fewer location 1 trips in order to com- (a) Revenue (b) Welfare Figure 6: Equilibrium revenue and welfare varying θ1/θ0 (a) Revenue (b) Welfare Figure 9: Equilibrium revenue and welfare varying s1 plete more trips in 0. The drivers, however, are only willing to drive in 0 when θ0 is high enough that the low probability of getting a ride in 1 offsets the extra utility I. Varying Demand Ratio θ1/θ0. In Figure 7, we set I/W = 0.2, θ0 = 1000 and vary θ1 from 0 to 2000. We see a sim- ilar trend as in Figure 1, with PARM doing worse than even equilibrium PORM for very small values of θ1. Figure 8 il- lustrates driver flow for θ1 = 100 = 0.1θ0 -- PARM employs drivers to idle at location 1 in order to satisfy IC, and this is very costly. It is worth noting that as θ1 increases, the social welfare achieved by the equilibrium outcome under PORM in fact does not increase, due to the increased amount of idle drivers at location 1. (a) Revenue (b) Welfare Figure 7: Equilibrium revenue and welfare varying θ1/θ0. 181.8 18.2 177.3 18.2 + 4.5 100.0 50.0 + 50.0 0 1 0 1 0 1 (a) Type 1: PORM (b) Type 1: PORM Eq. (c) Type 1: PARM Figure 8: Rider trip and idle driver flows, with θ = (1000, 100), α = [(1.0, 0.0), (0.0, 1.0)], s = (0, 200), and I = 0.2W . Varying Driver Supply s1. We now examine the effect of varying the supply of type 1 drivers (while still keeping the supply of type 0 drivers at 0). In Figure 9, we set I = 0.2W , θ0 = θ1 = 1000, and vary s1 from 0 to 1000. Revenue and welfare under PARM coincide with first-best and outperform PORM. All the mechanisms improve in profit and welfare as supply increases, but PARM is better able to use the ad- ditional drivers. Under PORM in equilibrium, drivers again over-supply the preferred location 1, causing rides at location 0 to get dropped. Eventually, there are so many drivers that they can fill all the demand, even with drivers idling at loca- tion 1. At this point, equilibrium PORM revenue coincides with PORM revenue, though the welfare is still lower. 5 Discussion We have proposed the Preference-Attentive Ridesharing Mechanism (PARM) for pricing and dispatch in the pres- ence of driver location preferences. It is an equilibrium under PARM for drivers to report their preferred locations truthfully and always provide service. PARM achieves first-best rev- enue in settings with unconstrained driver supply or symmet- ric rider demand, and we show via simulations that even out- side those scenarios, PARM achieves close to first-best wel- fare and revenue and outperforms a mechanism that is obliv- ious to location preferences. Our analysis suggests that incorporating drivers' location preferences is compatible with other aspects of ridesharing pricing and marketplace design -- even though drivers could in principle game the system by expressing preferences for locations associated with more highly compensated rides. There are two key elements to our approach that both seem likely to provide practical insight beyond the specific frame- work and mechanism considered here: First, we recognize that respecting drivers' location preferences creates value, which can at least partially substitute for cash compensa- tion. Then, we incentivize truthful location preference reve- lation through a variation on a revealed preference approach. PARM uses drivers' deviations from proposed dispatches to learn about their preference types -- a driver who chooses to drive to i instead of her assigned location is inferred to prefer location i and subsequently faces the compensation profile of other drivers with that preference. For this approach to work, it is important that preferences do not change frequently over the course of the day. Otherwise, it would be much harder to enforce incentive compatibility by tracking endogenous re- sponses to dispatch assignments. Acknowledgments We appreciate the helpful comments of Peter Frazier, Jonathan Hall, Hamid Nazerzadeh, Michael Stewart, and the Lab for Economic Design. Rheingans-Yoo gratefully ac- knowledges the support of a Harvard Center of Mathemati- cal Sciences and Applications Economic Design Fellowship, a Harvard College Program for Research and Science and En- gineering Fellowship, and the Harvard College Research Pro- gram. Rheingans-Yoo also appreciates the academic inspira- tion and personal support of Ross Rheingans-Yoo. Komin- ers gratefully acknowledges the support of National Science Foundation grant SES-1459912, as well as the CMSA's Ng Fund and Mathematics in Economics Research Fund. Ma gratefully acknowledges the support of a Siebel scholarship. [Ma et al., 2019] Hongyao Ma, Fei Fang, and David C. Parkes. Spatio-temporal pricing for ridesharing platforms. In Proceedings of the 2019 ACM Conference on Eco- nomics and Computation. ACM, 2019. [Ostrovsky and Schwarz, 2019] Michael Ostrovsky and Michael Schwarz. Carpooling and the economics of the 2019 ACM self-driving cars. Conference on Economics and Computation. ACM, 2019. In Proceedings of References [Af`eche et al., 2018] Philipp Af`eche, Zhe Liu, and Costis Maglaras. Ride-hailing networks with strategic drivers: The impact of platform control capabilities on perfor- mance. Working Paper, 2018. [Angrist et al., 2017] Joshua D. Angrist, Sydnee Caldwell, and Jonathan V. Hall. Uber vs. taxi: A driver's eye view. NBER Working Paper No. 23891, 2017. [Banerjee et al., 2015] Siddhartha Banerjee, Ramesh Johari, and Carlos Riquelme. Pricing in ride-sharing platforms: A queueing-theoretic approach. In Proceedings of the Six- teenth ACM Conference on Economics and Computation, pages 639 -- 639. ACM, 2015. [Banerjee et al., 2017] Siddhartha Banerjee, Daniel Freund, and Thodoris Lykouris. Pricing and optimization in shared In Pro- vehicle systems: An approximation framework. ceedings of the 2017 ACM Conference on Economics and Computation, pages 517 -- 517. ACM, 2017. [Besbes et al., 2018] Omar Besbes, Francisco Castro, and Ilan Lobel. Spatial capacity planning. Working Paper, 2018. [Bimpikis et al., 2016] Kostas Bimpikis, Ozan Candogan, and Daniela Saban. Spatial pricing in ride-sharing net- works. Working Paper, 2016. [Castillo et al., 2017] Juan Camilo Castillo, Dan Knoepfle, and E. Glen Weyl. Surge pricing solves the wild goose In Proceedings of the 2017 ACM Conference chase. on Economics and Computation, pages 241 -- 242. ACM, 2017. [Chen and Sheldon, 2015] M. Keith Chen and Michael Shel- don. Dynamic pricing in a labor market: Surge pricing and the supply of Uber driver-partners. Working Paper, 2015. [Chen et al., 2017] M. Keith Chen, Judith A. Chevalier, Pe- ter E. Rossi, and Emily Oehlsen. The value of flexible work: Evidence from Uber drivers. NBER Working Paper No. 23296, 2017. [Cohen et al., 2016] Peter Cohen, Robert Hahn, Jonathan Hall, Steven Levitt, and Robert Metcalfe. Using big data to estimate consumer surplus: The case of Uber. NBER Working Paper No. 22627, 2016. [Cook et al., 2018] Cody Cook, Rebecca Diamond, Jonathan Hall, John List, and Paul Oyer. The gender earnings gap in the gig economy: Evidence from over a million rideshare drivers. Working Paper, 2018. [Hall and Krueger, 2016] Jonathan V. Hall and Alan B. Krueger. An analysis of the labor market for Uber's driver- partners in the United States. NBER Working Paper No. 22843, 2016. [Hall et al., 2015] Jonathan V. Hall, Cory Kendrick, and Chris Nosko. The effects of Uber's surge pricing: A case study. Working Paper, 2015. [Hall et al., 2017] Jonathan V. Hall, John J. Horton, and Daniel T. Knoepfle. Labor market equilibration: Evidence from Uber. Working Paper, 2017. Appendix We provide in Appendix A the proofs that are omitted from the body of the paper. We present in Appendix B an example of an incentive issue when no penalty is imposed. A Proofs A.1 Proof of Lemma 1 Lemma 1. Consider an optimal solution (p, f, x, y) to prob- lem (3), and let c be the compensation scheme (4). Then: (i) (p, c) is an optimal solution to optimization problem (2) with steady-state equilibrium (f, x, y); and (ii) The expected lifetime utility (payment and location value) of a truthful driver is exactly w starting from ev- ery location, i.e. π(τ ) i = w for all i, τ ∈ L. Proof. The first term of the objective of (3) is the same as the income portion of the objective of (2). The constraints on this optimization are exactly the equilibrium conditions (C2), (C3) and (C5). Thus, it suffices to devise a compensation scheme where driver income everywhere is exactly equal to outside option, i.e. π(τ ) i = w (this will necessarily satisfy (C1) and (C4)). This will be revenue-optimal because by (C4) drivers cannot be making less than w. Consider compensation scheme (4): ij =W− I · 1{i = τ} c(τ ) The second term means that any idiosyncratic utility a driver gets is extracted by the platform, so any dispatched driver makes exactly W in that period. Thus, π(τ ) i = w = W 1−β exactly when probability of dispatch at every location is 1, i.e. x(τ ) i = f (τ ) ij + y(τ ) ij , ∀i ∈ L, ∀τ ∈ L (cid:88) j∈L This is equivalent to the second-to-last constraint of (3), so i = w, ∀i ∈ L, so any optimal solution to (3) will have π(τ ) (C1) and (C4) are satisfied. Thus an optimal solution to (3) corresponds to an optimal solution to (2) under compensation scheme (4). A.2 Proof of Theorem 2 Theorem 2. Under PARM, it is an ex post Nash equilibrium for drivers to report their types truthfully and to always pro- vide service. Proof. By Theorem 1, if a driver is going to always provide service, she cannot profitably misreport. By Lemma 2, if a driver reports her type truthfully, it is not profitable for her to strategically decline to provide service. So for a misreport to be profitable, it must be paired with post-reporting devi- ation (strategically declining to provide service). Lemma 2 characterizes what this deviation must be: providing service everywhere except her reported preferred location. There she instead drives to her true preferred location. Thus to show incentive compatibility without penalty, it suffices to show this strategy is not more profitable than truth- fully reporting and always providing service. Recall how we calculate penalties:  f (τ ) ij + y(τ ) ij xi πk→τ j W + δ (cid:88) j πk→τ i ,∀k. πk→τ i =1{i (cid:54)= τ} (cid:88) i i(cid:80) x(τ ) j x(τ ) j w = + I · 1{i = k} + 1{i = τ}(δw − P k→τ ),∀i, k; Where Pτ (cid:44) max{maxk∈{P k→τ}, 0}. If we had set penal- ties for switching types from k to τ to be P k→τ , a driver of type k pretending to be type τ following the strategy from Lemma 2 would get utility as defined in (6). The first term is the compensation from providing service at locations that are not τ. The second term is idiosyncratic utility from being at her favorite location. The third term is the utility from de- clining to provide service at τ and driving to k, after which she pays the penalty, the platform updates her type, and she makes w afterwards. Then with random initialization, by (6) the driver's expected utility is exactly w. Because we set Pτ = maxk P k→τ , The equality in (6) is an inequality, but still the driver's expected utility is no more than w, which is what she would make by reporting truthfully and always pro- viding service. Therefore, it is a best response for each driver to report truthfully and always provide service. A.3 Proof of Lemma 2 Lemma 2. Consider a driver of true type k ∈ L and re- ported type τ ∈ L, and assume that the rest of the drivers always provide service. If τ = k (truthful), always providing service is a best response. If τ (cid:54)= k, one of the following is a best-response: (i) always providing service, or (ii) providing service at every location except τ, where the driver instead drives to k. Proof. Suppose we have a driver of type τ who has reported she was of type j. If j = τ, then the driver makes W every period she provides service. If j (cid:54)= τ, the driver makes W +I every period she provides service at τ (extra utility but not paid less), makes W − I every period they provide service at j (paid less but not extra utility), and makes W every period elsewhere. First, we will show that the driver will never choose to not provide service and drive to τ. This move will not change how the platform treats the driver in the future. So in either case (j = τ and j (cid:54)= τ) the driver has lost W in income and then relocated to the location where she makes weakly least in the network. This is not profitable, so the driver will not choose to not provide service and drive to τ. Next, we will show that if a driver chooses to not provide service, she will drive to her true preferred location. Sup- pose this driver of type τ declines to provide service. As es- tablished in the previous paragraph, she will not relocate to her previously reported preferred location, so she may pay a penalty, but the penalty is the same no matter where she relo- cates to. she has the choice of where to drive in the network and will choose the location i that maximizes her expected lifetime earnings given that she will be treated as type-i in the future. If location i is such a best-response choice, then for every future deviation, the symmetry of the situation im- plies that i will be a best-response choice then too. So we can assume that for all future deviations, the driver drives to i. In the case that i = τ, the driver expects to make W = w(1 − δ) in every period after arriving at location τ. Now suppose that i (cid:54)= τ. The driver gets utility W +I every period she is at location τ, and W −I every period she is at i, and W everywhere else. With δ → 1, this means choice of i (cid:54)= τ can only be better than τ if she spends more time at τ than i before her next deviation, at which point she faces the same choice. However, we know that x(i) τ , which by the Ergodic Theorem implies that a driver treated as type-i will spend on average at least as much time at location i than location τ. This implies that if the deviant driver starts at location i, the expected number of times she visits location τ before return- ing to i is at most 1 (otherwise she would spend more time on , where t is the number of time periods and N (i) j (t) is the num- ber of periods in which the driver is in location j. So there is no time in the future by which point the driver expects to have been at τ more than i if she follows platform instruc- tions. The driver can deviate from platform instructions, but as established previously, without loss of best response she will drive to location i, which puts in the same position as before. average at τ than i). So for any t, E(cid:104) (cid:105) ≤ E(cid:104) i ≥ x(i) τ (t) N (i) N (i) (cid:105) (t) Finally, we will show that a driver will choose to provide service everywhere if j = τ and will choose to provide ser- vice everywhere except possibly j if j (cid:54)= τ. We have already established that a driver's best relocation is her true preferred location but that a driver will not decline to provide service and drive to her previously reported preferred location. It follows immediately that truthful drivers (those whose pre- viously reported preferred location is their true preferred lo- cation) will always provide service. So we assume j (cid:54)= τ. Because a driver's post-deviation relocation is her preferred relocation, she will make W in every period thereafter, after paying the platform a penalty. Before deviation, the driver makes W + I at τ, W − I at j, and W everywhere else. So the only location she might not want to provide service at is j. Everywhere else her earnings are the same as post-deviation, and the only time it will be less is when at j. So the driver will always choose to provide service at locations other than j. i A.4 Proof of Theorem 3 Theorem 3. Suppose s(τ ) = ∞ for all τ ∈ L. Then PARM achieves full-information first-best revenue, and no penalty is necessary to ensure incentive compatibility. Proof. We show full-information first-best revenue by show- ing the IC constraint does not bind. Consider an optimal so- lution to (3) without IC constraint (5). The flow constraint j allows us to decompose the flow of type-τ drivers into cy- cles with various mass. Suppose one of these cycles does not go through location τ. Then it is optimal to replace that driver flow with drivers of type-j, for location j in the cy- cle. (this can necessarily happen because there is no supply constraint). The new drivers do exactly what the old drivers did, so the demand met is exactly the same and the flow con- straints are still satisfied. However, they end up in their pre- ferred location strictly more, so the last term of the objective strictly increases. So the previous solution was not optimal. So all the cycles of type-τ driver flow go through location τ. ,∀τ, j because all flow of τ drivers This means x(τ ) through j also goes through τ. So any optimal solution to (3) naturally satisfies the IC constraint (5). So imposing the IC constraint does not lead to an objective loss. τ ≥ x(τ ) We show no penalty is necessary to achieve incentive com- patibility by showing that the strategy described in Lemma 2 is not profitable. Consider δ → 1 and suppose a driver of type τ reports he is of type i. Every time he visits location τ, he will visit location i before returning to τ. Otherwise, there would be some non-negative flow in a cycle through τ but not through i, which the platform could more optimally fill with reported type-τ drivers. So the driver will always eventually visit i and will never visit location τ more than once before doing so. The driver makes W +I at location τ, then W every period before giving a ride to i, then 0 at location i, before re- locating to τ and being thereafter treated as τ, making W in every subsequent period. So compared to truthful behavior, the driver makes a maximum of I extra at τ and loses a min- imum of W ≥ at location i before revealing his true type and making W every period thereafter. With δ → 1, this strategy is not more profitable than truthful reporting and always pro- viding service. So even without a penalty, PARM is incentive compatible. A.5 Proof of Lemma 3 Lemma 3. With symmetric demand, any optimal solution to (3) satisfies f (τ ) τ τ for all i, τ ∈ L. τ τ + y(τ ) ii ≤ f (τ ) ii + y(τ ) ii = y(τ ) Proof. Consider an arbitrary i, τ. First notice that in any optimal solution, y(τ ) τ τ = 0 because these are the drivers are not fulfilling rides and staying in the same location, which adds cost to the system without fulfilling demand or helping to satisfy any of the constraints. Next, if τ τ > 0 for j (cid:54)= τ, then it is more optimal to f (τ ) ii > 0 and f (j) switch drivers of type j going τ → τ with drivers of type τ going i → i. This fulfills the same demand, but with less cost because you have drivers of type τ at location τ more. This violates the optimality of the original solution, so we can τ τ = 0 ∀j (cid:54)= τ and that ∃j (cid:54)= τ assume that f (τ ) s.t. f (j) ii = 0. So we find ourselves in one of two cases: ii > 0 ⇒ f (j) τ τ > 0 ⇒ f (τ ) ii = 0: If this is the case, then f (τ ) ii ≤ f (τ ) τ because Case 1. f (τ ) τ τ ≥ 0. f (τ ) Case 2. f (τ ) f (τ ) ii > f (τ ) τ τ . Then(cid:80) ii > 0: Then f (j) ii > (cid:80) j f (j) τ τ = 0 ∀j (cid:54)= τ. Suppose τ τ ⇒ pii < pτ τ be- j f (j) cause the demand pattern is symmetric. I will show it is more optimal for the platform to raise pii, f (τ ) τ τ and lower pτ τ , f (τ ) ii by infinitesimal amounts. Making substitutions and differen- tiating, we get the derivative of the first term of the objective with respect to pii is given as follows: OBJ1 = 1 − 2 pii θiαii d dpii We know that θiαii = θtαtt and that pii < pτ τ . So d dpii OBJ1 > d dpτ τ OBJ1 τ τ ∀i, τ. ii ≤ f (τ ) So the platform can make a marginal increase in the first term of the objective by raising pii and lowering pτ τ by infinitesi- mal amounts, shifting an infinitesimal amount of f (τ ) to f (τ ) τ τ ii to make the market clear. The same number of drivers are in the system, so it does not change the second term of the objective. And it increases the third term in the objective because we just shifted drivers of type τ to only be at lo- cation τ. So this shift brings us to a more optimal solution, which is a contradiction. So without the IC constraint im- posed, f (τ ) A.6 Proof of Lemma 4 Lemma 4. If the demand pattern is symmetric, we can con- struct an optimal solution to (3) such that for all i, j ∈ L and all τ ∈ L, f (τ ) Proof. Consider an optimal solution to the platform's opti- mization problem. Now set pij = pji and f (τ ) ij + f (τ ) ji ), y(τ ) ji ). The same number of drivers of each type is used, so the supply constraint is still satis- fied. Flow into and out of a location before was the same, so it will be the same now too, so the flow constraint is sat- isfied. And the symmetry of the demand pattern implies that θiαij = θjαji and so if the market cleared before, setting prices and flows to be the same will still clear the market. ji and y(τ ) ij = f (τ ) ij + y(τ ) ij = y(τ ) ij = 1 ji = 0. ij = 1 2 (f (τ ) 2 (y(τ ) So all we need to show is that revenue is weakly better when pij = pji, holding number of drivers used (and thus pij + pji) constant. Let pij + pji = q. Then isolating the part of the objective that changes under this switch yields: θiαijpij(1 − pij) + θjαjipji(1 − pji) =θiαijpij(1 − pij) + θiαij(q − pij)(1 − (q − pij)) (cid:16) ∂ ∂pij =θiαij 0 =2q − 4pij pij = q 2 (cid:17) 1 − 2pij − 1 + 2q − 2pij So holding pij + pji constant, equal prices is optimal. So any solution to the optimization problem can be made without loss of optimality into a solution with f (τ ) ij = ji ∀i, j, τ. Having drivers flowing back and forth without y(τ ) giving rides is sub-optimal, so this implies y(τ ) ji = 0. ij = f (τ ) ij = y(τ ) , y(τ ) ji A.7 Proof of Theorem 4 Theorem 4. Suppose that rider demand is symmetric. Then we can construct a solution to optimization problem (3) with incentive compatibility constraint (5) such that PARM achieves full-information first-best revenue, and no penalty is necessary to ensure incentive compatibility. τ j(cid:54)=i f (τ ) ji > f (τ ) ij >(cid:80) Proof. We will show full-information first-best revenue by showing the IC constraint does not bind. By Lemma 3, ii ≤ the symmetry of the demand pattern means that f (τ ) τ τ ∀i, τ. By Lemma 4, we can restrict our attention to so- f (τ ) lutions where all flow of drivers is bilateral and there are no i > x(τ ) floating drivers. Suppose in an optimal solution x(τ ) . τ j , which in turn implies ij = f (τ ) τ j = f (τ ) jτ . This implies(cid:80) j(cid:54)=τ f (τ ) that there exists a location j s.t. f (τ ) We find ourselves in one of two cases: 1. Exists k (cid:54)= τ s.t.f (k) τ j = f (τ ) jτ > 0. Then we can switch some type-τ drivers going i → τ → i with some type k drivers going τ → j → τ. Formally, we make f (k) ij , f (τ ) smaller by  and make f (τ ) τ j , f (τ ) jτ , f (k) larger by . All the same demand is filled, the same number of drivers of each type are used, and we've swapped drivers in a way that preserves the flow constraint, so all the constraints are satisfied. We've just strictly increased x(τ ) τ while weakly increasing xkk (in- crease in the case that k = i), which decreases our cost. This improvement is a contradiction with the optimality of the original solution. τ j , f (k) ij , f (k) 2. DNE k (cid:54)= τ s.t. f (k) k f (k) ji > (cid:80) τ j = (cid:80) ij = jτ . The symmetry of the demand pattern then implies that pij = pji < pτ j = pjτ , and so it is an objective improvement to raise pij, pji, f (τ ) ij , f (τ ) ji by . This violates the optimality of the original solution. jτ by  and lower pτ j, pjτ , f (τ ) jτ > 0. Then (cid:80) τ j = f (τ ) τ j , f (τ ) jτ , f (τ ) (cid:80) k f (k) k f (k) k f (k) ji ji So there exists an optimal bilateral-flow solution, and this so- lution must have x(τ ) τ ∀i, τ. i ≤ x(τ ) We will show no penalty is necessary to achieve incen- tive compatibility by showing that the deviation described in Lemma 2 is not profitable for the solution constructed in Lemma 4. Consider δ → 1. We know that for all i, j, τ that iτ ≥ f (τ ) f (τ ) ij , so a driver of reported type τ is more likely to be sent to τ than j no matter what location she is at. So, with random initialization of drivers, a driver of type j pretend- ing to be type τ is more likely to be sent to τ before than j than the other way around. Even if sent to j first, she is more likely than not to visit τ before visiting j again. When the driver visits j, she declines to provide service, giving up W in income and then relocating to τ, making W in every sub- sequent period. When the driver visits τ, she gets I ≤ W in extra idiosyncratic utility. However, the probability she visits i (and lose W ) before τ is at least 1 2. So from the beginning of the game to the end of her first period in location τ or i, she loses more in expectation than she gains. Even if she is sent to τ first, the probability she visits i (losing W and then revealing her true preference) before returning to τ and mak- ing another I is less than 1 2, so she is still making less than if she had truthfully reported and always provided service. B Incentive Problem Without Penalty Figure 10 illustrates driver flow for θ1 = θ0 = 100, α = [(1.0, 0.0), (0.0, 1.0)], s = (200, 5), I = 0.2W . Importantly, there is no demand between locations, so once a driver is as- signed to a location, they will continue giving rides there and never visit another location, unless they decline to provide service in a period and relocate. Then a type 1 driver has a useful deviation. She reports that she is type 0, then if she is sent to location 1, she provides service in every period. Thus she prefers location 1 but is being paid as if she does not, and is never sent to location 0 (where she would be paid less) because there is no demand between locations. If this happens, she gets utility w + I 1−δ = 48 over her lifetime. If instead she is sent to location 0, she does not provide ser- vice the first period and relocates to location 1, after which she provides service and the platform treats her as type 1. If this happens, she gets utility w − W = 39.4 over her life- time. So her expected lifetime utility from this deviation is 59 · 39.4 + 25 59 · 48 ≈ 43.16, which is greater than her util- 34 ity from reporting truthfully and providing service, which is w = 40. So this deviation is useful. The key thing going on here is that although more type 0 drivers are at location 0 than 1, an individual type 0 driver might spend their entire lifetime at location 1, which incentivizes type 1 drivers to misreport, taking the risk of one lost period of income in order to get a lifetime of idiosyncratic utility. In this case, the markov chain describing the movement of a type 0 driver is discon- nected, but this issue also occurs when the markov chain is only very weakly connected and the driver is balancing one period of income versus many periods of idiosyncratic util- ity. The penalty is calculated such that if a driver does the deviation described here, the extra loss when they decline to provide service makes the deviation not useful. And in our proof of Theorem 2, we show that this deviation is the best of all non-truthful strategies, so the penalty ensures incentive compatibility. 34 0 25 1 0 0 5 1 (a) Type 0: PARM (b) Type 1: PARM Figure 10: Rider trip and idle driver flows, with θ = (100, 100), α = [(1.0, 0.0), (0.0, 1.0)], s = (200, 5), and I = 0.2W .
1902.09687
1
1902
2019-02-26T01:15:47
Market-Based Model in CR-WSN: A Q-Probabilistic Multi-agent Learning Approach
[ "cs.MA", "cs.GT" ]
The ever-increasingly urban populations and their material demands have brought unprecedented burdens to cities. Smart cities leverage emerging technologies like the Internet of Things (IoT), Cognitive Radio Wireless Sensor Network (CR-WSN) to provide better QoE and QoS for all citizens. However, resource scarcity is an important challenge in CR-WSN. Generally, this problem is handled by auction theory or game theory. To make CR-WSN nodes intelligent and more autonomous in resource allocation, we propose a multi-agent reinforcement learning (MARL) algorithm to learn the optimal resource allocation strategy in the oligopoly market model. Firstly, we model a multi-agent scenario, in which the primary users (PUs) is the sellers and the secondary users (SUs) is the buyers. Then, we propose the Q-probabilistic multiagent learning (QPML) and apply it to allocate resources in the market. In the multi-agent interactive learning process, the PUs and SUs learn strategies to maximize their benefits and improve spectrum utilization. Experimental results show the efficiency of our QPML approach, which can also converge quickly.
cs.MA
cs
1 Market-Based Model in CR-IoT: A Q- Probabilistic Multi-agent Learning Approach Dan Wang, Wei Zhang, Bin Song*, Xiaojiang Du, IEEE, and Mohsen Guizani Abstract -- The ever-increasingly urban population and its material demands have brought an unprecedented burden to cities. Smart cities leverage emerging technologies like CR-IoT to provide better QoE and QoS for all citizens. However, resource allocation is an important problem in CR-IoT. Currently, this problem is handled by auction theory or game theory. To make CR-IoT nodes smarter and more autonomously allocate resources, we propose a multiagent reinforcement learning (MARL) algorithm to learn the optimal resource allocation strategies in the oligopolistic market model. Firstly, we model a multi-agent scenario with two primary users (PUs) as sellers and multiple secondary users (SUs) as buyers, which is a Bertrand market model. Then, we propose the Q-probabilistic multiagent learning (QPML) and apply it for allocating resource in a market. In the situation of multiagent interaction, the PUs and SUs learn strategies to maximize their revenue. Experimental results prove our multiagent learning approach performs well and convergence also well. Index Terms -- CR-IoT, MARL, resource allocation, market model I. INTRODUCTION addressing urban W ITH the increasing world's population of cities, there has been estimated to increase to over 65 percent by 2050 of the total population [1]. Such rapid population growth and material demands are bringing an unprecedented burden to cities, such as urban infrastructure and social fabric. Therefore, for accelerating urbanization and creating a livable environment for worldwide urban residents, the smart city is proposed [2]. A smart city is one which leverages Information Communications Technology (ICT) and emerging technologies such as the Internet of Things (IoT), cloud computing and big data mining to provide the best quality of life for all citizens while minimizing the consumption of energy and resources. resource-strapped, The IoT is regarded as one of the most critical enabling technologies in the construction of the smart city. With the implementation of smart cities, a large number of various devices have been deployed everywhere [3]. According to the forecasts [4], more than 50 billion devices will be connected to This work has been supported by the National Natural Science Foundation of China (Nos.61772387), the Fundamental Research Funds of Ministry of Education and China Mobile(MCM20170202), and also supported by the ISN State Key Laboratory. D. Wang and B. Song (corresponding author) are with the State Key Laboratory of Integrated Services Networks, Xidian University, 710071, China (e-mail: [email protected], [email protected]) the IoT by the year 2020, which will provide a seamless connection between things and networks in smart cities [5]. Accessing so many devices in the IoT is posing many new and unprecedented opportunities and challenges, such as the ever- growing data and ever-increasing demands for spectrum resources, as well as the rationality of management and use of spectrum resources. If not addressed the above problems, these will become the bottleneck of the future IoT and smart city, especially the usage problem of spectrum resources [6]. Consequently, to solve these problems, many types of research have been done in industry and academia. In [6], the CR-IoT is proposed, which considers the emerging cognitive radio (CR) technology and cognitive radio network (CRN) in the IoT. CR enable IoT nodes to intelligently and dynamically manage themselves, effectively utilize spectrum communications resource, avoid resource waste, and improve spectrum efficiency. However, there are still existing some problems in real-time resource allocation in CR-IoT, for example, a centralized resource allocation mechanism leads to high network cost and low resource utilization. From another point of view, resources are cost-effective and resource utilization should be maximized at the lowest cost (that is, resources are no longer wasted). A fully distributed and autonomous resource allocation policy should be considered as a feasible solution [7]. Therefore, a sophisticated resource allocation mechanism in CR-IoT is expected, which in addition to being capable of improving resource utilization, can have smarter learning and decision-making capabilities to allocate resource by interacting with the environment. Up to now, game theory and auction theory are two prevalent tools for modeling and analyzing interactive decision-making processes. However, these approaches not very "smart" in decision-making, which lacks autonomy and self-adaptation. Fortunately, the era of artificial intelligence (AI) is coming [8]. The AI technologies pave the way for resource allocation in CR-IoT, like reinforcement learning (RL) method [9]. In this paper, we focus our emphasis on the CR-IoT scenario and propose a resource allocation W. Zhang is with the Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, China (email: [email protected]) X. Du is with Dept. of Computer and Information Sciences, Temple University, Philadelphia PA 19122, USA (email: [email protected]) M. Guizani is with Dept. of Electrical and Computer Engineering, University of Idaho, Moscow, ID 83844, USA (email: [email protected]) 2 mechanism from a relatively novel perspective - the market economy. Generally, the market is a natural multi-agent system. As illustrated in Fig. 1, we focus on a CR-IoT scenario, which is considered as an oligopolistic market from an economic perspective. In this paper, from the perspective of the cost and benefit of the market economy, we present a market economy model of resource allocation. We consider one scenario that there are two primary users (PUs) and multiple secondary users (SUs) in the Bertrand market. To make CR-IoT nodes intelligently and autonomously allocate resources, we propose a multiagent reinforcement learning (MARL) algorithm to learn the optimal resource allocation strategies in the market model. To motivate fair allocation and use of resources with a fully distributed autonomous manner in CR-IoT. Our contributions in this work are as follows. (1) We have described the price decision problem of the Bertrand market as a distributed multi-agent dynamic resource allocation problem; (2) We have modeled the two PUs and multiple SUs scenario as an oligopolistic market, from the perspective economic theory; (3) We have analyzed the behaviors of PUs and SUs in the multi-agent system; (4) We have proposed the Q-probabilistic multi-agent learning (QPML) and applied it for allocating resources in the Bertrand market. The remainder of this paper is organized as follows. Section 2 briefly introduces the related work of resource allocation in CR-IoT. Following that, we expound a multi-agent market model design in section 3. Then we propose the Q-probabilistic multi-agent learning and applied it for allocating resource in the Bertrand market in section 4. Section 5 indicates that the performance of our proposed algorithm is better verified by experiments. And section 6 concludes the paper. II. RELATED WORK Resource allocation in CR-IoT is challenging, and a lot of works has been done in academia in recent years. In the following sections, we first review some of the recent kinds of literature that address resource allocation issues in different ways. Then, we discuss the latest research on applying artificial intelligence (AI) algorithms to solve the resource allocation problem. A. Game Theory It analyzes Game theory is a powerful mathematical tool for learning interactive decision-making processes. the interaction strategies among players, and each player gains its own maximum benefit by game [10]. Nowadays, game theory has been widely recognized as a popular tool in many fields such as economics, engineering, science and computer science. Also, leveraging game theory for CRN resource allocation has become a hot research topic. An introduction to the application of game theory in CRN is provided in [11], which details the most fundamental concepts of game theory and explains how to use these concepts in cognitive tasks. Specifically, this paper Fig. 1. A CR-IoT scenario of two primary users (PUs) and multiple secondary users (SUs). This scenario is considered as an oligopolistic market. discusses four kinds of game theory methods in spectrum sharing, namely non-cooperative games, cooperative games, stochastic games, economic games. A detailed overview of cooperative game and non-cooperative game model applications in CR spectrum allocation is presented in [12]. In a similar literature, a non-cooperative spectrum sharing games in CRN has been discussed in [13], such as repeated game, potential game and supermodular game. A resource allocation based on game theory for distributed implementation has been presented in [14], mainly considering the potential games and coexistence problems of two wireless networks operating on the same spectrum. In addition, in [12], a spectrum trading was also discussed. It formulates the game problem between the primary user and multiple secondary users, with the theory of evolutionary game and non-cooperative game. In addition, game theory has been used to address resource allocation issues in various scenarios of the IoT, like device-to-device (D2D) communication scenarios [15]. B. Auction Theory Auction theory and its application are an important branch of economics and now be used to solve various engineering problems [16]. During the auction, the buyers submit the bids and sellers submit the sale. The actual item or service can be regarded as the auction commodity. Then trade according to the preferences of buyers and sellers. The auction can be designed for different types of radio resource allocation issues [17], such as a reverse auction, double auction and combinatorial auction all can be used for a different scenario. Joint spectrum allocation and relay allocation are modeled as hierarchical auctions in [18]. Moreover, the two auction mechanisms are proposed to improve spectrum utilization and increase the use of spatial diversity in the CRNs. In addition, auction theory can be combined with game theory and applied to dynamic resource allocation problems. In [19], the author presented an auction- based approach that uses game theory mechanism in a non- cooperative environment and repeats the game with incomplete information to determine bidders in the auction, thereby making resource provider to obtain maximum benefits and users obtain the resources they need. Both of the above methods are derived from the perspective 3 of economics and can be used to solve the problem of dynamic resource allocation in cognitive wireless networks. Game theory tends to study the behavioral strategies of agents to maximize the benefits. However, the auction theory is more commercial and more dependent on market factors. The auction is usually designed to address resource allocation issues. From the perspective of economics, as the number of agents continues to increase, the ability to rationally allocate resources using these two methods will continue to decline due to inadequate adaptability and self-organization capabilities. C. Reinforcement Learning Recently, the emerging technology reinforcement learning also has decision-making capability, which is similar to the two approaches above. RL is a dynamic online learning method, which mainly includes single-agent reinforcement learning (SARL) and multi-agent reinforcement learning (MARL) [20]. Researchers widely use the SARL to solve resource allocation problems in CRN, such as spectrum sensing, spectrum management and spectrum resource allocation [21]-[23]. A multi-layer cooperative mechanism has been proposed in [24], which uses the popular method RL, Q-learning. In [25], a market-based resource allocation mechanism is proposed that uses demand functions to give agents an allocation preference. In addition, a probabilistic reinforcement learning has been proposed in [26]. From the perspective of economics, the monopolistic market model is modelled to solve the resource allocation problem of one PU and multiple SUs in CR. However, although the RL algorithm has good performance in CRN, numerous communication scenarios are multi-agent systems. Therefore, the method of SARL is not enough to meet the demand. Therefore, the multi-agent approach is expected to solve the resource allocation problem of multi-agent scenarios. The [27] proposed a MARL method to common-pool resource appropriation to predict spatial and temporal resource dynamics allocation. Although there are three common methods for resource allocation in CRN, the self-adaptation and autonomy of RL- based methods still need to be improved. In the CR-IoT network, the intelligent control and distributed methods should be presented in sophisticated scenarios. the resource allocation problem to solve III. MODEL DESIGN AND USERS' BEHAVIORS ANALYSIS Different from the aforementioned works, we consider the scenario where two adjacent PUs have spectrum resources in a market. Meanwhile, there are many SUs bid to meet their own resource needs. In this section, we first briefly introduce the market model and then discuss the behaviors of PUs and SUs in the multi-agent system (MAS) model. A. The Oligopolistic market Model for CR-IoT Generally, the market is a sophisticated multi-agent environment, which is a mixture of monopolistic and oligopolistic markets. With the emergence of the CR-IoT networks, the capabilities of agents and network nodes have improved and became smarter. The users of CR-IoT are more Fig. 2. The interactions learning among PUs and SUs. likely to voluntarily send requests to get resources instead of waiting for resource allocation. Hence, we study the phenomenon of multi-agent interaction in a market economy model, in which the network nodes have the capability of making decisions about resources. The market environment is a natural multi-agent system with a variety of interesting agents. When it comes to market, the competition and allocation of resources is a universal phenomenon. Based on the economic aspects of resource allocation market, the prices of resources are important, which decide whether to exchange resources. Inspired by economic theory and market model approach, we consider the allocation problem of the CR-IoT resource as a market problem, where PUs are regarded as sellers and SUs are regarded as buyers. Under the market, the PUs specify prices for their spectrum resources, and SUs also give bids to fulfil their own needs. The PUs and SUs actively update prices and bids according to behaviors and environmental changes, while learning the best resource allocation strategy. SUs bid on the resource and PUs decide whether to sell resources according to the bids of SUs. The scenario is illustrated in Fig.2, in this market, feedbacks are generated continuously between PUs and SUs during the interaction process. During the learning process, the PUs update prices based on feedback from SUs, and the SUs also update the bids according to the prices of the resources designed by PUs. The prices of all PUs will reach an equilibrium, which will balance the market revenue. The motivation of this paper is to propose a multi-agent reinforcement learning method to establish a model and allocate resources. Next, in this section, we will discuss the oligopolistic model involving PUs and SUs. B. Problem Definition in Market Model As mentioned previously, the Bertrand market model can be used to balance market resources and prices. When the CR-IoT environment is regarded as markets, the network nodes can make price decisions, making CR-IoT systems analogous to the real market. Here, we describe this price decision problem in the Bertrand market as a distribute multi-agent dynamic resource allocation problem (DMDRAP). In DMDRAP, the agents represent network users (PUs and SUs). All agents can be considered as two types of agents where 4 relationship between all PUs are one type of homogeneous agents, and the other SUs are another type of homogeneous agents. Therefore, there is a competitive the same categories. Furthermore, all agents make price decisions autonomously and adaptively. In PUs, each agent's decision depends not only on its own state but also on neighbor agent's states and policies. In general, the states and behaviors of the agents must be considered in the reinforcement learning. However, we considered the stateless multi-agent Q-learning in our model, since the user's previous states have almost no effects on DMDRAP. Each resource allocation does not depend on the previous state. The DMDRAP is described as follows. In this problem, the PUs and SUs can trade resources under the Bertrand market. The SUs are buyers in this market and they decide to pay the price of the PUs. The main goal of DMDRAP is to develop decision strategies for each agent to maximize the benefits and achieve an overall price balance of the entire Bertrand market. Mathematically, we consider this market model has N PUs (P = {𝑝1, 𝑝2, … , 𝑝𝑁}), all PUs submit their prices and they have C subchannels. For simplicity, we focus on the scenario of the two PUs, which have 2 × C subchannels. And meanwhile, there are M SUs (S = {𝑠1, 𝑠2, … , 𝑠𝑀}) are submitting their bids and competing for the spectrum resources in the 2 × C subchannels. Then, we introduce the behaviors of the PUs and SUs. C. Behaviors of SUs and PUs 1) The behaviors of SUs We consider that each SU as an agent, while other users are considered to be external environment. Each agent learns and makes price decisions from feedback by interacting with the environment and maximize the efficiency of each SU. Therefore, the behaviors of the agents should be analyzed and an appropriate multi-agent reinforcement learning method should be proposed. And the details of these contents are as follows. As mentioned previously, the SUs are buyers, which give bids to compete for the spectrum resources. In general, each SU can compete for all subchannel resources of PUs, but each subchannel can only be allocated to one SU, otherwise, channel conflict will occur. Initially, the SU agents obtain the resource status of PUs'. There is a competitive relationship among SUs since each agent cannot communicate. During the interaction and learning of PUs and SUs, the demands of each SU is defined as a set of probabilities in all subchannels resources, as D = {𝑑1, 𝑑2, … 𝑑𝑐, … , 𝑑2𝑐}, (𝑑𝑖ϵ[0,1], ∑ 𝑑𝑖 = 1 ) . Originally, the demand for the subchannel spectrum resources of each SU is random. In a forward transaction market, the buyers (SUs) bid for subchannels from sellers (PUs). There is a dynamic process, the SUs generally updates their strategies based on the prices of the PUs design. The bids of SUs are decided to their demands for resources because demands represent how much they want to pay. Hence, according to the demands of SUs, then bids can be obtained by some policy function with reinforcement learning, as 𝐵𝑖𝑑𝑡 = π(D). 𝑖 However, the demands of agents are always dynamic, so we consider that the demands are static for a period of time. During this period, bidders can sample and estimate their demands by interacting with the PUs, and the trial and error method is effective. In other words, within a certain period of time, we can measure the difference between the actual demand values and the estimated values of the users to evaluate the performance of our estimates. 𝑠 = {𝑎1 𝑠,𝑡, 𝑎2 𝑠,𝑡, … , 𝑎𝐶 𝑠,𝑡}, (𝑎𝑖 𝑠,𝑡 … , 𝑎2𝐶 We denote a vector 𝐴𝑡 𝑠,𝑡 ∈ 𝑠,𝑡 {0,1}) , which is a set of actions of SUs, and each element 𝑎𝑖 is the SU's choices of channels at time 𝑡. Generally, the SUs' strategy has three aspects, namely, choosing the PU, selecting subchannel resource and bidding on the resources. Bids are obtained by an interaction between agents and the environment, which are considered as the sample, as 𝐵𝑖𝑑𝑡 = 𝐴𝑡 𝑠 ∙ D. (1) In the above formula, the actions is a set of discrete values, so the bids here is a set of discrete values based on demands. Based on the above interaction, SUs' revenue can be defined as follows: 𝑆𝑈 = { 𝑅𝑡 𝑈𝑡 − 𝑏𝑖, 𝑖𝑓 𝑏𝑖 𝑖𝑠 max 𝑏𝑖𝑑 𝑎𝑛𝑑 𝑏𝑖 > 𝑝𝑖 −𝑏𝑖, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (2) where 𝑈𝑡 is the marginal cost of the resources, for simply experiment, we consider 𝑈𝑡 as a constant and 𝑏𝑖 is the bid of SU i at time t. It should be noted that the channel resource quality of each PU is the same, and the number of subchannels owned by PU is the same. The two conditions in the above formula indicate that when the SU's bid is the highest of the same user's bid and is higher than the price of the resource, the channel resource will be purchased, so the reward value is positive. Conversely, when the price is lower than the price, the reward is negative and no resources are not obtained. 2) The behaviors of PUs is complicated because Because the CR-IoT nodes have the capability of intelligent behaviors, which can perceive the environments and make a smart decision about the prices of resources. Learning in a multi-agent environment the environment changes effectively as other PUs learn. However, in two agents' Bertrand market environment, an agent PU learn to design the prices for the C subchannels, while the other agent PU and the SUs are both regarded as a static environment. Hence, the above learning process of the agent PU is affected by the action of another PUs. In a multi-agent system of two PUs, each PU pursues its own target and choose actions independently, while there is no communication between PUs. In addition, the learning framework between PUs is a general- sum game framework. Obviously, in the market, the PU as a seller, its ideal goal is to maximize revenue in a multi-agent system. To achieve this goal in the market, PUs design their own resource prices. Implementation enables the network nodes to allocate resources intelligently. the environment, what PU learn from it is turned into their own behavior, that is, the designed prices of resources. This learning process is actually the process of dealing with SUs' needs and bids. interaction between PU and the In Now we analyze behaviors of PUs, the action space, and the 5 𝑝,𝑡, 𝑎2 𝑝,𝑡 , 𝑎𝐶+2 𝑝,𝑡, … , 𝑎𝐶 𝑝,𝑡 , … , 𝑎2𝐶 𝑝 = {𝑎1 𝑝 = {𝑎𝐶+1 reward function for learning price decision policy. Since there 𝑝,𝑡} are two PUs, so the PU's action is 𝐴1,𝑡 𝑝,𝑡} . and the another PU's action is 𝐴2,𝑡 Each PU's action is the same, that is, their action is to design the price based on the interaction with the SUs and to select SUs to allocate the resources. There is no communication between PUs, but they know each other how to take action in Bertrand market. The agent receives feedback from the external environment (the SUs) and its neighbor (another PU). Thus, other agents' decision policies affect the agent's price decision policy. The PUs design a set of prices, represented as P = 1,𝑡 ∈ [0,1]) is the {𝑃𝑡 2,𝑡 ∈ [0,1]) is first PU's price, and 𝑃𝑡 the another PU's price. The behavior of PUs is to allocate channel resources according to the bid of SUs, and the users with high bids obtain resources. We assume that there is a standard that each SU obtains only one channel resource. To motivate agents to achieve the goal of balancing market prices, supplies and demands, the PUs are using the same reward functions to learn. Each PU receives a positive reward in learning episode. This reward is given by the function: 1,𝑡, 𝑝2 2 = {𝑝1 1,𝑡, … , 𝑝𝐶 2,𝑡, 𝑝2 1,𝑡}, (𝑝𝑖 2,𝑡, … , 𝑝𝐶 2,𝑡}, (𝑝𝑖 1, 𝑃𝑡 2} , where 𝑃𝑡 1 = {𝑝1 𝑃𝑈 = ∑ R𝑡 𝑃𝑈𝑖) (𝑟𝑡 𝑖∈[1,2] . (3) 𝑃𝑈𝑖 is the reward of agent PU and R𝑡 𝑃𝑈 is the sum of where 𝑟𝑡 two agents. The reward 𝑟𝑡 𝑃𝑈𝑖 is defined as follows: 𝑃𝑈𝑖 = max{𝐵𝑖𝑑𝑡 − P − 𝐶𝑜𝑠𝑡 , 0}. 𝑟𝑡 (4) In Bertrand market, we assume that marginal cost is constant. Hence, when ignoring cost (𝐶𝑜𝑠𝑡 = 0), we simplify the formula to calculate the maximum reward of PU. Based on the Bertrand market model above, the revenue of the whole multiagent 𝑃𝑈. Therefore, the system to be maximized, that is, maximize R𝑡 policy of one PU is adjusted based on interaction and feedback with another PU and the SUs. When the number of users seeking to purchase is too small and the supply of resources exceeds demand, the price of the resource should be appropriately reduced. On the contrary, when there are too many users and demand exceeds supply, the price should be appropriately increased to make the entire market equilibrium and curb the development of monopoly industries. In a dealer market, there is a problem for the market seller (PUs) and buyers (SUs) learn how to deals their bids and judge whether the prices are acceptable. Specifically, this issue is a question of pricing policy decisions. Reinforcement learning is a method to solve decision problems. Therefore, in the next section, we will propose the details of the Q-probabilistic multi- agent algorithm to solve the price decision problem. IV. Q-PROBABILISTIC MULTIAGENT LEARNING METHOD We study the phenomenon of price decision problem in the CR-IoT market model of agents' interaction. We use the Bertrand market model, which is an interesting and dynamic multi-agent system. Our model is based on the framework of a general-sum stochastic game in which each agent's payoff also depends on other agents' policy. We are interested in the equilibrium price in the Bertrand market model because we want to design learning agents in resource allocation problem that can learn allocation policies, adaptively. In a single-agent system, reinforcement learning algorithms, such as Q-learning, is usually used to address a problem like a resource allocation in a monopolistic market. Also, in a multi- agent system, the multiagent reinforcement learning (MARL) algorithms have been developed to address the problem of resource allocation in CR-IoT. To address DMDRAP, we proposed a multiagent reinforcement learning algorithm, called Q-probabilistic multiagent learning (QPML). The QPML can solve the problem of resource allocation in an oligopolistic market. We consider a probabilistic policy to control the actions of PUs and SUs. In single-agent reinforcement learning, the Q-learning algorithm is the off-policy approach, which is very popular. Its target is to update Q-value, which is defined as the follows: Q(s, a) = (1 − α)Q(s, a) + α[r + β max 𝑏 𝑄(𝑠′, 𝑏)]. (5) where α is the learning rate, β is the discount factor and r is the reward. The 𝑄(𝑠′, 𝑏) is a future state-action pair. Generally, α determines whether convergence, convergence speed, and accuracy of expectation, which is a trade-off value. In the learning process, the state-action pair that leads to higher reward will be reinforced. In multi-agent Q-learning, we not only maximize our own Q- values but also consider joint optimization since the one agent's Q-value also depend on other agents. In a multi-agent system, the rules for updating the Q-values are as follows: 𝑄1(s, 𝑎1, 𝑎2) = (1 − α)Q(s, 𝑎1, 𝑎2) + α[𝑟1 + β𝜋1(𝑠′)𝑄1(𝑠′)𝜋1(𝑠′)]. (6) 𝑄2(s, 𝑎1, 𝑎2) = (1 − α)Q(s, 𝑎1, 𝑎2) + α[𝑟2 + β𝜋1(𝑠′)𝑄2(𝑠′)𝜋2(𝑠′)]. (7) where the α is the learning rate and β is the discount factor, 𝑟1 is the reward of agent 1, 𝑟2 is the reward of agent 2. Here, (𝜋1, 𝜋2) is the strategy function of 𝑃𝑈1 and 𝑃𝑈2 respectively, and the (𝑄1(𝑠′), 𝑄2(𝑠′)) is a biomatrix game policy. Therefore, each agent maintains two Q tables that the one is its own Q table and the other is another agent's Q table. Furthermore, each PU can observe the rewards and previous actions of other PUs during the learning period. In this paper, a scenario with 2C subchannels is considered where there are two PUs and multiple SUs. Each PU has 2𝐶 − 1 states and actions. Also, each PU learns two Q tables, each of them has (2𝐶 − 1)2 elements. In such a large state and action space, we consider using stateless Q-probabilistic multi-agent algorithm. As mentioned previously, we considered the stateless multi- agent Q-learning in our model, since each resource allocation does not depend on the previous states. Algorithm 1 describes ALGORITHM 1 ALGORITHM 2 6 Loop t= 0, Initialization: All action of multi-agent Random initialization Q-value Algorithm 1: Q-probabilistic multiagent learning (QPML) Algorithm begin end update Q-value function, respectively Calculate rewards Foreach action let t=t+1 end 𝑆 is other agents' action, P is a probabilistic form of Q-value 𝑆) Initialization: t= 0, 𝐴𝑡 Random initialization: 𝑄𝑡+1(𝐴𝑡 Algorithm 2: QPML for SU learning procedure begin end for each period 𝑡 End Calculate P as (11) Choose action 𝐴𝑡 Calculate 𝐵𝑖𝑑𝑡 as (1) Calculate rewards as (2) 𝑟𝑆 ←the reward for action 𝐴𝑡 foreach action 𝐴𝑡 Calculate KL divergence as (12) 𝑠, according to P 𝑠 do end Update Q-value function as (10) 𝑆 of other agents where D is the true demand distribution of SUs and D is the estimated distribution. Then K(𝐷‖𝐷) represents the relative entropy of D to D, that is, the similarity estimation when D is fitted to D. During the learning process, we present the details learning methods for SUs and PUs, respectively. A. Learning procedure of SUs Based on the behaviors of the SUs and the QPML algorithm depicted above, the details of the learning method of SUs will be introduced as follows. In the Bertrand market, each SU bids to compete for the spectrum resources of two PUs. When the SU selects one subchannel, the action is 1, Otherwise 0. Each SU has a selection probability, and this value is determined by the Boltzmann distribution in the QPML algorithm. In the market, SUs are enough active buyers who trade of high liquidity with PUs. Each SU submits its bid, which aims to obtain as many resources as possible. Then, PUs receive the SUs' bids and determine whether to accept the incoming bids and resource asks. The market PU can accept a bid from SUs when bid exceeds the PU's price. Then, the resource allocation can be executed right after the moment that a bid and an ask are matched in a trading. Otherwise, the ask of SU is rejected and the trade is over. In the multi-agent system of the market, the environment is made up of SUs and PUs, and the learning process of SUs and PUs is closed-loop. The SU's reward comes from PU, and PUs receives SU's feedback during the learning process, which is an interactive process. Algorithm 2 shows the price decision-making process of SUs, which repeats at each epoch. B. Learning procedure of SUs Formally, in our multi-agent market model, the PU's price not only depends on their own behaviors but also depends on another agent's actions. When designing two learning agents, we must consider what information is available to agents, such as preference, price vector and another agent's action. We assume an agent PU can observe the actions of other agents (whether resources are allocated). the QPML policy update process, in which we adopt the stateless Q-learning in the learning process of PUs, as follows: 1 (𝐴1,𝑡 𝑄𝑡+1 𝑝 , 𝐴2,𝑡 𝑝 ) = 𝑄𝑡 1(𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 ) + α[r𝑃 1 − 𝑄𝑡 1(𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 )]. 𝑄𝑡+1 2 (𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 ) = 𝑄𝑡 2(𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 ) + α[r𝑃 2 − 𝑄𝑡 2(𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 )]. (8) (9) 𝑝 is a set of actions of PU1 and 𝐴2,𝑡 1 is the reward of PU1 and r𝑃 𝑝 where 𝐴1,𝑡 is a set of actions 2 is the reward of of PU2. The r𝑃 2 are the Q value of PU1 and PU2. Furthermore, the 𝑄𝑡 PU2. For two PUs, the action space is 2 × A2, here, we assume 𝑝 = A. Similar to that of the PUs', the stateless 𝐴1,𝑡 Q-learning is also adopted in SUs learning, the following rule is used to update Q-value function: 𝑝 = 𝐴2,𝑡 1 and 𝑄𝑡 𝑄𝑡+1(𝐴𝑡 𝑆) = 𝑄𝑡 (𝐴𝑡 𝑆) + α[𝑟𝑆 − 𝑄𝑡 (𝐴𝑡 𝑆)]. (10) 𝑆 donates a set of action of SUs, that is the bids of the where 𝐴𝑡 SUs. Here, the action (bids) in Q-learning is stochastic and the Q value is not probabilistic, to assure that all actions will be converted to a probabilistic form. We consider Boltzmann distribution to normalize the Q-value, as P = 𝑡 𝑄𝑖𝑗,𝑘 (𝑎) ⁄ 𝜏 𝑒 𝑡 𝑄𝑖𝑗,𝑘 (𝑎) ⁄ 𝜏 ∑ 𝑒 𝑖 (11) 𝑡 (𝑎) is the Q-value for action a when SU i select channel here 𝑄𝑖𝑗 k of the PU j (𝑗 ∈ (1,2)) at time t. The τ is a temperature parameter, which controls the fluctuation of this Boltzmann distribution. Hence, we use P as the estimated demand D to control the actions of agents. In addition, we use KL divergence to measure the difference between the demand D and estimate value D. The KL divergence is a method used to describe the difference between the probability, D and estimate value D as follows: K(𝐷‖𝐷) = ∑ 𝐷𝑙𝑜𝑔 𝑛 𝑖=1 𝐷 𝐷 (12) ALGORITHM 3 t= 0, 𝑝 , 𝐴2,𝑡 Initialization: For each period 𝑡 𝑝 is 𝑃𝑈2's action 𝑝 ), 𝑄𝑡+1 1 (𝐴1,𝑡 𝑝 is 𝑃𝑈1's action, 𝐴2,𝑡 All 𝐴1,𝑡 Random initialization: 𝑄𝑡+1 Algorithm 3: QPML for PU learning procedure begin 2 ←the reward for action 𝐴1,𝑡 1 ←the reward for action 𝐴1,𝑡 ≥ 𝑀2 𝑀 update 𝑃𝑈1 Q-value function as (13) update 𝑃𝑈2 Q-value function as (14) Obtain the reward 𝑟𝑡 r𝑃 r𝑃 Input bids of SUs Calculate payoff 𝑝1,𝑡, 𝑝2,𝑡 𝑝 , 𝐴2,𝑡 𝑝 , 𝐴2,𝑡 𝑃𝑈𝑖 as (4) then else 𝑀1 𝑀 if 𝑀1 𝑀 < 𝑀2 𝑀 , when update 𝑃𝑈1 Q-value function as (15), update 𝑃𝑈2 Q-value function as (16) end end end 2 (𝐴1,𝑡 𝑝 , 𝐴2,𝑡 𝑝 ) 𝑝 of 𝑃𝑈1 𝑝 of 𝑃𝑈2 Initially, the prices of the resources are generated randomly, which is in [0,1]. We assume that the quantity and quality of resources owned by two PUs are the same for each time period. During a learning process, the prices of PUs' resources are constantly changing. That is, the PUs update price strategies to change the prices during the learning process. Specifically, the price is adjusted according to the difference between the maximum bid of each subchannel and actual price. When 𝐵𝑖𝑑𝑡 − P ≥ 0, the PU allocate resource to SUs, otherwise, the trade is failed. When the trade fails, the PU should consider adjusting their own designed prices. Each PU has two update rules, which are to increase prices and lower prices. ≥ 𝑀2 𝑀 𝑀1 𝑀 − . When 2, and when 𝑝1,𝑡 > 0, denote as 𝑝1,𝑡 As mentioned previously, there are M SUs, we assume 𝑀1 SUs obtain resource of 𝑃𝑈1 and 𝑀2 SUs obtain resource of 𝑃𝑈2, 1 and 𝑝2,𝑡 = where 𝑀1 + 𝑀2 ≤ 𝑀. We denote 𝑝1,𝑡 = 𝐵𝑖𝑑𝑡 − 𝑃𝑡 + , otherwise denote 𝐵𝑖𝑑𝑡 − 𝑃𝑡 as 𝑝1,𝑡 , the transaction success rate of 𝑃𝑈1on the market is greater than 𝑃𝑈2. In the next round of trading, 𝑃𝑈1 will continue to raise its prices in order to obtain more benefits. In contrast, 𝑃𝑈2 will lower its prices to get more buyers. However, 𝑃𝑈1 may also continue to suppress prices, which is a malicious competition in the market. In this paper, we don't consider the malicious competition. Then, 𝑃𝑈1 update Q-value function as the following rule: 𝑄𝑡+1 1 (𝑝1,𝑡 + , 𝑝2,𝑡 − ) = 𝑄𝑡 1(𝑝1,𝑡 + , 𝑝2,𝑡 − ) + α[r𝑃 1 − 𝑄𝑡 1(𝑝1,𝑡 + , 𝑝2,𝑡 − )]. (13) 7 𝑀1 𝑀 𝑀2 𝑀 < , 𝑃𝑈1 will lower its prices and 𝑃𝑈2 will raise its When prices. The 𝑃𝑈1 update Q-value function as the following rule: 𝑄𝑡+1 + ) + α[−r𝑃 + ) = 𝑄𝑡 1 (𝑝1,𝑡 − , 𝑝2,𝑡 1 − 𝑄𝑡 − , 𝑝2,𝑡 − , 𝑝2,𝑡 1(𝑝1,𝑡 1(𝑝1,𝑡 + )]. (15) The 𝑃𝑈2 update Q-value function as the following rule: 𝑄𝑡+1 + ) + α[r𝑃 + ) = 𝑄𝑡 2 (𝑝1,𝑡 − , 𝑝2,𝑡 − , 𝑝2,𝑡 − , 𝑝2,𝑡 2 − 𝑄𝑡 + )]. 2(𝑝1,𝑡 2(𝑝1,𝑡 (16) Algorithm 3 shows the learning process of 𝑃𝑈1and 𝑃𝑈2, which repeats at each epoch. V. EXPERIMENTAL EVALUATION In this section, we present experimental to evaluate our proposed Q-probabilistic multi-agent learning method. Our experiments are based on a Window 10 operating system (Intel(R) Core™ i5-7200U CPU @ 2.50GHz 2.71GHz). In Bertrand market model, two PUs interact with many SUs. From a market perspective of the Bertrand model, in order to achieve a balance of the resource market, our agent PUs have the same quality resources. Initially, the prices of the two PUs' resources are random (prices are higher than costs), and then during the learning process, the two PUs change the price decisions based on the multi-agent environment. The Bertrand model can better describe strategies choice because quantity decisions are generated immediately by price choices. The goal of our agents' learning is to determine prices and maximize personal interests in the short term, but the long-term goal is to balance the Bertrand market. interaction with In our experiments, we explored agents' behaviors strategies learning separately and tracked the benefits of each SU and PU We have tested the MAQL approach on multiple CR-IoT network models with different numbers of SUs and different numbers of channels, all of which show similar results, but there are also significant differences. Here, we provide detailed results of the users' revenues with the three cases in Table 1, the experimental results as shown in Fig. 3, Fig. 4 and Fig. 5. Next, we analyze the different effects of the experiments in three cases. Case 1: In this case, we have 10 SUs and 2 PUs. We set the three different channel resources for each PU: (a) 600 channels, THE THREE CASES INDIFFERENT DYNASTIC ENVIRONMENTS TABLE 1 CASE CASE1 (M=10) CASE2 (M=20) CASE3 (M=50) NETWORK ENVIRONMENTS 𝐶1 = 600 𝐶2 = 600 𝐶1 = 600 𝐶2 = 600 𝐶1 = 600 𝐶2 = 600 𝐶1 = 300 𝐶2 = 300 𝐶1 = 300 𝐶2 = 300 𝐶1 = 300 𝐶2 = 300 𝐶1 = 100 𝐶2 = 100 𝐶1 = 100 𝐶2 = 100 𝐶1 = 100 𝐶2 = 100 The 𝑃𝑈2 update Q-value function as the following rule: The M represents the numbers of SUs, 𝐶1 represents the numbers of 𝑃𝑈1's 2 (𝑝1,𝑡 + , 𝑝2,𝑡 − ) = 𝑄𝑡 2(𝑝1,𝑡 + , 𝑝2,𝑡 − ) + α[−r𝑃 2 − 𝑄𝑡 2(𝑝1,𝑡 + , 𝑝2,𝑡 − )]. 𝑄𝑡+1 (14) channels, the 𝐶2 represents the numbers of 𝑃𝑈2's channels 8 (a) the numbers of PUs' channels are 𝐶1 = 600 , 𝐶2 = 600 (b) the numbers of PUs' channels are 𝐶1 = 300 , 𝐶2 = 300 (c) the numbers of PUs' channels are 𝐶1 = 100 , 𝐶2 = 100 Fig. 3. Case 1.The average rewards for PUs , the efficiency of SUs' bids, and the average revenue convergence curve in the market (the number of SUs is N=10). (a) the numbers of PUs' channels are 𝐶1 = 600 , 𝐶2 = 600 (b) the numbers of PUs' channels are 𝐶1 = 300 , 𝐶2 = 300 (c) the numbers of PUs' channels are 𝐶1 = 100 , 𝐶2 = 100 Fig. 4. Case 2. The average rewards for PUs, the efficiency of SUs' bids, and the average revenue convergence curve in the market (the number of SUs is N=20). (b) 300 channels, (c) 100 channels. As shown in Fig. 3 (a), (b), (a) the numbers of PUs' channels are 𝐶1 = 600 , 𝐶2 = 600 (b) the numbers of PUs' channels are 𝐶1 = 300 , 𝐶2 = 300 (c) the numbers of PUs' channels are 𝐶1 = 100 , 𝐶2 = 100 9 Fig. 5. Case 3. The average rewards for PUs, the efficiency of SUs' bids, and the average revenue convergence curve in the market (the number of SUs is N=50). (c), these figures show the average rewards of 𝑃𝑈1 and 𝑃𝑈2 , also show the efficiency of SUs' bids during the learning process. It can be clearly seen that at first PUs' average rewards are very small, and as the numbers of trade increases, their rewards gradually improve. We carefully analyze the behavior of PU and SU in the four sets of images in Fig. 3 (a). The trend of other group diagrams is similar. As shown in the first and second figure of Fig. 3 (a), In the PUs' learning process, each time the SUs bid is received, and then the profit is calculated based on the market price of the design. As the price changes from one iteration to the next, each PU's revenues in the process is also constantly changing. But the total average revenues will converge to the value. This simulation result indicates that the optimal price design of resource can be learned in a Bertrand market model. The third image of Fig. 3 (a) depicts a long-term efficiency of SUs' bidding in multi-agent environments. SUs mainly learn to make bids based on whether or not the feedback information of the resources is obtained, and the pricing behavior of each SU is different. We averaged the rewards for SUs in the curve and analyzed the overall benefits of pricing. As can be seen from the figure, the overall benefit closes to be a value when the iteration is displayed about 600 iterations on the horizontal axis. The number of iterations on the horizontal axis on the chart represents one run of the trade. The last graph in Fig. 3 (a) is the average revenue of all users in the market. The red line, the blue line and the green line represent the revenues of SUs, 𝑃𝑈1 and 𝑃𝑈2 , respectively. From this figure, as the number of iterations was increased, the TABLE 2 THE CONVERGENCE VALUE CASE C PU1 PU2 SUs CASE1 (M=10) CASE2 (M=20) CASE3 (M=50) 100 1.00 ± 0.01 1.06 ± 0.01 0.90 ± 0.00 300 0.64 ± 0.01 0.68 ± 0.00 0.62 ± 0.01 600 0.42 ± 0.01 0.44 ± 0.01 0.41 ± 0.00 100 1.14 ± 0.00 1.24 ± 0.01 0.94 ± 0.01 300 0.89 ± 0.01 0.94 ± 0.01 0.82 ± 0.00 600 0.62 ± 0.01 0.66 ± 0.01 0.6 ± 0.00 100 1.25 ± 0.00 1.36 ± 0.01 0.97 ± 0.00 300 1.10 ± 0.00 1.18 ± 0.01 0.93 ± 0.01 600 0.90 ± 0.01 0.96 ± 0.01 0.83 ± 0.00 M represents the numbers of SUs, C represents the numbers of a PU. Fig. 6. The KL divergence of SUs' demands. three curves gradually converge. The convergence is within 600 iterations. Here, one iteration means one complete strategy updates for all users. After 600 iterations, the three curves closer 10 to their own optimal value, respectively. It shows that our algorithm converges. Fig. 3 (b) and (c) also depicts the users' rewards and the average revenue of users in the market. The behaviors of SUs and PUs are similar to that described previously, but their rewards, market revenues, and convergence times are all different. In Fig.4 and Fig.5 of the Case 2 and Case 3, respectively, the behaviors of SUs and PUs are similar for the case 1. We summarize the results of the final convergence values in the three cases in Table 2, and then analyzed the behaviors of users in the market under different conditions. The conclusions we observed are as follows: (1) We observe that the number of users is the same, the smaller the number of channels, and the greater the average market revenue and the user's personal reward. For example, in case 1, the number of SUs is 10, when 𝑃𝑈1 and 𝑃𝑈2 all have 100 channels, their average reward and SU's bidding efficiency are the best. It can be seen from this that the smaller the number of resources in the market, the greater the market gain. And resources are allocated reasonably to SUs, no waste. If the amount of resources is too large, it will become cheaper and the overall market income will decrease. (2) In three cases, our algorithm does not reduce its performance as the number of users increases. For example, when the number of channels is 600, the convergence iterations of the algorithm in the three cases are about 500 iterations. This proves that the fullness of market users will not affect our resource allocation. (3) As the number of SUs increases, the average reward for PUs and SUs increases gradually, indicating that our algorithm can allocate resources and maximize market efficiency in the high-volume user market. The more users, the better the performance of the algorithm. In addition, in order to verify the validity of the ability of the SUs to estimate demand after interacting with the dynamic environment, we propose to use KL divergence to calculate the similarity between the probability distribution of demand D and estimated value D . As illustrated in Fig. 6, it plots the KL divergence curve between the original resources demand distribution of the SUs and the estimated resources distribution of agents' online learning. The curve fluctuates dynamically between the value of 1.7 and 1.9. It can be seen that the KL divergence of the actual demand and the estimated demand is small, so their similarity is greater. Therefore, it is effective to estimate the demand function using the Boltzmann distribution normalized Q value. In the proposed multi-agent learning method, both PUs know each other behaviors and benefits, so they can determine the price that can bring the most profit for themselves, that is, each user will adjust their own prices. These prices adapt to the price of other users on the market. It can be indicated by the above experimental results that the proposed method is effective in the multiple users' scenario of CR-IoT, and the implementation of the method suppresses the monopolistic behavior of the merchants in the resource market and maintains the market balance. VI. CONCLUSION AND FUTURE WORK This paper has proposed the use of the Q-probabilistic multiagent learning to solve dynamic resource allocation problem in a sophisticated market model. From the perspective of economic theory, we have tackled a distribute multi-agent dynamic resource allocation problem. Each learning agent PU can observe the behavior of other PUs, which design their own resource price in Bertrand market model. Also, the SUs compete for resources by bidding. The empirical results of this paper plausibly suggest that the interactive learning between multi-agent SUs and PUs is a promising method for balancing market price, optimizing resource allocation and suppressing monopolistic behavior in resource market. In this paper, we have only designed a multi-agent system with two PUs and multiple SUs in CR-IoT, but can be extended to n-PUs scenario in future work. REFERENCES [1] "Harnessing the Smart City opportunity.", KPMG, 2017, vailable online: http://www.un.org/en/index. [2] " Where's Wally? In Search of Citizen Perspectives on the Smart City.", Sustainability, Vol. 8, pp. 207. [3] X. He, et al. "QoE-Driven Big Data Architecture for Smart City." IEEE Communications Magazine, vol. 56, no. 2, Feb. 2018, pp. 88-93. [4] S. H. Shah, and I. Yaqoob. "A Survey: Internet of Things (IOT) Technologies, Applications and Challenges.", Smart Energy Grid Engineering IEEE, Aug. 2016, pp. 381-385. I. A. T. Hashem, V. Chang, N. B. Anuar, et al. "The role of big data in smart city." International Journal of Information Management, vol. 36, no. 5, Oct. 2016, pp. 748-758. [5] [6] P. Rawat, K. D. Singh, and J. M. Bonnin. "Cognitive radio for M2M and Internet of Things: A survey." Computer Communications, vol. 94, Nov. 2016, pp. 1-29. [7] Bae, B., Park, J. and Lee, S. "A Free Market Economy Model for Resource Management in Wireless Sensor Networks" Wireless Sensor Network, Vol.7, No.6, June 2015, pp. 76-82. [8] Dan Wang, Dong Chen, Bin Song, et al. "From "IoT" to "5G I-IoT": The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies." IEEE Communications Magazine, 2018, Accept. [9] X. Wang, X. Li, and V. C. M. Leung. "Artificial Intelligence-Based Techniques for Emerging Heterogeneous Network: State of the Arts, Opportunities, and Challenges." IEEE Access, vol. 3, Aug. 2015, pp. 1379-1391. [10] A. Mackenzie and L. Dasilva. "Game theory for wireless engineers." Synthesis Lectures on Communications, vol. 1, 2006, pp. 1-86. [11] B. Wang, Y. Wu, and K. J. R. Liu. "Game theory for cognitive radio networks: An overview." Computer Networks, vol. 54, no. 14, Oct. 2010, pp. 2537-2561. [12] A. A. Anghuwo, et al. "Spectrum Allocation Based on Game Theory in Cognitive Radio Networks." Journal of Networks, vol. 8, no. 3, Mar. 2013, pp. 1-9. [13] Kim, Sungwook, et al. "Game Theory for Cognitive Radio Networks." Game Theory Applications in Network Design (2014). [14] Re, E. Del, et al. "A power allocation strategy using Game Theory in Cognitive Radio networks." ICST International Conference on Game Theory for Networks IEEE Press, Jun. 2009, pp.117-123. [15] Kaur, Veerpal, and S. Thangjam. "A stochastic geometry analysis of RF energy harvesting based D2D communication in downlink cellular networks." India International Conference on Information Processing IEEE, 2017, pp. 1-5. [16] S. Parsons, J. A. Rodriguez-Aguilar, and M. Klein. "Auctions and bidding:A guide for computer scientists. " Acm Computing Surveys, vol. 43, no. 2, Jan. 2011, pp. 1-59. [17] Y. Zhang, et al. "Auction-based resource allocation in cognitive radio systems." Communications Magazine IEEE, vol. 50, no. 11, Nov. 2012, pp. 08-120. 11 [18] X. Wang, et al. "Auction-based resource allocation for cooperative cognitive radio networks." Computer Communications, vol. 97, Jan,2017, pp. 40-51. [19] A. Nezarat, and G. Dastghaibifard. "Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction." International Conference on Next Generation Computing Technologies IEEE, Jan. 2016, pp. e0138424. [20] L. Busoniu, R. Babuska, and B. De Schutter. "A Comprehensive Survey of Multiagent Reinforcement Learning." IEEE Transactions on Systems Man & Cybernetics Part C, vol. 38, no. 2, Mar. 2008, pp. 156-172. [21] Yau, K. L., et al., "Application of Reinforcement Learning in Cognitive Radio Networks: Models and Algorithms." The Scientific World Journal, Jun. 2014. [22] Ling, Mee Hong, et al. "Application of reinforcement learning for security enhancement in cognitive radio networks." Applied Soft Computing vol. 37, 2015, pp. 809-829. [23] B. F. Lo, and I. F. Akyildiz. "Reinforcement learning-based cooperative sensing in cognitive radio ad hoc networks." IEEE, International Symposium on Personal Indoor and Mobile Radio Communications IEEE, Dec. 2010, pp.2244-2249. [24] J. Peng, et al. "Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks." IEEE, International Conference on Trust, Security and Privacy in Computing and Communications IEEE, Nov. 2011, pp. 1624-1629. [25] Yue Zhang, Bin Song, Xiaojiang Du and Mohsen Guizani. "Monopolistic Models for Dynamic Spectrum Access in Cognitive Radio Networks: A Probabilistic Reinforcement Learning Approach." IEEE Access, 2017. [26] Zhang, Y., et al. "Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning." Sensors, vol. 16, Dec. 2016, pp. 2021. [27] Perolat, J., Leibo, Joel Z., et al. "Vinicius; A multi-agent reinforcement learning model of common-pool resource appropriation", 2017, arXiv170706600P.
1608.04851
1
1608
2016-08-17T04:36:27
Essentials of an Integrated Crowd Management Support System Based on Collective Artificial Intelligence
[ "cs.MA" ]
The simulation of the dynamical behavior of pedestrians and crowds in spatial structures is a consolidated research and application context that still presents challenges for researchers in different fields and disciplines. Despite currently available commercial systems for this kind of simulation are growingly employed by designers and planners for the evaluation of alternative solutions, this class of systems is generally not integrated with existing monitoring and control infrastructures, usually employed by crowd managers and field operators for security reasons. This paper introduces the essentials and the related computational frame- work of an Integrated Crowd Management Support System based on a Collective Artificial Intelligence approach encompassing (i) interfaces from and to monitored and controlled environments (respectively, sen- sors and actuators), (ii) a set of software tools supporting the analysis of pedestrians and crowd phenomena taking place in the environment to feed a (iii) faster than real-time simulation of the plausible evolution of the current situation in order to support forms of inference provid- ing decision support to crowd managers, potentially directly controlling elements of the environment (e.g. blocking turnstiles, escalators), com- municating orders to operators on the field or trying to influence the pedestrians by means of dynamic signage or audible messages.
cs.MA
cs
Essentials of an Integrated Crowd Management Support System Based on Collective Artificial Intelligence Giuseppe Vizzari1 and Stefania Bandini1,2 1 Complex Systems and Artificial Intelligence Research Centre, {giuseppe.vizzari, stefania.bandini}@disco.unimib.it 2 Researche Center for Advanced Science and Technology, University of Milano-Bicocca The University of Tokyo Abstract. The simulation of the dynamical behavior of pedestrians and crowds in spatial structures is a consolidated research and application context that still presents challenges for researchers in different fields and disciplines. Despite currently available commercial systems for this kind of simulation are growingly employed by designers and planners for the evaluation of alternative solutions, this class of systems is generally not integrated with existing monitoring and control infrastructures, usually employed by crowd managers and field operators for security reasons. This paper introduces the essentials and the related computational frame- work of an Integrated Crowd Management Support System based on a Collective Artificial Intelligence approach encompassing (i) interfaces from and to monitored and controlled environments (respectively, sen- sors and actuators), (ii) a set of software tools supporting the analysis of pedestrians and crowd phenomena taking place in the environment to feed a (iii) faster than real-time simulation of the plausible evolution of the current situation in order to support forms of inference provid- ing decision support to crowd managers, potentially directly controlling elements of the environment (e.g. blocking turnstiles, escalators), com- municating orders to operators on the field or trying to influence the pedestrians by means of dynamic signage or audible messages. Keywords: pedestrians and crowd simulation, monitoring and control, crowd management 1 Introduction The simulation of the movement of pedestrians and crowds in spatial structures is a consolidated research and application context that still presents challenges for researchers in different fields and disciplines: both the automated analysis and the synthesis of pedestrian and crowd behaviour, as well as attempts to in- tegrate these complementary and activities [26], present open challenges as well as significant opportunities in a smart environment perspective [20]. Although 6 1 0 2 g u A 7 1 ] A M . s c [ 1 v 1 5 8 4 0 . 8 0 6 1 : v i X r a the currently available commercial tools are used on a day-to-day basis by de- signers and planners, there is still room for innovations in models, to improve their effectiveness in modeling pedestrians and crowd phenomena, their expres- siveness (i.e. simplifying the modeling activity or introducing the possibility of representing phenomena that were still not considered by existing approaches) and efficiency. Moreover, and this is the particular focus of this paper, they are generally not integrated with existing monitoring and control infrastructures, that are employed by crowd managers and field operators. As testified by an analysis of a recent disaster related to a crowding situ- ation [13], a more systemic perspective on the overall work flow leading from planning and preparation, to monitoring and control of a crowded event, can help preventing these kinds of situations. This idea of a more thorough and comprehensive computational support to crowd management is also discussed in [31]. This paper introduces the notion of an Integrated Crowd Management Support System, a system encompassing both interfaces from and to a moni- tored and controlled environment (respectively sensors and actuators) as well as a set of software tools supporting the analysis of phenomena taking place in the environment, a faster than real-time simulation of the plausible evolution of the current situation in order to support forms of inference providing deci- sion support to crowd managers, potentially directly controlling elements of the environment (e.g. blocking turnstiles, escalators), communicating orders to op- erators on the field or trying to influence the pedestrians by means of dynamic signage or audible messages. The following Section provides a brief discussion of the relevant state of the art in pedestrians and crowd automated analysis and synthesis, then some early works providing relevant examples of prototypes of systems partly implementing a crowd control center will be presented and dis- cussed in order to sketch a general architecture. Conclusions and future works end the paper. 2 Pedestrians and Crowd Analysis and Synthesis The research on pedestrian dynamics is basically growing on two lines. On the analysis side, literature is producing methods for an automatic extraction of pedestrian trajectories (e.g. [5,6]), charactertization of pedestrian flows (e.g. [15]) automatic recognition of pedestrian groups [22], recently gaining importance due to differences in trajectories, walking speeds and space utilization [2]. The synthesis side -- where the contributions of this work are concentrated -- has been even more prolific, starting from preliminary studies and assumptions provided by [14] or [11] and leading to quite complex, yet not usually validated, models exploring components like panic [7] or other emotional variables. Most of the literature has been focussed on the reproduction of the physics of the system, so on the lowest level, where a significant knowledge on the fun- damental diagram achieved with different set of experiments and in different environment settings (see, e.g, [32,33]) allows a robust validation of the models. Literature of this level can be classified regarding the scope of the modeling approach. Macroscopic models describe the earliest approach to pedestrian mod- eling, based on analogies between behavior of dense crowds and kinetic gas [14] or fluids [11], but essentially abstracting the concept of individual. A microscopic approach is instead focused on modeling the individual behavior, effectively im- proving the simulations precision also in low density situations. The microscopic approach is as well categorized in two classes describing the representation of space and movement: continuous models simulate the dynamics by means of a force-based approach, which finds its basis on the well-known social force model by [12]. These models design pedestrians as particles moved by virtual forces, that drive them towards their destination and let them avoid obstacles or other pedestrians. Latest models in this class are the centrifugal force model by [9] and the stride length adaptation model by [21]. Other examples consider also groups of pedestrians by means of attractive forces among persons inside the group [19]. The usage of a discrete environment is mostly employed by the cellular au- tomata (CA) based models, and describes a less precise approach in the re- production of individuals trajectories that, on the other side, is significantly more efficient and still able to reproduce realistic aggregated data. This class derives from vehicular modeling and some models are direct adaptations of traf- fic ones, describing the dynamics with ad hoc rules (e.g. [3,4]). Other models employs the well-know floor field approach from [8], where a static floor field drives pedestrians towards a destination and a dynamic floor field is used to generate a lane formation effect in bi-directional flow. [23] is an extension of the floor field model, introducing the anticipation floor field used to manage cross- ing trajectories and encourage the lane formation. [16] discussed methods to deal with different speeds, in addition to the usage of a finer grid discretization that decreases the error in the reproduction of the environment, but significantly impacts on the efficiency of the model. An alternative approach to represent dif- ferent speeds in a discrete space is given by [1]. [27] is another extension of the floor-field model, where groups of pedestrians are also considered. 3 Towards an Integrated Crowd Management Support System The first work proposing the idea of employing faster than real-time pedestrian simulation to support decision making activities of crowd managers was proposed in [10]: the authors were essentially considering the idea of feeding a CA-based simulator with data from computer vision algorithms characterizing a given evac- uation situation. The simulation of a short-term future could detect plausible congested positions and, therefore, actions influencing pedestrian movement (i.e. activation of sound and/or optical signals) could be enacted to prevent them. As for a more recent work by the same research group [24], the authors also de- scribe a hardware (FPGA) implementation of the system, for achieving increased performance of both the computer vision and CA simulation systems. Fig. 1. A high level architecture of an Integrated Crowd Management Support System. Another relevant prototypical implementation of this kind of system was carried out in the context of the Hermes project [29,28]: once again, also this work basically considered evacuation situations, in which the intention of pedestrians is generally to vacate the area in the shortest possible time, which generally means following the shortest path. Both the above mentioned works present separate blocks for the interpreta- tion of inputs to the system (mostly computer vision techniques for analyzing video footage and perform pedestrian detection, counting, tracking) and the short-term simulation of the plausible evolution of the system. Both works sim- ply suggest, but do not actually describe in details, the presence of a module actually coordinating these modules: triggering the start of a simulation accord- ing to the passage of time (i.e. repeatedly perform a 10 minute simulation every minute) or due to the detection of a certain kind of event (e.g. an increased incoming flow from a certain entrance), interpreting simulation results (e.g. to detect and characterize congested areas), correlating these results and available information on the spatial structure of the environment (e.g. regions and pas- sages connecting them) to support decision making activities by users, that are generally supposed to be "in -- the -- loop" (i.e. actually taking final decisions on Faster than Real-Time SimulatorCrowd Analysis toolsCorrelation and crowd control logic Sensors (turnstile counters, video cameras, RFID devices, etc.)Actuators (doors, signs, audible signals, turnstiles, escalators, etc.)Crowd manager user interfaceIntegrated CrowdManagement Support SystemMonitored and controlled environment actions to be enacted). The overall resulting architecture can be described by the schema depicted in Figure 1: an Integrated Crowd Management Support System is essentially responsible to support the control of an area subject to crowding conditions calling for a careful planning of the operations, monitoring of actual crowd dynamics, decision support to the crowd manager (and poten- tially supporting a smooth communication with field operators) and potential enactment of actions (e.g. different forms of information provisioning to pedes- trians or actual changes in the environmental conditions) to influence overall crowd dynamics. A different and additional line of work, described in [18] and [17], and devel- oped in the context of a Spanish research project, does not employ pedestrian simulation systems, but it rather relies on consolidated results in the area of route optimization to provide guidance in smart cities, large public events and evacuation situations. This work is in earlier stages compared to the previously described ones, but it is interesting to mention both to suggest that predictions on system evolution can be carried out also by more coarse grained models of the environment, and also to stress the fact that a growing number of additional sensors can be considered to complement and enrich the information acquired by means of computer vision tools. These works also suggest that different Crowd Management Support Systems could be fruitfully connected, both to leverage the monitoring capabilities and be able to foresee changes in the local situations whenever the monitored areas are connected and reachable from one another, and more generally to support a more comprehensive and systemic view of the overall environment, reducing at the same time the computational costs related to the simulation of a potentially very high number of pedestrians. Finally, this line of work suggests that, besides supporting decisions of ex- perts, either designers or crowd managers, this kind of system could be used to provide a distributed awareness of the state of the overall (large scale) environ- ment to actually trigger collaborative forms of diffused, bottom-up behaviours that, at the same time, lead to individually and collectively beneficial choices: by being informed about the state of a transportation network and informing (either explicitly or implicitly, through a behaviour implicit form of communication) the overall system, pedestrians could avoid situations of congestion (causing delays or even simply unpleasant travels), making a reasonable individual choice that could also play a role in limiting the growth of the already existing congestion. Although research on this line of work in the transportation area is still quite open [25], the idea of investigating a collective intelligence scheme [30] in which different forms of AI techniques are employed is appealing and promising. 4 Conclusions and Future Developments This paper has introduced the notion of an Integrated Crowd Management Sup- port System, an comprehensive set of tools supporting the both analysis of crowd dynamics and its simulation (faster than real-time) for supporting short term predictions on the evolution of the monitored environment. A control logic mod- ule is responsible both to trigger the simulation, to analyze its results and supply the crowd manager indications on potential issues and potential mitigation ac- tions. Whereas the state of the art presents abundant and significant results both in the analysis of crowd dynamics and in their simulation (even respect- ing the faster than real-time speed requirement) more work has to be carried out to define a proper control logic for a Crowd Management Support System: this module should encompass both the ability to analyze and correlate the flow of information coming from sensors, to trigger simulation and other forms of predictions, but also to support decisions on the most appropriate mitigation actions to prevent or solve potential issues. Acknowledgements The authors would like to thank Davide Bogni, Guido Bonazza, Luca Crociani, Andrea Gorrini and Sara Manzoni for the fruitful discussions that contributed to the conceptualization of the Crowd Management Support System concept and architecture. References 1. Bandini, S., Crociani, L., Vizzari, G.: Heterogeneous Pedestrian Walking Speed in Discrete Simulation Models. In: Chraibi, M., Boltes, M., Schadschneider, A., Seyfried, A. (eds.) Traffic and Granular Flow '13, pp. 273 -- 279. Springer Interna- tional Publishing (2015) 2. Bandini, S., Gorrini, A., Vizzari, G.: Towards an integrated approach to crowd analysis and crowd synthesis: A case study and first results. Pattern Recognition Letters 44, 16 -- 29 (2014), http://dx.doi.org/10.1016/j.patrec.2013.10.003 3. Blue, V., Adler, J.: Modeling Four-Directional Pedestrian Flows. Transportation Research Record: Journal of the Transportation Research Board 1710(-1), 20 -- 27 (Jan 2000) 4. Blue, V.J., Adler, J.L.: Cellular Automata Microsimulation of Bi-Directional Pedestrian Flows. Transportation Research Record 1678, 135 -- 141 (1999) 5. Boltes, M., Zhang, J., Seyfried, A., Steffen, B.: T-junction: Experiments, trajectory collection, and analysis. In: Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on. pp. 158 -- 165 (Nov 2011) 6. Boltes, M., Seyfried, A.: Collecting pedestrian trajectories. Neurocomputing 100, 127 -- 133 (2013), http://dx.doi.org/10.1016/j.neucom.2012.01.036 7. Bosse, T., Hoogendoorn, M., Klein, M.C.A., Treur, J., van der Wal, C.N., van Wissen, A.: Modelling collective decision making in groups and crowds: Integrat- ing social contagion and interacting emotions, beliefs and intentions. Autonomous Agents and Multi-Agent Systems 27(1), 52 -- 84 (2013) 8. Burstedde, C., Klauck, K., Schadschneider, A., Zittartz, J.: Simulation of pedes- trian dynamics using a two-dimensional cellular automaton. Physica A: Statistical Mechanics and its Applications 295(3 - 4), 507 -- 525 (2001) 9. Chraibi, M., Seyfried, A., Schadschneider, A.: Generalized centrifugal-force model for pedestrian dynamics. Phys. Rev. E 82(4), 46111 (2010) 10. Georgoudas, I.G., Sirakoulis, G.C., Andreadis, I.: An anticipative crowd manage- ment system preventing clogging in exits during pedestrian evacuation processes. IEEE Systems Journal 5(1), 129 -- 141 (2011), http://dx.doi.org/10.1109/JSYST. 2010.2090400 11. Helbing, D.: A fluid dynamic model for the movement of pedestrians. arXiv preprint cond-mat/9805213 (1998) 12. Helbing, D., Molnar, P.: Social force model for pedestrian dynamics. Physical re- view E (1995) 13. Helbing, D., Mukerji, P.: Crowd disasters as systemic failures: analysis of the love parade disaster. EPJ Data Science 1(1), 1 -- 40 (2012), http://dx.doi.org/ 10.1140/epjds7 14. Henderson, L.F.: The Statistics of Crowd Fluids. Nature 229(5284), 381 -- 383 (Feb 1971) 15. Khan, S.D., Bandini, S., Basalamah, S.M., Vizzari, G.: Analyzing crowd behav- ior in naturalistic conditions: Identifying sources and sinks and characterizing main flows. Neurocomputing 177, 543 -- 563 (2016), http://dx.doi.org/10.1016/ j.neucom.2015.11.049 16. Kirchner, A., Klupfel, H., Nishinari, K., Schadschneider, A., Schreckenberg, M.: Discretization effects and the influence of walking speed in cellular automata mod- els for pedestrian dynamics. Journal of Statistical Mechanics: Theory and Experi- ment 2004(10), P10011 (2004) 17. Lujak, M., Giordani, S., Ossowski, S.: Distributed safety optimization in evacuation of large smart spaces by marin lujak, stefano giordani and sascha ossowski. In: Proceedings ot the Ninth Workshop on Agents in Traffic and Transportation (ATT 2016) (2016) 18. Lujak, M., Ossowski, S.: Intelligent People Flow Coordination in Smart Spaces, pp. 34 -- 49. Springer International Publishing, Cham (2016), http://dx.doi.org/ 10.1007/978-3-319-33509-4_3 19. Qiu, F., Hu, X.: Modeling group structures in pedestrian crowd simulation. Simu- lation Modelling Practice and Theory 18(2), 190 -- 205 (2010) 20. Sassi, A., Borean, C., Giannantonio, R., Mamei, M., Mana, D., Zambonelli, F.: Crowd steering in public spaces: Approaches and strategies. In: 14th IEEE In- ternational Conference on Ubiquitous Computing and Communications, IUCC 2015, Liverpool, United Kingdom, October 26-28, 2015. pp. 2098 -- 2105 (2015), http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.312 21. von Sivers, I., Koster, G.: Dynamic Stride Length Adaptation According to Utility And Personal Space p. 30 (Jan 2014) 22. Solera, F., Calderara, S., Cucchiara, R.: Socially constrained structural learning for groups detection in crowd. IEEE Trans. Pattern Anal. Mach. Intell. 38(5), 995 -- 1008 (2016), http://dx.doi.org/10.1109/TPAMI.2015.2470658 23. Suma, Y., Yanagisawa, D., Nishinari, K.: Anticipation effect in pedestrian dynam- ics: Modeling and experiments. Physica A: Statistical Mechanics and its Applica- tions 391(1-2), 248 -- 263 (Jan 2012) 24. Tsiftsis, A., Georgoudas, I.G., Sirakoulis, G.C.: Real data evaluation of a crowd supervising system for stadium evacuation and its hardware implementation. IEEE Systems Journal 10(2), 649 -- 660 (2016), http://dx.doi.org/10.1109/JSYST. 2014.2370455 25. Varga, L.: On intention-propagation-based prediction in autonomously self- adapting navigation. Scalable Computing: Practice and Experience 16(3), 221 -- 232 (2015), http://www.scpe.org/index.php/scpe/article/view/1098 26. Vizzari, G., Bandini, S.: Studying pedestrian and crowd dynamics through in- tegrated analysis and synthesis. IEEE Intelligent Systems 28(5), 56 -- 60 (2013), http://dx.doi.org/10.1109/MIS.2013.135 27. Vizzari, G., Manenti, L., Crociani, L.: Adaptive Pedestrian Behaviour for the Preservation of Group Cohesion. Complex Adaptive Systems Modeling 1(7) (2013) 28. Wagoum, A.U.K., Chraibi, M., Mehlich, J., Seyfried, A., Schadschneider, A.: Ef- ficient and validated simulation of crowds for an evacuation assistant. Journal of Visualization and Computer Animation 23(1), 3 -- 15 (2012), http://dx.doi.org/ 10.1002/cav.1420 29. Wagoum, A.U.K., Steffen, B., Seyfried, A., Chraibi, M.: Parallel real time compu- tation of large scale pedestrian evacuations. Advances in Engineering Software 60, 98 -- 103 (2013), http://dx.doi.org/10.1016/j.advengsoft.2012.10.001 30. Weld, D.S., Mausam, Lin, C.H., Bragg, J.: Handbook of Collective Intelligence, chap. Artificial Intelligence and Collective Intelligence. MIT Press (2015) 31. Wijermans, N., Conrado, C., van Steen, M., Martella, C., Li, J.: A land- scape of crowd-management support: An integrative approach. Safety Science 86, 142 -- 164 (2016), http://www.sciencedirect.com/science/article/pii/ S0925753516300030 32. Zhang, J., Klingsch, W., Rupprecht, T., Schadschneider, A., Seyfried, A.: Empirical study of turning and merging of pedestrian streams in T-junction. ArXiv e-prints p. 8 (2011) 33. Zhang, J., Klingsch, W., Schadschneider, A., Seyfried, A.: Ordering in bidirec- tional pedestrian flows and its influence on the fundamental diagram. Journal of Statistical Mechanics: Theory and Experiment (02), 9 (2011)
1912.05676
1
1912
2019-12-11T22:39:51
Biases for Emergent Communication in Multi-agent Reinforcement Learning
[ "cs.MA", "cs.CL", "cs.LG" ]
We study the problem of emergent communication, in which language arises because speakers and listeners must communicate information in order to solve tasks. In temporally extended reinforcement learning domains, it has proved hard to learn such communication without centralized training of agents, due in part to a difficult joint exploration problem. We introduce inductive biases for positive signalling and positive listening, which ease this problem. In a simple one-step environment, we demonstrate how these biases ease the learning problem. We also apply our methods to a more extended environment, showing that agents with these inductive biases achieve better performance, and analyse the resulting communication protocols.
cs.MA
cs
Biases for Emergent Communication in Multi-agent Reinforcement Learning Yoram Bachrach DeepMind London, UK [email protected] Tom Eccles DeepMind London, UK [email protected] Guy Lever DeepMind London, UK [email protected] Thore Graepel DeepMind London, UK [email protected] Angeliki Lazaridou DeepMind London, UK [email protected] Abstract We study the problem of emergent communication, in which language arises because speakers and listeners must communicate information in order to solve tasks. In temporally extended reinforcement learning domains, it has proved hard to learn such communication without centralized training of agents, due in part to a difficult joint exploration problem. We introduce inductive biases for positive signalling and positive listening, which ease this problem. In a simple one-step environment, we demonstrate how these biases ease the learning problem. We also apply our methods to a more extended environment, showing that agents with these inductive biases achieve better performance, and analyse the resulting communication protocols. Introduction 1 Environments where multiple learning agents interact can model important real-world problems, ranging from multi-robot or autonomous vehicle control to societal social dilemmas [4, 27, 23]. Further, such systems leverage implicit natural curricula, and can serve as building blocks in the route for constructing aritficial general intelligence [22, 1]. Multi-agent games provide longstanding grand-challenges for AI [17], with important recent successes such as learning a cooperative and competitive multi-player first-person video game to human level [14]. An important unsolved problem in multi-agent reinforcement learning (MARL) is communication between independent agents. In many domains, agents can benefit from sharing information about their beliefs, preferences and intents with their peers, allowing them to coordinate joint plans or jointly optimize objectives. A natural question that arises when agents inhibiting the same environment are given a communication channel without an agreed protocol of communication is that of emergent communication [34, 37, 8]: how would the agents learn a "language" over the joint channel, allowing them to maximize their utility? The most naturalistic model for emergent communication in MARL is that used in Reinforced Inter-Agent Learning (RIAL) [8] where agents optimize a message policy via reinforcement from the environment's reward signal. Unfortunately, straightforward implementations perform poorly [8], 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada. driving recent research to focus on differentiable communication models [8, 30, 35, 12], even though these models are less generally applicable or realistic. RIAL offers the advantage of having decentralized training and execution; similarly to human communication, each agent treats others as a part of its environment, without the need to have access to other agents' internal parameters or to back-propagate gradients "through" parameters of others. Further, agents communicate with discrete symbols, providing symbolic scaffolding for extending to natural language. We build on these advantages, while facilitating joint exploration and learning via communication-specific inductive biases. We tackle emergent communication through the lens of Paul Grice [10, 31], and capitalize on the dual view of communication in which interaction takes place between a speaker, whose goal is to be informative and relevant (adhering to the equivalent Gricean maxims), and a listener, who receives a piece of information and assumes that their speaker is cooperative (providing informative and relevant information). Our methodology is inspired by the recent work of Lowe et al. [25], who proposed a set of comprehensive measures of emergent communication along two axis of positive signalling and positive listening, aiming at identifying real cases of communication from pathological ones. Our contribution: we formulate losses which encourage positive signaling and positive listening, which are used as auxiliary speaker and listener losses, respectively, and are appended to the RIAL communication framework. We design measures in the spirit of Lowe et al. [25] but rather than using these as an introspection tool, we use them as an optimization objective for emergent communication. We design two sets of experiments that help us clearly isolate the real contribution of communication in task success. In a one-step environment based on summing MNIST digits, we show that the biases we use facilitate the emergence of communication, and analyze how they change the learning problem. In a gridworld environment based on search of a treasure, we show that the biases we use make communication appear more consistently, and we interpret the resulting protocol. 1.1 Related Work Differentiable communication was considered for discrete messages [8, 30] and continuous mes- sages [35, 12], by allowing gradients to flow through the communication channel. This improves performance, but effectively models multiple agents as a single entity. In contrast we assume agents are independent learners, making the communication channel non-differentiable. Earlier work on emergent communication focused on cooperative "embodied" agents, showing how communication helps accomplish a common goal [8, 30, 6], or investigating communication in mixed cooperative- competitive environments [26, 3, 15], studying properties of the emergent protocols [21, 18, 25]. Previous research has investigated independent reinforcement learners in cooperative settings [36], with more recent work focusing on canonical RL algorithms. One version of decentralized Q-learning converges to optimal policies in deterministic tabular environments without additional communi- cation [19], but does not trivially extend to stochastic environments or function approximation. Centralized critics [26, 9] improve stability by allowing agents to use information from other agents during training, but these violate our assumptions of independence, and may not scale well. 2 Setting We apply multi-agent reinforcement learning (MARL) in partially-observable Markov games (i.e. partially-observable stochastic games) [33, 24, 11], in environments where agents have a joint communication channel. In every state, agents take actions given partial observations of the true world state, including messages sent on a shared channel, and each agent obtains an individual reward. Through their individual experiences interacting with one another and the environment, agents learn to broadcast appropriate messages, interpret messages received from peers and act accordingly. Formally, we consider an N-player partially observable Markov game G [33, 24] defined on a finite state set S, with action sets (A1, . . . ,AN ) and message sets (M1, . . . ,MN ). An observation function O : S × {1, . . . , N} → Rd defines each agent's d-dimensional restricted view of the true t = O(St, i), and the state space. On each timestep t, each agent i receives as an observation oi t−1 sent in the previous state for all j (cid:54)= i. Each agent i then select an environment action messages mj t ) ∈ (A1, . . . ,AN ) t ∈ Ai and a message action mi ai the state changes based on a transition function T : S × A1 × ··· × AN → ∆(S); this is a stochastic transition, and we denote the set of discrete probability distributions over S as ∆(S). Every t ∈ Mi. Given the joint action (a1 t , . . . , aN 2 t , . . . , mN t ), and ot = (o1 t , . . . , aN t ), mt = (m1 t , . . . oN t ). We write m¯i,t for (m1 EπA,πM ,T (cid:2)(cid:80)∞ t, and M¯i for (M1, . . . ,MN ), excluding Mi. t : S × A1 × ··· × AN → R for player i. We use the notation t ), t , . . . , mN agent gets an individual reward ri at = (a1 excluding mi In our fully cooperative setting, each agent receives the same reward at each timestep, ri t = ∀i, j ≤ N, which we denote by rt. Each agent maintains an action and a message policy rj t t), and which can in from which actions and messages are sampled, ai general be functions of their entire trajectory of experience xi t). t−1, mt−1, oi 1, ..., ai These policies are optimized to maximize discounted cumulative joint reward J(πA, πM ) := {π1 M}. Although the objective J(πA, πM ) is a joint objective, our model is that of decentralized learning and execution, where every agent has its own experience in the environment, and independently optimizes the objective J with respect to its own action and message policies πi M ; there is no communication between agents other than using the actions and message channel in the environment. Applying independent reinforcement learning to cooperative Markov games results in a problem for each agent which is non-stationary and non-Markov, and presents difficult joint exploration and coordination problems [2, 5, 20, 28]. (cid:3) (which is discounted by γ < 1 to ensure convergence), where πA := t=1 γt−1rt A }, πM := {π1 t) and mi t ∼ πi t := (m0, oi M (·xi 1, ai t ∼ πi A(·xi M , ..., πN A and πi A, ..., πN 3 Shaping Losses for Facilitating Communication One difficulty in emergent communication is getting the communication channel to help with the task at all. There is an equilibrium where the speaker produces random symbols, and the listener's policy is independent of the communication. This might seem like an unstable equilibrium: if one agent uses the communication channel, however weakly, the other will have some learning signal. However, this is not the case in some tasks. If the task without communication has a single, deterministic optimal policy, then messages from policies sufficiently close to the uniform message policy should be ignored by the listener. Furthermore, any entropy costs imposed on the communication channel, which are often crucial for exploration, exacerbate the problem, as they produce a positive pressure for the speaker's policy to be close to random. Empirically, we often see agents fail to use the communication channel at all; but when agents start to use the channel meaningfully, they are then able to find at least a locally optimal solution to the communication problem. We propose two shaping losses for communication to alleviate these problems. The first is for positive signalling [25]: encouraging the speaker to produce diverse messages in different situations. The second is for positive listening [25]: encouraging the listener to act differently for different messages. In each case, the goal is for one agent to learn to ascribe some meaning to the communication, even while the other does not, which eases the exploration problem for the other agent. We note that most policies which maximize these biases do not lead to high reward. Much information about an agent's state is unhelpful to the task at hand, so with a limited communication channel positive signalling is not sufficient to have useful communication. For positive listening, the situation is even worse -- most ways of conditioning actions on messages are actively unhelpful to the task, particularly when the speaker has not developed a good protocol. These losses should therefore not be expected to lead directly to good communication. Rather, they are intended to ensure that the agents begin to use the communication channel at all -- after this, MARL can find a useful protocol. 3.1 Bias for positive signalling The first inductive bias we use promotes positive signalling, incentivizing the speaker to produce different messages in different situations. We add a loss term which is minimized by message policies that have high mutual information with the speaker's trajectory. This encourages the speaker to produce messages uniformly at random overall, but non-randomly when conditioned on the speaker's trajectory. We denote by πi M the average message policy for agent i over all trajectories, weighted by how often they are visited under the current action policies for all agents. The mutual information of agent i's message mi I(mi t is: t with their trajectory xi txi t) − H(mi t, xi t) t) = H(mi (cid:88) m∈Mi M (mxi πi t) log(πi M (mxi t)) (1) (2) = − (cid:88) m∈Mi πi M (m) log(πi M (m)) + E xi t 3 txi t, xi We estimate this mutual information from a batch of rollouts of the agent policy. We calculate H(mi t) exactly for each timestep from the agent's policy. To estimate H(πm), we estimate πm as the average message policy in the batch of experience. Intuitively, we would like to maximize I(mi t), so that the speaker's message depends maximally on their current trajectory. However, adding this objective as a loss for gradient descent leads to poor solutions. We hypothesize that this is due to properties of the loss landscape for this loss. Policies which maximize mutual information are t, but uniformly random unconditional on xi deterministic for any particular trajectory xi t. At such policies, the gradient of the term H(πi M (·xi t)) is infinite. Further, for any c < log(2) the space of policies which have entropy at most c is disconnected, in that there is no continuous path in policy space between some policies in this set. To overcome these problems, we instead use a loss which is minimized for a high value for H(πi and a target value for H(πi Msi). The loss we use is: M ) Lps(πi (3) for some target entropy Htarget, which is a hyperparameter. This loss has finite gradients around its minima, and for suitable choices of Htarget the space of policies which minimizes this loss is connected. In practice, we found low sensitivity to Htarget, and typically use a value of around log(A)/2, which is half the maximum possible entropy. M ) − (H(mi M , si) = −E(cid:0)λH(πi txt) − Htarget)2(cid:1), t for 1 ≤ t ≤ T . Algorithm 1 Calculation of positive signalling loss 1: πM i ← 0. 2: Lps ← 0. 3: Target conditional entropy Htarget. 4: Weighting λ for conditional entropy. 5: for b=1; b ≤ B; b++ do # Batch of rollouts. t for 1 ≤ t ≤ T . 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: end for 22: Lps ← Lps + T × B × H. Observations oi Actions ai Other agent messages mt,¯i from M¯i for 1 ≤ t ≤ T . Initial hidden state hi 0. Action set Ai, message set Mi, observation space Oi, hidden state space H i. Message policy πi Hidden state update rule hi : Oi × Ai × H i × M¯i (cid:55)→ H i. for t = 1; t ≤ T; t++ do t−1, hi t−1, mt−1,¯i). t/(T × B). t(m)). t(m) log(pi t − Htarget)2. t ← hi(oi t, ai hi t ← πi t, hi M (oi pi πM ← πM + πi Hi m∈Mi pi Lps ← Lps + λ(Hi M : Oi × Ai × H i × M¯i (cid:55)→ Mi. 21: H =(cid:80) m∈Mi π(m) log(π(m)). t ←(cid:80) t−1, mt−1,¯i). end for 3.2 Bias for positive listening The second bias promotes positive listening: encouraging the listener to condition their actions on the communication channel. This gives the speaker some signal to learn to communicate, as its messages have an effect on the listener's policy and thus on the speaker's reward. The way we encourage positive listening is akin to the causal influence of communication, or CIC [15, 25]. In [15], this was used as a bias for the speaker, to produce influential messages, and in [25] as a measure of whether communication is taking place. We use a similar measure as a loss for the listener to be influenced by messages. In [15, 25], CIC was defined over one timestep as the mutual information between the speaker's message and the listener's action. We extend this to multiple timesteps using the mutual information between all of the speaker's previous messages on a single listener action -- using this as an objective encourages the listener to pay attention to all the speaker's messages, rather than just the most recet. For a listener trajectory xt = (o1, a1, m1, . . . , ot−1, at−1, mt−1, ot), we define 4 x(cid:48) t = (o1, a1, . . . , at−1, ot) (this is the trajectory xt, with the messages removed). We define the multiple timestep CIC as: CIC(xt) = H(atx(cid:48) = DKL t) − H(atxt). (cid:0)(atxt)(atx(cid:48) t)(cid:1) (4) (5) (6) (8) We estimate this multiple timestep CIC by learning the distribution πi t). We do this by per- forming a rollout of the agent's policy network, with the actual observations and actions in the trajectory, and zero inputs in the place of the messages. We fit the resulting function πi t) to predict πi A(·xt), using a cross-entropy loss between these distributions: A(·x(cid:48) A(·x(cid:48) t)), A(ax(cid:48) A(axt) log(πi πi A(axt) term. For a given policy πi A(·x(cid:48) A, this loss is where we backpropagate only through the πi t) = E(πi minimized in expectation when πi A is trained to be an approximation of the listener's policy unconditioned on the messages it has received. The multi-timestep CIC can then be estimated by the KL divergence between the message-conditioned policy and the unconditioned policy: t)). Thus πi A(·x(cid:48) Lce(xt) = − (cid:88) a∈Ai CIC(xt) ≈ DKL(πi A(·xt)πi A(·x(cid:48) t)). (7) For training positive listening we use a different divergence between these two distributions, which we empirically find achieves more stable training. We use the L1 norm between the two distributions: Lpl (xt) = − (cid:88) (cid:12)(cid:12)πi a∈Ai A(axt) − πi A(ax(cid:48) t)(cid:12)(cid:12). t for 1 ≤ t ≤ T . A : Oi × Ai × H i × M¯i (cid:55)→ Ai. t for 1 ≤ t ≤ T . 0 = h(cid:48) 0. Algorithm 2 Calculation of positive listening losses 1: Observations oi 2: Actions ai 3: Other agent messages mt,¯i from M¯i for 1 ≤ t ≤ T . 4: Initial hidden state hi 5: Action set Ai, observation space Oi, hidden state space H i. 6: Action policy πi 7: Hidden state update rule hi : Oi × Ai × H i × M¯i (cid:55)→ H i. 8: Lce ← 0. 9: Lpl ← 0. 10: for i = 1; t ≤ T; t++ do t−1, hi 11: t−1, mt−1,¯i). 12: t−1, h(cid:48) t−1, 0). 13: t−1, h(cid:48) t, 0). 14: a∈A stop_gradient(pi 15: a∈A pi 16: 17: end for Lce ← Lce +(cid:80) Lpl ← Lpl +(cid:80) t(a)) log(pi t(a) − stop_gradient(pi t ← hi(oi hi t ← πi pi A(oi t ← hi(oi h(cid:48) t ← πi pi A(oi t, ai t, hi t, ai t, ai t(a)). t(a)). t−1, mt−1,¯i). 4 Empirical Analysis We consider two environments. The first is a simple one-step environment, where agents must sum MNIST digits by communicating their value. This environment has the advantage of being very amenable to analysis, as we can readily quantify how valuable the communication channel currently is to each agent. In this environment, we provide evidence for our hypotheses about how the biases we introduce in Section 3 ease the learning of communication protocols. The second environment is a new multi-step MARL environment which we name Treasure Hunt. It is designed to have a clear 5 performance ceiling for agents which do not utilise a communication channel. In this environment, we show that the biases enable agents to learn to communicate in a multi-step reinforcement learning environment. We also analyze the resulting protocols, finding interpretable protocols that allow us to intervene in the environment and observe the effect on listener behaviour. The full details of the Treasure Hunt environment, together with the hyperparameters used in our agents, can be found in the supplementary material. 4.1 Summing MNIST digits In this task, depicted in Figure 1, the speaker and listener agents each observe a different MNIST digit (as an image), and must determine the sum of the digits. The speaker observes an MNIST digit, and selects one of 20 possible messages. The listener receives this message, observes an independent MNIST digit, and must produce one of 19 possible actions. If this action matches the sum of the digits, both agents get a fixed reward of 1, otherwise, both receive no reward. The agents used in this environment consist of a convolutional neural net, followed by an multi-layer perceptron and a linear layer to produce policy logits. For the listener, we concatenate the message sent to the output of the convnet as a one-hot vector. The agents are trained independently with REINFORCE. Figure 1: Summing MNIST environment. In this example, both agents would get reward 1 if a = 9. The purpose of this environment is to test whether and how the biases we propose ease the learning task. To do this, we quantify how useful the communication channel is to the speaker and to the listener. We periodically calculate the rewards for the following policies: 1. The optimal listener policy πlc, given the current speaker and the labels of the listener's MNIST digits. 2. The optimal listener policy πlnc, given the labels of the listener's MNIST digits and no communication channel. 3. The optimal speaker policy πsc, given the current listener and the labels of the speaker's MNIST digits. 4. The uniform speaker policy πsu, given the current listener. We calculate these quantities by running over many batches of MNIST digits, and calculating the optimal policies explicitly. The reward the listener can gain from using the communication channel is Pl(πs) = R(πlc, πs) − R(πlnc , πs), so this is a proxy for the strength of the learning signal for the listener to use the channel. Similarly, Ps(πs) = R(πl, πsc ) − R(πl, πsu ) is how much reward the speaker can gain from using the communication channel, and so is a proxy for the strength of the learning signal for the speaker. The results (Figure 2) support the hypothesis that the bias for positive signalling eases the learning problem for the listener, and the bias for positive listening eases the learning problem for the speaker. When neither agent has any inductive bias, we see both Pl and Ps stay low throughout training, and the final reward of 0.1 is exactly what can be achieved in this environment with no communication. When we add a bias for positive signalling or positive listening, we see the communication channel used in most runs (Table 1), leading to greater reward, and Ps and Pl both increase. Importantly, when we add our inductive bias for positive listening, we see Ps increase initially, followed by Pl. This is consistent with the hypothesis that the positive listening bias bias produces a stronger learning signal for the speaker; then once the speaker has begun to learn to communicate meaningfully, the listener also has a strong learning signal. When we add the bias for positive signalling the reverse is true -- Pl increases before Ps. This again fits the hypothesis that speaker's bias produces a stronger learning signal for the speaker. We also ran experiments with the speaker getting an extra reward for positive listening, as in [15]. However, we did not see any gain from this over the no-bias baseline; in our setup, it seems the 6 Figure 2: (a) Both biases lead to more reward. (b,c, d) Listener and speaker power in various settings. Listener power increases first with positive signalling, and speaker power increases first with positive listening. speaker agent was unable to gain any influence over the listener. We think that there is a natural reason this bias would not help in this environment; for a fixed listener, the speaker policy which optimizes positive listening has no relation to the speaker's input. Thus this bias does not force the speaker to produce different messages for different inputs, and so does not increase the learning signal for the listener. Proportion of good runs Final reward of good runs Biases No bias Social influence Positive listening Positive signalling Both 0.00 0.00 0.88 0.98 1.00 CI 0.00-0.07 0.00-0.07 0.76-0.94 0.90-1.00 0.93-1.0 N/A N/A 0.92 ± 0.03 0.99 ± 0.00 0.98 ± 0.01 Table 1: Both biases lead to consistent discovery of useful communication. We define a good run to be one with final average reward greater than 0.2. Averages are over 50 runs for each setting. 4.2 Treasure Hunt We propose a new cooperative RL environment called Treasure Hunt, where agents explore several tunnels to find treasure 1. When successful, both agents receive a reward of 1. The agents have a limited field of view; one agent is able to efficiently find the treasure, but can never reach it, while the other can reach the treasure but must perform costly exploration to find it. In the optimal solution, the agent which can see the treasure finds it and communicates the position to the agent which can reach it. Agents communicate by sending one of five discrete symbols on each timestep. The precise generation rules for the environment can be found in the supplementary material. The agents used in this environment are Advantage Actor-Critic methods [29] with the V-trace correction [7]. The agent architecture employs a single convolutional layer, followed by a multi-layer perceptron. The message from the other agent is concatenated to the output of the MLP, and fed into an LSTM. The network's action policy, message policy and value function heads are linear layers. 1Videos for this environment can be found at https://youtu.be/eueK8WPkBYs and https://youtu. be/HJbVwh10jYk. 7 Figure 3: Treasure hunt environment. Figure 4: Positive signalling and listening biases leads to more reward. Proportion good Final reward (good runs) Biases No bias Positive signalling Positive listening Both 0.28 0.84 0.64 0.94 CI 0.18-0.42 0.71-0.92 0.50-0.76 0.84-0.98 Final reward 12.45 ± 0.48 14.22 ± 0.36 13.94 ± 0.44 15.14 ± 0.33 14.67 ± 0.29 14.69 ± 0.18 14.95 ± 0.20 15.41 ± 0.14 36.1 ± 3.3 41.3 ± 7.9 Table 2: Proportion and average reward of good runs. Values are means over 50 runs with 95% confidence intervals, calculated using Wilson approximation in the case of Bernoulli variables. Run Mean time (unmodified) Mean visit time (modified) Median Best 100.6 ± 14.7 85.4 ± 14.1 Table 3: Visit time to tunnel, with and without modified messages. Values are means over 100 episodes with 95% confidence intervals. Our training follows the independent multiagent reinforcement learning paradigm: each agent is trained independently using their own experience of states and actions. We use RMSProp [13] to adjust the weights of the agent's neural network. We co-train two agents, each in a consistent role (finder or collector) across episodes. The results are shown in Table 2. We find that biases for positive signalling and positive listening both lead to increased reward, and adding either bias to the agents leads to more consistent discovery of useful communication protocols; we define these as runs which get reward greater than 13, the maximum final reward in 50 runs with no communication. With or without biases, the agents still frequently only discover local optima - for example, protocols where the agent which can find treasure reports on the status of only one tunnel, leaving the other to search the remaining tunnels. This demonstrates a limitation of these methods; positive signalling and listening biases are useful for finding some helpful communication protocol, but they do not completely solve the joint exploration problem in emergent communication. However, among runs which achieve some communication, we see greater reward on average among runs with both biases, corresponding to reaching better local optima for the communication protocol on average. We also ran experiments with the speaker getting an extra reward for influencing the listener, as in [15]. Here, we used the centralized model in [15], where the listener calculates the social influence of the speaker's messages, and the speaker gets an intrinsic reward for increasing this influence. We did not see a significant improvement in task reward, as compared to communication with no additional bias. We analyze the communication protocols for two runs, which correspond to the two videos linked in1. One is a typical solution among runs where communication emerges; we picked this run by taking the median final reward out of all runs with both positive signalling and positive listening biases enabled. Qualitatively, the behaviour is simple -- the finder finds the rightmost tunnel, and then reports whether there is treasure in that tunnel for the remainder of the episode. The other run we analyze is the one with the greatest final reward; this has more complicated communication behaviour. To analyze these runs, we rolled out 100 episodes using the final policies from each. 8 First, we relate the finder's communication protocol to the actual location of the treasure on this frame; in both runs, we see that these are well correlated. In the median run, we see that one symbol relates strongly to the presence of treasure; when this symbol is sent, the treasure is in the rightmost tunnel around 75% of the time. In the best run, where multiple tunnels appear to be reported on by the finder, the protocol is more complicated, with various symbols correlating with one or more tunnels. Details of the correlations between tunnels and symbols can be found in the supplementary material. Next, we intervene in the environment to demonstrate that these communication protocols have the expected effect on the collector. For each of these pairs of agents, we produce a version of the environment where the message channel is overridden, starting after 100 frames. We override the channel with a constant message, using the symbol which most strongly indicates a particular tunnel. We then measure how long the collector takes to reach a square 3 from the bottom, where the agent is just out of view of the treasure. In Table 3, we compare this to the baseline where we do not override the communication channel. In both cases, the collector reaches the tunnel significantly faster than in the baseline, indicating that the finder's consistent communication is being acted on as expected. 5 Conclusion We introduced two new shaping losses to encourage the emergence of communication in decentralized learning; one on the speaker's side for positive signalling, and one on the listener's side for positive listening. In a simple environment, we showed that these losses have the intended effect of easing the learning problem for the other agent, and so increase the consistency with which agents learn useful communication protocols. In a temporally extended environment, we again showed that these losses increase the consistency with which agents learn to communicate. Several questions remain open for future research. Firstly, we investigate only fully co-operative environments; does this approach can help in environments which are neither fully cooperative nor fully competitive? In such settings, both positive signalling and positive listening can be harmful to an agent, as it becomes more easily exploited via the communication channel. However, since the losses we use mainly serve to ensure the communication channel starts to be used, this may be as large a problem as it initially seems. Secondly, the environments investigated here have difficult communication problems, but are otherwise simple; can these methods be extended to improve performance in decentralized agents in large-scale multi-agent domains? There are a few dimensions along which these experiments could be scaled -- to more complex observations and action spaces, but also to environments with more than two players, and to larger communication channels. References [1] Trapit Bansal, Jakub Pachocki, Szymon Sidor, Ilya Sutskever, and Igor Mordatch. Emergent complexity via multi-agent competition. In 6th International Conference on Learning Repre- sentations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings, 2018. [2] Daniel S. Bernstein, Shlomo Zilberstein, and Neil Immerman. The complexity of decentralized control of Markov Decision Processes. In UAI '00: Proceedings of the 16th Conference in Uncertainty in Artificial Intelligence, Stanford University, Stanford, California, USA, June 30 - July 3, 2000, pages 32 -- 37, 2000. [3] Kris Cao, Angeliki Lazaridou, Marc Lanctot, Joel Z Leibo, Karl Tuyls, and Stephen Clark. Emergent communication through negotiation. arXiv preprint arXiv:1804.03980, 2018. [4] Yongcan Cao, Wenwu Yu, Wei Ren, and Guanrong Chen. An overview of recent progress in the study of distributed multi-agent coordination. IEEE Trans. Industrial Informatics, 9(1):427 -- 438, 2013. [5] Caroline Claus and Craig Boutilier. The dynamics of reinforcement learning in cooperative mul- tiagent systems. In Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, AAAI 98, IAAI 98, July 26-30, 1998, Madison, Wisconsin, USA., pages 746 -- 752, 1998. [6] Abhishek Das, Théophile Gervet, Joshua Romoff, Dhruv Batra, Devi Parikh, Michael Rab- bat, and Joelle Pineau. Tarmac: Targeted multi-agent communication. arXiv preprint arXiv:1810.11187, 2018. 9 [7] L. Espeholt, H. Soyer, R. Munos, K. Simonyan, V. Mnih, T. Ward, Y. Doron, V. Firoiu, T. Harley, I. Dunning, S. Legg, and K. Kavukcuoglu. IMPALA: Scalable Distributed Deep-RL with Importance Weighted Actor-Learner Architectures. ArXiv e-prints, February 2018. [8] Jakob Foerster, Ioannis Alexandros Assael, Nando de Freitas, and Shimon Whiteson. Learning to communicate with deep multi-agent reinforcement learning. In Advances in Neural Information Processing Systems, pages 2137 -- 2145, 2016. [9] Jakob N. Foerster, Gregory Farquhar, Triantafyllos Afouras, Nantas Nardelli, and Shimon Whiteson. Counterfactual multi-agent policy gradients. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018, pages 2974 -- 2982, 2018. [10] H Paul Grice. Utterer's meaning, sentence-meaning, and word-meaning. Language, and Artificial Intelligence, pages 49 -- 66. Springer, 1968. In Philosophy, [11] Eric A. Hansen, Daniel S. Bernstein, and Shlomo Zilberstein. Dynamic programming for partially observable stochastic games. In Proceedings of the 19th National Conference on Artifical Intelligence, AAAI'04, pages 709 -- 715. AAAI Press, 2004. [12] Matthew John Hausknecht. Cooperation and communication in multiagent deep reinforcement learning. PhD thesis, University of Texas at Austin, Austin, USA, 2016. [13] G. Hinton, N. Srivastava, , and K. Swersky. Lecture 6a: Overview of mini -- batch gradient descent. Coursera, 2012. [14] Max Jaderberg, Wojciech M. Czarnecki, Iain Dunning, Luke Marris, Guy Lever, Antonio García Castañeda, Charles Beattie, Neil C. Rabinowitz, Ari S. Morcos, Avraham Ruderman, Nicolas Sonnerat, Tim Green, Louise Deason, Joel Z. Leibo, David Silver, Demis Hassabis, Koray Kavukcuoglu, and Thore Graepel. Human-level performance in first-person multiplayer games with population-based deep reinforcement learning. CoRR, abs/1807.01281, 2018. [15] Natasha Jaques, Angeliki Lazaridou, Edward Hughes, Caglar Gulcehre, Pedro A Ortega, DJ Strouse, Joel Z Leibo, and Nando de Freitas. Intrinsic social motivation via causal influence in multi-agent rl. International Conference of Machine Learning, 2019. [16] Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. [17] Hiroaki Kitano, Minoru Asada, Yasuo Kuniyoshi, Itsuki Noda, and Eiichi Osawa. Robocup: The robot world cup initiative. In Agents, pages 340 -- 347, 1997. [18] Satwik Kottur, José MF Moura, Stefan Lee, and Dhruv Batra. Natural language does not emerge'naturally'in multi-agent dialog. arXiv preprint arXiv:1706.08502, 2017. [19] Martin Lauer and Martin A. Riedmiller. An algorithm for distributed reinforcement learning in cooperative multi-agent systems. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML 2000), Stanford University, Stanford, CA, USA, June 29 - July 2, 2000, pages 535 -- 542, 2000. [20] Guillaume J. Laurent, Laëtitia Matignon, and Nadine Le Fort-Piat. The world of Indepen- dent learners is not Markovian. International Journal of Knowledge-Based and Intelligent Engineering Systems, 15(1):55 -- 64, March 2011. [21] Angeliki Lazaridou, Karl Moritz Hermann, Karl Tuyls, and Stephen Clark. Emergence of linguistic communication from referential games with symbolic and pixel input. arXiv preprint arXiv:1804.03984, 2018. [22] Joel Z. Leibo, Edward Hughes, Marc Lanctot, and Thore Graepel. Autocurricula and the emergence of innovation from social interaction: A manifesto for multi-agent intelligence research. CoRR, abs/1903.00742, 2019. 10 [23] Joel Z. Leibo, Vinícius Flores Zambaldi, Marc Lanctot, Janusz Marecki, and Thore Graepel. Multi-agent reinforcement learning in sequential social dilemmas. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2017, São Paulo, Brazil, May 8-12, 2017, pages 464 -- 473, 2017. [24] Michael L. Littman. Markov games as a framework for multi-agent reinforcement learning. In In Proceedings of the Eleventh International Conference on Machine Learning, pages 157 -- 163. Morgan Kaufmann, 1994. [25] Ryan Lowe, Jakob Foerster, Y-Lan Boureau, Joelle Pineau, and Yann Dauphin. On the pitfalls of measuring emergent communication. arXiv preprint arXiv:1903.05168, 2019. [26] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor Mordatch. Multi- agent actor-critic for mixed cooperative-competitive environments. In Advances in Neural Information Processing Systems, pages 6379 -- 6390, 2017. [27] Laëtitia Matignon, Laurent Jeanpierre, and Abdel-Illah Mouaddib. Coordinated multi-robot exploration under communication constraints using decentralized markov decision processes. In Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada., 2012. [28] Laëtitia Matignon, Guillaume J. Laurent, and Nadine Le Fort-Piat. Independent reinforcement learners in cooperative markov games: a survey regarding coordination problems. Knowledge Eng. Review, 27(1):1 -- 31, 2012. [29] Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lilli- crap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep reinforcement learning. In International conference on machine learning, pages 1928 -- 1937, 2016. [30] Igor Mordatch and Pieter Abbeel. Emergence of grounded compositional language in multi- agent populations. In Thirty-Second AAAI Conference on Artificial Intelligence, 2018. [31] Stephen Neale. Paul grice and the philosophy of language. Linguistics and philosophy, 15(5):509 -- 559, 1992. [32] Malcolm Reynolds, Gabriel Barth-Maron, Frederic Besse, Diego de Las Casas, Andreas Fidjeland, Tim Green, Andria Puigdomenech, Sébastien Racanière, Jack Rae, and Fabio Viola. Open sourcing Sonnet - a new library for constructing neural networks. https: //deepmind.com/blog/open-sourcing-sonnet/, 2017. [33] L. S. Shapley. Stochastic games. Proceedings of the National Academy of Sciences of the United States of America, 39(10):1095 -- 1100, 1953. [34] Luc Steels. Evolving grounded communication for robots. Trends in cognitive sciences, 7(7):308 -- 312, 2003. [35] Sainbayar Sukhbaatar, Arthur Szlam, and Rob Fergus. Learning multiagent communication with backpropagation. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain, pages 2244 -- 2252, 2016. [36] Ming Tan. Multi-agent reinforcement learning: Independent versus cooperative agents. In Ma- chine Learning, Proceedings of the Tenth International Conference, University of Massachusetts, Amherst, MA, USA, June 27-29, 1993, pages 330 -- 337, 1993. [37] Kyle Wagner, James A Reggia, Juan Uriagereka, and Gerald S Wilkinson. Progress in the simulation of emergent communication and language. Adaptive Behavior, 11(1):37 -- 69, 2003. 11 A Environment details To generate a map for the treasure hunt environment, we: 1. Create a rectangle of grey pixels with height 18 and width 24. 2. Draw a black tunnel on the second row up, including all but the leftmost and rightmost pixels. 3. Draw a black tunnel on the second row down, including all but the leftmost and rightmost pixels. 4. Pick 4 starting positions on the top horizontal tunnel for vertical tunnels. These are randomly selected among sets of positions which are all at least 3 pixels apart (so no tunnel is visible from another). Draw black tunnels from these positions to 2 pixels above the bottom tunnel. 5. Place the yellow treasure at the bottom of a random tunnel. 6. Place one agent uniformly at random in the top tunnel, and one uniformly at random in the bottom tunnel. The episode length is 500 timesteps. The agents have 5 actions, corresponding to the 4 directions and a no-op action. They can move in the black tunnels and onto the treasure, but not onto the grey walls. The agent observation is a 5 × 5 square, centered on the agent. When an agent moves onto the treasure, both agents receive reward 1, and the treasure respawns at the bottom of a random tunnel. The RGB values of the colors of the pixels in the observations are: • Blue self: (0, 0, 255). • Red partner agent: (255, 0, 0). • Grey walls: (128, 128, 128). • Black tunnels: (0, 0, 0). • Yellow treasure: (255, 255, 0). B Treasure hunt communication protocols In this section, we give more details on the communication protocols in Treasure Hunt. First, we give full details of the correlations between messages and treasure location in the two runs discussed in the main text. These are the median and the best runs in terms of final reward, in the setting where we use both positive signalling and positive listening biases. We generated 100 episodes using the final policies for the 2 agents, and recorded the treasure locations and symbols on each timestep. Each cell shows the probability of each treasure location, given that the speaker transmits a particular symbol. In Table 4, we see that symbol 2 is particularly meaningful, fairly reliably indicating the presence of treasure in the final tunnel. In Table 5, we see that three symbols appear to be used; 0 and 2 correlate with righthand tunnels, and 3 with lefthand ones. P(T = 1S) 0.12 ± 0.01 0.36 ± 0.02 0.06 ± 0.01 0.32 ± 0.01 0.27 ± 0.01 P(T = 2S) 0.08 ± 0.01 0.35 ± 0.02 0.05 ± 0.00 0.35 ± 0.02 0.28 ± 0.02 P(T = 4S) S 0.46 ± 0.03 0 0.07 ± 0.01 1 0.75 ± 0.02 2 0.09 ± 0.01 3 0.20 ± 0.01 4 Table 4: Message tunnel correlations for median Treasure Hunt run. P(T = 3S) 0.35 ± 0.03 0.22 ± 0.01 0.14 ± 0.01 0.24 ± 0.01 0.24 ± 0.01 12 S 0 1 2 3 4 P(T = 1S) 0.08 ± 0.01 0.15 ± 0.01 0.12 ± 0.01 0.56 ± 0.03 0.23 ± 0.02 P(T = 2S) 0.12 ± 0.01 0.31 ± 0.02 0.15 ± 0.01 0.19 ± 0.02 0.32 ± 0.02 P(T = 3S) 0.32 ± 0.02 0.31 ± 0.02 0.29 ± 0.02 0.16 ± 0.02 0.27 ± 0.02 P(T = 4S) 0.48 ± 0.02 0.22 ± 0.01 0.44 ± 0.02 0.09 ± 0.02 0.18 ± 0.02 Table 5: Message tunnel correlations for best Treasure Hunt run. We also show the correlations between messages and listener actions, in Tables 6 and 7. In both cases, these are as expected from the correlations between tunnels and messages; we see the listener move more in the direction which the messages correlate with. P(RightS) 0.46 ± 0.01 0.05 ± 0.00 0.32 ± 0.01 0.04 ± 0.00 0.03 ± 0.00 P(DownS) 0.34 ± 0.01 0.49 ± 0.00 0.17 ± 0.01 0.09 ± 0.00 0.73 ± 0.00 P(N oopS) 0.00 ± 0.00 0.00 ± 0.00 0.00 ± 0.00 0.00 ± 0.00 0.00 ± 0.00 P(Lef tS) 0.05 ± 0.00 0.26 ± 0.00 0.03 ± 0.00 0.09 ± 0.00 0.09 ± 0.00 P(U pS) 0.14 ± 0.01 0.20 ± 0.00 0.48 ± 0.01 0.78 ± 0.00 0.14 ± 0.00 Table 6: Message action correlations for median Treasure Hunt run. S 0 1 2 3 4 S 0 1 2 3 4 P(N oopS) 0.01 ± 0.00 0.01 ± 0.00 0.01 ± 0.00 0.01 ± 0.00 0.00 ± 0.00 P(U pS) 0.49 ± 0.01 0.37 ± 0.01 0.25 ± 0.01 0.47 ± 0.01 0.26 ± 0.01 P(RightS) 0.28 ± 0.01 0.07 ± 0.00 0.23 ± 0.01 0.04 ± 0.01 0.07 ± 0.00 P(DownS) 0.11 ± 0.00 0.38 ± 0.01 0.42 ± 0.01 0.27 ± 0.01 0.52 ± 0.01 P(Lef tS) 0.10 ± 0.01 0.17 ± 0.00 0.09 ± 0.00 0.21 ± 0.01 0.14 ± 0.00 Table 7: Message action correlations for best Treasure Hunt run. C Network details and hyperparameters C.1 MNIST sums experiments In the MNIST sums environment, the agent architecture used was from an existing MNIST classifier; we did not optimize this, as the goal was to investigate the effect of communication biases rather than to achieve optimal performance. This architecture is: • A convolutional neural network, with 2 layers, which have 32 and 64 channels respectively. Both layers have kernel size 5, stride 1, and rectified linear unit (ReLU) activations. We use max pooling, with stride and kernel 2. • One hidden linear layer with 1024 neurons, with ReLU activations. We used the Adam optimizer [16], with a learning rate of 0.0003 and parameters β1 = 0.9, β2 = 0.999,  = 10−8. These layers were implemented using the Sonnet library [32]. The agents were trained using REINFORCE; the total loss for each agent consists of the REINFORCE loss, entropy regularization, and the biases for positive signalling (Lps) and positive listening, (Lpl and Lce). For the listener agent, the message is concatenated to the flattened output of the convolutional net before the hidden linear layer. The final hyperparameters used for the 5 settings were: To select the hyperparameters for the no bias setting, we performed a joint sweep over action and message entropy bonuses, consider a range of values from 0.0 to 0.3 for each. No values were found which improved over the no communication policy; the final values reported here are those which worked best in the other settings. 13 Hyperparameter Batch size Action policy entropy bonus Message policy entropy bonus Target message entropy Htarget Weight of Lpl Weight of Lps Weight of Lce λ for Lps No bias 32 0.03 0.03 N/A N/A N/A N/A N/A PL PS 32 32 0.03 0.03 0.03 0.0 1.0 1.0 N/A 0.01 N/A 0.1 N/A 0.001 N/A 3.0 Both 32 0.03 0.0 N/A 0.01 0.1 0.001 3.0 SI 32 0.01 0.01 N/A N/A N/A 0.001 N/A Table 8: Hyperparameters for final MNIST experiments. In the positive listening setting, we performed sweeps: • Over the weight of Lpl, using values in (0.01, 0.03, 0.1, 0.3). • Over the entropy costs for messages and actions, using values (0.01, 0.03, 0.1). • Over the weight of Lce, using values of (0.0, 0.001, 0.01, 0.1); aside from 0, which unsur- prisingly produced worse results, there was no significant difference in the results of these runs. In the positive signalling setting, we performed sweeps: • Jointly over the weight of Lps and λ, using values in (0.01, 0.03, 0.1) for Lps, and (0.01, 0.03, 0.1) for the product λLps. In the setting with both biases, we ran no additional sweeps, simply combining the hyperparameters from the best runs with positive signalling and positive listening. In the social influence setting, we performed sweeps: • Over the weight of the social influence reward, using values (0.01, 0.03, 0.1, 0.3, 1.0, 10.0). • Over the entropy costs for messages and actions, using values (0.01, 0.03, 0.1). For all hyperparameter sweeps, we ran 5 runs, and picked the setting with the highest average final reward. For the final sets of hyperparameters, we then ran 50 runs. C.2 Treasure Hunt experiments In our experiments, we use 32 parallel environment copies for the Asynchronous Advantage Actor- Critic algorithm [29] with the V-trace correction [7]. The total loss for each agent consists of the A3C loss, including entropy regularization, and the biases for positive signalling (Lps) and positive listening, (Lpl and Lce). The two agents have the same architecture, which consists of: • A single convolutional layer, using 6 channels, kernel size of 1 and stride of 1. • A multi-layer perceptron with 2 hidden layers of size 64. • An LSTM, with hidden size 128. • Linear layers mapping to policy logits for the action and message policies, and to the baseline value function. The message from the other agent is concatenated to the flattened output of the convolutional net before the hidden linear layer. We used the RMSProp optimizer [13] for gradient descent, with a initial learning rate of 0.001, exponentially annealed by a factor of 0.99 every million steps. The other parameters are η = 0.99, and  = 10−6. The final hyperparameters used for the 5 settings were: In the no communication setting, we performed sweeps: • Over the entropy costs for actions, using values (0.001, 0.003, 0.006, 0.01). 14 Parameter Batch size No comms No bias 16 16 PS 16 PL 16 0.006 Action entropy regularization Message entropy regularization Target message entropy Htarget 0.0 N/A N/A 0.01 0.001 N/A N/A Table 9: Hyperparameters for final Treasure Hunt experiments. 0.006 N/A N/A N/A N/A N/A N/A N/A 0.006 0.0 0.8 0.003 N/A 0.001 3.0 N/A 0.006 0.0 N/A N/A N/A N/A N/A N/A Weight of Lpl Weight of Lce Weight of Lps λ for Lps Weight of Lsi Both 16 0.006 0.0 0.8 0.003 0.01 N/A 3.0 N/A SI 16 0.006 0.0 N/A N/A 0.01 N/A N/A 0.01 • Over the sizes of the MLP layers, using values (32, 64, 128). • Over the sizes of the LSTM hidden size, using values (64, 128). We then fixed these parameters for the other settings. In the positive listening setting, we performed sweeps: • Over the weight of Lpl, using values in (0.001, 0.003, 0.01). • Over the weight of Lce, using values of (0.0, 0.001, 0.01). In the positive signalling setting, we performed sweeps: • Jointly over the weight of Lps and λ, using values in (0.001, 0.003, 0.01) for Lps, and (0.001, 0.003, 0.01) for the product λLps. • Over the target entropy Ht, using values in (0.4, 0.8, 1.6). In the setting with both biases, we ran no additional sweeps, simply combining the hyperparameters from the best runs with positive signalling and positive listening. In the social influence setting, we performed a sweep over the weighting of the reward for social influence to the speaker, using values in (0.01, 0.03, 0.1, 0.3, 1.0). For all hyperparameter sweeps, we ran 5 runs, and picked the setting which exceeded the no- communication baseline most frequently, terminating runs early if the result was clear. For the final sets of hyperparameters, we then ran 50 runs. D Multi-step CIC ablation In the positive listening bias for the listener, we use the multiple timestep CIC. Recall that for a listener trajectory xt = (o1, a1, m1, . . . , ot−1, at−1, mt−1, ot), we define x(cid:48) t = (o1, a1, . . . , at−1, ot) (this is the trajectory xt, with the messages removed). We define the multiple timestep CIC as: t) − H(atxt). CIC(xt) = H(atx(cid:48) (9) We could also choose to use the single timestep CIC, defined in [15, 25] as the mutual information between the speaker and the listener's actions. Defining x(cid:48)(cid:48) t = (o1, a1, m1, . . . , at−1, ot) -- which is the trajectory with only the final message removed -- this would be: t ) − H(atxt). CIC(st) = H(atx(cid:48)(cid:48) (10) A(·x(cid:48) Similarly to in the multiple timestep CIC, we estimate the single timestep CIC by learning the t). We do this by performing a rollout of the agent's policy network, with the distribution πi actual observations and actions in the trajectory, including all message except the final one, which A(·xt), using a cross-entropy loss is zeroed out. We fit the resulting function πi between these distributions. The single-timestep CIC can then be estimated by: t ) to predict πi A(·x(cid:48)(cid:48) CIC(xt) ≈ DKL(πi A(·xt)πi A(·x(cid:48)(cid:48) t )). (11) 15 Figure 5: One step CIC does not lead to better results than no speaker-side bias. As with the multi-timestep CIC, we used the L1 loss for Lpl (xt) = − (cid:88) (cid:12)(cid:12)πi t)(cid:12)(cid:12). A(axt) − πi A(ax(cid:48) a∈Ai (12) Using the single timestep CIC, with or without positive signalling, we did not find improvements over a baseline with no speaker-side bias -- see Figure 5. E Statistical methodology All confidence intervals shown are 95% confidence intervals. For confidence intervals of Bernoulli variables -- the proportion of runs with reward above a certain threshhold -- we use the Wilson approximation. For graphs depicting average performance over multiple runs, we first take the mean reward per run in 100 time windows over training. The interval shown is the 95% confidence interval for this mean. 16
1903.04726
1
1903
2019-03-12T04:40:53
Self-triggered distributed k-order coverage control
[ "cs.MA", "math.OC" ]
A k-order coverage control problem is studied where a network of agents must deploy over a desired area. The objective is to deploy all the agents in a decentralized manner such that a certain coverage performance metric of the network is maximized. Unlike many prior works that consider multi-agent deployment, we explicitly consider applications where more than one agent may be required to service an event that randomly occurs anywhere in the domain. The proposed method ensures the distributed agents autonomously cover the area while simultaneously relaxing the requirement of constant communication among the agents. In order to achieve the stated goals, a self-triggered coordination method is developed that both determines how agents should move without having to continuously acquire information from other agents, as well as exactly when to communicate and acquire new information. Through analysis, the proposed strategy is shown to provide asymptotic convergence similar to that of continuous or periodic methods. Simulation results demonstrate that the proposed method can reduce the number of messages exchanged as well as the amount of communication power necessary to accomplish the deployment task.
cs.MA
cs
Self-triggered distributed k-order coverage control Daniel Tabatabai Mohanad Ajina Cameron Nowzari 9 1 0 2 r a M 2 1 ] A M . s c [ 1 v 6 2 7 4 0 . 3 0 9 1 : v i X r a Abstract -- A k-order coverage control problem is studied where a network of agents must deploy over a desired area. The objective is to deploy all the agents in a decentralized manner such that a certain coverage performance metric of the network is maximized. Unlike many prior works that consider multi- agent deployment, we explicitly consider applications where more than one agent may be required to service an event that randomly occurs anywhere in the domain. The proposed method ensures the distributed agents autonomously cover the area while simultaneously relaxing the requirement of constant communication among the agents. In order to achieve the stated goals, a self-triggered coordination method is developed that both determines how agents should move without having to continuously acquire information from other agents, as well as exactly when to communicate and acquire new information. Through analysis, the proposed strategy is shown to provide asymptotic convergence similar to that of continuous or periodic methods. Simulation results demonstrate that the proposed method can reduce the number of messages exchanged as well as the amount of communication power necessary to accomplish the deployment task. I. INTRODUCTION This paper studies a multi-agent coordination problem where a network of agents perform a deployment task to statically position themselves over a desired area. For exam- ple, a mobile sensor network where it is required to deploy sensors to positions that will maximize total coverage of the desired sensing environment. This is commonly referred to as coverage control. Specific applications include topics such as environmental monitoring [1], [2], survelliance [3], data collection [4], [5], and search and rescue [6]. More specifically, we consider a generalization of the coverage problem that extends to scenarios where more than one agent may be required to overlap a region in the coverage area. This is referred to as k-order coverage control [7] -- [9], where k > 1 agents must overlap coverage of the same point q. Our contributions focus on the development of coordination strategies that will reduce the amount of communication necessary between agents while performing the deployment task. This is accomplished by the design of a self-triggered algorithm where agents autonomously decide when they require information from other agents in the network. With respect to coverage control, the majority of previous research has focused on scenerios where an individual agent is capable of servicing events that occur in the agent's respective region of responsibility without the assistance of other agents. As an example, consider a monitoring application where a wirless sensor network must monitor the The authors and Com- puter Engineering, George Mason University, Fairfax, VA 22030, USA, {dtabatab,majina,cnowzari}@gmu.edu are with the Department of Electrical environment. If a random event occurs in the vicinity of a particular sensor then that sensor has the ability to measure and capture the event independent of other sensors in the network. However, various applications exists where agents do not possess the capability to capture or respond to events independently. These applications require multiple agents to work collectively in order to service events. One example of this type of application is that of Time Difference of Arrival (TDOA) localization [10] -- [12] where the requirement is that three or more sensors that are located at different positions must measure the same event. Another example is emergency response vehicles where two or more vehicles may be required to respond to a particular event, such as a fire or burglary. In other scenarios, two or more agents may not be necessary for event handling, but the application may require redundant agents to overlap areas for fail-safe purposes. Literature review: The topic of multi-agent coverage control has been studied by a number of authors in the past including the seminal work [13] where coverage control based on agents moving to the centroids of a Voronoi partition was introduced. In [14], the authors consider the coverage control problem where each node is constrained to have m neighboring nodes. The authors use an approach based on vector potential fields where each node acts as a repelling force in order to maximize coverage and acts as an attracting force in order to satisfy the m neighbor constraint. In [15], the authors consider heterogeneous and non-point source nodes as well as non-convex enviroments. In [16], the authors study the problem in the context of using sensor measurements to estimate regions of importance in the mission space thus driving nodes to concentrate in these areas. Common to all the above mentioned works is the fact that they study the coverage control problem in terms of a first-order coverage problem where each agent is solely responsible for covering a sub-region of the mission space. As previously mentioned, the interest of our work is the generalized k-order coverage control problem where multiple agents overlap coverage of sub-regions in the mission space. The k-order coverage control problem was studied in [17] -- [19] where a method using higher-order Voronoi parti- tions was proposed. The authors present a method for deploy- ing agents over a bounded area when more than one agent must have overlapping coverage of the same point. However, to realize the proposed contol law in [19], it is assumed that continuous communication between agents is achievable. For many real-world systems, continuous communication is not feasible and periodic solutions can be resource inefficient and may not be neccessary. As alternatives to continuous and periodic solutions, self-triggered and event-triggered approaches have been proposed in the literature to handle similiar problems in networked systems [8], [20] -- [23]. For self- and event-triggered solutions, the exact time at which agents perform actions, e.g. wirelessly communicate or up- date a control signal, is autonomously decided by the agents rather than occurring at periodic time intervals. In [24], [25], the concepts of self-triggered control was applied to the case of first-order optimal deployment. In our current work, we extend the self-triggered centroid algorithm presented in [24] by considering the higher-order coverage control problem studied in [17] -- [19] and develop a self- triggered coordination strategy to relax the synchronous, periodic communication requirement while guaranteeing that each agent moves such that it does not contribute negatively to the task. Statement of contributions: The main contribution of this work is the development of a distributed self-triggered control strategy that deploys a set of agents to static locations in a convex area in order to achieve k-order optimal coverage. Our solution relaxes the need for continuous or periodic communication among agents as is done in prior works [19]. More specifically, our algorithm is comprised of two major sub-components. The first being an update decision policy where each agent decides when to acquire new information from neighboring agents through a wireless communication network. The decision to comunicate is based on the level of uncertainty each agent has accumulated over time. This uncertainty is due to not having up-to-date information that results from the lack of communication with other agents. We extend the notion of uncertain spatial partitioning [26] -- [28] used for optimal deployment in [24] by the use of k- order guaranteed and dual-guaranteed Voronoi partitions. The second major sub-component is a motion control law that determines how agents should move given possibly outdated information about the location of other agents in the network. Each agent determines a motion plan that is guaranteed to contribute positively to the higher-order deployment task. Organization: Section II outlines some important notions from computational geometry. Section III formally presents the problem statement. Section IV formulates the concepts of k-order guaranteed and k-order dual-guaranteed Voronoi partitions. Section V presents the algorithm design. In section VI convergence analysis of the algorithm is discussed. Section VII presents simulation results and section VIII assimilates the conclusions. II. PRELIMINARIES Let R≥0 and Z≥0 be the set of non-negative real, integer values respectively. With the Euclidean norm defined by k · k A. Basic geometric notions We denote by [p, q] ⊂ Rd the closed segment with extreme points p and q ∈ Rd. Let φ : Rd → R≥0 be a bounded measurable function that we term density. For MS = ZS φ(q)dq, CS = qφ(q)dq. 1 MS ZS S ⊂ Rd, the mass and center of mass of S with respect to φ are Let s1, s2, ..., sn be n subsets of S and {s1, s2, ..., sn} be a partition of S then mass and center of mass with respect to φ and the n partitions, MS = Msi, nXi=1 CS = Pn Pn i=1 MsiCsi i=1 Msi The circumcenter ccs of a bounded set S ⊂ Rd is the center of a closed ball of minimum radius that contains S. The circumradius crs of S is the radius of this ball. The diameter of S is diam(S) = maxp,q∈S kp − qk. Given v ∈ Rd \ {0}, let unit(v) be the unit vector in the direction of v. Given a convex set S ⊂ Rd and p ∈ Rd, let prS(p) denote the orthogonal projection of p onto S, i.e., prS(p) is the point in S closest to p. The to-ball-boundary map tbb : (Rd × R≥0)2 → Rd takes (p, δ, q, r) to (p + δ unit(q − p) prB(q,r) if kp − prB(q,r)(p)k ≥ δ, if kp − prB(q,r)(p)k ≤ δ. Figure 1 illustrates the action of tbb. p δ tbb(p, δ, q, r) p ≤ δ tbb(p, δ, q, r) r q r q Fig. 1: Graphical representation of the action of tbb when (a) kp − prB(q,r)(p)k > δ and (b) kp − prB(q,r)(p)k ≤ δ. We denote by B(p, r) the closed ball centered at p ∈ S with radius r and by Hpo = {q ∈ Rd kq − pk ≤ kq − ok} the closed halfspace determined by p, o ∈ Rd that contains p. B. 1-order Voronoi partitions The methods developed in this work rely heavily on the concept of Voronoi partitioning [29]. In the following sub- sections a brief discussion of 1-order Voronoi partitions is presented. Let S be a convex polygon in R2 and P = (p1, . . . , pn) be the location of n agents. A partition of S is a collection of n polygons K = {K1, . . . , Kn} with disjoint interiors whose union is S. The Voronoi partition V(P ) = {V1, . . . , Vn} of S generated by the points P = (p1, . . . , pn) is Vi = {q ∈ S kq − pik ≤ kq − pjk , ∀j 6= i}. Intuitively, the Voronoi cell Vi represents all the points that are closer to the agent at position pi than to any of the other agents in the network. When the Voronoi regions Vi and Vj are adjacent (i.e., they share an edge), pi is called a (Voronoi) neighbor of pj (and vice versa). P = (p1, . . . , pn) is a centroidal Voronoi configuration if it satisfies that pi = CVi , for all i ∈ {1, . . . , n}. III. PROBLEM STATEMENT A. k-order Voronoi partitions 2 Intuitively, a k-order Voronoi cell represents all the points that are closer to k agents located at positions {pi1, pi2 , ..., pik } = PI than to any of the other agents in the network. A k-order Voronoi partition would then be a collection of all the k-order Voronoi cells. In the first-order case, the space is partitioned into n cells such that each agent is closest to every point in their cell than any of the other agents. However, in the case of a second-order partition the space is partitioned into n(n−1) cells and there are many cells that can be empty because certain agents may not share overlapping responsibility for any points in the space. The difference between the first-order and second-order case can be seen in figure 2. In figure 2a an example of a first-order partition is illustrated for five agents. Note that each agent is enclosed in their respective cells and there is exactly five cells, one per agent. Figure 2b illustrates the second-order partition for the same five agents. Note that in figure 2b the number of cells are greater than the number of agents. Also note that some cells contain multiple agents while other cells do not contain any agents at all. Furthermore, some agent combinations are not associated to a cell at all, e.g. V(1, 5) and V(3, 4). This is due to the fact that these agents do not share points in the space that are mutually closer to them combined than to any of the other agents. A more formal definition of the k-order Voronoi partition follows. Let S ⊂ R2 be a convex polygon in a 2-dimensional space. Let A = {1, . . . , n} be a finite set of integers representing the agents in a n-agent network. Let P = {p1, . . . , pn} ∈ S be the set of positions of the agents A in the domain S. Let I = (i1, . . . , ik) ∈ I be a k-tuple element of the set I where I = {(i1, . . . , ik) ∈ Ak i1 < · · · < ik} is the set of k-tuples in Ak that do not repeat, for example (i1, i2, i3) ∈ I , but (i3, i2, I1) /∈ I. Let PI = {pi1, . . . pik } ⊂ P be the subset of agent positions corresponding to the agents (i1, . . . , ik) ∈ I. The collection of all elements I ∈ I that include a particular agent i is denoted by I i where I i = {I ∈ I ∀ 1 ≤ α ≤ k, i = Iα} A k-order partition of S is a collection of m polygons R = {R1, . . . , Rn} with disjoint interiors whose union is S and where an element in R is associated with k-agents. The k-order Voronoi partition of a convex polygon S can be defined as follows. Given a set of agents A with positions P. For k < n, let PI ⊂ P with PI = k. Then the k-order Voronoi region associated with agents I = (i1, . . . , ik) with generating sites PI = (pi1 , . . . , pik ) is defined as VI = {q ∈ S kq−pk ≤ kq−p′k, ∀ p ∈ PI, ∀ p′ ∈ P \PI}. For example, if k = 2 then PI = {pi, pj} and the second- order Voronoi cell for agents (i, j) ∈ I becomes, Vij = {q ∈ S kq − pik ≤ kq − p′k, kq − pjk ≤ kq − p′k, ∀ p′ ∈ P \ {pi, pj}} For every point q in VI , the distance from q to any agent position in PI is less than or at most equal to the distance from q to all other agent positions not in PI . For k = 2, the second-order Voronoi partition with I = (i, j) and PI = {pi, pj} would mean that the two agents i and j are closer to or at most as close to all the points in Vij than any of the other agents A \ {i, j}. An alternative interpretation would be that the agents i and j are considered responsible for the region defined by Vij . Combining all k-order Voronoi regions in S, the k-order Voronoi partition of the environment S becomes V(P ) = . The environment S can be considered as the union (cid:8)VI(cid:9)I∈I of all k-order Voronoi cells S =SI∈I VI . Figure 2 presents an example of the difference between a first-order (2a) and second-order (2b) Voronoi partition for five agents. For any agent i with position pi ∈ P, there can be multiple sets PI ⊂ P that contain pi meaning that an agent i located at position pi can be responsible for multiple k-order Voronoi cells. The collection of k-order Voronoi cells associated with agent i is given by V i = {VI }I∈I i. All k-order cells associated with agent i can be combined to form a single region of S that agent i is responsible for and this cell is referred to as the dominant region of agent i. The dominant region for agent i is be defined by Wi = [I∈I i VI . The dominant cell Wi represents the region of S that agent i is responsible for covering. Note that the first-order cell Vi and the k-order cell VI are not equivalent, but both are convex. However, the dominant cell Wi may not be convex. The k-order neighbors of agent i is denoted by Ni. For a k- order Voronoi partition, P = (p1, . . . , pn) is a centroidal k- order Voronoi configuration if it satisfies pi = CWi , for all i ∈ {1, . . . , n}. Next, optimal deployment for k-order Voronoi partitioning is discussed. B. Objective for higher-order coverage The interest is in applications where k > 1 agents are required to service an event occuring at a random point q ∈ S. This is in contrast to the 1-order problem where for any point q ∈ S only one agent is responsible. In order to optimally deploy agents throughout the mission space, an objective function for the higher order deployment problem must be defined. For the 1-order case, from [13], the objective function in terms of Voronoi partitions is defined as H(P ) = kq − pik2φ(q)dq (1) nXi=1ZVi a1 a3 a2 a4 a5 a1 V(1,4) V(1,3) V(1,2) a4 V(2,4) a2 V(4,5) a3 V(2,3) V(3,5) a5 V(2,5) (a) 1-order Voronoi diagram (b) 2-order Voronoi diagram Fig. 2: Example of 1-order Voronoi diagram (left) and 2-order Voronoi diagram (right). In the 1-order case, cells can be represented by the agent that covers the cell. In the case of 2-order partitions, two agents share coverage over a cell. The cells are represented by two agents that cover the particular partition. Note that not all agents share cells. In particular, agents (1, 5) and agents (3, 4) do not share cells, i.e. V(1,5) = ∅ and V(3,4) = ∅ The objective here is to minimize the distance from agent i's position pi to all points q ∈ Vi. Taking advantage of the parallel axis theorem, H(P ) may be expressed as, H(P ) = nXi=1 JVi,CVi + nXi=1 MVikpi − CVi k2 (2) where JVi,CVi is the polar moment of inertia of the 1-order Voronoi cell Vi centered at the centroid CVi . Taking the partial derivative of (2) with respect to pi and evaluating at zero will produce the minimum H at position p∗ i for agent i. The partial derivative of (2) with respect to pi is given by, ∂H ∂pi = MVi(pi − CVi ) This demonstrates that the objective function H in the 1- order case is minimal when pi is located at the centroid CVi . For Voronoi partitions of the k-order, a similar approach to the order-1 partition can be followed. In [19] an objective function for higher-order coverage control with a general per- formance measure was introduced and a detailed derivation with performance measured defined by Euclidean distance for k = 2 was presented. For completeness, the objective function is restated for arbitrary k. The objective function in terms of a k-order partition of S is defined as, H(P, R) = 1 kXI∈IZRI f (q, p1, . . . , pk)φ(q)dq. (3) Where f (q, ·) is the performance measure given by, f (q, p1, . . . , pk) = kq − pik2. kXi=1 The objective function in terms of k-order Voronoi partitions is defined as, H(P ) = = 1 kXI∈IZVI kXI∈IZVI(cid:16) kXi=1 1 f (q, p1, . . . , pk)φ(q)dq (4) kq − pik2(cid:17)φ(q)dq. Unlike like the first-order Voronoi objective function where the integration occurred over each cell and there was a cell for each agent, the k-order case does not have a one-to- one relationship between cells and agents. The performance measure is based on the distance k-agents are from each point q in VI . However, by manipulation, the objective function can be written in terms of the contribution of each agent separately. By distributing the integral, H(P ) = kq − pi1 k2φ(q)dq + . . . . . . +ZVI kq − pik k2φ(q)dqi and summing over all cells for each agent, H(P ) = kq − pi1 k2φ(q)dq + . . . 1 kXI∈IhZVI 1 kXI∈IZVI . . . + 1 kXI∈IZVI kq − pik k2φ(q)dq, the higher-order objective function can be expressed in terms of the polar moment of inertia, H(P ) =XI∈IhJV,CV + + 1 k 1 k MVI kpi1 − CVI k2 + . . . MVI kpik − CVI k2i, (5) From (5), it can be seen that the value of H depends on the distance from an agent to the centroid of a given cell. Clearly an agent cannot be located at the centroid of all the cells it is responsible for. To solve for the optimal location for agents to be located, the function H is described in matrix form as follows, H(P ) = 1⊤(JVI ,CVI )1 + . . . + + 1 k(cid:0)pi1 k(cid:0)pik 1 1 − CVi1(cid:1)⊤ 1 − CVik(cid:1)⊤ MVi1(cid:0)pi1 MVik(cid:0)pik 1 − CVi1(cid:1) 1 − CVik(cid:1). Where 1 is a vector of ones, JVI ,CVI is a diagonal matrix, is a vector of cell centroids associated with agent i, CVi and MVi is a diagonal matrix with elements on the diagonal represent the mass of the respective cell. Now the the optimal position p∗ i for agent i can be solved by, 1(cid:1)−1(cid:0)1⊤MVi CV i CVi(cid:1) j = CWi . p∗ i =(cid:0)1⊤MVi = PV i PV i j=1 MV i j j=1 MV i j CWi is the centroid of the dominant cell Wi. As mentioned in the previous section, the cell Wi is the dominant cell of agent i, which is the union of all the k-order Voronoi cells associated with agent i. The objective function H is minimal when pi is located at the centroid CWi of the dominant cell Wi. This leads to the following lemma. Lemma III.1 Given P ∈ Sn and a k-order partition R of S, H(P, V(P )) ≤ H(P, R), i.e., the optimal partition is the k-order Voronoi partition. For P ′ ∈ S with kp′ i − CWi k ≤ kpi − CWi k, i ∈ {1, . . . , n}, H(P ′, R) ≤ H(P, R), i.e., the optimal positions of agents are the centroids. As discussed in [19], for continuous control and commu- nication the gradient descent control law is given by ui = −k(pi − CWi ) for gain k > 0. However, implementing this in continuous time assumes that agents have exact position information about their neighbors at all times. Instead, we next discuss how to relax this requirement without resorting to a synchronous, periodic implementation. C. Communication between agents We assume agent i has access to its own position pi(t) at all times t ∈ Z≥0, but must communicate with neighbors j ∈ Ni to obtain their positions pj . Similar to [24], a request- response communication model is used where agent i is able to request position pj from agent j and agent j immediately responds with this information. We assume that packet loss does not occur and that round-trip latency is negligible such that agent i can request and receive information in- stantaneously i.e. the action of requesting and responding information occurs within the same timestamp. More specifically, let {ti ℓ}ℓ∈Z≥0 ⊂ Z≥0 be the sequence of times at which agent i requests information from some neighbor j ∈ Ni. Then, agent i only has access to the position of agent j at these times, e.g., at timestep t agent i has access to {pj(t′)}t′∈{ti ℓ≤t}. ℓti D. Agent state representation If an agent does not request information on every timestep then that agent does not have access to the current position of other agents. Therefore, agent i maintains state information pertaining to the most recent known position of agent j in addition to information that is able to model the evolution of uncertainty over time that exists with respect to agent j's current position. Given that agent i has acquired position pj(tℓ) from agent j at timestep tℓ, let τ > tℓ be the amount of time that has elapsed since agent i has communicated with agent j. Then the position pj(t) where t = tℓ + τ will be unknown to agent i at time t. However, if the maximum speed vmax for agent j is known then agent i can determine the set of all possible positions where agent j could have traveled to in time duration τ . The set of possible positions for agent j can be represented by a closed ball with center at pj(tℓ) and radius rj = vmaxτj . To maintain state, each agent stores pj(tℓ) and rj in memory for every agent in the network. The data storage for agent i is then defined by, Di =(cid:0)(pi 1, ri 1), . . . , (pi n, ri n)(cid:1) ∈ (S × R≥0)n (6) where ri i = 0 for all time since it is assumed that agent i always has access to it's own position pi i at every timestep. There exists two methods for which the contents of the data structure Di may be updated. The first is a time evolution update where all values ri increase in magnitude based j on the the time duration τ . The second update method, referred to as the information/position update, corresponds to the acquisition of a new position value pi j via means of communication with agent j. When a position update occurs for pi j = 0. This is due to the fact that the exact position of agent j is known at the instance in time that pi j has been received and stored in memory by agent i. In addition, two explicit methods for agent i to extract information from Di. The first is the map loc : (S ×R≥0)n → Sn that allows agent i to extract position information (p1 i )) from Di. The second extraction map π : (S × R≥0)n → (S × R≥0)m, where m ≤ n, allows agent i to extract a subset π(Di) ⊂ Di from data storage. j is reset i.e. ri j, the value ri i , . . . , pn E. Agent dynamics Considering the set A of agents moving in a convex polygon S with positions P = (p1, . . . , pn). We consider discrete-time, single-integrator dynamics pi(t + 1) = pi(t) + ui(t)∆t, (7) where ∆t > 0 denotes the length of time of one timestep, and ui(t) denotes the input at timestep t with kui(t)k ≤ vmax for each agent i ∈ A. The interest is in optimally deploying these agents in the domain S such that k agents overlap responsibility for every point q ∈ S. Equipped with a communication model, a state data model, and agent dynamics the formal problem may now be presented by the following, Problem III.2 Given a set A = {1, . . . , n} of agents mov- ing in a convex polygon S ⊂ R2 with dynamics (7), maximum speed vmax > 0, spatial density φ : S → R, and only depending on information local to agent i, find a distributed communication and control strategy such that pi → CWi . Based on the data that each agent stores in memory, the exact computation of the k-order Voronoi cell cannot necessarily be achieved at each timestep. Next we address the issue of space partitioning with uncertainty for general cases of k-order. IV. SPACE PARTITION WITH UNCERTAIN INFORMATION If agent i does not have access to the exact location pj of agent j, then the uncertain position of agent j with respect to agent i can be represented to be within a set of points Dj ∈ S. This set Dj represents all the possible points where agent j is guaranteed to be located relative to agent i. The consequence of this representation is that agent i cannot compute it's dominant region exactly. However, because the position of agent j is guaranteed to be constrained to the set Dj , it is possible for agent i to compute regions in S that pertain to a) the points that are certain to be part of its dominant cell, b) the points that are certain not to be part of agent i's dominant cell, and c) the region where it is uncertain if the points belong to agent i's dominant cell or not. The region of points that are certain to be part of agent i's dominant cell is referred to as the k- order guaranteed dominant cell of agent i. The region of points that are certain to not be a part of agent i's dominant cell is referred to as the k-order dual-guaranteed dominant cell. Similar to the case of certain sites, we construct the guaranteed and dual-guaranteed dominant cell of an agent i by means of the k-order guaranteed and dual-guaranteed Voronoi cells. The the k-order guaranteed Voronoi partition is described next. A. k-order guaranteed Voronoi partitions To assist in the exposition that follows, the first-order guaranteed Voronoi cell is briefly mentioned. The first-order guaranteed Voronoi cell for agent i is given by, gVi =nq ∈ S (cid:12)(cid:12)(cid:12) max x∈Di kq − xk ≤ min y∈Dj kq − yk, ∀j 6= io. The cell gVi contains the points of S that are guaranteed to be closer to pi than to any other pj , with i 6= j. The uncertain regions Di and Dj are considered to be closed balls B(pi, ri,) and B(pj, rj ,) centered at pi and pj with radius ri and rj , respectively. The set D = {D1, . . . , Dn} is the collection of uncertain regions for n agents. Similar to the discussion of k-order Voronoi partitions of certain sites where I = (i1, . . . , ik) ∈ I and PI ⊂ P, a subset of D is defined by DI = {D1, . . . , Dk} Given DI and with DJ = D \ DI , the k-order guaranteed Voronoi cell associated with I agents is defined by, gVI =nq ∈ S (cid:12)(cid:12)(cid:12) max x∈Di kq − xk ≤ min y∈Dj kq − yk ∀Di ∈ DI , ∀Dj ∈ DJo The k-order guaranteed Voronoi cell represents the points that are guaranteed to be closer to the k-agents in I with positions in PI than to the agents with positions in PJ . For example, with k = 2 the I-agents becomes I = {Di, Dj} and has positions PI = {pi, pj} such that the second-order guaranteed Voronoi cell associated with agents i and j is given by, gVij =(cid:26)q ∈ S (cid:12)(cid:12)(cid:12) max x∈Di max x∈Dj kq − xk ≤ min y∈DJ kq − xk ≤ min y∈DJ kq − yk, kq − yk(cid:27) with DJ = D \ {Di, Dj}. For agent i, dominant region can be defined by, the guaranteed gWi = [I∈I i gVI The cell gWi represents the region that agent i is guaranteed to be responsible for covering. B. k-order dual-guaranteed Voronoi partitions In [24], the concept of dual-guaranteed Voronoi partitions was presented. Here we extend this concept to the case of k- order dual-guaranteed Voronoi partitions. Again using DI ⊂ D and DJ = D \ DI , the k-order dual-guaranteed Voronoi cell for agents in I is defined by, dgVI =nq ∈ S (cid:12)(cid:12)(cid:12) min x∈Di kq − xk ≤ max y∈Dj kq − yk, ∀Di ∈ DI , ∀Dj ∈ DJo The region outside of the cell dgVI represents the points that are guaranteed to be closer to agents in J than to the agents in I. The dual-guaranteed dominant region associated with agent i is given by, dgWi = [I∈I i dgVI The region outside of cell dgWi represents the points that agent i is guaranteed not to be responsible for covering. Next, a solution that includes both the design of a motion control law and a communication strategy for the above stated problem is presented. V. SELF-TRIGGERED HIGHER ORDER COVERAGE OPTIMIZATION Given the problem described in Section III, one possi- ble approach would be for agent i to periodically acquire position information from other agents. This would occur (a) r = 0 (b) r = 1 (c) r = 2 Fig. 3: The guaranteed k-order Voronoi cells (k = 2) for a single agent represented by the black asterisk located close to the center of each diagram. Together, the diagrams illustrate the difference between cells when the radii changes, r = 0 (a), r = 1 (b), r = 2 (c). (a) r = 0 (b) r = 1 (c) r = 2 Fig. 4: The dual-guaranteed k-order Voronoi cells (k = 2) for a single agent represented by the black asterisk located close to the center of each diagram. Together, the diagrams illustrate the difference between cells when the radii changes, r = 0 (a), r = 1 (b), r = 2 (c). at each time step where agent i would 1) acquire new information, 2) Compute it's dominant cell Wi, 3) compute the centroid CWi , 4) move towards CWi at vmax, 5) repeat. However, similar to continuous communication, a periodic method requires frequent communication and a potentially unnecessary computational burden. The method proposed in the following section attempt to alleviate the communication and computational burden by a two part approach. The first component is a motion control law to determine how agents move when the information they possess is not up to date with respect to the most recent time step. The second component is an information update policy that allows each agent to decide when information from other agents should be acquired. A. Motion control If agent i has access to the exact positions of other agents then agent i is capable of computing the exact dominant cell Wi. Consequently, agent i can compute the centroid CWi . Once CWi has been computed, agent i may simply move towards it. When agent i does not communicate with the other agents in the network, the exact location of the other agents will be unknown to agent i. Since the exact locations of other agents is unknown, each agent must rely on the data that it does possess as a means for deciding how to move. The data that an agent does possess at any given time step includes the most recent position update that it has received from the other agents and the time that has elapsed since the last update. Informally, the motion control law is described by the following. At each time step each agent uses the information that it has stored to compute it's k-order guaranteed and dual-guaranteed Voronoi cells. Next, each agent computes it's guaranteed and dual-guaranteed dominant cells. Once the agent has computed these cells, the agent then computes the centroid for the guaranteed dominant cell gWi and begins moving toward it. The motion control law assumes that each agent has ac- cess to the value of the density φ over it's k-order guaranteed dominant cell. The motion control law as describe above does not necessarily guarantee that agents will move closer to the centroids of their dominant cells without applying additional constraints on agent movement. As in [24], the following lemma applies. Lemma V.1 Given p 6= q, q∗ ∈ R2, let p′ ∈ [p, q] such that kp′ − qk ≥ kq∗ − qk, then kp′ − q∗k ≤ kp − q∗k. Following lemma V.1, if p = pi is the position of agent i that is moving toward p′ in the direction of the computed goal q = CgWi then the distance to q∗ = CWi decreases while kp′ − CgWi k ≥ kCVi − CgWi k (8) holds. Since CW i is unknown to agent i the right hand side of 8 cannot be computed. However the value kCWi −CgWik can be bounded such that kp′ − CgWik ≥ bndi (9) where bndi is given by bndi = bnd(gWi, dgWi) = 2crdgWi(cid:18)1 − MgWi MdgWi(cid:19) (10) Therefore, agent i moves towards CgWi as much as possible in one timestep while maintaining the condition in (9). The motion control law is formally defined in table (1). For every consecutive time step that an agent goes without receiving updated information, (10) increases making the condition of (9) less likely to be achievable. Leading to the condition where the agent can no longer move in a manner that does not increase the distance to CWi . Therefore, a decision mechanism that governs when an agents will acquire new information is required and is discussed next. Algorithm 1 : motion control law Agent i ∈ {1, . . . , n} performs: 1: set D = Di 2: compute L = gWi(D) and U = dgWi(D) 3: compute q = CL and r = bnd(L, U ) 4: set d = vmax∆t 5: set p′ 6: move to p′ i j = ri 7: set ri j + d j = ( pi 8: set Di i = (p′ 9: set Di j, min {ri i, 0) i = tbb(pi, d, q, r) j, diam(S)} ) B. Update decision policy The second major aspect of the self-triggered deploy- ment strategy provides a decision mechanism that deter- mines when an agent must perform an information update via communication with other agents. Updates to position information will be necessary for an agent to reduce the level of uncertainty that it has accumulated since the last time an update occurred. As previously mentioned, as time elapses without receiving position information from other agents, the true location of CWi will be unknown and the set of possible locations for CWi will continue to increase in size. Based on the motion control law presented in the previous section, agent i will rely on moving towards CgWi so long as condition (9) holds. If it becomes infeasible for agent i to move due to condition (9) not being satisfied, then agent i must perform an information update at that moment in time in order to maintain condition (9). Therefore, the update decision policy can be describe as follows. For every timestep, each agent computes their k-order guaranteed and dual guaranteed dominant cells, as well as computing the bound (10). Then each agent decides whether or not to perform a position data update. Agent i will decide to perform the update when the bound (10) becomes greater than or equal to kpi − CgWi k. It is possible that the points pi and CgWi may become close to one another i.e. kpi − CgWi k < ε for ε > 0.In this case, the bound (10) may not be able to become small enough such that a position update is not required. To handle this condition, the value of kpi − CgWik is clamped at ε so that a minimum amount of time will pass before and update will occur. The update policy is described formally in table 2. Algorithm 2 : one-step-ahead update policy Agent i ∈ {1, . . . , n} performs: 1: set D = Di 2: compute L = gWi(D) and U = dgWi(D) 3: compute q = CL and r = bnd(L, U ) 4: if r ≥ max {kq − pik, ε} then 5: 6: end if reset Di by performing a position update C. The k-order self-triggered centroid algorithm A self-triggered deployment strategy can be formulated by combining the motion control law defined in Table 1 and the update decision policy from Table 2. First, it is noted that combining the two algorithms from Table 1 and Table 2 without modification would provide an event-triggered deployment strategy. The event-triggered strategy would be performed on each timestep where agent i runs the update decision policy followed by running the motion control law. This requires agent i to compute L, U , CL, and r from Table 2 on every timestep. However, agent i is in possession of all the information necessary to predict its motion trajectory up to the time in the future where r ≥ max {kq − pik, ε} occurs. The self-triggered algorithm is presented in Table 4. In addition, note that a trivial update mechanism would provide each agent with up-to-date locations for all other agents in the network i.e. using all information stored in Di. However, this is costly from a communications point of view. Instead, a localized algorithm is proposed that limits the number of agents that agent i must acquire information from. To compute gWi and dgWi, agent i must have knowledge of only a subset of agent positions. The subset of agents used by agent i can be found by first defining Ai(q) = {j ∈ A kpj − qk < kpi − qk, j 6= i} where Ai(q) ≥ k. Based on this definition we can redefine the cell Wi by Wi = {q ∈ S (Ai(q)) ≤ k − 1} To locally compute Wi at the specific time when step 4: is executed, the Dominant cell computation is used. This is borrowed from [30] and presented in Algorithm 3 set out ← true set ρ ← ρ + γ set Ni(ρ) ← {j kpj − pik < ρ} for all {q ∈ S kq − pik = ρ/2} do Algorithm 3 : Dominant cell computation 1: initialize ρ = 0 2: repeat 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: until out = true 14: compute Wi from Ni(ρ) set Ai(q) ← {j ∈ Ni(ρ) kpj − qk < kpi − qk, j 6= i} if Ai(q) < k then set out ← f alse break end for end if The Dominant cell computation is based on agent i gradually increasing its communication radius until all the information required to construct its exact k-order Voronoi cell has been obtained. Combining Algorithms 1- 3 leads to the complete k-order self-triggered centroid algorithm described in Algorithm 5. reset Di by performing a position update initialize tsleep = 0 while r < max {kq − pik, ε} do Algorithm 4 : multiple-steps-ahead update policy Agent i ∈ {1, . . . , n} performs: 1: set D = Di 2: compute L = gWi(D) and U = dgWi(D) 3: compute q = CL and r = bnd(L, U ) 4: if r ≥ max {kq − pik, ε} then 5: 6: else 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: end if set tsleep = tsleep + 1 set d = vmax∆t set p′ move to p′ i j = ri set ri j + d j = ( pi set Di i = (p′ set Di set D = Di compute L = gWi(D) and U = dgWi(D) compute q = CL and r = bnd(L, U ) end while wait for tsleep timesteps repeat j, min {ri i, 0) i = tbb(pi, d, q, r) j, diam(S)} ) Algorithm 5 : k-order self-triggered centroid algorithm Initialization 1: execute Dominant cell computation At time step ℓ ∈ Z≥0, agent i ∈ {1, . . . , n} performs: reset Di by running Dominant cell computation set D = π(Di) compute L = gWi(D) and U = dgWi(D) compute q = CL and r = bnd(L, U ) 1: set D = π(Di) 2: compute L = gWi(D) and U = dgWi(D) 3: compute q = CL and r = bnd(L, U ) 4: if r ≥ max {kq − pik, ε} then 5: 6: 7: 8: 9: end if 10: set d = vmax∆t 11: set p′ 12: move to p′ i 13: set ri j = ri j + d j = ( pi 14: set Di i = (p′ 15: set Di j, min {ri i, 0) i = tbb(pi, d, q, r) j, diam(S)} ) the number of agents in the network, the area of the task space, and the initial agent configuration. This presents chal- lenges when attempting to analyze the convergent properties in a similar fashion to that of the continuous-time continuous- update policy. Instead, our analysis assumes that agents move according to the motion control law given in Table (1) while considering information updates that occur randomly in time. We show that regardless of how agents share information, trajectories governed by the motion control law, in particular the constraints laid out by tbb, will at least converge to a positively invariant set and that if the update decision policy is followed, the network will converge to the centroidal configuration. To achieve this, a set-valued map T is defined that describes the evolution of the network state represented by the data storage of all agents. Then by applying the LaSalle Invariance Principal for set-valued maps, it is shown that all trajectories generated under the state evolution map T provide values of the performance function H that are monotonically non-increasing. It is also shown that there exist under T a weakly positively invariant set that is specif- ically contained in the trajectories that follow the update decision policy of Table (2). Finally, we deduced that this set coincides with the centroidal network configuration in task space. This is proposed formally by the following: Proposition VI.1 For ε ∈ [0 diam(S)], the agent position evolving under the self-triggered deployment algorithm from any initial network configuration in S converges to the k- order Voronoi centroidal configuration. VI. CONVERGENCE ANALYSIS A detailed analysis is provided in this section to demon- strate that agents following the motion and information update strategies presented thus far will generate a network configuration such that all agents converge to their centroidal positions. The asynchronous timing of information exchange that occurs during the network evolution is dependent on the Di = (cid:0)(pi To proceed, we formally define D = (D1, . . . , Dn) ∈ (S × R≥0)n2 as the sate of an n agent network where 1, ri 1), . . . , (pi n)(cid:1) is the state of agent i. We n, ri define M : (S × R≥0)n2 as the map that updates both the motion pi i and uncertainty evolution ri j in D. Recall that the magnitude of ri j increases over time when information updates do not occur. We define → (S × R≥0)n2 (a) Initial configuration (b) Trajectories (c) Final configuration Fig. 5: Initial configuration (a), self-triggered centroid algorithm trajectories (b), and final configuration (c) for 20 agents running the k-order → (S × R≥0)n2 fu : (S × R≥0)n2 as a mapping of the network state into itself and it describes the information update evolution when the update decision policy from Table (2) is followed. Note that the self-triggered algorithm can be described as the composition fst = M ◦ fu = M(fu(D)). Let U : (S × R≥0)n2 be the set-valued map that represents any possible information-update evolution. For D′ ∈ U(D), the ith component of D′ is described by, ⇒ (S × R≥0)n2 Di =((cid:0)(pi (cid:0)(pi 1), . . . , (pi 1, ri 1, 0), . . . , (pi n, ri n)(cid:1), no update n, 0)(cid:1), update occurred Note that fu(D) ∈ (S × R≥0)n2 but U(D) ⊂ (S × R≥0)n2 further, fu(D) ∈ U(D) is one outcome in U(D). is an element of the domain, is a subset of the domain and Given the definition of M and U , the full state evolution is defined by the set-valued map T : (S × R≥0)n2 ⇒ (S × R≥0)n2 where T = U ◦ M. Since U is closed and M is continuous, the evolution map T is closed. For a trajectory γ = {D(tℓ)}t∈Z>0 generated by the self-triggered algorithm and γ′ = {D′(tℓ)}t∈Z>0 given by D′(tℓ) = fu(D(tℓ)) then, D′(tℓ+1) = T (D′(tℓ)) (11) Let loc : (S × R≥0)n → Sn be a map that extracts the n)) from D such that H(loc(D)) = 1, . . . , pn positions P = (p1 H(P ). Lemma VI.2 H : (S × R≥0)n2 increasing along the trajectories of T . → R is monotonically non- Proof: Let D ∈ (S × R≥0)n2 and D′ ∈ T (D). Let P = loc(D) and P ′ = loc(D′) = loc(M(D))). To demonstrate that H(P ′) ≤ H(P ), first the k-order partition V(P ) is fixed. Then for each i ∈ A, if the condition i − CgWi k ≤ bnd(Di) is true then p′ kp′ i = pi. This is due to the fact that agent i strictly follows the definition of tbb. If instead kp′ i − CgWi k > bnd(Di) then it is true that kp′ i − CWi k < kpi − CWi k by lemma V.1 and (10). For both cases, H(P ′, V(p)) ≤ H(P, V(P )) and furthermore, from lemma III.1, H(P ′, V(P ′)) ≤ H(P ′, V(P )) Lemma VI.3 Let γ′ be a trajectory of (11). Then the ω- limit set Ω(γ′) ⊂ (S × R≥0)n2 with Ω(γ′) 6= ∅ belongs to H−1(c) for some constant c ∈ R≥0 and is weakly positively invariant. Let γ′ be a trajectory of (11). Proof: Let γ′ be a trajectory of (11). First, note that γ′ being bounded implies Ω(γ′) 6= ∅ and for D′ ∈ Ω(γ′) there exists a converging sub-sequence {D′(tℓm m ∈ Z≥0} of γ′ such that D′(tℓm) → D′ as m → ∞. In addition, the sequence {D′(tℓm+1) m ∈ Z≥0} is also bounded and has a converging sub-sequence where for bD′ the sequence D′(tℓm+1 → bD′ for m → ∞. Since by definition bD′ ∈ Ω(γ′) and T is closed, this implies Ω(γ′) is weakly positive invariant. Since γ is bounded and H is non-increasing along γ for all of (S×R≥0)n2 , the sequence H◦γ = {H(γ(l)) l ∈ Z≥0} is decreasing and bounded from below and therefore convergent. Since for any z ∈ Ω(γ) there is a converging subsequence γ(ℓm) in Ω(γ) that converges to z and since H is continuous, H(γ(ℓm)) → H(z) = c as m → ∞ where c ∈ R is a constant. Proof of Proposition VI.1 Let γ = {D(tℓ)}t∈Z≥0 be an evolution of the self-triggered centroid algorithm. Define γ′ = {D(tℓ)}t∈Z≥0 by D′(tℓ) = fu(D(tℓ)). Note that loc(D(tℓ)) = loc(D′(tℓ)). Since γ′ is a trajectory of T , lemma VI.3 guarantees that Ω(γ′) is weakly positively invariant and belongs to H−1(c) for some c ∈ R. Next, it is shown that Ω(γ′) ⊂ {D ∈ (S × R≥0)n2 i ∈ A, kpi i − CgWi k ≤ bndi} (12) We reason by contradiction. Assume there exists D ∈ Ωγ for which there is i ∈ A such that kpi i − CgWik > bndi. By lemma III.1, V.1 and the constraint given by (8), any possible evolution from D under T will strictly decrease H. This is in contradiction with the fact that Ω(γ′) is weakly positively invariant for T . (a) Initial configuration (b) Trajectories (c) Final configuration Fig. 6: self-triggered centroid algorithm Initial configuration (a), trajectories (b), and final configuration (c) for 5 agents running the k-order benchmark st: = 5 2500 2000 1500 1000 500 benchmark st: = 5 benchmark st: = 5 1500 1000 t n u o c g s m 500 10 9 8 7 6 5 4 3 2 1 0 0 5 10 15 time 20 25 30 0 0 5 10 15 time 20 25 30 0 0 5 10 15 time 20 25 30 (a) Performance (b) Message count (c) Power Fig. 7: Performance (a), messages communicated between agents (b), and power (c) versus time. It is also noted that for each i the inequality bndi < i − CgWi k, ε} is satisfied at D′(tℓ)), for all ℓ ∈ Z≥0 max {kpi an by continuity, this holds for Ω(γ′) as well. That is, bndi < max {kpi i − CgWi k, ε} (13) i = p′ for all i ∈ A and all D ∈ Ω(γ′). Now it is shown that Ω(γ′) ⊂ {D ∈ (S × R≥0)n2 i = CWi }. Consider i ∈ A, pi i gets updated information then bndi = 0 and consequently from (12), pi i = CgWi = CWi and the result follows. If 1) > eD ∈ Ω(γ′). Since Ω(γ′) is weakly positively invariant, there exists eD1 ∈ Ω(γ′) ∩ T (eD). Note that (12) implies that loc(eD1) = loc(eD) We consider two cases depending on whether agents have received information in eD1. If agent agent i does not get updated information then bnd(eDi bnd(eD1) and gWi(eD1) ⊂ gWi(eD). Again using the fact eD2 ∈ Ω(γ′) ∩ T (eD1) Reasoning repeatedly in this manner, the only case that needs to be discarded is when agent i never receives updated information. In this case kpi i − CgWi k → 0 while bndi monotonically increases towards diam(S). For sufficiently large ℓ, kpi i − CgWik < ε. Then (13) implies bndi < ε, which contradicts the fact that bndi tends towards diam(S). that Ω(γ′) is a weakly positively invariant set, there exist VII. SIMULATIONS In this section, simulation results for the self-triggered deployment algorithm are presented. Simulations were per- formed with n = 5 agents moving in a 50m× 50m area. The timestep was set to ∆t = 0.1s and all agents were given the same maximum velocity of vmax = 1m/s. Multiple simulation iterations were performed by selecting different values of ε and generating random initial positions for agents on each iteration. Twenty iterations were carried out for each value of ε. The values selected for ε were ε = {0.5, 1.0, 2.5, 5.0}. To quantify the performance of the self-triggered method, the objective function H, the total transmission power, and the total number of messages transmitted were computed on every timestep. As in [24], the power output model for agent i is given by Pi = 10 log10" Xj∈A\{i} β 100.1Pi→j+αkpi−pj k# where α > 0 and β > 0 are parameters that are dependent on the wireless medium and Pi→j is the power received from agent i at agent j in decibel-milliwatts. Simulation results were evaluated against a benchmark case that rep- resents a centroidal continuous information update method 10 9 8 7 6 5 4 3 2 1 0 benchmark = 0.5 st: st: = 1.0 = 2.5 st: st: = 5.0 benchmark st: = 0.5 = 1.0 st: = 2.5 st: st: = 5.0 1600 1400 1200 1000 800 600 400 200 t n u o c g s m benchmark = 0.5 st: = 1.0 st: = 2.5 st: st: = 5.0 1800 1600 1400 1200 1000 800 600 400 200 0 5 10 15 time 20 25 30 0 0 5 10 15 time 20 25 30 0 0 5 10 15 time 20 25 30 (a) Performance (b) Message count (c) Power Fig. 8: Performance (a), messages communicated between agents (b), and power (c) versus time. Average over 20 random initial configurations for different values of ε. 1.006 1.005 1.004 1.003 1.002 1.001 % 1 0.999 0.998 0.997 0.996 0 1 2 3 4 5 1.1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 % 0 1 2 3 4 5 1.1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 % 0 1 2 3 4 5 (a) Performance (b) Message count (c) Power Fig. 9: Convergence of H (a), total network message count (b), and total network power (c) averaged over 20 random initial configurations for each value of ε = (0, 0.5, 1, 2.5, 5) where ε = 0 corresponds to the benchmark case of continuous communication. where agents move toward their dominant cell centroid and positions are updated on every timestep ∆t = 0.1s. Figures 6 and 7 display the results for the execution of a single simulation instance. Figures 6 provides illustration of the initial configuration (6a), the trajectories traveled (6b), and the final configuration (6c) of all agents following the self-triggered deployment strategy. Figure (7) shows a comparison against the benchmark case of the convergence of H (7a), the total message count (7b), and the communi- cation power (7c) at each timestep. The results from figure 7 demonstrate how the self-triggered strategy can reduce both the total amount of communication and the power required to perform the deployment task. This is accomplished while still being capable of achieving convergence performance similar to that of a continuous or periodic communication strategy. Figures 8 and 9 further illustrate this point by presenting results for combined values of ε where twenty random initial configurations for each ε are averaged together. In figure 9, the value ε = 0 corresponds to the benchmark case. These figures illustrate how varying ε affects the overall performance. It can be seen that the total message count and communication power decreases when the value of ε increases, while the the convergence rate of H degrades. However, the convergence degradation of H can be con- sidered minimal when compared to the reduction in both message count and power. For the largest value ε = 5, the convergence of H degrades by less than one-percent, while message count and communication power see a decrease of more than eighty-percent. VIII. CONCLUSIONS This paper presented a k-order self-triggered centroid algorithm for optimal deployment of k- order coverage control scenarios. The presented strategy combined an information update policy with a motion control law. The information update policy provided a method to determine when each agent should communicate with other agents in the network. Agents communicate in order to update their data storage. The decision to communicate is based on whether an agent can continue to contribute positively to the deployment objective. The motion control law provided a method for agents to move when the locations [17] B. Jiang, Z. Sun, and B. D. Anderson, "Higher order voronoi based mobile coverage control," in American Control Conference (ACC), 2015. IEEE, 2015, pp. 1457 -- 1462. [18] B. Jiang, Z. Sun, B. D. O. Anderson, and C. Lageman, "Higher to localization," CoRR, vol. abs/1703.02424, 2017. [Online]. Available: http://arxiv.org/abs/1703.02424 control with order mobile coverage application [19] B. Jiang, Z. Sun, B. D. Anderson, and C. Lageman, "Higher order mobile coverage control with applications to clustering of discrete sets," Automatica, vol. 102, pp. 27 -- 33, 2019. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0005109818306356 [20] W. Heemels, K. H. Johansson, and P. Tabuada, "An introduction to event-triggered and self-triggered control," in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on. IEEE, 2012, pp. 3270 -- 3285. [21] D. V. Dimarogonas, E. Frazzoli, and K. H. Johansson, "Distributed self-triggered control for multi-agent systems," in Decision and Con- trol (CDC), 2010 49th IEEE Conference on. IEEE, 2010, pp. 6716 -- 6721. [22] D. V. Dimarogonas and K. H. Johansson, "Event-triggered control for multi-agent systems," in Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC 2009. Proceedings of the 48th IEEE Conference on. IEEE, 2009, pp. 7131 -- 7136. [23] M. Mazo and P. Tabuada, "On event-triggered and self-triggered control over sensor/actuator networks," in Decision and Control, 2008. CDC 2008. 47th IEEE Conference on. IEEE, 2008, pp. 435 -- 440. [24] C. Nowzari and J. Cort´es, "Self-triggered coordination of robotic networks for optimal deployment," Automatica, vol. 48, no. 6, pp. 1077 -- 1087, 2012. [25] C. Nowzari, J. Cort´es, and G. J. Pappas, "Team-triggered coordination of robotic networks for optimal deployment," Chicago, IL, Jul. 2015, pp. 5744 -- 5751. [26] W. Evans and J. Sember, "Guaranteed voronoi diagrams of uncertain sites," in 20th Canadian Conference on Computational Geometry, 2008, pp. 207 -- 210. [27] M. Jooyandeh, A. Mohades, and M. Mirzakhah, "Uncertain voronoi diagram," Information processing letters, vol. 109, no. 13, pp. 709 -- 712, 2009. [28] R. Cheng, X. Xie, M. L. Yiu, J. Chen, and L. Sun, "Uv-diagram: A voronoi diagram for uncertain data," in Data Engineering (ICDE), 2010 IEEE 26th International Conference on. IEEE, 2010, pp. 796 -- 807. [29] M. Senechal, "Spatial tessellations: Concepts and applications of voronoi diagrams," Science, vol. 260, no. 5111, pp. 1170 -- 1173, 1993. [30] F. Li, J. Luo, S. Xin, W. Wang, and Y. He, "Autonomous deployment for load balancing k-surface coverage in sensor networks," vol. 14, no. 1, pp. 279 -- 293, 2015. of other agents is uncertain due to the lack of communica- tion. Through analysis, the proposed strategy was shown to provide guaranteed asymptotic convergence. The results have shown convergence similar to that of continuous and periodic position update methods. Simulation results were able to demonstrate the potential benefits of the proposed method by illustrating the ability of the k-order self-triggered centroid algorithm to not only reduce the amount of communication necessary to achieve the deployment goal, but also reducing the power consumed from communication. REFERENCES [1] T. B. Curtin, J. G. Bellingham, J. Catipovic, and D. Webb, "Au- tonomous oceanographic sampling networks," Oceanography, vol. 6, no. 3, pp. 86 -- 94, 1993. [2] Q. Lu, Q.-L. Han, B. Zhang, D. Liu, and S. Liu, "Cooperative control of mobile sensor networks for environmental monitoring: An event-triggered finite-time control scheme," IEEE transactions on cybernetics, vol. 47, no. 12, pp. 4134 -- 4147, 2017. [3] J. R. Peters, S. J. Wang, and F. Bullo, "Coverage control with anytime updates for persistent surveillance missions," in American Control Conference (ACC), 2017. IEEE, 2017, pp. 265 -- 270. [4] P. E. Rybski, N. P. Papanikolopoulos, S. A. Stoeter, D. G. Krantz, K. B. Yesin, M. Gini, R. Voyles, D. F. Hougen, B. Nelson, and M. D. Erickson, "Enlisting rangers and scouts for reconnaissance and surveillance," IEEE Robotics & Automation Magazine, vol. 7, no. 4, pp. 14 -- 24, 2000. [5] M. Zhong and C. G. Cassandras, "Distributed coverage control and data collection with mobile sensor networks," IEEE Transactions on Automatic Control, vol. 56, no. 10, pp. 2445 -- 2455, 2011. [6] A. Macwan, G. Nejat, and B. Benhabib, "Optimal deployment of robotic teams for autonomous wilderness search and rescue," in Intelligent Robots and Systems (IROS), 2011 IEEE/RSJ International Conference on. IEEE, 2011, pp. 4544 -- 4549. [7] A. Gallais and J. Carle, "An adaptive localized algorithm for multiple sensor area coverage," in 21st International Conference on Advanced Information Networking and Applications (AINA '07), May 2007, pp. 525 -- 532. [8] J. Wang, S. Medidi, and M. Medidi, "Energy-efficient k-coverage for wireless sensor networks with variable sensing radii," in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE. IEEE, 2009, pp. 1 -- 6. [9] J. Yu, S. Wan, X. Cheng, and D. Yu, "Coverage contribution area based k -coverage for wireless sensor networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8510 -- 8523, Sep. 2017. [10] F. Gustafsson and F. Gunnarsson, "Positioning using time-difference of arrival measurements," in Acoustics, Speech, and Signal Processing, 2003. Proceedings.(ICASSP'03). 2003 IEEE International Conference on, vol. 6. IEEE, 2003, pp. VI -- 553. [11] W. A. Gardner and C.-K. Chen, "Signal-selective time-difference-of- arrival estimation for passive location of man-made signal sources in highly corruptive environments. theory and method," IEEE Transactions on signal processing, vol. 40, no. 5, pp. 1168 -- 1184, 1992. i. [12] G. Mellen, M. Pachter, and J. Raquet, "Closed-form solution for determining emitter location using time difference of arrival mea- surements," IEEE Transactions on Aerospace and Electronic Systems, vol. 39, no. 3, pp. 1056 -- 1058, 2003. [13] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, "Coverage control for mobile sensing networks," IEEE Transactions on robotics and Automation, vol. 20, no. 2, pp. 243 -- 255, 2004. [14] S. Poduri and G. S. Sukhatme, "Constrained coverage for mobile sensor networks," in Robotics and Automation, 2004. Proceedings. ICRA'04. 2004 IEEE International Conference on, vol. 1. IEEE, 2004, pp. 165 -- 171. [15] L. C. Pimenta, V. Kumar, R. C. Mesquita, and G. A. Pereira, "Sensing and coverage for a network of heterogeneous robots," in Decision and Control, 2008. CDC 2008. 47th IEEE Conference on. IEEE, 2008, pp. 3947 -- 3952. [16] M. Schwager, J.-J. Slotine, and D. Rus, "Decentralized, adaptive con- trol for coverage with networked robots," in Robotics and Automation, 2007 IEEE International Conference on. IEEE, 2007, pp. 3289 -- 3294.
1901.09660
1
1901
2018-12-09T06:34:33
Swarm Intelligent Algorithm For Re-entrant Hybrid Flow shop Scheduling Problems
[ "cs.MA" ]
In order to solve Re-entrant Hybrid Flowshop (RHFS) scheduling problems and establish simulations and processing models, this paper uses Wolf Pack Algorithm (WPA) as global optimization. For local assignment, it takes minimum remaining time rule. Scouting behaviors of wolf are changed in former optimization by means of levy flight, extending searching ranges and increasing rapidity of convergence. When it comes to local extremum of WPA, dynamic regenerating individuals with high similarity adds diversity. Hanming distance is used to judge individual similarity for increased quality of individuals, enhanced search performance of the algorithm in solution space and promoted evolutionary vitality.A painting workshop in a bus manufacture enterprise owns typical features of re-entrant hybrid flowshop. Regarding it as the algorithm applied target, this paper focus on resolving this problem with LDWPA (Dynamic wolf pack algorithm based on Levy Flight). Results show that LDWPA can solve re-entrant hybrid flowshop scheduling problems effectively.
cs.MA
cs
Swarm Intelligent Algorithm For Re-entrant Hybrid Flow shop Scheduling Problems Zhonghua Han Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, Liaoning, China Department of Digital Factory, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, Liaoning, China Email: [email protected] Xutian Tian* Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China Email: [email protected] *Corresponding author Xiaoting Dong Faculty of Electrical Engineering, Sichuan College of Architectural Technology, Deyang, Sichuan ,China Email: [email protected] Fanyi Xie Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China Email: [email protected] Biographical notes: Zhonghua Han received his PhD degree at Shenyang Institute of Automation, China in 2014. He is currently a Professor with the Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China. His main research includes production and operation management, of automation system in enterprise, and the engineering application research of production scheduling method. technology integrated XuTian Tian is a master candidate from the Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China. He currently does his study under the supervising of Zhonghua Han.His main research area is production scheduling. Xiaoting Dong is a postgraduate student from the Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China. Her main research area is production scheduling. Fanyi Xie is a master candidate from the Faculty of Information and Control Engineering, Shenyang Jianzhu University, Shenyang, China. She currently does her study under the supervising of Zhonghua Han.Her main research area is production scheduling. Abstract: In order to solve Re-entrant Hybrid Flowshop (RHFS) scheduling problems and establish simulations and processing models, this paper uses Wolf Pack Algorithm (WPA) as global optimization. For local assignment, it takes minimum remaining time rule. Scouting behaviors of wolf are changed in former optimization by means of levy flight, extending searching ranges and increasing rapidity of convergence. When it comes to local extremum of WPA, dynamic regenerating individuals with high similarity adds diversity. Hanming individual similarity for distance to increased quality of individuals, enhanced search performance of the algorithm in solution space and promoted evolutionary vitality.A painting workshop in a bus manufacture enterprise owns typical features of re-entrant hybrid flowshop. Regarding it as the algorithm applied target, this paper focus on resolving this problem with LDWPA (Dynamic wolf pack algorithm based on Levy Flight). Results show that LDWPA can solve re-entrant problems effectively. scheduling flowshop is used judge hybrid Key words: Re-entrant Hybrid flow shop; simulations and processing models; Hanming distance; levy flight ; Swarm Intelligent Algorithm 1 Introduction Kumar(1993)first proposed the RHFS line(Li and Wang, 2010) as the third type of scheduling problem that distinguishes it from Flowshop and Jobshop. Reentrant manufacturing system have all jobs of reentrant working procedure featuring re-entering the waiting matching area. It leads to instability scheduling problems of reentrant workshop and obstruct, making scheduling problems of reentrant manufacturing workshop more complicated than general issue. Many tasks, various processes, multi work stations, and different processing time of jobs in the same working procedure are features of hybrid flowshop problems (HFSP) (Han et al., 2016; Karimi et al., 2011). If reentrant manufacturing lines appears in the RHFS, more complex production process, sharply increased production loads, unbalanced instability added and equipment loading and other questions greatly result in HFS difficulty. RHFS scheduling problem (Ying et al., 2015)is a typical kind of NP-hard problem. RHFS scheduling problems can be found in semi-conduct manufacturing, bus production and steel smelting. Multi chip packages of semiconductor packaging production line, multiple and multi-sticking crape masking process of a painting workshop have obvious characters of RHFS. bonding chip line Many scholars have made varying degrees of progress in research on RHFS scheduling. Liu et al.(2011) and Zhu and Chen(2018) use particle swarm with fast convergence and strong global searching ability of genetic algorithm for an exchanged result, designing a genetic particle swarm optimization for reentrant manufacturing dispatch algorithm. (Fan et al., 2012) study aero-engine reassembly line in a workshop after multi decomposition. With the stochastic matrix coding method, crossover method and variation method, an optimization scheduling method based on genetic algorithm is proposed to find the optimal method of assembly workshop scheduling. (Lin et al., 2016) aimed to meeting the characteristics of the dynamic reach ability and re-entry of jobs in mold heat treatment, weighted tardiness and energy consumption index are established as optimization objectives, having in mould heat treatment been in rolling schedule for heuristic algorithm. As for obstacles of two classes of RFFS, (Sangsawang et al., 2015) investigates GA based on fuzzy logic controller and PSO about Cauchy distribution to solve the problem. tempering process According to relevant references in recent years, existing works(Collart and Verschueren, 2014;Lin D et al., 2012) have supplied optimization algorithm to Re-entrant Flowshop scheduling problems and achieve good results. Algorithm is more accurate for optimization after improvement algorithm and combined with various algorithms, especially the traditional meta heuristic algorithm and improved algorithm which includes (Re-entrant flexible Flowshop, (RFFS) scheduling problems, there are few references about RHFS scheduling problems. This paper investigates LDWPA (The Dynamic wolf pack algorithm based on Levy Flight), and show LDWPA has faster speed and higher accuracy compared with other existing algorithm 2 Describe and mold about RHFS dispatch problems jobs processed As for RHFS scheduling problems, it can be described as in working procedures. Jobs are produced according to the specified sequence of operations in the process flow. One working procedure of all contains at least one work station. There are differences about process time of jobs. At least one process with re-entrant features work station must be supplied jobs traversing all process are re-inserted into the queue to be processed. Jobs with the least remaining processing time are chosen in free work station. Scheduling problems are about work station distribution, process, start time and completion time. Process must follow the rules below: 1 Every workstation can manufacture only one job's process flow .After to job at a time. 2 Every procedure of one job are processed in one workstation. 3 The whole procedure of job process are not allow to be interrupted. 4 Transit time of jobs is neglected during processes. nrm During the scheduling process of RHFS, in the number non-reentrant manufacturing process, each workstation consists of a set of the . In the number same work stations rm re-entrant manufacturing phase, each workstation composes a set of the same work stations ; the job iJ needs to 1 ~ M  re-enter this phase times, while different job M M nrm rm irts 1 ~ nrm M nrm has its own re-entrant times. In this problem, each job in accordance with the specified process flow goes through various workstations for processing. Each job will be processed for times. Flow process chart is nrm rm rts i shown in Figure 1.   Figure 1 the chart of process sequence Non- reentrant working procedure 1 M1 M2 …… M1 Non- reentrant working procedure nrm M1 M2 …… Reentrant working procedure1 Reentrant working procedure rm M1 M2 …… M1 M2 …… Mnrm Mnrm+1 Mnrm+rm 2.1 Mathematic simulations and processing model description 2.1.1 Parameter setting In this section, there are many mathematical variables of the re-entrant hybrid flow shop for establishing its mathematics planning models. n means the largest number of processing jobs iJ means the i th job m means procedures. the whole number of working {1,....., } n  . i jOP means j process. jM means the largest work station of jOP working procedure. ,j kWS means the kth work station of jOP working procedure. qFL means the process flow of jobs, it is processed working procedure collection of jobs according to the process flow. rm means the re-entrant processes number in production line. nrm means numbers in production line. non-re-entrant processes the irts means iJ job experience times of reentrant working procedure. iom means the whole number of processed jobs in production procedure qFL . Cumulative the whole number of counting about re-entrant working procedure, l means the sequence number of being processed working in procedure iom m the . qFL l  {1,....., om }i process flow. S l , , i j k means iJ job, the jOP working procedure in the process flow of qFL , the start process time. C l , i , j k means iJ job, the jOP working procedure in the process flow of qFL , the finished process time. i j kWT , l , iJ job, the jOP working procedure in the process flow of qFL , the process time. ,j kWS means the serial number of job in the kth station of jOP working procedure. 2.1.2 Assumed variables and basic constrained relationships In this section, many mathematical formulas are established with the variable set up in the through which constraint previous section, in relations scheduling optimization the scheduling procedure the process included, are and features of reflecting of optimization in the Re-entrant Hybrid flow shop. workshop.(5)indicates that the whole number of At ti , , i j k    0      1   i , j k of J doesn t process on ' WS t i Workpiece the work station O P j during the number working . procedure Workpiece the work station during the numbe proce process on of WS r wor t i OP j king dure , j k J i The variable ,j kWS represents if the jobs are in the qFL process. In the l th processed of jOP working procedure is about the process situation of ,j kWS job. C l , , i j k  S l , , i j k  WT l , , i j k , i  {1,....., } n , l  {1,....., } om , j  {1,....., } m (1) C l , , i j k S l , , i j k , i  {1,....., } n , l  {1,....., } om , j  {1,....., } m (2) omi  ti  1 At ti , , i j k  om i , i  {1,....., } n , l om i n , j k omn i   ti  1  1 i At ti , , i j k (3) (4)    nrm rm rts i (5) om i Formula (1) indicates relationships among job's start process time, process time and finished process time in its processing flow with the re-entrant process. Formula (2) indicates limited relationships of the same job between continuous process start and finished process time. Formula (3) indicates every job should experience their whole process flow. Formula (4) indicates that it is necessary to accumulate number of repetitively processed jobs when counting the number of jobs processed re-entrant in a workstation in jobs in qFL equals to the whole number of iJ in non-reentrant and reentrant working procedures. 3 WPA designs The Dynamic wolf pack algorithm based on Levy Flight (LDWPA) after utilizing WPA(Yang et al., 2007;Zhou et al., 2013) is in this paper, which includes two improvements. 1 Scouting behaviors based on Levy Flight: scouting behaviors are about position changes from present situation to new one. The search ranges of this kind of local random walking is focused in such small scope. Basically, the Levy Flight is a random walk combines of long step and small step. The Levy Flight has a larger search ranges and ability compared with random walking because of directed long step. Founding wolf position is improved according to levy flight, the wolf rushed to its own searching area of low-probability with a long step in solution space. It also extends searching range for a development of wolf optimization. 2 The species dynamic mechanism based on hanming distance: After a certain number of iterations, WPA is shows the phenomenon of evolutionary stagnation. The reason is that with the increased iterations, more similar and even the same genes of individuals and useless communication between individuals attribute to this result. Therefore, a dynamic updating population method based on stagnation evolution iterations is introduced. If the optimum value of stagnated revolution iterations exceeds threshold, the hanming distance can be used to judge the similarity among the individuals with the highest similarity of best one and individual with low similarity and large differences, making a diversity, highlighting local extremum and individuals left new abandon and (cid:160) keeping vitality of algorithm. 3.1 Population dynamic renewal mechanism to In order The basic concept and characteristics of Hanming distance are charted in 3.1.1 firstly. In 3.1.2 is about real examples of LDWPA to reflect objectively the distance of long code word based on Hanming distance. judge differences among individuals in population on the condition that the iterative process falls to hysteresis, the method of using Hanming distance the difference among individuals for less difference one is introduced in 3.1.3. Besides, it can be used to increase new individuals with more differences, enhance diversity and maintain evolutionary vitality. evolution during judge to 3.1.1 Hanming distance Hanming distance (Harada et al., 2017; Atallah and Duket 2011; Haider et al., 2015) is a basic concept in information theory, describing the distance of two long code words. D x y ( , )  n  x k k  1 x  (x , x , ..., x ) 1 2 n , y k , y  (y , 1 2y , ..., y ) n (6) , {0,1} kx  represents  XOR operation, D x y means the whole number of two code words in the same position. It reflects the differences between two code words and evidences for the similarity. ky  {0,1} ( , ) , and improve the time efficiency. Through the similarity D between wolves, that is, the ratio of the same gene in the two individuals to the total number of genes in the individual. Then compare with the threshold to find similar individuals. Firstly, individual is ranked by fitness. The similarity D between the leader wolf and other individuals in wolf pack can be calculated. If D is greater than the threshold Rt , two individuals are similar individuals which leads to a temporary subpopulation 2 StPop is built in the rest individuals by repeating the above operations for better individuals till the end. In every temporary subpopulation, many similar individuals can be ranked according to adjustment degree. Partial individuals can be reserved based on Kr ratio of better individual as its revolution adaptation out of others. StPop . 1 d , i ti 0      1      a , i t i a , i t i       ' a , i t ' a , i t     i i     The variate ,i tid means upper line of two different individuals npX and 'npX . The responding gene section    reflects situation of the upper line. If the situation   and a '   ,i ti ,i tia  is same, i tid  ; if not, 1 , i tid  . 0 , N D omn i   ti  1  1 i D , i ti (7) 3.1.2 The individual similar judgment based on hanming distance ND in (7) means the number of two individual with the same gene. In WPA, the individual is the sequence of real numbers and matrix. The individual similarity can be found from the individual distribution of population. In view of the fact that similarity judgment method is in the evolve algorithm, in order to reduce the complexity of the operation D  D N N Gene (8) D is the similarity of individual and the proportion between DN of two individuals with the same gene section and the whole number of GeneN . If it surpasses the threshold Rt , two individuals is similar. 3.1.3 Dynamic renewable similar individual The individual with a high similarity can be found after every generation when it comes to a certain iterations. Reserving superb individuals, eliminating similar individuals, then generate new individuals with large differences from the population and replace individuals with high similarity in order to preserve good distribution of population in solution space and strengthen the global searching ability. The purpose of using starting generation StartGen mainly consider that the population still has good evolutionary vitality at the early stage of evolution. When it comes to a certain number of iterations, the vitality will decrease and then the operation of dynamic updating population is introduced which reduce computation of the algorithm during the entire evolution process. it et in flight(Palyulin improvement of natural random phenomenon, such as Brownian movement. Levy al., 2014)conforms to random searching routines of the levy distribution. It is a walking way combined with short distance searching and occasionally long distance walking. Levy fight is adopt to upgrade many population optimization. Many scholars (Ibrahim, 2016; Ehsan et al., 2013) utilize informational interaction among individuals and searching for the optimal solution in the solution space. In a conclusion, there is a possibility of population individual advancing to former small searching range, expanding the range. It has achieved satisfactory results increasing population diversity and also improved the rapidity and veracity of algorithm. Therefore, the use of Swarm Intelligent Algorithm based on Levy flight makes it easier to jump out of the local extremum which can effectively enhance the algorithm's optimization ability. in The new method of competitive wolf's position based on levy flight scouting behaviors. ( ) t x i  ( , ) stepa levy u v  (9)   ( 1) t x i  1...... n 3.2 Scouting behaviors based on levy flight i This section combines the dynamic renewal populations based on Hanming distance mentioned above and the Scouting behavior depended on Levy flight. By creating the constraint relation of different variables and listing the changing variables in the evolution process. This part describes all steps of the LDWPA proposed in this paper in detail and makes the logical relations more clearly based on the flow chart of the algorithm. French mathematician Levy put forward a probability distribution called levy distribution in 1930s, which leads to a large amount of scholars' researches. Till now, scholars can prove that foods searching routines of many animals and insects (albatross, bee and fruit fly) are the same with levy distribution. It also explains many ( )t ix means the t th position of competitive wolf; is multiplication; step is step element. to Levy flight basically is a random step which levy distribution. It has been conforms achieved because of levy distribution, which leads to the frequent usage of Mantegna algorithm. Mantegna algorithm about levy flight is as followed. the complicated levy  ( ) ~ u   u 1 v  (10)  u           (1  )sin(   [1   ]  2  2   (1 2 1  ) )        , ~ (0, u N  u 2 ) (11) 2  1,v ~ N( v   v   1.5 ) (12) A larger searching range and improvement of WPA can been achieved by advancing to a small possibility range of levy flight. 3.3 LDWPA operations the Step1 The parameter of original algorithm and Np wolves form initial population, initializing positions of every wolf. The maximum number of iteration is Genmax , the is q , each number of scouting wolf scouting wolf hunt prey in h directions, the is SCmax and . The searching step maximum SCmax  searches 15 stepa and move step are stepb . There are bw wolves will be eliminated in each iteration. Step2 q wolves are used for the leader wolf by hunting. The cwp k wolf's scouting behaviors searches for better positions based on levy flight and (9). Step3 Other wolves which fail to implement scouting behaviors followed the best wolf as the leader wolf. It's position is changed through   x kd x kd   ( rand stepb x ld   x kd ) : rand is a random number between (0,1). ldx is d dimensional vector of the leader wolf. Step4 Regenerating population according to the wolf distribution principle, removing the worst bwwolf and creating newbwwolves by initializing position through X kbw  x min  ( rand x  x max min ) limitation and lower limitation of value. The leader wolf randomly moves to find the food, notifies the other wolves around the prey by howling, and the other wolves surround the leader wolf. For this behavior, a random number kr generated in [0,1] is generated. If kr is smaller than (a preset threshold), the wolf kx does not move. If kr is greater than  .The wolf kx surrounds the prey with the leader wolf. The position new of k wolf is 'k x  x k  rand ra  ( ) ra t  ra min  ( x max  x min  ) exp( ln( ra min / ra maxt max )  t ) Step5 The and best individual revolution limitation can be judged or not. If it meets the condition, it will be finish; if it does not meet the condition, it will continue. Step6 If the population revolution is none of newer best individual, it is necessary to stop evolve iteration. stopgen stopgen  . 1  Step7 The evolvement reaches StartGen iteration at the beginning of new population similar individual or not. If gen StartGen , which indicates the calculating of iteration and turn to Step 2; Otherwise, it starts operational formula of dynamic update similar individuals. it does not reach that  SI that similarity SI the Individuals among Step8 Calculating are individuals. greater than the threshold Rt are made into a temporary subpopulation, Subpopulation of subpopulation temporary is ltPop .Each member Nt in ltPop contains several subpopulations stPop. The number of each stPop is stnp . temporary subpopulation these maxx and minx represents the upper Step9 Assuming the individual count variable of a is inp to better . temporary new population According individual reserve percentage Kr . Preserving better individuals of subpopulation are . That is, preserving individuals Kr with fitness values that match evolutionary trends. The best individual is put into a new group newPop and in p = Kr each  stnp temporary stnp .  individual number of newPop reaches to N p and set a new individual count variable tnp  . 0 Step10 If the Step11 If the new individual number tnp bigger or the same with  N p  in p  and then to the step 13; if not, go on to the Step 12. above newPop individual of Step12 New individuals came into being in this way to judge the similarity between the new individual and individual of newPop . This new individual will be abandoned as long as the similarity between the new individual and the threshold Rt . This new individual will be reserved as long as the similarity between the individual of newPop lower or the same with the threshold Rt . This individual is added to newPop , tnp = tnp +1, and go on to Step 11. Regarding Pop as a new group Pop with  gen q is 5, searching direction his 4, searching step is the first step before Step 2. individual new and gen  1 Step13 stepa is 0.6  x max  x min and moving step stepb is 0.3. t is the current iteration number, m a x r a maxt is the maximum number of iterations, =400 is the maximum surrounding and ra steps. =0.5 is minimum surrounding steps. Similarity threshold Rt is 0.6. Better individual reserve ratio K r is 0.3. m in Figure 2 The chart of algorithm sequence Start Initial population Y Gen>maxt raining generations Genmax N Scouting behaviors based on the levy flight Competition for the leader wolf Move to the the leader wolf . Beleaguering behaviors Exit and output the best results Judge of meeting terminational conditions Y N N New optimization or not Y Stopgen=Stopgen+1 Stopgen=0 N Stopgen>stopgenmax Y According to the SI between individuals, ItPop of each temporary subpopulation is formed, includingNttemporary subpopulationstPop.ThetNzequals to0. inpis0. N tNt>= Nt Y Based on the reserved ratio Kr and temporary subpopulationstPop, the best individual of temporary subpopulationstPopcan be found and reserved it in a populationnewPop. tNt=tNt+1,inp=inp+Kr*stPopm Increasing the individual number of populationnewPopbyNP,tnp=0 Tnp=Np-inp N Y A new individualwas createthroughtheindividual built method of initial population N The similarity between individuals innewPop over or equals to Rt Y Reserve the new individual in population newPop Abandon the new individual tnp=tnp+1 Pop=newPop,gen= gen+1 4 Simulation experiments In this section, The LDWPA is used to optimize benchmarks of different scales in this section. The optimization results are compared with these obtained of GA, WPA and WOA simulation examples in order to prove the effectiveness and superiority of the LDWPA algorithm. 4.1 Algorithm analysis To verify effectiveness of LDWPA algorithm mentioned in the former part, the flexible flow shop examples are used to compare performance of the algorithm under the real facts that researches on re-entrant hybrid flow shop scheduling optimization problem is still in the primary stage, and lack of examples. Adopt the benchmark published by (Carlier and Néron, 2000), this section includes three hard instances: j15c5d2, three easy j15c5d4 and instances: j15c5a4, j15c5a5, j15c5b1. j15c5d3, Comparing the LDWPA algorithm with the NEH algorithm mentioned in (Ribas et al., 2010) research and the WPA algorithm, the best lower 'LB is known as the best optimal bound scheduling result. The effectiveness of the algorithm is evaluated by the following indexes: deviation d refers to the deviation between maxC and 'LB . Among in d refers to: d  (( C max  LB ') / LB  ') 100% Based on CPU 2.5GHz and 4G internal memory, MATLAB environment is the prerequisite of GA, WOA, WPA, LDWPA algorithms in this paper. examples are compared with those obtained by WOA, WPA and LDWPA selected in this paper. This proves the validity and superiority of the algorithm in dealing with various scale data. Table 1 the results of instance in three algorithm Figure 3 The Iterative Curve Diagram of Four kinds of algorithms to solve the Scheduling Problems of instance of J15c5d3 in the easy In table 1, it can be concluded from the table that three algorithms have obtained best optimization results instances. However, the advantages of LDWPA algorithm is more obvious in hard problems. The optimization effects of WPA and NEH are nearly the same as for the easy instances. In the difficult instances, such as J15c5d3, the effects of WPA optimization algorithm are worse than NEH because that WPA algorithm is easy to the local extremum and lack of evolutionary vitality. Both the optimal solutions and average optimal solutions from LDWPA are better than those from the contrast algorithm NEH, which shows that the LDWPA algorithm mentioned this paper greatly improves the overall optimization effects of the WPA algorithm, effectiveness and superiority of LDWPA algorithm. in In this paper, two small scale examples and five large scale examples mentioned in (Sun et al., 2017) research are used for simulation test. By using GA algorithm mentioned in Sun Y's paper, the optimization results of different scale till the small stable Figure 3 is a proper revolution curve graph from optimization algorithm data of GA, WOA, WPA and LDWPA. With the development of exercise in figure 3, the fitness value of four groups is smoothly situation. Optimized curve convergence rate is slow in GA algorithm. The optimization is inferior to other three methods in limited evolution frequency. The optimized curve convergence rate with WOA algorithm is rapidly and stop within 20th generation, leading to the local extremum and bad evolution situation. The bad fitness reflects the fast convergence rate、local extremum and bad optimization. The optimized WPA algorithm between 10th generation and sharp decreased 20th generation is superior to whales optimization algorithm in optimization speed. It also exists the weak local extremum capacity and fragile vitality. The worse first generation optimization fitness through the LDWPA algorithm is the same with the initial generation among 20th generation. Thus, the optimized curve by WPA is nearly reach the fitness. The optimization speed is faster than WOA and WPA featuring fast speed. It is concluded that the Levy flight optimizes the local searching and fosters the algorithm optimization. With the dynamic new population, algorithm among 10th generation and 40th generation keeps evolution after its local extremum and jump from the local extremum for a better fitness value 86. The dynamic upgraded population greatly improves WPA of being in local extremum. Figure 4 The chart of four type algorithms Figure 4 is the Box-plot about fitness value after 20 times same date by means of optimizing GA, WOA, WPA, LDWPA. The abscissa is the algorithm of example date and the ordinate is about fitness values. The box's tendency is down in the process of optimization from the Box-plot above, testifying the whole result is up in the comparable four algorithms. The minimum of improved algorithm is smaller than other three algorithms, resulting to the higher possibility of qualitative results in the improved algorithm. 1st quartile and maximum are equal to 3rd quartile of WPA and minimum, which is also smaller than the range of median of GA、3rd quartile and fitness value of algorithm. It can be concluded that the overall results' quality through the LDWPA algorithm is superior to other two algorithms. The unusual number 90 is related to fitness value of initial population. The worst result appears when the fitness value of initial population is 20. From the partial solution examples in table 2, the fitness value of every algorithm is similar for the small range examples. The LDWPA is still better to get results, whose average is also less than that of other algorithms. That is to say, the LDWPA has good optimization ability in small range of date. It is necessary to notice that the former WPA , with the feature of being into local extremum, exists phenomena of lacking evolve vitality and relying on optimal value of initial population. From the chart, GA algorithm has a feature of jumping out of local extremum. But results of GA algorithm is better than those of WPA with enough generations. With population dynamic mechanism and the levy flight in neighbor searching, the LDWPA's results is superior to GA algorithm in medium and big date, which proves the efficiency and stability of this algorithm in the paper. Table 2 The results of examples in different algorithms 4.2 Experimental analysis on LDWPA results and RHFS dispatching problems This section uses the LDWPA algorithm, which has proved its superiority in the former section to optimize the operation section of multiple masking procedures in the painting shop with the characteristics of re-entrant hybrid flow shop in the actual bus manufacturing enterprises. By establishing different evaluation indexes, the superiority of LDWPA algorithm to solve the re-entrant shop scheduling optimization problem can be proved. hybrid flow Figure 5 Deployment Diagram of Work Station in Multi-Sticking Crape Masking Procedure Some automobile manufacturing enterprises provide scheduling date about the practical information of multi-sticking crape process masking working coating workshops. This figure 5 is about the distribution of multi-sticking crape masking working procedure. procedures in The result is about the scheduling problems crape masking working in 15 automobiles' bodies. The of multi-sticking procedures working procedures of  O P O P O P 3 1 2 , ,  mean stickingcolor ribbon、spraying and baking paint in multi-sticking crape masking working procedures. These three working procedures contain parallel work stations of 2,3,4. painting housefor spraying as well as painting house for baking paint are treated as work stations in thescheduling procedure.  1 J J , , J J 3 , 4 , J J 5 , 6 2 , J , J 8 7 J , J 10 , 9 J 11 12 J , , J 13 , J 14 , J 15 r  in all working procedure epresent jobs of the fifteen types of car body to be processed. Fifteen cars belong to fifteen types manufactured by its order. X in the list means automobile process time of multi-sticking crape masking working procedures. The manufacture time is different because of different types of buses. There is no people in the process of baking paint in painting house. Therefore, the baking paint time in different painting house about the same type of automobiles is no different and working time difference is related to types. Table 3 Time of multi-sticking crape masking working procedures(min) times factory. In the working multi-sticking crape masking working procedures of spraying workshop in automobile manufacturing The technological persons disperse color ribbon into different colors according to the difficulty of color ribbon models and spray various color ribbon patterns on bus external parts. Spraying one kind of color after sticking color ribbon(crape masking) 、 spraying and baking paint and the whole pattern come into being after several Therefore, multi-sticking crape masking working procedure is a typical re-entrant stage, including many working procedures and work stations. This working procedure has obvious features of hybrid flowshop because that various abilities of technological persons attribute to different process times. Aimed at scheduling problems of multi-sticking working procedures in spraying workshop, this paper optimizes it with LDWPA and resolve scheduling problems in RHFS. crape masking spraying. of Working Procedure Work station Time of multi-sticking crape masking working procedure J1 J2 J3 J4 J5 J6 J7 J8 J9 J10 J11 J12 J13 J14 J15 OP1 1stC OLO RRI OP2 BBO N 2nd COL ORR IBB ON 3rdC OLO OP3 OP1 OP2 OP3 OP1 RRI OP2 BBO N OP3 2 5 1 WS1,1 WS1,2 WS2,1 WS2,2 WS2,3 3 WS3,1 WS3,3 4 WS1,1 WS1,2 WS2,1 WS2,2 WS2,3 6 WS3,1 WS3,3 7 WS1,1 WS1,2 WS2,1 WS2,2 WS2,3 9 WS3,1 WS3,3 8 FL1 FL2 12 15 FL3 15 FL4 12 FL5 FL6 FL7 FL8 FL9 FL10 FL11 FL12 FL13 FL14 FL15 15 15 15 20 12 18 15 15 15 20 15 15 15 20 18 25 15 18 22 20 25 12 15 15 18 20 18 18 15 20 20 20 20 25 20 25 18 25 25 20 25 18 25 18 20 25 15 18 20 18 20 10 12 15 15 15 18 10 15 15 18 20 12 10 15 10 15 18 12 18 15 20 20 15 15 20 15 15 20 20 20 20 22 25 15 10 15 15 20 20 18 20 20 22 25 15 12 15 15 20 20 15 15 18 15 20 15 12 18 15 18 20 10 12 10 15 15 18 18 18 20 15 20 15 12 15 18 15 18 12 10 15 10 15 18 12 20 16 15 20 12 15 15 18 15 18 12 10 12 15 10 18 The GA, WPA and LDWPA algorithms are used to compare the different evaluation indexes. The makespan maxC is used as the fitness value function of the overall optimization algorithm during the optimization process. At the same time, many evaluation indexes related to the practical application of the production line are established. These include the total load balance costTLB, the total workstation free time TWT and the total equipment utilization rate FUR. Except for the total equipment utilization FUR, the other evaluation index value is smaller and better. The evaluation indicators are described as following: WT j           TLB  M j n om       1 1 1 j l i WT l , , i j k  t i , , i j k At         M j j Mm  om      1 1 j l          1  k WT l , , i j k  At i t , , i j k            WT j 2          (13) (14) jWT in formula (13) means the average processing time of jM work stations of jOp working procedure. By summing up the Total load balance TLB. total processing time at each station ,j kWS of the procedure jOp and the average processing time jWT of the work stations and the square of the average processing time jWT .The load balance cost TLB is established in formula (14). j The total load balance cost TLB is the sum of the cost of load balance of all working procedures during the whole process. the Total equipment utilization ratio FUR FUR  M j m   1 k     i n      1  om lWTi     ,   1 1 l j  t i At , i , j k , j k   min             l , i , j k  t i At , i , j k         (15) , j k  S m   1 j  M j        1 k max  C l , i FUR in formula (15) is the total equipment utilization ratio of all stations in the flexible flow shop . It is also the ratio of the all effective processing time of work stations and the span of the work station working time. This time span is a period from the first processing task to the final processing task. the beginning of Table 4 The results of evaluation indexes in three algorithms Optimization performances of each optimization algorithm is analyzed from the data in Table 4. The average of maximum completion time maxC from LDWPA algorithm is better than that of GA and WPA algorithm. The three algorithms are similar to each other in terms of furniture utilization ratio FUR , but the optimization effects of LDWPA is still slightly higher than that of the other two algorithms. The optimization effect of WPA algorithm for total load balance TLB and free time of total work station TWT is obviously worse than that of GA algorithm. However, the optimization effect of LDWPA algorithm on every evaluation index is better than that of GA algorithm, which shows that the optimization ability and the quality of solution obtained by LDWPA algorithm are greatly improved compared with WPA algorithm. LDWPA can optimize every index, which shows that LDWPA can reduce the free time of work station better, arrange the processing task more reasonably, make the equipment load more balanced, and have better optimization performance. Figure 6 shows the gantt of the re-entrant hybrid flow shop based on the actual data during production process. The work 7J , traversing the process route, passes through the work station W S 1 2 , W S W S 2 1 3 2 , W S W S W S , , 1 2 2 1  3 3 , and the work 2J firstly it is produced in station enters when the Re-entrant working 11WS procedure 1OP .The job is produced in the work station 12W S when it first comes to re-entrant working procedure 1OP . Besides, the two stations in the working procedure 1OP is different. Both 2J and the work of them indicates that the scheduling of work production tasks is constantly changing during the ongoing production procedure, reflecting that Re-entrant Hybrid flow shop scheduling problem is a dynamic problem. Special attention is paid to entering the work 7J firstly the second working procedure 2OP of the re-entrant working procedure part at the same time. According to the local assignment rule specified in this paper, the work with the smaller remaining has a higher priority to enter the station for processing. According to table 2, the remaining of , so is shorter than that of 2J 7J the work station 21W S 7J . is first processed by the free Acknowledgement Figure 6 Gantt results of Re-entrant Hybrid Flowshop This work was supported by Liaoning Provincial Science Foundation(No. 201602608), Project of Liaoning Province Education Department(No. LJZ2017015), Shenyang Municipal Science and Technology Project(No. Z18-5-015) and Project of Sichuan Province Education Department (No. 17ZB0823). Reference 5 Conclusion the complete Based on multi-sticking crape masking in spraying workshop of automobile manufacture enterprises, this paper investigates the RHFS searching problems. In view of reentrant process system in practical society, this paper also raises RHFS dispatch searching problem with reentrant system and describes this problem. Mathematics models come into being with the target of minimizing time. This paper highlights the LDWPA algorithm. Improving the scouting behaviors of WPA with the Levy flight and evolution power of algorithm with dynamic regenerating population are used to improve WPA algorithm and resolve this problem. Any scales of simulation results are analyzed by experiments and compared with other algorithms. The simulation results show the proposed LDWPA algorithm can acquire near-optimal solutions in reasonable time. Our future work will focus on decreasing algorithm operation time and increasing control requirements for the quality of big scale problems. Kumar, P, R . (1993) 'Re-entrant Lines', Queuing Systems, Vol.13,No,1-3,pp.87-110. Wang, C.,Li, J.(2010) 'Approximate Analysis of Reentrant Lines With Bernoulli Reliability Model', IEEE Transactions on Automation Science and Engineering, Vol.7,No.3,pp.708-715. Han, Z., Zhu, Y., Ma, X., Chen, Z. (2016) 'Multiple rules with game theoretic analysis for flexible flow shop scheduling problem with component altering times', International Journal of Modeling Identification and Control, Vol.26, No.1,pp.1-18. Han, Z., Ma, X., Yao, L., Shi, H. (2012) 'Cost Optimization Problem of Hybrid Flow-Shop Based on PSO Algorithm', Advanced Materials Research, Vol. 532, pp. 1616-1620. Han, Z., Wang, S., Dong, X., Ma, X. (2017) 'Improved NSGA-II algorithm for multi-objective scheduling in hybrid flow shop', 2017 The 9th problem International Conference on Modeling, Identification and Control (ICMIC), Kunming, China, pp.740-745. Sun, Y., Lin, S., Li, T., Ma, X. (2017) 'Improved Imperialist Competitive Algorithm for Flexible Flow Shop Scheduling', 2017 The 9th International Conference on Modeling, Identification and Control (ICMIC),Kunming, China, pp. 169-174. Han, Z., Sun, Y., Ma, X., Lv, Z. (2018) 'Hybrid Flow Shop Scheduling with Finite Buffer', International Journal of Simulation and Process Modelling, Vol.13,No.2, pp.156-166. Ying, K., Lin, S., Wan, S. (2015) 'Bi-objective reentrant iterated Pareto of hybrid flowshop scheduling: an greedy Production Research, Vol.54,No.12,pp.1-18. International algorithm', Journal Hekmatfar. M., Ghomi, S.M.T.F., Karimi, B. (2011) 'Two stage re-entrant hybrid flow shop with setup times and the criterion of minimizing makespan', Applied Soft Computing Research, Vol.11, No.8, pp.4530-4539. Liu, X., Lin, J., Deng, K. 'Scheduling Optimization in Re-entrant Lines Based on a GA and PSO Hybrid Algorithm', Journal of Tongji University (natural science), Vol.39,No.5,pp.726-730. (2011) Fan, J., Yan, H., Zhou, K. 'Optimizing Aeroengine Assembly Shop Schedule Based on Genetic Algorithm', Computer Technology and Development, Vol.22,No.9,pp.205-209. (2012) Lin, G., Liiu, J., Mao, N. (2016) 'Dynamic batch re-entrant mould heat-treatment Integrated Manufacturing scheduling flow-shop', Computer System, Vol.22,No.4, pp.1046-1058. for Sangsawang, C., Sethnanan, K., Fujimoto, T., Gen, M. (2015) 'Met heuristics optimization approaches for two-stage reentrant flexible flow shop with blocking constraint', Expert Systems with Applications, Vol.42,No.5,pp.1046-1058. Collart. C., Verschueren. K. (2014) 'Re-entrant flow shop scheduling problem with time windows using hybrid genetic algorithm based on auto-tuning strategy', International Journal of Production Research, Vol.52, No.9,pp.2612-2629. Lin, D., Lee, C.K.M.., Wu, Z. (2012) 'Integrating analytical hierarchy process to genetic algorithm for problem', re-entrant International Journal of Production Research, Vol.50,No.7,pp.1813-1824. scheduling Yang, C., Tu, X., Chen, J. (2007) 'Algorithm of marriage in honey bees optimization based on the wolf pack search', Computing, International Conference on(IPC), Jeju Island, Korea. Intelligent Pervasive Zhou, Q., and Zhou, Y. (2013) 'Wolf colony search algorithm based on leader strategy', Application No.9, of Research pp.2629-262932. Computers, Vol.30, shop flow Harada, Y., Fujimoto, K., Fukuhara, M., Yoshida M. 'Minimum Hamming Distance Search (2017) Associative Memory Using Neuron CMOS Inverters', Japan, Electronics & Communications Vol.100,No.1, pp.36-42. in Atallah, M.J. and Duket, T.W. (2011) 'Pattern matching in thresholds', Information Processing Letters, Vol.111,No.14 pp.674-677. the Hamming distance with Haider, B., Suresh, D. (2015) 'A Hamming distance based binary particle swarm optimization (HDBPSO) algorithm for high dimensional feature selection, classification and validation', Pattern Recognition Letters, Jharkhand, India. Palyulin, VV., Chechkin, AV., Metzler, R. (2014) 'Levy flights do not always optimize random blind search for sparse targets', Proceedings of the National Academy of Science of the United States of America,Vol.111,No.8,pp.2931-2936. Ehsan, V., Elham, V. (2013)'A cuckoo search algorithm by Levy flights for solving reliability redundancy allocation problems' Engineering Optimization, Vol.45,No.11,pp.1273-1286. Ibrahim, A. (2016) 'Cost optimization of reinforced concrete cantilever retaining walls under seismic loading using a biogeography-based optimization flights' algorithm with Engineering Optimization, Vol.49,No.3,pp.381-400. Levy Carlier, J., Néron, E (2000) 'An exact method for solving RAIRO-Operations multi-processor Research, Vol.34, No.1, pp.1-25. flows-shop' Ribas, I., Listen, R., Framinan, J.M. (2010) 'Review and classification of hybrid flow shop scheduling problems from a production sys-tem and a solutions procedure perspective' Computer & Operations Research, Vol .37, No.8, pp.1439-1454.
1004.4450
1
1004
2010-04-26T09:37:46
Improving Supply Chain Coordination by Linking Dynamic Procurement Decision to Multi-Agent System
[ "cs.MA" ]
The Internet has changed the way business is conducted in many ways. For example, in the field of procurement, the possibility to directly interact with a trading partner has given rise to new mechanisms in the supply chain management. One such interactive dynamic procurement, which lets both buyer and seller software agents bid by potential buyer agents instead of static procurement by vendors. Dynamic procurement decision could provide the buying and selling channel to buyer, to avoid occurring condition that seller could not deliver on the contract promise. Using NYOP(Name Your Own Price) to be the core of dynamic procurement negotiation algorithm sets up multi-agent dynamic supply chain system, to present the DSINs(Dynamic Supply Chain Information Networks) by JADE, and to present the dynamic supply chain logistic simulation by eM-Plant. Finally, evaluating supply chain performance with supply chain performance metrics (such as bullwhip, fill rate), to be the reference of enterprise making deciding in the future.
cs.MA
cs
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Improving Supply Chain Coordination by Linking Dynamic Procurement Decision to Multi-Agent System Yee M ing Chen 42 Abstract—The Internet has changed the way business is conducted in many ways. For example, in the field of procurement, the possibility to directly interact with a trading partner has given rise to new mechanisms in the supply chain management. One such interactive dynamic procurement, which lets both buyer and seller software agents bid by potential buyer agents instead of static procurement by vendors. Dy- namic procurement decision could provide the buying and selling channel to buyer, to avoid occurring condition that seller could not deliver on the contract promise. Using NYOP(Name Your Own Price) to be the core of dynamic procurement negotiation algorithm sets up multi-agent dynamic supply chain system, to present the DSINs(Dynamic Supply Chain Information Networks) by JADE, and to present the dynamic supply chain logistic simulation by eM-Plant. Finally, evaluating supply chain performance with supply chain performance metrics (such as bullwhip, fill rate), to be the reference of enterprise making deciding in the future. Index Terms—Multi-Agent System、Bullwhip effect、 Fill rate 、NYOP(Name Your Own Price) ——————————  —————————— 1 INTRODUCTION N owadays agent technology is utilized in many in- dustrial applications such as production planning, collaborative engineering, and more recently supply chain management(SCM). One of the most difficult but critical issues in SCM is to improve the efficiency of supply chains from the perspective of the whole supply chain, not individual companies. More specifically, the formation, optimisation and minimizing the bullwhip effect(BWE) (the magnification of demand fluctuations as orders move up the supply chain.) [3] are considered crit- ical issues for efficient supply chain management [14]. Current approaches for reducing the BWE can be distin- guished in (1) information sharing (2) collaborative plan- ning. Although it is well-known that sharing information among supply chain members can lead to improved effi- ciency, information sharing is not always possible, often because of the limitations in information systems[1][12]. Collaborating production and orders of supply chain members by a single company or a decision-making unit is in many cases infeasible, because supply chain mem- bers are usually independent companies. Considering the limitations of information sharing and collaborative plan- ning, this paper proposes an agent-based Dynamic Supply Chain Information Networks (DSINs) in which each participant decides about procurement and produc- tion based on local information only. The interaction with other participants adopt a special form of Name Your Own Price(NYOP). The NYOP channel, exemplified by Priceline, is a popular online alternative to other, more traditional channels, through which service providers ————————————————  Yee Ming Chen is with the Department of Industrial Engineering and Management, Yuan Ze University, Taoyuan, Taiwan. such as airlines, hotels, and car rental companies offer their products to customers. This paper is motivated by the importance of developing an understanding of the market implications of this pricing and distribution mod- el. Therefore,NYOP plays a dominating and in many cas- es an exclusive role for coordinating supply and demand. The objective of our work is to design a dynamic pro- curement mechanism in the multi-agent system. Each SC participant is represented by an autonomous software agents that negotiation for coordinating supply and de- mand to reduce the BWE. The remainder of our paper is structured as follows: In section 2, we review existing work. Then we describe a dynamic procurement scheme that integrates concepts of NYOP. In section 4, we eva- luate our proposal by conducting a simulation study us- ing a multi-agent system(Dynamic Supply Chain Infor- mation Networks; DSINs). Section 5 discusses the pros and cons of DSINs. Finally, section 6 draws conclusions, and points out avenues of future research. 2. RELATED WORK The related work to ours can be grouped into three major areas: using multiagent technology and information shar- ing in supply chains, countering the BWE, and adopting dynamic procurement for coordination in supply chains. Each area is briefly discussed below. (1) Multi-agent technology and sharing information Coordination plays a pivotal role in successful design and implementation of supply chains, especially for those that are formed by independent and autonomous compa- nies[2]. In SCM, multiagent technology is at the brink of being integrated into real-world applications. An example JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 43 panies to interact with customers in ways that may have been prohibitively costly using traditional chan- nels[10][11]. In particular, the Internet has facilitated the emergence of name-your-own-price (NYOP) auctions. In such auctions, as popularized by Priceline, buyers bid for a product or service[8]. If a bid exceeds the seller's con- cealed threshold price, the buyer receives the product at the price of her bid. This selling mechanism has been used predominantly in the SC. Several normative models have been proposed regarding the optimal bid sequence [9][13]. In this section, we describe procurement decisions in SC with local information. This research employs a stylized model to identify and understand key tradeoffs driving the decision by a service provider in the SC to employ an NYOP channel, assuming that such a channel is available. 3. DYNAMIC PROCUREMENT SCHEME In this section, we describe dynamic procurement scheme with NYOP in SC. The adaptation of NYOP for dynamic procurement calls for specifications of the three steps : Step 1: Buyer agent’s bid: For calculating the bid of the buyer agent we refer to the demand function. A linear demand curve, thus an increasing price P causes a de- creasing demand Q Q d a bP   (1) where a>0 and b>0, the demand function describes the bidding behavior of the buyer agent. Step 2: Seller agent’s minimum price: For calculating the minimum price of the supplier we refer to the supply function. The linear form is (2) cQs  dP where c>0 and d>0 . Step 3: Matching: By comparing bid price and minimum price for the requested quantity, the price been decided. Step 1 and 2 require that equilibrium price P* and equili- brium quantity Q* as well as estimates for the price elas- ticity of demand Ed and supply Es are available. Then we can determine the parameters a and b of the demand function as well as c and d of the supply function. Figure 1 shows the relationship between demand and supply as described. is MASCOT, which is a reconfigurable, multilevel, agent- based architecture for planning and scheduling, aimed at improving SC agility [13]. Chen and Wei [5] analyzed the effects of negotiation-based information sharing in a dis- tributed make-to-order manufacturing supply chain in a multi-period,multi-product types environment, which is modeled as a multi-agent system. Verdicchio and Colom- betti [6] also stress that information sharing as a critical factor for successful business process management. Supply chain decisions are improved with access to glob- al information. However, supply chain partners are fre- quently hesitant to provide full access to all the informa- tion within an enterprise [10]. A mechanism to make de- cisions based on global information without complete access to that information is required for improved supply chain decision making. Cigoloni and Marco [2] carried out a study of the Collaborative Planning Fore- casting and Replenishment (CPFR) process for trading partners (belonging to the same supply chain) who are willing to collaborate in exchanging sales and order fore- casts. The two major out come of the literature survey is that information sharing is most important requirement of efficient supply chain and multi agent modelling is most suitable for designing of supply chains. (2) Bullwhip effect The term Bullwhip Effect was coined by Procter & Gam- ble management who noticed an amplification of infor- mation distortion as order information travelled up the supply chain [3]. The Bullwhip Effect (or Whiplash Effect) is an observed phenomenon in forecast-driven distribu- tion channels. To address the Bullwhip Effect, many tech- niques are employed to manage various supply chain processes, such as order information sharing, demand forecasting, inventory management, and shipment sche- duling[ 3]. Factors contributing to the Bullwhip Effect: forecast errors, overreaction to backlogs, lead time (of information – orders and of material) variability, no communication and no coordination up and down the supply chain, delay times for information and material flow, batch ordering (larger orders result in more va- riance), rationing and shortage gaming, price fluctuations, product promotions, free return policies, inflated orders. Bullwhip Effect is also attributed to the separate owner- ship of different stages of the supply chain. Each stage in such a structured supply chain tries to amplify the profit of the respective stages, thereby decreasing the overall profitability of the supply chain [13 ]. (3) Dynamic procurement Dynamic procurement in a capacitated supply chain faces uncertain demand. Burnetas and Gilbert [1] study reser- vation or forward purchase decisions by providing the buyer a second means of capacity procurement after the demand uncertainty is revealed [7]. Fredergruen and Heching [6] study a model similar to ours and show that dynamic pricing/procurement redistributes the power between the supply chain partners and allows the buyer to impact the wholesale prices. The Internet allows com- JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 44 Figure 1 Demand and supply function 4, FORMATION OF BUYER-SUPPLIER AGENTSHIP WITH DYNAMIC PROCUREMENT SCHEME Fig 1 shows an example supply chain of a Taiwam LCD panel assembly company which is used throughout this paper. LCD modules are widely used for display devices such as mobile phones, PDAs , and notebook PCs. In the supply chain, for a company like Cell Plant demand is distorted along the multiple paths from the markets to the company due to bullwhip effects and accumulation of erroneous estimations. Figure 2 An example supply chain model of a LCD panel assembly manufacturing company DSINs(Dynamic Supply Chain Information Networks) takes a simple but practical approach to address this problem. In an ADINS, agents autonomously form an information network by only local collaboration and in- formation sharing. Fig 3 shows the architecture of a pro- posed DSINs. To increase the practicality of DSINs, all the interactions among participating agents in a supply chain are implemented with Java Agent Development Frame- work (JADE) which based on the specifications from FIPA ACL (Agent Communication Language) format [4]. Figure 3 The architecture of DSINs Using the network, they perform order and production planning in a synchronized way without any central con- trolling entities. For this, we assume that agents are able to observe market demands directly rather than relying on the possibly distorted demand figures that are re- ceived by their companies. By doing this, DSINs is able to reduce bullwhip effects and improve service quality such as fill rates. In this multi-agent-based system, each SC participant is represented by an autonomous software agent. The cen- tral component of the JADE agent platform is the agent management system, which keeps supervisory control over access and use of the agent platform. Agents coordi- nate their ordering behavior by exchanging messages using the JADE message transport system. DSINs agents are generated using the JADE agent class and by imple- menting the appropriate agent control behavior on top of it. DSINs agents can send orders to other agents and re- ceive goods. In this context, we distinguish two types of scenarios: Agents with/without NYOP scheme determine their orders according to the dynamic procurement nego- tiation algorithm (Figure 4.), and present the dynamic supply chain logistic simulation by eM-Plant. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 45 5. EXPERIMENTS SETTING AND RESULTS We defined a four-tier SC consisting of four agents (see also figure 2). Only the last agent ( k = 4 ) knows the final retailer demand D . We set the following parameters: (1) Final retailer demand D : normally distributed with expected value  =100 and standard deviation =10 . (2) The price elasticity of demand sE =1.56. (3) T between 5 and 15 (time periods of the moving av- erage forecast). dE =-0.75 and supply (4) k between 1 and 4 (same lead time for all tiers) Table 1 BWE for k=4 (Retailer) (SD: standard deviation , T:number of periods) Figure 4. Dynamic procurement negotiation algorithm An agent interacts with other agents by placing orders for goods. An example of this interaction is shown in Figure 5: In each period T, an FSA agent ( forecasting & structur- ing agent) observes the current inventory level and sends an order (calculated by algorithm ) to PSA (production & scheduling agent). After the order is placed, PSA agent observes and fills its demand for this period. Since our objective is to quantify the BWE, we must determine the variance of placed orders, relative to the variance of De- mand. Figure 5 presents message exchanges captured in the experiment with the help of a JADE provided sniffer agent. Table 2 BWE for k=3 (Wholeseller) Table 3 BWE for k=2 (Manufactuer) Figure 5 Screen captures showing our NYOP scheme in transaction. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Table 4 BWE for k=1 (Supplier) Table 6 Fill Rate for k=3 (Wholeseller) 46 In the first set of experiments, we determined the BWE un- der variation of T. From Table 1 to Table 4 present the data for the comparison of the conventional procurement decision and the NYOP scheme yields a reduction in the order BWE of 8.03 % to 26.86 %. In general, the BWE decreases with an increasing T (see also figure 6). Table 7 Fill Rate for k=2 (Manufactuer) Table 8 Fill Rate for k=1 (Supplier) Figure 6 BWE and variation T In the second set of experiments, we determined the Fill rate (FR) under variation of T. Where is the standardized loss function. k=1,2,3,4 (3) zG )( u QVar ( ) k k 1 )( zGu FR k 1  L k In Table 5 ~ 8, the fill rate improve from 1.70 % to 3.74 % with NYOP scheme against the conventional procurement decision in four tier supply partners. The FR increases with an increasing T (figure 7). . Table 5 Fill Rate for k=4 (Retailer) (SD: standard deviation , T:number of periods) Figure 7 Fill rate and variation T JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 47 6. CONCLUSIONS AND FUTURE WORK We aimed at reducing the bullwhip effect and improve fill rate in multi-tier SCs by means of NYOP scheme. In par- ticular, the multiagent based behaviour model for each agent was developed to clarify the states, transitions, and commu- nication requirements of agents and also to facilitate the de- rivation of concrete procedures for agent behaviours that can be used for actual development of agent systems. In order to show the practical feasibility of the approach, the conversa- tions among agents were also modelled with FIPA’s stan- dard interaction protocols and messages and a prototype DSINs system was constructed using a FIPA-compliant agent platform JADE. A major limitation is that we assumed linear supply and demand functions. This assumption is, however, coherent with basic concepts of market economics, we believe that this paper has contributed to proving the ever-growing po- tential of agent technology for practical supply chain man- agement where analytic or optimization results from multi- tier supply chains cannot be easily applied or global infor- mation sharing or central coordination is impossible. Further rsearch issues include the full implementation of DSINs, relaxing the assumptions on supply chains, and analysing the bidding strategies for the iterative relaxation Contract Net in the supply chain management. REFERENCES [1] A. Burnetas and S. Gilbert, “ Future Capacity Procurements Under Unknown Demand and Increasing Costs”. Management Science, Vol 47, pp979–992, 2001. [2] M.,R.Cigoloni and D. De Marco,” Improving supply-chain collaboration by linking intelligent agents to CPFR”, Interna- tional Journal of Production Research, Vol. 43, No. 20, pp 4191–4218,2005. [3] F. Chen, Z. Drezner, J. K. Ryan, and D. Simchi-Levi, “Quan- tifying the Bullwhip Effect in a Simple Supply Chain: The Impact of Forecasting Lead Times, and Information”, Man- agement Science, Vol 46, No 3, pp 436 -443 ,2000. [4] FIPA web site – http://www.fipa.org/. [5] Y.M. Chen and C.W. Wei, ”Multi-Agent-Oriented Approach to Supply Chain Planning and Scheduling in Make-to-Order Manufacturing, International Journal of Electronic Business, Vol. 5, pp. 427-454, 2007. [6] A. Fredergruen and A. Heching, “Combined Pricing and Iven- tory Control under Uncertainty”, INFORMS,Operations Re- search, Vol. 47, pp. 454-475, 1999. [7] J. B. Kim, ”Multi-Component Contingent Auction (MCCA): A Procurement Mechanism for Dynamic Formation of Supply Networks”, Proceedings of International Conference on e- Commerce, Pittsburgh, USA, ,2003. [8] P. K. Kanna, and P. K. Kopalle, “Dynamic pricing on the In- ternet: Importance and implications for consumer behavior”, J. Electronic Commerce , Vol 5, No 3, pp 63– 83, 2001. [9] Y. Mujaj, J. Leukel, and S. Kirn, S. “A Reverse Pricing Model for Multi-Tier Supply Chains,” Proceedings of the IEEE Joint Conference on E-Commerce Technology (CEC’07) and Enterprise Computing, E-Commerce and E-Services (EEE’07), IEEE Computer Society, 2007. [10] Y. H. Park and E. Bradlow, “ An integrated model for bidding behavior in Internet auctions: Whether, who, when, and how much”. J. Marketing Res. Vol 42, No 4, pp 470–482, 2005. [11] C. Terwiesch, S. Savin, and I.H. Hann. “ Online haggling at a name-your-own-price retailer: Theory and application. Man- agement Science, Vol 51, No 3, pp 339–351, 2005. [12] Z. Yu, H. Yan and T. C. E. Cheng, “ Benefits of information sharing with supply chain partnerships”, Industrial Manage- ment & Data Systems, Vol 101, No 3, pp 114-119, 2001. [13] J. M. Swaminathan, “ Modeling Supply Chain Dynamics: A Multiagent Approach, Decision Sciences ,Vol 29 No 3, pp 607-632, 1998. [14] R. Zimmermann, S. Winkler, and F. Bodend , “ Agent-based Supply Chain Event Management – Concept and Assessment, Proceedings of the 39th Hawaii International Conference on System Sciences, pp 1-10, 2006. Yee Ming Chen is a professor in the Department of Industrial Engi- neering and Management at Yuan Ze University, where he carries out basic and applied research in agent-based computing. His cur- rent research interests include soft computing, supply chain man- agement, and pattern recognition.
1808.07975
1
1808
2018-08-24T00:53:43
A Communication Protocol for Man-Machine Networks
[ "cs.MA" ]
One of the most challenging coordination problems in artificial intelligence is to achieve successful collaboration across large-scale heterogeneous systems that include Robots, Agents, and People (RAP). In the best case, these RAP systems are potentially capable of leveraging the strengths of the individual entities to achieve complex distributed tasks. However, without intelligent communication protocols, man-machine partnerships are likely to fail as the humans become overloaded with irrelevant information. This paper introduces a communication protocol for man machine systems and demonstrates that its message routing performance approaches the central optimized solution in a simulated smart environment scenario.
cs.MA
cs
A Communication Protocol for Man-Machine Networks Neda Hajiakhoond Bidoki Department of Computer Science University of Central Florida Orlando, FL USA [email protected] Gita Sukthankar Department of Computer Science University of Central Florida Orlando, FL USA [email protected] Abstract -- One of the most challenging coordination problems in artificial intelligence is to achieve successful collaboration across large-scale heterogeneous systems that include Robots, Agents, and People (RAP). In the best case, these RAP systems are potentially capable of leveraging the strengths of the individual entities to achieve complex distributed tasks. However, without intelligent communication protocols, man-machine partnerships are likely to fail as the humans become overloaded with irrelevant information. This paper introduces a communication protocol for man machine systems and demonstrates that its message routing performance approaches the central optimized solution in a simulated smart environment scenario. I. INTRODUCTION The potential of man-machine teams has tantalized researchers for over a decade. Scerri et al. wrote a seminal paper introducing the acronym, RAP, to describe systems consisting of Robots Agents and People [1]. RAP systems leverage the strengths of the heterogeneous components, drawing from the common sense knowledge of the human, the robots' ability to perform repetitive physical tasks, and the ability of software agents to solve specialized artificial intelligence problems. They augment large-scale participatory sensor networks composed of humans carrying mobile devices with additional autonomous robot and software agents. Scerri et al. envisioned an architecture in which software agent proxies running on mobile devices could be used to coordinate the man-machine teams. in urban areas. There have been RAP systems are valuable for a variety of problems, including command and control, sensor networks, urban rescue, and personal assistance. In the future, RAP systems are likely to become an integral part of smart cities, serving the function of proactively helping humans limited demonstrations of HRI (human-robot interaction systems) as museum tour guides [2] and as building receptionists [3]. To extend these systems to include multiple robots and humans requires solving coordinated task allocation and scheduling which are NP-hard problems [4]. Glas et al. [5] introduced a general framework for networked robots that supports different social robot services including the observation of human behavior using environmental sensor networks, structured knowledge sharing, centralized resource and service allocation, global path planning for coordination between robots, and support for selected recognition and decision tasks by a human operator. In this paper, we propose new communication protocols to support this type of man machine system that includes networked robots cooperating with humans. We demonstrate that our new communication protocols are valuable for reducing communication costs in a simulated Netlogo scenario inspired by the Glas et al. shopping assistance system. II. PROBLEM STATEMENT the team In a man-machine team, humans, robots, and agents must cooperate to achieve the joint goal. In our smart environment shopping assistance problem, customers are aided by a combination of fellow shoppers, mobile robots, and software agents who help locate a desired set of items. We define the problem as consisting of an environment defined by a map, a set of robots, 𝑅, a set of human-service assistants, 𝐻, a set of customers 𝐶, and a set of additional system constraints. The set of robots on the team is defined as 𝑅 ∶= {𝑟1, 𝑟2, … , 𝑟𝑁} where 𝑁 is the number of robots on the team. The set of human is defined as 𝐻 ∶= service assistants on {ℎ1, ℎ2, … , ℎ𝑀} where 𝑀 is the number of human service assistants on the team. To make it simpler, we consider one customer or request sender as c. Our communication protocol must connect the customer with the best set of RAP assistants such that both human and non- human agents assist to accomplish his requirements while minimizing cost. Finding a balance between reward and recruitment effort remains a challenge. We assume that humans' willingness to collaborate changes over time, and that the customer uses a monetary offer or tips to motivate other humans to provide assistance. According to the incentive theory of motivation, if people receive a positive profit from performing a task, there is a higher chance that they will successfully complete it. An analysis of workplace incentive programs suggests that correctly employed incentives are able to enhance participants' performance [6], [7] [8]. Additionally, prompt awards enhance participants' motivation even more; an instant award, combined with repetitive actions, can create new behavioral habits. the customer III. METHEDOLOGY Our proposed protocol (History-based Financial Incentive) leverages the history of incentive acceptance to determine the best message routing. We compare our protocol against a centralized optimization algorithm to calculate the best possible agent allocation as well as Directed Diffusion protocol which is designed for robustness, scaling and energy efficiency in wireless sensor networks . Centralized optimization algorithms are undesirable for RAP systems since they rely on centralized information as well as a single computational node. These characteristics reduce their ability to deal with large scale problems and datasets, due to the high computational complexity. Moreover, it is inefficient to collect and store data in a centralized manner especially when the communication is multicast. In such scenarios, collecting all the necessary information through a central node is both time-consuming and incurs a high communication cost due to the large amount of packet exchange. Having a single point of failure also jeopardizes the inherently resilient nature of RAP systems. As an alternative to the centralized optimization algorithm, we implemented two protocols: The first is a Directed Diffusion algorithm and the second is our proposed history-based algorithm that tracks successful assistants.  Directed Diffusion protocol The customer requests as interests for named resources. Agents satisfying the interest can be found by flooding the message. Confirmation is exchanged by intermediate agents and resources are shipped when confirmed.  History-based Financial Incentive protocol (HFI) In our proposed protocol, the history of previously successful assists is recorded. Customers can make requests to the set of agents who are stored in his records. We believe that this protocol can reduce communication cost in many applications, especially when customers make repeated requests for similar types of assistance. We have implemented these two algorithms along with the incentive strategy used for motivating human agents. A. Human Behavior Modeling To account for differences between the agents and humans, we created a separate human behavior model. Skill is often a major determinant of human success, yet it can be sensitive to situational factors. In human-robot interaction tasks requiring physical control, human skills have been found to change over both the short and long term. Over the long term body movements slowed down and/or became less accurate; simple control skills may exhibit different kinematics and dynamics and are affected by microgravity [9]. Also, time-of-day affects the individual's performance; for instance, circadian rhythms such as morningness or eveningness can impact productivity. Creating a physically realistic human behavior model is complex and beyond the scope of our work. Instead in our scenario, we assume that skill is a negligible factor but that the human's current ability to perform the task can be modeled by a normal distribution, centered on the human's preferred time of day; this preferred time is when they are most available to render assistance. Peak time differs for each individual in our simulated scenario. Although robot performance can also fluctuate over time due to causes such as mechanical malfunctions and improper maintenance, we do not expect these situations to occur frequently in the short term. Thus, we assume that the non-human agents use a greedy task acceptance model; whenever a robot is not busy with other tasks, it always renders assistance. B. Mathematical Model We present a mathematical model for the problem that is used to calculate the optimal allocation that serves as our comparison benchmark. 𝐻, 𝑅 and 𝐶 represent the set of human agents, robot agents and customers (and their locations) respectively. ℎ𝑖, 𝑟𝑖 refers to 𝑖𝑡ℎ human and 𝑖𝑡ℎ robot agents. For simplicity, we consider one customer represented as 𝑐. Variables and parameters are as follows: Variables       𝑙ℎ𝑖 : Binary variable assuming the value 1 if human agent 𝑖 has been selected to assist the customer; 0 otherwise. 𝑜ℎ𝑖 : Binary variable assuming the value 1 if human agent 𝑖 has been selected to assist the customer; 0 otherwise. 𝑙𝑟𝑖 : Binary variable assuming the value 1 if robot agent 𝑖 has been selected to assist the customer; 0 otherwise. 𝑐ℎ𝑖 : Number of human agents have been requested by current customer. 𝑐𝑟𝑖 : Number of robot agents have been requested by current customer. 𝑐𝑡: Current customer monetary offer. Parameters  𝑁ℎ and 𝐻ℎ: are the size of human, robot, agents sets respectively. We assume each robot agent, human agent as well as customer is equipped with an IoT device with an omni- directional halfduplex antenna [10], [7], [11]. C. Integer Linear Programming Formulation The objective function minimizes the communication cost of agents and customers through the process of customer agent resource assembling. For the robot costs we consider the shortest path the robot can take to reach the customer. For human agents we also include the reward costs required to motivate response. 𝐸ℎ𝑖 and 𝐸𝑟𝑖 represent the total cost for human agent 𝑖 and robot agent 𝑖 necessary to reach current customer and assist with his demand. Therefore the objective function can be written as follows:  minimize 𝐸 = ∑ ℎ=1 𝑙ℎ𝑖𝐸ℎ𝑖 + ∑ 𝑟=1 𝑙𝑟𝑖𝐸𝑟𝑖   subject to the following constraints:   ∑ ℎ=1 𝑙ℎ𝑖 = 𝑐𝑖 and ∑ 𝑟=1 = 𝑐𝑟𝑖 𝑙𝑟𝑖 𝑙ℎ𝑖 ∗ 𝑜ℎ𝑖 <= 𝑐𝑡   The first constraint ensures that the total number of human and robot agents that are selected is equal to the number of human and robot agents that the customer has requested. The second constraint guarantees that the minimum offer value of the selected human is less than what the customer has offered, thus ensuring that the human agent is motivated to assist the customer. D. Implementation in Netlogo which We implemented our shopping assistance scenario and routing protocols is a multi-agent programmable modeling environment [12]-[13]. Fig. 1 shows the simulator interface, and Fig. 2 shows a flow chart of its operation. All variables are set when the simulation is initialized. Then a random customer creates a message with the required resource and reward info. This message is either broadcast to all surrounding agents (the flooding protocol) or unicast to the agents who have assisted the customer with previous The DD protocol does not perform well in comparison to the HFI algorithm as it constantly broadcasts to the surrounding agents. Obstacles such as walls do not block signal reception of agents but do block movement. Therefore, an agent may receive a request quickly while needing take a long path in order to reach the customer, due to the existence of solid obstacles. A matched paired t-test on the mean values of the same scenarios under different algorithms yields no significant difference between our proposed FIH protocol and the optimal ILP solution. Comparing DD protocol communication cost with HIF communication cost yielded t equal to -7.937337, indicating that the result is significant at 𝑝 ≤ 0.01. demands. After a response, the message will be updated with the remaining required resources. If any required resources exist, the message is broadcast. This process will continue until no resources are needed or all the agents have been contacted. In the latter case, the customer can increase the reward to attract more help, and the process will repeat. Algorithm 1 History-based routing algorithm Result: Message routing Contact agents in history Update required resources If more resources are needed then While more resource needed or all agents have not received message do to other nodes Upon receiving a message from an agent forward it if an agent exhibits interest then Update the needed resources Forward message else Forward message end end end IV. RESULTS The results for the centralized optimization model were obtained by solving the ILP model using AIMMS run on a Windows-based 64-bit core-i7 computer with 24GB of RAM. In all the scenarios we considered, LP model executions were fast, never lasting more than few seconds. We implemented the heuristics in a home-grown software framework written in NetLogo. Their executions were similar, lasting only a few minutes according to the number of agents in the simulated environment. After initializing the map, we determine the number of agents (including the number of human agents, robot agents and customers) as well as our budget and the maximum number of human and robot agents that a customer can request as inputs. Our simulation then randomly places humans, robots, and customers on the map of a building, assuming constant sensor radio coverage. For each scenario created two communication protocols (DD and HFI). The map and model info were loaded directly into our AIMMS program in order to execute the optimization procedure. In this way we are able to calculate the results of all three models on the same scenario. Initialization parameters (including number of agents) were varied; for each set of parameters, 20 different scenarios were generated. The average cost of all 20 different scenarios is used as the communication cost. Fig. 3 shows the results; as expected the History-based Financial Incentive algorithm (marked as HFI) had a better performance, closely matching the optimum selection of agents. This occurs due to several facts. First agents who previously participated on a team are likely to be around, having recently finished their previous task. the NetLogo simulation, we run the in Fig. 2. Simulation logic flow chart Fig. 3. Communication cost for each routing protocol Fig. 1. Netlogo simulation of shopping assistance scenario V. CONCLUSION for man-machine This paper introduces a history-based financial incentive communication algorithm systems. NetLogo was used to simulate a shopping assistance scenario in which a smart store environment summons help for the shopper in the form of robots and other humans to help locate items. Although non-human agents have no reason not to respond if available, humans are likely to be performing other shopping tasks and need to be incentivized to render assistance. In our simulation, they are modeled as having time availability preferences and as being less willing to respond to lower incentives outside their peak availability period. We demonstrate that the agent allocation solution reached our proposed algorithm results in an insignificant cost increase over a centralized solution calculated with an ILP solver. Lower communication costs are particularly important in man-machine systems to avoid bombarding the human with unwanted messages. In future work, we plan to implement our communication protocol in ROS (the Robot Operating System) for use in coordinating quadcopters with humans for autonomous photography tasks. REFERENCES [1] P. Scerri, D. Pynadath, L. Johnson, P. Rosenbloom, M. Si, N. Schurr, and M. Tambe, "A prototype infrastructure for distributed robot-agent- person teams," in Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, 2003, pp. 433 -- 440. [2] S. Thrun, M. Bennewitz, W. Burgard, A. B. Cremers, F. Dellaert, D. Fox, D. Hahnel, C. Rosenberg, N. Roy, J. Schulte, and D. Schulz, "Minerva: a second-generation museum in Proceedings of the IEEE International Conference on Robotics and Automation, vol. 3, 1999, pp. 1999 -- 2005. tour-guide robot," [3] S. Sabanovic, M. P. Michalowski, and R. Simmons, "Robots in the wild: observing human-robot social interaction outside the lab," in IEEE International Workshop on Advanced Motion Control, 2006, pp. 596 -- 601. [4] M. Koes, I. Nourbakhsh, and K. Sycara, "Heterogeneous multirobot coordination with spatial and temporal constraints," in AAAI, vol. 5, 2005, pp. 1292 -- 1297. [5] D. F. Glas, S. Satake, F. Ferreri, T. Kanda, H. Ishiguro, and N. Hagita, "The network robot system: enabling social human-robot interaction in public spaces," Journal of Human-Robot Interaction, vol. 1, no. 2, pp. 5 -- 32, 2012. [6] "Increase customer effective motiation strategies,"https://rewardstream.com/blog/increase-customer referrals- usingmotivation/, accessed: 2018-02-19. referral using [7] A. Mayle, N. H. Bidoki, S. S. Bacanli, L. Boloni, and D. Turgut, "Investigating the value of privacy within the internet of things," in Proceedings of IEEE GLOBECOM'17, December 2017. [8] M. Baghbahari, A. Behal, "Real-time policy generation and its application to robot grasping," FCRAR 2018, May 2018. [9] F. Steinberg, M. Kalicinski, M. Dalecki, and O. Bock, "Human performance in a realistic instrument-control task during short-term microgravity," PloS One, vol. 10, no. 6, p. e0128992, 2015. [10] N. H. Bidoki, M. B. Baghdadabad, G. R. Sukthankar, and D. Turgut, "Joint value of information and energy aware sleep scheduling in wireless sensor networks: A linear programming approach," in IEEE ICC'18, May 2018. [11] N. H. Bidoki and M. D. T. Fooladi, "Linear programming-based model for joint routing and sleep scheduling in data-centric wireless sensor networks," in Information and Knowledge Technology (IKT), 2014 6th Conference on. IEEE, 2014, pp. 73 -- 78. [12] U. Wilensky, "Netlogo," Center for Connected Learning and Computerbased Modeling, Northwestern University, Evanston, IL, Tech. Available: http://ccl.northwestern.edu/netlogo/. Rep.,1999. [Online]. [13] S. J. Russell and P. N. A. I. A. Modern, "Approach," Prentice Hall Pearson Education Inc., Upper Saddle River, New Jersey, vol. 7458, pp. 116 -- 119, 2003.
1311.6233
1
1311
2013-11-25T08:42:59
Agent Based Negotiation using Cloud - an Approach in E-Commerce
[ "cs.MA" ]
Cloud computing allows subscription based access to computing. It also allows storage services over Internet. Automated Negotiation is becoming an emerging, and important area in the field of Multi Agent Systems in ECommerce. Multi Agent based negotiation system is necessary to increase the efficiency of E-negotiation process. Cloud computing provides security and privacy to the user data and low maintenance costs. We propose a Negotiation system using cloud. In this system, all product information and multiple agent details are stored on cloud. Both parties select their agents through cloud for negotiation. Agent acts as a negotiator. Agents have users details and their requirements for a particular product. Using users requirement, agents negotiate on some issues such as price, volume, duration, quality and so on. After completing negotiation process, agents give feedback to the user about whether negotiation is successful or not. This negotiation system is dynamic in nature and increases the agents with the increase in participating user.
cs.MA
cs
Agent Based Negotiation using Cloud - an Approach in E-Commerce Amruta More1, Sheetal Vij1, Debajyoti Mukhopadhyay2, 1 Department of Computer Engineering , 2Department of Information Technology, Maharashtra Institute of Technology, Pune- 411038, India, {moreamruta930, sheetal.sh, debajyoti.mukhopadhyay} @gmail.com Abstract. 'Cloud computing' allows subscription based access to computing. It also allows storage services over Internet. Automated Negotiation is becoming an emerging, and important area in the field of Multi-Agent Systems in E- Commerce. Multi-Agent based negotiation system is necessary to increase the efficiency of E-negotiation process. Cloud computing provides security and privacy to the user data and low maintenance costs. We propose a Negotiation system using cloud. In this system, all product information and multiple agent details are stored on cloud. Both parties select their agents through cloud for negotiation. Agent acts as a negotiator. Agents have user’s details and their requirements for a particular product. Using user’s requirement, agents negotiate on some issues such as price, volume, duration, quality and so on. After completing negotiation process, agents give feedback to the user about whether negotiation is successful or not. This negotiation system is dynamic in nature and increases the agents with the increase in participating user. Keywords: Cloud computing, negotiation, multi-agent, E-Commerce 1 Introduction In business negotiation two or more parties come together to find mutually agreeable contractual decision. For negotiation process both parties must show their interest, thus, negotiation can be complicated and lengthy process. When all parties have to come to final decision, negotiation will be stopped. In negotiation, each individual aim to achieve the best possible outcome for their organization. Negotiator is an individual representing an organization which listens to all the parties’ decision carefully and takes his own decision which gives profit to his organization. In negotiation process organization profit depends on organization's negotiator so that negotiator needs to understand situation and all other organization's negotiator. Negotiator must know how to negotiate well to successfully close deals, avoid conflicts, and establish better relations among the other organization's negotiators making the organization a better place to work. For successful negotiation individuals or negotiator must learn to compromise and stop f inding faults in each other. Today cloud computing is widely used and is becoming a popular technology. Cloud is a remote server, where the user can store their data and access the data remotely whenever it's required. Cloud computing provides security and privacy to the user data. User has no burden in maintaining huge amount of data stored on cloud. Cloud computing is sometimes referred to as "on-demand resources" and is usually based on pay-per-use basis. If business owner requires more space as compared to his previous space on cloud, owner can easily request for additional data storage on the cloud. Also owner can easily request for additional bandwidth, processing speed, and additional licenses. Using cloud computing, user can access information from any device like desktop, minicomputer, mobile etc. anywhere and anytime. Amazon, Microsoft, Openstack, Google all these are the cloud providers. Google Apps is one example of cloud. In Agent based negotiation system, we propose a system for negotiation between a provider and a consumer using cloud. In this system, all product information and multiple agent details are stored on the cloud. Both provider and consumer will select their agents through cloud for negotiation. An agent acts as a negotiator. Agent has user’s details and their requirements for a particular product. Using user’s requirement, agents negotiate on certain features or issues. 2 Features of Cloud for E-Negotiation 1. Rapid Scalability: Cloud computing has the ability of scaling the resources both ways for the consumers and as per the need. Cloud is infinite and one can buy the computing power as per the need. Negotiation system is dynamic, so that if more data storage is required, it can be easily made available by cloud. 2. Security: It is the core feature of cloud computing. Security is much stricter in cloud computing. Data is shared within a server hence, the provider must ensure that each account is secured, and only authorized users in one account can access it. Any product or negotiation process information is stored in a secure manner. Only authorized agents have access to the product information and negotiation process. 3. No Need of Maintenance: User can store all types of data on the cloud, and do not have to worry about maintenance of data. The product data can be stored on cloud, so that organizations do not require any server and maintenance of that server. Simultaneously maintenance cost is also reduced. 4. No Need of Backup: Business owner do not need to worry about the backup responsibilities, as the supplier has already taken effort to put up a great system for backup. Disk failure, server crash or system failure won’t create much problem as the supplier can easily restore the latest backup from the cloud. 5. Device and Location Independent: User can access cloud from any device like mobile, mini-computer, and desktop etc. anywhere and anytime. 6. Transparent Software Updates: Softwares which are necessary with any e- commerce system, are updated, transparently and require minimum download time. 3 Technical Literature Survey Li Pan [1] introduced a framework for automated service negotiation in cloud computing environments. In this framework, software agents negotiate with each other on behalf of service consumer and provider. This system also used a bilateral multi-step monotonic concession negotiation protocol for service negotiation in cloud computing environments. Service provider and consumer agents interact with each other due to the negotiation process and they make decisions according to the negotiation protocol. Miguel A. Lopez-Carmona, Ivan Marsa-Maestre and Mark Klein [2] says that, consensus policy based mediation framework is used to perform multi -agent negotiation. This paper also proposed a mediation mechanism which is used to perform the exploration of negotiation space in the multiparty negotiation setting. The performance of mediator mechanism is under guidance of aggregation of agent performance and on the set of alternatives the mediator proposes in each n egotiation round. Mikoto Okumura, Katsuhide Fujita proposed [3], a collaborative park-design support system which is an example of collective collaboration support systems based on multi-agent systems. In this system, agents collect user information, many alternatives and reach optimal decision using automated negotiation protocol. Especially, in this paper, the attribute space and utility space of user in real world is decided. At the end of the system user gives feedback. According to the user’s feedback, if most of the users agree on some alternative, then this alternative is final or optimal. Amir Vahid Dastjerdi and Rajkumar Buyya [4] described SLA negotiation challenges in a cloud computing environment. This system also proposed time dependent negotiation which solves negotiation challenges. To increase the dependability of negotiation process, this system has included reliability assessment. Cloud providers can accommodate more requests and thus increase their profit by discriminating regarding the pattern of concession Ivan Marsa-Maestre, Miguel A. Lopez-Carmona and Mark Klein [5] presented a framework for characterization and generation of negotiation process. Considering both the structural properties of agent utility functions, and the complexity due to relationships between utility functions of the different agents, a set of metrics to measure high-level scenario parameters is provided. Then a framework is presented to generate scenarios in a parametric and reproducible way. The basis of generator is the aggregation of hyper volumes which is used to generate utility functions. Generator is also based on the use of shared hyper volumes and nonlinear regression which is used to generate negotiation scenarios. Bo An, Victor Lesser, David Irwin, Michael Zink [6] designed a system for dynamic resource allocation problem and implements a negotiation system. In negotiation model, multiple sellers and buyers are allowed to negotiate with each other concurrently. At the same time an agent is allowed to de-commit from an agreement at the cost of paying a penalty. This system also presents negotiation strategies for both seller and buyer. Moustapha Tahir Ateib [7] has presented a fuzzy logic based negotiation modeling that can be used to overcome the complexity of automation negotiation processes. This system uses fuzzy logic to deal with ambiguity and uncertainties. Yan Kong, Minjie Zhang [8] proposed a negotiation-based method which is used for task allocation under time constraints in an open, dynamic grid environment. In this environment, both consumers and provider agents can enter into or , exit the environment freely at any time. There is no central controller so that agents are negotiating with each other for task allocation based only on local views. Hsin Rau, Chao-Wen Chen, and Wei-Jung Shiang [9] developed a negotiation model which is used for a supply chain with one supplier and one buyer. This model is useful to achieve coordination under incomplete information environment. To find an optimal solution, an objective programming approach is applied. Liu Xiaowen, Yu Jin [10] introduced automated negotiation model for tourism industry. To improve the negotiation efficiency and success rate, this system proposed RBR and CBR. The model employs CBR method to support an automated negotiation by past successful negotiation cases used for those negotiation partners that have no contract rule existing in each other. Mukhopadhyay et. al. recently proposed related solutions in negotiation over the Internet for efficient E-Commerce and negotiation prediction. [11] [12] 4 Proposed System 4.1 Scope of the System Due to cloud computing, negotiation system will be secured, user can access it any time on any device like desktop, mobile etc. and organization maintenance cost is also reduced. Further we can use features like rule based reasoning and case based reasoning [10]. These two features improve the efficiency and success rate of the negotiation process. 4.2 Purpose The objective of this system is to reduce maintenance cost of organizing data and provide security for data and negotiation process. So, it makes automated negotiation faster, flexible, secure and reliable. 4.3 Problem Definition In order to make some agreeable decision, two or more parties come together during the negotiation process. And there are organizations to maintain data of negotiation process and product data. But this maintenance is a very tedious job. In order to overcome this problem, all organizations’ product data is stored on cloud. Hence, security and maintenance cost of organizations’ data is reduced. 5 Proposed System Architecture In agent based negotiation system, agents are the negotiator. The negotiation process is done by agents through cloud. Cloud is used to store all product details and agents information. Further we go on case based reasoning and rule based reasoning, we will add two more databases in this system. Fig. 1. System Architecture of Agent Based System If sometimes buyer has time for doing negotiation process but at the same time seller is busy in his/her work. In this situation buyer has to wait until seller is free. For this reason we can use agent based system. In this system, firstly, agents are register ed on the cloud. All information related to agents (such as agent name, experience etc.) is stored on cloud database. Cloud database also has product details (for example product of company, price, features of product etc).Seller and Buyer of product selects agent using cloud database for negotiation . Agents have all requirement and details of seller and buyer respectively. Using these requirements agents negotiate. After completing negotiation, respective agents will give feedback to the seller and buyer through cloud. For this system, we can use Amazon Simple Storage Service (Amazon S3). Amazon S3 is used as huge storage area for the internet. It is designed to make easy development of web-scale computing. Amazon S3 offers a simple web services interface which can be used to store, access and retrieve any amount of data at any time. On Amazon S3, user can write, read, and delete objects containing from 1 byte to 5 terabytes of data each. User can store unlimited number of objects. 5.1 System Components For this system, we can use three modules. Using these components, system becomes easy to use and works efficiently. 1. Store data on cloud and Agent registration: For storing data, we can use Amazon S3 service. It makes our system fast, secure and highly reliable. In this component, agent detail and product information is stored on cloud in proper format. Only authorized agent can access product details. Fig. 2. Flowchart of the System 2. Negotiation process: For negotiation process, seller and buyer select their agents respectively. After that they can give their requirement to agent in encrypted format that is to generate the hash code of that requirement and encrypt that hash code using agent's public key. Agent's public key is known to sellers and buyers. Buyer or Seller Requirements = E {H (m), Apk}. (1) Where, for generating hash function MD5 algorithm is used. Apk is agent's public key. We can use encryption for security purpose, in this process, we can use digital signature concept same as seller. Buyer can do same process for generating hash code of his requirement. After getting requirement, agent decrypts the hash code using his private key. And calculate s the hash code for checking whether this message comes from appropriate seller or buyer and whether it is modified or not. Agent Receive Requirements = D {H (m), Apri}. (2) Where, Apri is agent's private key. When an agent confirms that this message comes from appropriate seller or buyer and message is not modified, then negotiation process will be start. For negotiation process, we can use The Bilateral Negotiation Model presented by Moustapha Tahir Ateib [7]. Let x (x €{x1, x2,…,xm})represents the buyer agent and y(y€{y 1,y2,…,yn}) be the supplier agent. And let then i (i€{i1,i2,…,in}) be the issues under negotiation, such as price, volume, duration, quality and so on. Each agent assigns to each issue i, weight Wi denoting the relative importance of that x represents the importance of issue i to agent x, issue to the agent. Hence, Wi therefore the overall utility function of an offer O is: . (3) Where U(O) is the overall utility for the offer O (=[O_1,...,Om] T) and ui(xi) is the individual utility function for issue i for ui € [0,1]$ and the preference degree of an agent to an issue i is denoted as Wi € [0,9]. Each agent also specifies a minimum acceptable utility level to determine if an offer is acceptable. Hence, for benefit-oriented, the utility function U i(xi) is computed as follows : For cost oriented however, the utility function can be written as: (4) (5) 3. Feedback: When negotiation process is finished, agent gives feedback to his appropriate seller or buyer about negotiation whether it is successful or not. Then the actual E-commerce part would start which is not part of our current research. 6 Conclusion Cloud computing provides various features such as security, scalability, reliability and low maintenance which are beneficial to negotiation process in E-Commerce. In this paper, we propose an agent based negotiation system, in which the agent uses cloud for storage of data and product information . Agents negotiate on some issues using the product information and seller’s or buyer’s requirement. After completing negotiation process, agents give feedback to user about whether the negotiation is successful or not. This negotiation system is dynam ic, if number of users is increased, then number of agents also increases automatically. Our future work is to make a faster, secure and flexible E-negotiation agent using rule based reasoning and case based reasoning [10]. References 1. Li Pan. Towards A Framework For Automated Service Negotiation In Cloud Computing. 61284-204-2/11 IEEE (2011) 2. Miguel A. Lopez-Carmona, Ivan Marsa-Maestre and Mark Klein. Consensus Policy Based Multi-Agent Negotiation. ANAC (2011) 3. Mikoto Okumura, Katsuhide Fujita. Implementation of Collective Collaboration Support System based on Automated Multi-Agent Negotiation. ANAC (2011) 4. Amir Vahid Dastjerdi and Rajkumar Buyya. An Autonomous Reliability -aware Negotiation Strategy for Cloud Computing Environments. 978-0-7695-4691-9/12 IEEE (2012) 5. Ivan Marsa-Maestre, Miguel A. Lopez-Carmona and Mark Klein. A Scenario Generation Framework for Consistent Comparison of Negotiation Approaches. ANAC (2011) 6. Bo An, Victor Lesser, David Irwin, Michael Zink. Automated Negotiation with Decommitment for Dynamic Resource Allocation in Cloud Computing. Proc. of 9th Int. Conf. on Autonomous Agents and Multiagent Systems AAMAS( 2010) 7. Moustapha Tahir Ateib. Agent Based Negotiation In E-commerce.978-1-4244-6716-7/101 IEEE (2010) 8. Yan Kong, Minjie Zhang, Xudong Luo, Dayong Ye. A Negotiation Method for Task Allocation with Time Constraints in Open Grid Environments. ANAC (2013) 9. Hsin Rau, Chao-Wen Chen, and Wei-Jung Shiang. Development of an Agent-based Negotiation Model for Buyer-supplier Relationship with Multiple Deliveries. 978-1-4244- 3492-3/09 IEEE(2009) 10. Liu Xiaowen, Yu Jin. Hybrid Approach Using RBR and CBR to Design an Automated Negotiation Model for Tourism Companies. 978-0-7695-4853-1/12 IEEE (2012) 11. Saurabh Deochake, Shashank Kanth, Subhadip Chakraborty, Suresh Sarode, Vidyasagar Potdar Debajyoti Mukhopadhyay. HENRI: High Efficiency Negotiation -based Robust Interface for Multi-party Multi-issue Negotiation over the Internet; ACM Digital Library, USA; pp.647-652; ISBN 978-1-4503-1185-4. (2012) 12. Debajyoti Mukhopadhyay, Sheetal Vij, and Suyog Tasare. NAAS: Negotiation Automation Architecture with Buyer’s Behavior Pattern Prediction Component; Springer-Verlag, Germany; pp.425-434; ISSN 1867-5662, ISBN 978-3-642-31513-8. (2012) 13. Xianrong Zheng, Patrick Martin, Wendy Powley, Kathryn Brohman. Applying Bargaining Game Theory to Web Services Negotiation. IEEE International Conference on Services Computing (2010)
1711.03966
1
1711
2017-11-10T11:44:23
Multi-agent based IoT smart waste monitoring and collection architecture
[ "cs.MA" ]
Solid waste management is one of the existing challenges in urban areas and it is becoming a critical issue due to rapid increase in population. Appropriate solid waste management systems are important for improving the environment and the well being of residents. In this paper, an Internet of Things (IoT) architecture for real time waste monitoring and collection has been proposed; able to improve and optimize solid waste collection in a city. Netlogo Multiagent platform has been used to simulate real time monitoring and smart decisions on waste management. Waste filling level in bins and truck collection process are abstracted to a multiagent model and citizen are involved by paying the price for waste collection services. Furthermore, waste level data are updated and recorded continuously and are provided to decision algorithms to determine the vehicle optimal route for waste collection to the distributed bins in the city. Several simulation cases executed and results validated. The presented solution gives substantial benefits to all waste stakeholders by enabling the waste collection process to be more efficient.
cs.MA
cs
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 MULTI-AGENT BASED IOT SMART WASTE MONITORING AND COLLECTION ARCHITECTURE Eunice David Likotiko, Devotha Nyambo, Joseph Mwangoka Information and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology (NM-AIST), Tanzania. ABSTRACT Solid waste management is one of the existing challenges in urban areas and it is becoming a critical issue due to rapid increase in population. Appropriate solid waste management systems are important for improving the environment and the well-being of residents. In this paper, an Internet of Things(IoT) architecture for real time waste monitoring and collection has been proposed; able to improve and optimize solid waste collection in a city. Netlogo Multi-agent platform has been used to simulate real time monitoring and smart decisions on waste management. Waste filling level in bins and truck collection process are abstracted to a multi-agent model and citizen are involved by paying the price for waste collection services. Furthermore, waste level data are updated and recorded continuously and are provided to decision algorithms to determine the vehicle optimal route for waste collection to the distributed bins in the city. Several simulation cases executed and results validated. The presented solution gives substantial benefits to all waste stakeholders by enabling the waste collection process to be more efficient KEYWORDS Solid Waste Management, Multiagent Simulation, IoT, WSN, Real Time Monitoring, Waste Collection 1. INTRODUCTION The amount of waste generated in urban areas is proportional to the rapid growth of cities. The increase of human activities and consumption patterns generate various types of waste that must be appropriately managed to ensure sustainable development and a decent standard of living for all urban residents. Managing Urban solid waste is complex especially to most of the resourced constrained regions. Conventional approach to Municipal Solid Waste Management (MSWM) suffers from lack of sustainable collection throughput [1], lack of data on collection time and location, lack of efficient monitoring systems of waste bin status, lack of efficient systems for waste collection and transportation, and delays in collection. Creativity of having reliable approach on solid waste management is needed, starting from the existing strengths of the city and build up on them with good involvement of all stakeholders in designing their own local models [2]. The use of technology can be adopted to improve the quality of waste data collection, the service availability and reliability in a city thus, building smart cities' world in the aspects of waste management. DOI : 10.5121/ijcseit.2017.7501 1 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 According to [3]"A Smart City is a city well performing in a forward-looking way in the following fundamental components (i.e., Smart Economy, Smart Mobility, Smart Environment, Smart People, Smart Living, and Smart Governance), built on the 'smart' combination of endowments and activities of self-decisive, independent and aware citizens". Therefore, smart city process for waste collection is a fundamental point in achieving green city environment and well-being of the citizen and its quality should be considered seriously. smart home applications are of trending. In this scenario, the application of Information and Communications Technologies (ICT) solutions through Internet of Things(IoT) is of interest.[3]and[4]defined IoT as: The Internet of Things allows people and things to be connected anytime, anywhere (AAA), with anything and anyone, ideally using any path/network and any service. The IoT concept enables easy access and interaction with a wide variety of devices such as, home appliances, surveillance cameras, monitoring sensors, actuators, displays, vehicles, and so on[5]. The idea of internet of things (IoT) was developed in parallel to Wireless sensor networks (WSNs). WSNs as an important aspect in IoT, changes and advances environmental monitoring scenarios and increasingly being adopted in different application[6]for instance, waste collection and monitoring activities. The real timewaste monitoring is now possible from the IoT enabled bins which can sense the status of waste level in a bin and update the status to the central server through the connections. In addition, citizens are now given a room to fully participate in the process of waste management, as a way to build a smart city in the aspect of smart waste management. Multi-agent based models presents tools and methods to visualize and abstract a given system. Multi-agent system (MAS) "is a set of software agents that interact to solve problems that are beyond the individual capacities or knowledge of each individual agent"[7].Many researches have been done using the agents in providing simulated solutions for different smart city scenarios, for instance intelligent waste collection[8], and generic model for smart city[9]. In this paper, a Multiagent based simulation model is used to simulate the functioning of the IoT and smart city in a waste management scenario. The aim of this work is to abstract real time solid waste monitoring and collections using multi- agent based model, to design architectural models for real time solid waste's bin monitoring and collection based on wireless sensor network (WSN) technology. WSN can be useful in smart waste management, to overcome the challenges on MSWM, providing optimal path for waste collection resulting into reduced operational costs. Furthermore, this paper highlights the importance of information flow between the authorities and waste collection points with a target of increasing collection throughput, optimize routes and continuously maintaining statistical records of the amount of waste collected, which are necessary for the sustainability of the operations. The remaining part of this paper has been divided into six sections: Related work, Methodology used with the study requirement analysis and Designs, Simulation set up, Results Discussion, Conclusion Future work and Acknowledgment. 2. RELATED WORK Several efforts have been invested in tackling the problem of Municipal Solid Waste Management (MSWM). Most of the initiatives use wireless communication technologies as one 2 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 of the solution in reducing amount of time and cost for waste collection and transportation and making smart waste management. A real time intelligent bin status monitoring and rule based decision algorithms[1] is among the invested efforts toward smart solid waste management. The monitoring application is based on decision algorithms for sensing solid waste data via a wireless sensor network. The system is built on a three-level architecture; smart bin, gateway and control station. The elementary concept is that, smart bins collect their status when any changes occur and transmit the status data to a server via an intermediate coordinator. A set of applications in server presents the updated bin status on real time. The strength of the system is the design and development of an automated bin status monitoring system that exercises a set of novel rules based decision algorithms. However, the system encounters technical challenges technical such as long range communication technologies on gateways, erroneous output of data from sensors readings, and lack of GPS for location detection, citizen involvement in the system for better interactions which is proposed by this paper. Automation and integrated system by[10]performed 55 tests run on the developed prototype. The authors provide the unique effort on waste monitoring by incorporating accelerometer, magnetic proximity, ultrasonic, weight sensing and long lived rechargeable battery respectively. The integrated sensing system is designed using rule-based decision procedure to offer a proficient and automatic bin status monitoring system. However, the designed system does not support the use of the obtained waste data for route optimization and how the citizen as the major waste stakeholders will play their role in making sure the smart waste management is achieved. Similarly,[11]used an open-source project Smart-M3 Platform which has smart-space for virtualization of the real environment used in simulating the real time waste collection. All components of the system; Proximity and Weight sensors, Raspberry PI, Xbee module were implemented using Python language and the ontology was developed using Protege. Authors argued that several simulation cases were run and a map of full and semi full bin was developed and the vehicle was sent to them. In additional a user android application integrated with the Google Map API was still to be a part of the implementation. Besides of the simulated tests the proposed approach didn't consider the development of the central system for users and their bins registration and authenticity also the graphical user interface for central system. Moreover, the system lacks the route decision making algorithm of vehicle for waste collection In [12]used RFID, cell load sensors technologies and Personal digital assistant (PDA) in the achievement of smart waste management. Authors detailed that RFID tag are embedded on the bin, the PDA (smart phone) consists of a reader which converts the radio waves reflected from the waste bin into digital information (i.e., bin ID) that is then recorded in a PDA, the bin is located on the waste collecting vehicle. The PDA-based RFID when robotic/lifting arms in the waste collector loaded onto the vehicle (truck), then the weighting system (e.g., SSC) measures the weight of each bin. The data (bin ID) is then used to calculate actual waste disposal charges for each individual household and sends it to the PDA for temporary storage after emptying each bin. In additional the security of components and customers information were considered, conversely the designed system lack prior planning waste collection scheduling route since bin is only detected when the vehicle is few meters away. On the other hand,[13]developed a wireless sensor network with three tier architecture the system was tested into three different bin samples, several sensors were involved temperature, humidity 3 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 and weight sensors, ZigBee, author contented that data from the sensor nodes are transmitted to the servers through GSM/GPRS. The control station with the database server continuously receive analyze the data and update the specific bin information, the developed web based programs run in the server to facilitate the management of data on the database and bin status monitoring purpose, also the user can monitor the bin status using a web browser. Minimum energy consumption less operation cost by avoiding GPRS in every bin were also thought out, but ignoring the part for citizen participation. Moreover, Optimal routing for efficient municipal solid waste transportation involving Geographical information system "ArcGIS" and Dijkstra algorithm for solving shortest path problem was done by [14].Authors were able to reduce the waste collection travelled distance by 9.93% of the 13 identified and selected wards,despite of the optimal route achievement also the time and cost was reduced. However, the authors didn't expound on how all type of waste stakeholders will be involved and the real time routing basis but authorities could use the solution to reduce cost and improve management. In addition,[8]proposed a model for multi agent simulation and GIS to abstract intelligent decision support for waste management. GIS maps representing domains are abstracted to 2D lattices in order to couple with the multi agent system. Waste bins are represented as points, and actual distances are converted to appropriate units, agent follows a route on the 2D lattice, collects waste bins up to the specified time and capacity limit. Yet the simulated design didn't not focus on wireless sensor network for real time waste status detection before the collection status, moreover author didn't reflect how the household found on the map are involved with the waste management. In general, this paper suggests the improvement for solid waste management by allowing citizens as major stakeholder of waste management to be involved during the operation. Real time monitoring and continuous reporting of waste status for wellbeing of the environment together with the prior planning for waste collection scheduling. Table 1: Summary of related work with their advantages and limitations s/n Related Citizen Real Time Scheduling Literature Involvement Monitoring and 1. 2. 3. 4. 5. 6. 7. [1] [10] [11] [12] [15] [8] [14] NOT NOT NOT YES NOT NOT NOT YES YES YES NOT YES NOT NOT optimization YES NOT NOT NOT YES NOT YES 4 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 3. METHODOLOGY 3.1 Requirement Analysis This work used the following software to model and simulate the real time waste collection, monitoring and generation of optimal paths for waste collections vehicles: Netlogo is an open source software, and a programmable modeling environment for simulating natural and social phenomena [16]. Netlogo 5.3.1 Multiagent Platform has been used to model and simulate the real time waste collection and generation of the optimal paths for collection. While UML diagrams were designed by using Microsoft Visio 2016 see decision logic Fig.4 and Fig.5, the general proposed architecture Fig.1 and central system architecture Fig. 2. 3.2 Functional Requirements The Functional requirements of the simulated multiagent based model are highlighted as follows; 1. Waste level in a bin shall be generated per simulation tick in minutes 2. Individual bin waste levels shall continuously be updated and recorded 3. Citizen shall pay the cost per waste unit to be collected 4. The truck shall follow the generated optimal path for waste collection 5. Bin and truck shall have the maximum capacity for carrying waste load while keeping the nonfunctional performance of the simulated model to have appropriate response time, and effective throughput during the waste collection. 3.3 System Design The design of the model for smart waste monitoring system has been split up into two sections which are conceptual designs and decision logic design. The sections of the designs are described in detail as follows. 3.3.1. Conceptual Design i) General architecture: The conceptual design gives an overview of the proposed general architectural implementation and the overview of the proposed central system architecture. As shown in Fig. 1, the general architecture reveals three actors; the citizen, system administrator and truck driver. The citizen buys smart bin from the company and registers it into the central system. The bin is located at the citizen intended place (home, church, mosque, hospital, school etc.). The citizen can access information and pay for waste collection through the web. The cover of the bin will be embedded with the integrated circuit board for continuous and real time waste monitoring purposes. The Arduino Wi-Fi Shield with GSM/GPRS connection is used as the gateway for transmitting waste status data into the central system database. The administrator manages citizens registration and payment information; also browses and retrieves the processed information for waste collection and transportation then assigns the optimal route to the trucks drivers. 5 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 Figure 1. General architectural implementation ii) Central system architecture: Fig.2 shows the central system, which is composed of three tier architectures: upper, middle and lower tiers. The upper tier comprises of a central database allied with the optimization model; the middle tier contains the gateway; and the lower tier consists of the sensor nodes. The central system receives updates, and stores the waste status via the gateways from different citizen's location after establishing connection with the server. Data are analyzed and optimal path for waste collection is established via the linked optimization model. The user graphical interface is provided with role based restrictions for both administrator and citizen from the central system. Figure 2.Smart bin and Central systems architecture. 6 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 3.3.2. Decision Logic The activity diagrams Fig.3 and Fig.4 describes the building blocks and logical decision involved from bin status recording to waste bin emptying. The diagrams provide an impression on how the multi-agent model will achieve real time monitoring and collection of solid waste. Activity diagrams consist of activities, states and transitions between activities and states [17]. These are essentially flowcharts that can be used to model dynamic aspect of a system. Simulation decision logic flow charts describe the working principles of the proposed architectures in Fig.1 and Fig.2 for IoT and WSN smart waste management embracing the principles of Multi-agent based models. Figure 3.Bin monitoring decision logic Figure 4. waste collection decision logic 7 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 4. SIMULATION SETUP The Multiagent model for real time waste monitoring and collection define three main agents(turtles breed) bin, truck and citizen with their attributes and procedures, the patches form the world of a city where, smart bins were randomly placed,smart bins data extracted into .cvs format from the Netlogo system. Agent Bin The Agent bin has capacity parameter with the maximum level of 25 waste units. In this simulation 25 bins are distributed in a city following the decisions rule defined in Fig.3. Initially, all bins are green and the level of the [bin_load = 0]. The levels are increased per 1 tick when simulation time starts [bin_load = bin_load + 1], when the [bin_load>=10] the color of the agent bin changes to yellow as the first alert, again when the level [bin_load>=25] it is assumed to be the maximum capacity of the bin no more level to be added so the agent [stop] color changes to red, the levels of the bin load are reported continuously and can be exported for analysis. The simulation model's monitor provides total number of distributed bins and when they are full the number of [full_Bins uncollected] is reported, the [full_Binsuncollected] shoulddecrease each time a truck is assigned into that path for collection, else the delay in collation is observed Fig.10. Agent Truck The agent truck follows the optimal path for waste collection to the full bins ([bin_load>=25] and color set red]). The truck is simulated with the maximum capacity of [truck_load>=100] waste units, the unloaded bins by a truck returns to green and level becomes zeroas shown in Fig.4. When [truck_load>=100] is emptied into a dump and the truck load return to zero. To reduce the delay in collections number of trucks can be added. Cost per trip can be calculated by identifying the distance between points of collections together with the defined fixed cost for the operations i.e. fuel, wages and the load carried by the truck. Although for the simulation purposes this cost is constant (1). Agent Citizen A citizen is another agent defined in the model in which, movement of the citizen portrays their activities which produce waste in a city. The citizen is involved in the simulated system by paying the price per unit waste they produce and collected from their own installed bins. Thus, total revenue for waste collection operation is given by: (cid:1)(cid:2) = (cid:4)(cid:2) ∗ (cid:6) (i) Where R is the Revenue, Ni is the weight of the full bin collected, and p is the price per unit weight of waste in units of currency (UC). 5. WASTE COLLECTION ROUTE OPTIMIZATION In order to reduce the operational cost for waste collections, route optimization is also considered in this work. The route optimization is achieved by using Dijkstra's algorithm[18]of the Netlogo Thus, for the set of vertices Q [B, C, D, E……T] inFig.5 the algorithm identifies the vertices (place or nodes) to be visited. The edges link the start and end of vertices and the shortest path can be drawn. 8 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 Figure 5. Set of vertices and edges linked by Dijkstra's algorithm. 6. RESULTS AND DISCUSSION The implementation of Multi-agent model for real time waste monitoring and optimal route for waste collection using the Netlogo platform was verified by running several simulation cases at different simulations time T in minutes. Initially the model presents 25 bins located randomly in a city, with the initial state of [bin_load=0] and color = green. The monitors provide the number of located bins and show no number of full_bins. Parameters of bins, trucks and cost per waste unit to be paid by the citizen are also shown in Fig.6. Simulation time T1 = 0 minutes Figure 6. Initial setup for real time waste monitoring multiagent model. 9 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 The Go button run the simulation and bin levels increased per 1 tick, the bins with [bin_load>=10] set color to yellow meaning an alert that the bin is nearly to be full. The full bins are red in color [bin_load>=25]. At simulation time T2 = 53 minutes, 8 out of 25 distributed bins were full, bin number 1, 5, 6, 10,18,19,20 and 24 see Fig.7 which, also reports the continuous recording of different waste level foreach number of bin per tick, the optimal path for waste collection by a truck was obtained Fig. 8to the bins which were full. Fig.8 also shows the change in color for the different waste level inside a bin, and truck optimal path for waste collections. From this simulation case, total revenue of 100,000UCs expected to be obtained by trucks for the collection operations to all 8 full bins if 500UCsbe an assumed amount for cost per unit waste, paid by the citizen for waste collection services: RT=∑ (cid:4)(cid:9) ∗ (cid:6) (cid:10) (cid:2) (ii) Where RT is the total revenue, Niis the weight of the ith bin, p is the price per unit weight of waste. Figure 7. Bins with different waste levels at time T = 53 minutes. At simulation time T = 93 minutes the continuous recording of different waste level for each number ofbin per tick is shown in Fig. 9. Number of uncollected waste increased to 12, new 8 full bins and other 4 which had delay in collection since T =53 minutes. The identification of vertices in the grid position for 4 bins which shown the delay in collection was done Fig.10. The obtained new optimal path included the four vertices which were uncollected from the first simulation time, vertices set for full bins with collection delay was given as; [(D [9,9], L[(-4.5, 0)], M[(0, 0)],O[(9,0)] 10 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 Figure 8. Color change for different bin's waste level and Truck optimal path for waste collection to 8 full bins Figure 9. Bins with different waste levels at time T = 93 minutes 11 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 Figure 10. Identified vertices which had delay in collection and truck optimal path 7. CONCLUSION AND FUTURE WORK In this paper, we have presented an overview of the proposed architectures and simulation of our on-going work towards smart solid waste management using multiagent based modeling approach. Real time and continuous reporting of waste level status from the bins ensures the clean and green environment and wellbeing of the citizen in a city. The use of WSN Technology assures efficiency of the MSW operations, despite of having technical challenges such as internet connectivity, security of components, power supply and error readings from the sensors, are to be overcome before the actual implementation. Further work would consider full development of the WSN for real time waste monitoring and collection. Real Geographical Information System (GIS) map of the case study area will be used to identify nodes for the located smart bins. The distance from one node to another will be used to calculate cost per trip by a truck. The profit or loss of the operation will be achieved by the deduction from the collected revenues. In additional optimal path for waste collection will be achieved using the developed mathematical model for route optimization which is appropriate for supporting decision making on municipal solid waste management. ACKNOWLEDGMENT The author would like to thank Ms. DevothaNyambo and Dr. Joseph Mwangoka of Department of Information Communication Science and Engineering at The Nelson Mandela African Institution of Science and Technology for the great supervision and technical guidance, and the German Academic Exchange Service (DAAD) for study fund support provided. 12 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 REFERENCES [1] M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, "Theoretical model and implementation of a real time intelligent bin status monitoring system using rule based decision algorithms," Expert Syst. Appl., vol. 48, pp. 76–88, 2016. [2] D. C. Wilson, L. Rodic, A. Scheinberg, C. A. Velis, and G. Alabaster, "Comparative analysis of solid waste management in 20 cities," Waste Manag. Res., vol. 30, no. 3, pp. 237–254, 2012. [3] S. Balandin, S. Andreev, and Y. Koucheryavy, Internet of Things, Smart Spaces, and Next Generation Networks and Systems, vol. 9247, no. June. Cham: Springer International Publishing, 2015. [4] S. Kumar, "Ubiquitous Smart Home System Using Android Application," Int. J. Comput. Networks Commun., vol. 6, no. 1, pp. 33–43, 2014. [5] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, 2014. [6] A. Mesmoudi, M. Feham, and N. Labraoui, "Wireless Sensor Networks Localization Algorithms: A Comprehensive Survey," Int. J. Comput. Networks Commun., vol. 5, no. 6, pp. 45–64, 2013. [7] K. Potiron, A. El Fallah Seghrouchni, and P. Taillibert, From Fault Classification to Fault Tolerance for Multi-Agent Systems. London: Springer London, 2013. [8] N. V. Karadimas, G. Rigopoulos, and N. Bardis, "Coupling multiagent simulation and GIS - An application in waste management," in WSEAS Transactions on Systems, 2006, vol. 5, no. 10, pp. 2367–2371. [9] M. Longo, M. Roscia, and G. C. Lazaroiu, "Innovating Multi-agent Systems Applied to Smart City," Res. J. Appl. Sci. Eng. Technol., vol. 7, no. 20, pp. 4296–4302, 2014. [10] M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, "Integrated sensing systems and algorithms for solid waste bin state management automation," IEEE Sens. J., vol. 15, no. 1, pp. 561– 567, 2015. [11] V. Catania and D. Ventura, "An Approch for Monitoring and Smart Planning of Urban Solid Waste Management Using Smart-M3 Platform," in Proceedings of 15th Conference of Open Innovations Association FRUCT, 2014, pp. 24–31. [12] B. Chowdhury and M. U. Chowdhury, "RFID-based real-time smart waste management system," in 2007 Australasian Telecommunication Networks and Applications Conference, 2007, pp. 175–180. [13] M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, "Wireless Sensor Network Prototype for Solid Waste Bin Monitoring with Energy Efficient Sensing Algorithm," in 2013 IEEE 16th International Conference on Computational Science and Engineering, 2013, pp. 382–387. [14] V. Sanjeevi and P. Shahabudeen, "Optimal routing for efficient municipal solid waste transportation by using ArcGIS application in Chennai, India.," Waste Manag. Res., vol. 34, no. 1, pp. 11–21, 2016. [15] M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, "Wireless sensor network prototype for solid waste bin monitoring with energy efficient sensing algorithm," Proc. - 16th IEEE Int. Conf. Comput. Sci. Eng. CSE 2013, pp. 382–387, 2013. 13 International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.7, No.5, October 2017 [16] F. Tancini et al., "1,1-Dicyano-4-[4-(diethylamino)phenyl]buta-1,3-dienes: Structure-Property Relationships," European J. Org. Chem., vol. 2012, no. 14, pp. 2756–2765, May 2012. is currently a master's student [17] H. Gomaa, "Activity Diagrams," Softw. Model. Des., pp. 89–92, 2011. [18] E. Millinocket and M. Dodge, "13 13.1 Shortest Paths," Algorithms, pp. 1–11, 2000. AUTHORS Eunice D. Likotiko in Information and Communication Science and Engineering at The Nelson Mandela African Institution of Science and Technology (NM-AIST)specializing in Information Technology and System Development, also employed as Tutorial assistant at Ardhi University in the Department of Computer Systems and Mathematics. She received BSc. (Hons) degree in Information Systems Management at Ardhi University in November 2012. Her interest includes, Modelling and Simulations, Internet of Things, smart and embeded systems development. Devotha Nyambo is a PhD candidate at the Nelson Mandela African Institution of Science and Technology Information and Communication Science and Engineering. She is a prestigious fellow of the African Women in Agricultural Research and Development (AWARD) through which she has been trained in scientific skills, leadership and mentorship. Devotha's research focus is on livestock informatics. Currently, she is using Multi-Agents Research and Simulation to understand evolvement of smallholder dairy farmers. She has developed strong capabilities in paperless data collection (tools development, database designs, data management, and field work), Data analysis (descriptive statistics and modeling) and e-documents design and development for business collaboration Dr. Joseph W. Mwangoka, is Lecturer at School of Computational and Communication Science and Engineering, at The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania. E- mail: [email protected] (NM-AIST), specializing in 14
1706.08046
1
1706
2017-06-25T07:35:00
An Algorithm for Supervised Driving of Cooperative Semi-Autonomous Vehicles (Extended)
[ "cs.MA", "cs.RO" ]
Before reaching full autonomy, vehicles will gradually be equipped with more and more advanced driver assistance systems (ADAS), effectively rendering them semi-autonomous. However, current ADAS technologies seem unable to handle complex traffic situations, notably when dealing with vehicles arriving from the sides, either at intersections or when merging on highways. The high rate of accidents in these settings prove that they constitute difficult driving situations. Moreover, intersections and merging lanes are often the source of important traffic congestion and, sometimes, deadlocks. In this article, we propose a cooperative framework to safely coordinate semi-autonomous vehicles in such settings, removing the risk of collision or deadlocks while remaining compatible with human driving. More specifically, we present a supervised coordination scheme that overrides control inputs from human drivers when they would result in an unsafe or blocked situation. To avoid unnecessary intervention and remain compatible with human driving, overriding only occurs when collisions or deadlocks are imminent. In this case, safe overriding controls are chosen while ensuring they deviate minimally from those originally requested by the drivers. Simulation results based on a realistic physics simulator show that our approach is scalable to real-world scenarios, and computations can be performed in real-time on a standard computer for up to a dozen simultaneous vehicles.
cs.MA
cs
An Algorithm for Supervised Driving of Cooperative Semi-Autonomous Vehicles (Extended) Florent Altch´e, Xiangjun Qian, and Arnaud de La Fortelle, 1 7 1 0 2 n u J 5 2 ] A M . s c [ 1 v 6 4 0 8 0 . 6 0 7 1 : v i X r a Abstract-Before reaching full autonomy, vehicles will gradu- ally be equipped with more and more advanced driver assistance systems (ADAS), effectively rendering them semi-autonomous. However, current ADAS technologies seem unable to handle complex traffic situations, notably when dealing with vehicles arriving from the sides, either at intersections or when merging on highways. The high rate of accidents in these settings prove that they constitute difficult driving situations. Moreover, intersections and merging lanes are often the source of important traffic congestion and, sometimes, deadlocks. In this article, we propose a cooperative framework to safely coordinate semi- autonomous vehicles in such settings, removing the risk of collision or deadlocks while remaining compatible with human driving. More specifically, we present a supervised coordination scheme that overrides control inputs from human drivers when they would result in an unsafe or blocked situation. To avoid unnecessary intervention and remain compatible with human driving, overriding only occurs when collisions or deadlocks are imminent. In this case, safe overriding controls are chosen while ensuring they deviate minimally from those originally requested by the drivers. Simulation results based on a realistic physics simulator show that our approach is scalable to real-world scenarios, and computations can be performed in real-time on a standard computer for up to a dozen simultaneous vehicles. Index Terms-Semi-autonomous driving, safety, supervisor, supervised driving. I. INTRODUCTION A DVANCED driver assistance systems (ADAS) are be- coming increasingly complex as they spread across the automotive market. Although adaptive cruise control (ACC) [1] and automated emergency braking (AEB) [2] are the best-known examples of such systems, applications of ADAS have been broadened and now include pedestrian [3], traffic light [4] or obstacle detection [5] as well as lane keeping assistance [6]. The development of this new equipment allows drivers to delegate part of the driving task to their vehicles. As these systems keep getting more efficient and able to handle more complex situations, vehicles will gradually progress towards semi-autonomous driving, where drivers remain in charge of their own safety, while their errors can be seamlessly corrected to prevent potential accidents. One of the challenges of semi-autonomous driving lies in efficiently handling vehicles on conflicting paths, for instance at an intersection or a highway entry lane. Traffic rules such as priority to the right can help determine whether to pass before F. Altch´e, X. Qian and A. de La Fortelle are with MINES ParisTech, PSL Research University, Centre for robotics, 60 Bd St Michel 75006 Paris, France (e-mail: [email protected].) F. Altch´e is also with ´Ecole des Ponts ParisTech, Cit´e Descartes, 6-8 Av Blaise Pascal, 77455 Champs-sur-Marne, France. or after another vehicle; however, many situations require driving experience to be handled efficiently. Learning-based approaches may eventually prove able to transfer driving ex- perience to a computer, but such knowledge is very hard to im- plement in a safety system. In this article, we consider another possible solution, consisting in using vehicle-to-vehicle or vehicle-to-infrastructure communication for cooperative semi- autonomous driving. In this setting, vehicles negotiate with one another, or receive instructions from a centralized computer, allowing them to drive safely and efficiently. In this article, we consider a method to ensure the safety of multiple semi-autonomous vehicles on conflicting paths, for instance crossing an intersection or entering a highway, while remaining compatible with the presence of human drivers. To this end, and inspired by earlier work in [7], [8], we propose a so-called Supervisor which monitors control inputs from each vehicle's driver, and is able to override these controls when they would result in an unsafe situation. More specifically, the role of the supervisor is twofold: first, knowing the current states of the vehicles, the supervisor should determine if the controls requested by the drivers would lead the vehicles into unsafe inevitable collision states [9]. In this case, the second task of the supervisor is to compute safe controls – maintaining the vehicles in safe states – which are as close as possible to those actually requested by the drivers. We say that such a control is minimally deviating. This paper provides two main contributions: from a prac- tical standpoint, we design and implement a mathematical framework allowing to simultaneously perform the safety verification of target control inputs, and the computation of minimally deviating safe controls if target inputs are unsafe. From a theoretical standpoint, we formally prove that verifying safety over a finite time horizon is enough to ensure infinite horizon safety, and we provide a sufficient condition on the verification horizon for this property to hold. Unlike previous work focusing on specific situations such as intersections [7], [8], our framework can be applied to a wide variety of driving scenarios including intersections, merging lanes and roundabouts. The rest of the article is structured as follows: in Section II, we provide a review of the related literature. In Section III, we present our modeling of semi-autonomous vehicles and introduce the Supervision problem of verifying the safety of drivers control inputs and finding a minimally deviating safe control if necessary. In Section IV, we present an infinite horizon formulation based on constraints programming to solve this problem. In Section V, we derive a finite horizon to the infinite formulation which we prove is equivalent horizon one. In Section VI, we use computer simulations to showcase the performance of the proposed supervisor in various driving situations. In Section VII, we present possible methods for real-world implementations of our approach. Finally, Section VIII concludes the study. II. RELATED WORK In the last decade, a lot of research has been focused on coordinating fully autonomous vehicles in challenging settings such as crossroads, roundabouts or merging lanes, with the ambition of improving both safety and traffic efficiency. Nau- mann et al. [10], followed by Dresner and Stone [11] have seemingly pioneered the work of adapting traffic intersections management methods to fully autonomous vehicles, designing so-called autonomous intersection management algorithms. They propose that each approaching autonomous vehicle re- serves a time interval to cross the intersection; collisions are prevented by ensuring that conflicting vehicles are assigned non-overlapping crossing times. Subsequent studies on this particular problem have led to other approaches. In [12], vehicles choose their control inputs based on navigation functions which include a collision avoidance term, allowing vehicles to react to maneuvers from other traffic participants. In [13], collision avoidance is ensured by assigning relative crossing orders to incoming vehicles; each vehicle then uses model predictive control to plan collision-free trajectories respecting these priorities. Other authors have considered different driving situations for autonomous vehicles, such as cooperative merging on a highway [14]–[16], or entering a roundabout [17]. By contrast, relatively little work has considered semi- autonomous driving assistance, possibly because the presence of human drivers brings a lot of additional complexity. The goal of a semi-autonomous driving assistant is to help the driver avoid collisions, either by notifying of a potential danger [18] or by taking over vehicle control in dangerous situations [19]–[21]. To be accepted by human drivers, such systems should be as unobtrusive as possible, and in particular should only intervene when necessary. Most of the currently existing literature on semi-autonomous driving mostly focuses on highway driving [19]–[21], which presents relatively low difficulty as vehicles trajectories remain mostly parallel. The aim of this article is to bring semi-autonomy one step fur- ther, to allow cooperative driving between semi-autonomous vehicles in more complex conflict situations. Some of these more complex problems have already been studied in the literature. In [22], the authors consider semi- autonomous driving at an intersection and propose that human drivers let an automated system control their vehicle while crossing said intersection. However, this scheme is rather intrusive as drivers completely relinquish control for a time, and handing back controls to a potentially distracted driver poses problems by itself. Colombo et al. [7], [8] introduced the idea of a supervisory instance (called supervisor) tasked with preventing the system of vehicles from entering undesirable states by overriding the controls of one or several vehicles. In this more human-friendly approach, overriding only occurs 2 when necessary, i.e. if an absence of intervention would result in a crash. The question of determining whether overriding is needed or not, called verification problem, is NP-hard [23]; under several simplifying assumptions, it is shown in [7] to be equivalent to a scheduling problem. In this reformulation, vehicles are each assigned a time slot during which they are allowed inside the intersection, and assigned slots are mutually disjoint. If, due to vehicle dynamics, no feasible schedule exists, the initial state is deemed unsafe. This allows the authors to design a so-called least restrictive supervisor, which verifies the safety of the desired inputs and overrides them if necessary. However, the proposed supervisor is only suitable to simple intersection geometries with a single conflict point. Moreover, no additional property is required from the safe controls used for overriding, which can widely deviate from the desired ones. Several variations have been proposed based on the equiva- lence demonstrated in [7]. Reference [24] designs a supervisor which is robust to bounded uncertainties by adding safety mar- gins. Reference [25] leverages job-shop scheduling to develop a supervisor that considers several possible conflict points inside the intersection; however, vehicle dynamics are only modeled as first-order integrators, which is not realistic in a real-world setting. Campos et al. [8] proposed a Pareto-optimal supervisor leading to a minimally deviating formulation by recursively finding the most constrained vehicle, reserving its optimal crossing time, and scheduling the crossing of the remaining vehicles using the previous schedule as constraints. This method allows to minimize the deviation between the overridden and desired controls, but may be computationally intensive. Indeed, one of the major difficulties of performing optimization in this context lies in the necessity to consider all the possible orderings of the vehicles. This problem is highly combinatorial; it has been shown that there exists up to 2n(n−1)/2 orderings for n vehicles [26]. Moreover, it is generally ignored by most authors studying motion planning problems, who either use simple heuristics such as first-come, first-served [11], [27] or rely on exhaustive search [8], [28]. A possible method to handle the combinatorial explosion is to use pruning techniques such as branch-and- bound, which avoid exploring branches of the decision tree that would provably yield suboptimal results. These methods are commonly used in mixed-integer linear (see, e.g., [29], [30] for applications to motion planning) or quadratic programming (see, e.g., [31]) problems, which combine continuous and discrete optimization. More general nonlinear methods have also been used in motion planning [32], [33], although their high computational difficulty generally requires linearization for effective resolution, as illustrated in [34]. To the best of the authors' knowledge, branch-and-bound methods have never been applied to semi-autonomous driving. This article significantly differs from references [7], [8], [25]. Instead of using a scheduling approach, we formulate the supervision problem as a Mixed Integer Quadratic Program- ming (MIQP) problem, which can handle various geometries with multiple collision points such as multi-lane intersections, merging lanes or roundabouts. Our formulation only requires to consider a small, finite planning horizon, while previous approaches [7], [8], [25] needed to schedule the crossing of all the considered vehicles. Furthermore, the MIQP formula- tion is highly flexible, allowing to take into account various constraints (e.g., maximal turning speed) and different cost functions. Finally, the resolution of MIQP can leverage highly- optimized solvers [35], allowing real-time implementations even for a relatively large number of vehicles. This article expands the results presented in the conference paper [36]; among the significant improvements made in this extension, we now give a more comprehensive model of our vision of semi-autonomous vehicles and adjust the modeling of the problem to handle bounded control errors. We provide a detailed discussion on how complex road geometries with multiply-intersecting paths can be handled, leading to a very versatile framework. Finally, we extend the theoretical results to continuous arrivals of vehicles, and provide possible ways for actual implementation as a roadside unit. III. SUPERVISION PROBLEM We consider the problem of safely coordinating multiple semi-autonomous vehicles on the road, in order to prevent collisions and deadlock situations where no vehicle is able to move forward. Since vehicles are human-driven, a form of outside supervision is necessary to prevent undesirable situations. This section presents our formulation of a so-called Supervision problem generalizing the work of Colombo et al. [7]; solving this problem yields a provably safe control, as close as possible to the original intentions of the drivers. A. Modeling 1) Supervision area: We consider an isolated portion of a road infrastructure used by semi-autonomous vehicles, where some form of coordination is required to ensure vehicles safety. For instance, this could be a classical road intersection, a roundabout or an entry or weaving lane on a highway. We call this bounded portion of infrastructure the supervision area and we assume that vehicles can travel safely outside of the collision area using only their ACC capacities. In a real-world setting, different critical portions of infrastructure which are far enough apart can be considered individually, but need to be treated jointly if traffic from one can influence another. Figure 1 shows examples of roads configurations and the corresponding possible choice for a supervision area. In this article, we present an embodiment of a Supervisor working over a spatially static supervision area over time, that can be thought of as a dedicated computer on the infrastructure or in the cloud. Vehicles are assumed to establish a connection to the supervisor when they enter the supervision area (using, for instance, V2I communication), and maintain it until they exit this region. We denote by Nt the set of vehicles currently inside the supervision area at a time t. semi- autonomous vehicles equipped with advanced driver assistance systems, many of which are already commercially available, and Vehicle to Infrastructure (V2I) communication capacities. In particular, vehicles are assumed to have advanced cruise control, automated braking and lane keeping assistance 2) Semi-autonomous vehicles: We consider 3 (a) Crossroads (b) Roundabout (c) Highway merging Fig. 1. Examples of considered road configurations, and corresponding supervision areas (interior of the dotted rectangles). systems such that accelerating, braking and steering can be actuated by an on-board computer. Moreover, we suppose that vehicles have access to reliable cartographic data and are capable of precisely measuring their current position, orientation and velocity with reference to a unique global frame, for instance using GNSS and inertial navigation. Since the vehicles are not assumed to have advanced environment-sensing capacities, for instance based on LIDAR data, they are not able to handle all situations and still require a human driver to safely navigate, for instance in the case of on-road obstacles or loss of GNSS signal. Moreover, lateral collisions or deadlock situations can happen due to human error, justifying the need for supervision. 3) Parametrization: In the remainder of this article, we only consider the two-dimensional kinematics and dynamics of the vehicles. We denote by Ei a bounding polygon for the shape of vehicle i ∈ Nt, and by ci the center of Ei. We assume that the geometry and lane markings of the roads inside the supervision area define a finite number of reference paths across this region, as exemplified in fig. 2. Due to the presence of a lane keeping assistance system, we assume that every vehicle is able to follow one of these reference paths with a small bounded lateral error. Noting γi the reference path of a vehicle i, we assume that the distance of ci from γi is bounded from above by ξi ≥ 0. Moreover, we assume that γi is at least C2-continuous, and that ξi is small enough to ensure, for all x ∈ R2, d(x, γi) ≤ ξi ⇒ ∃! y ∈ γi, x − y = d(x, γi). (1) This condition allows to use the curvilinear position of the point of γi closest to ci to uniquely encode the longitudinal position of vehicle i along γi. We denote by si this curvilinear position, with the convention that si = 0 when the front bumper of i first enters the supervision area and increases when i goes forward; we let sout be the longitudinal position at which the rear bumper of i fully exits the supervision area. i 4) Vehicle dynamics: In this article, we mostly focus on the longitudinal dynamics of the vehicles, and we let xi = (si, vi)T be the state of vehicle i, where si and vi are re- spectively its longitudinal position and longitudinal speed. We assume that vehicles follow second-order integrator dynamics with a bounded longitudinal error, and that the control input ui corresponds to the longitudinal acceleration as: 4 xi = Axi + Bui, 0 0 ) and B = ( 0 (2) where A = ( 0 1 1 ). Since we mostly consider situations with conflicting vehicles, we assume that human drivers maintain a relatively low speed (compared to the cur- vature of their path), which allows neglecting lateral dynamics and slip [37]. i∈Nt performance. At a given time t, we let Ut = (cid:81) To account for speed limitations on the vehicles, each vehicle i is supposed to have a bounded non-negative velocity, so that vi ∈ [0, vi] (with vi > 0) at all times. Moreover, we assume that the acceleration ui of each vehicle is bounded as ui ∈ [ui, ui], with ui < 0 < ui. These bounds can differ between vehicles, thus allowing heterogeneous vehicle [ui, ui] be the set of admissible accelerations for the vehicles of Nt. We denote bt boldface x = (xi)i∈Nt and u = (ui)i∈Nt the state and control for the system of vehicles. In what follows, we let vmax > 0 be a global upper bound for vi, ua > 0 a lower bound for ui and ub < 0 an upper bound for ui such that for all t ≥ tκ and all i ∈ Nt, vi ≤ vmax and ui ≤ ub < 0 < ua ≤ ui. Therefore, all vehicles are capable of braking with ub and accelerating with ua; finally, we let umax be a global upper bound for ui. 5) Collision regions: Finally, we assume that the angle between the orientation of vehicle i and the tangent to γi at its point closest to ci is also bounded. With these hypotheses, for any pair of vehicles (i, j), we can compute the bounded set Cij of curvilinear positions (si, sj) ⊂ [0, sout ] × [0, sout ] for which a collision could happen between i and j. Note that these sets are "inflated" to take into account the bounded control errors. We call Cij the collision region between i and j; fig. 2 shows examples of paths and corresponding computed collision regions for different driving situations. Note that collision regions can be empty or have one or multiple connected components. If Cij (cid:54)= ∅, we say that vehicles i and j are conflicting; when Cij has multiple connected components, we denote by Cp ij its p-th component, using the convention ij = Cp Cp ji. 6) No-stop regions: To prevent creating deadlock situa- tions, vehicles are not allowed to stop when doing so would (cid:1) block traffic in other directions. To this extent, we define a no-stop region (see fig. 3) Di for each vehicle i ∈ Nt as the ij for all t(cid:48) ≥ t, j ∈ Nt(cid:48) and all p such that (0, 0) /∈ Cp ij; in this formula, Πsi is the projection operator on the first coordinate. The no-stop region corresponds to the part of the supervision area where a vehicle may have to yield to another; if Cp ij contains (0, 0), then either i or j enters the supervision area behind the other, in which case the relative ordering of the vehicles is given and the Cp Note that, although this definition theoretically requires knowledge of all future vehicles, Di can be computed off-line as a finite intersection of intervals provided that there only exists a finite number of possible paths inside the supervision area. In what follows, we let vmin > 0 be a minimum allowed smallest interval Di = [s⊥i , s⊥i ] containing all min(cid:0)ΠsiCp ij does not count in Di. j i (a) Simple orthogonal intersection situation with example vehicle shapes (b) Roundabout situation with multiple connected components in Cij (c) Highway merging situation Fig. 2. Examples of paths (left) and corresponding collision regions (right) for vehicles with the polygonal shape shown in fig. 2a. Fig. 3. Illustration of the no-stop region Di and acceleration region Ai inside the supervision area (dotted rectangle). i i speed for any vehicle inside its no-stop region, and we assume that vmin ≤ vi for all vehicles. For a no-stop region Di, we define the corresponding accel- , s⊥i ] such that, if vehicle i is stopped eration region Ai = [sacc , it can reach a speed vmin before reaching s⊥i . More at sacc for all specifically, we require that 0 ≤ sacc i. Inside the acceleration region, vehicles are only allowed to accelerate; this condition prevents vehicles from stopping right before the entrance of the no-stop region, leaving them unable to proceed forward due to the minimum speed requirement. Figure 3 illustrates an example of the no-stop regions and the corresponding acceleration regions. i ≤ s⊥i − vmin 7) Time discretization: Drivers continuously change the control input of their vehicle; however, due to computational 2ua 2 γiγjCijsisjγiγjC1ijC2ijsisjγiγjCijsisjij1j2jn...Cij1Cij2CijnDiAi and communication constraints, it is impractical to handle functions of a continuous variable. In the remainder of this article, we choose a constant time step duration τ > 0, and we assume that all vehicles use piecewise-constant controls with step τ, typically 0.5 s. To simplify the formulation, we further assume that vehicles update their control simultaneously at times tκ = κτ for κ ∈ N, and we denote by Uτ (tκ) the set of piecewise-constant admissible controls for the vehicles of Ntκ. By definition, for all t ≥ tκ and all u ∈ Uτ (tκ), u(t) ∈ Utκ. B. Problem statement Before presenting the so-called supervision problem, we first define the safety criterion for the vehicles inside the supervision area at a given time. Definition 1 (Safe state). We say that the supervision area is in a safe state xκ at time tκ if there exists an admissible piecewise-constant control u ∈ Uτ (tκ) defined over [tκ, +∞[ such that, under this control and starting from xκ, for all t ≥ tκ and all i, j ∈ Ntκ, (si(t), sj(t)) /∈ Cij. Such a control is said to be a safe control. τ τ With this definition, the supervision area is in a safe state when all the vehicles inside this area can apply a dynamically admissible, infinite horizon control without a risk of collision. This safety condition corresponds to a contraposition of the notion of "inevitable collision state" proposed by Fraichard et (tκ) the set of al. [9]. In what follows, we denote by U saf e safe and dynamically admissible piecewise-constant controls for the vehicles in Ntκ; by definition, a control u ∈ U saf e (tκ) is a piecewise-constant function from [tκ, +∞[ to Utκ. We now define the safety condition for vehicles entering the supervision area. Definition 2 (Safe entry). Consider a safe state xκ at time tκ and let t1 > tκ be the first time at which a new vehicle enters the supervision area. We say that the vehicles of Nt1 \ Ntκ safely enter the supervision area with a margin τ if t1 ≥ tκ+τ, or if any safe control u ∈ U saf e • keeps the system of the vehicles of Nt1 safe at time tκ +τ • remains safe over [tκ, +∞[ for the vehicles of Ntκ, regardless of the control applied by the vehicles of Nt1 \ Ntκ over [t1, t1 + τ ]. (tκ): and τ This definition ensures that a safe control computed for the vehicles of Ntκ remains safe after new vehicles enter, i.e. the entry of new vehicles does not invalidate previously safe controls. Moreover, we assume that we can safely exclude vehicles departing the supervision area from the safety ver- ification problem, i.e. that drivers are able to safely follow the previously departed vehicles without supervision. We will show in Section IV-C that these hypotheses allow discrete-time supervision with continuous vehicle arrival. In the remainder of this article, we consider a centralized supervisor working in discrete time steps of duration τ, and we assume that new vehicles always enter safely with a margin τ. At the beginning of each time step κ, the supervisor receives an information about the desired longitudinal control of each 5 τ vehicle for the next time step, denoted by uκ i,des. The collection of these desired controls for the vehicles of Ntκ defines a des defined over [tκ, tκ + τ [. constant desired system control uκ This control may, or may not, lead the system of vehicles into an unsafe state. The supervisor is tasked with preventing the system from entering an unsafe state, by overriding the desired control if necessary. To remain compatible with human drivers, it is desirable that the supervisor has several properties, namely being least restrictive and minimally deviating. Letting τ,κ (tκ) be the restriction of the functions of U saf e (tκ) to U saf e [tκ, tκ +τ [, we define the least restrictive supervision problem: Definition 3 (Least restrictive supervision). Consider a safe state xκ at time tκ = κτ, a desired system control uκ des and assume that all new vehicles enter the supervision area safely with a margin τ. The least restrictive supervision problem (SP ) is that of finding a control uκ τ,κ (tκ) such that uκ τ,κ (tκ). des if uκ this definition corresponds to that of [7] in our generalized setting. Such a supervisor is least restrictive because overriding only occurs if the initially requested control would lead the vehicles in an unsafe state. However, it is also desirable that the control used for overriding is chosen close to the drivers' desired control. Extending the work in [8], we define the minimally deviating supervision problem as follows: Definition 4 (Minimally deviating supervision). Consider a safe state xκ at time tκ = κτ, a desired system control uκ des and assume that all new vehicles enter the supervision area safely with a margin τ. The minimally deviating supervision problem (SP ∗) is that of finding a constant control u∗κ such that: saf e ∈ U saf e des ∈ U saf e saf e = uκ Note that saf e u∗κ saf e = arg min u ∈ U saf e τ,κ (tκ)uκ − uκ des (3) where · is a norm defined over Utκ. Note that, from this definition, any solution to SP ∗ is a solution to SP . This concept of minimally deviating supervision follows a different fail-safety paradigm that could be found in, e.g., rail transportation where all trains in an area should perform an emergency braking when an incident occurs. The reasoning behind definition 4 is that, to improve efficiency without sacrificing safety, intervention is only performed on vehicles which are actually at risk, and does not necessarily result in a full stop. However, at individual vehicle level, the safe overriding control u∗κ saf e may differ greatly from the driver's input, e.g. braking instead of accelerating. IV. INFINITE HORIZON FORMULATION OF THE SUPERVISION PROBLEM In this section, we present an extension of the work in [36] allowing to reformulate the generalized minimally deviating supervision problem using mixed-integer quadratic program- ming (MIQP) in Section IV-A. As the supervisor works in discrete time steps of duration τ, we consider the beginning of a step κ, corresponding to a time tκ = κτ and formulate an infinite-horizon MIQP problem. Assuming the initial state 6 is safe, we will show in Section IV-B that this formulation can be used to find a minimally deviating safe control for the vehicles in Ntκ. We will show in Section IV-C that, if the vehicles of Ntκ follow the corresponding control, our formulation expressed at tκ+1 = (κ + 1)τ remains feasible for the vehicles of Ntκ+1, provided that all new vehicles enter safely with a margin τ. These properties ensure that our infinite horizon MIQP formulation can be solved in a receding horizon fashion, to ensure safety for all future vehicles. A. Model variables and constraints Fig. 4. Minimum bounding hexagon for the collision region presented in fig. 2a. sk+1 i − sk vk+1 i − vk 1 i = 2 i = uk i τ In what follows, we present the variables and constraints used in our model. Unless specified otherwise, these con- straints are enforced at all time steps k ≥ κ, and for all vehicles of Ntκ. 1) Vehicle dynamics: When they evolve inside the super- vision area, vehicles use a piecewise-constant control, which is updated every τ seconds. For a vehicle i ∈ Ntκ at step k, i ∈ [ui, ui], we introduce the variables sk respectively denoting its curvilinear position and longitudinal speed at tk, and longitudinal acceleration over [tk, tk +τ [. The following constraints enforce vehicle dynamics: i ∈ [0, vi] and uk i , vk (cid:0)vk (cid:1) τ i + vk+1 i (4) (5) 2) Logical constraints: In [38], we showed that it is pos- sible to enforce logical constraints on continuous and integer variables with linear inequalities using a "big-M" formulation. More specifically, if b is a binary variable and x a continuous or integer variable bounded so that x < M, then the logical constraint: (b = 0 ⇒ x ≤ a) is equivalent to the linear inequality constraint x ≤ a + bM. This method can be used to define indicator binary variables for a given semi- infinite interval: for a continuous variable x and a constant a ∈ R, we denote by b = χ[a,+∞[(x) the constraints (b = 0 ⇒ x ≤ a) ∧ (b = 1 ⇒ x ≥ a), where ∧ denotes the binary conjunction; we use ¬ to denote the binary negation. 3) Collision avoidance: As presented in Section III-A3, the collision region between two vehicles i, j ∈ Ntκ, Cij, can be computed off-line. As it was already presented in [38], it is possible to compute a minimal bounding convex polygon for each connected component Cp ij of Cij. A good compromise be- tween accuracy and complexity is to use a bounding hexagon with edges either parallel to the si = 0, si = sj or sj = 0 lines; such a polygon is uniquely defined by six parameters, as shown in fig. 4. To ensure that vehicles do not enter any of the collision regions, we introduce a set of binary variables to encode the discrete decisions arising from the choice of an ordering of vehicles, as presented in [38]. For all conflicting vehicles i, j ∈ Ntκ, we let πp ij = 1 if vehicle i passes the p-th collision region before j, and πp ij = 0 otherwise; moreover, we introduce the binary indicator variables for all k ≥ κ: εij,p(k) = χ[sij,p,+∞[(sk i ), ε⊥ij,p(k) = χ[s⊥ ij,p,+∞[(sk i ). We enforce the collision avoidance constraints for all con- flicting vehicles i, j ∈ Ntκ and k ≥ κ as: (cid:0)πp ij ∧ ¬ εij,p(k)(cid:1) (cid:0)πp ij ∧ εij,p(k) ∧ ¬ ε⊥ij,p(k)(cid:1) ij ∧ εij,p(k) ∧ ¬ ε⊥ij,p(k)(cid:1) (cid:0)πp j ≤ s⊥ji,p i ≥ sk+1 ⇒ sk+1 ⇒ sk+1 ⇒ (cid:0)vk+1 τ 2 sk+1 i ≥ sk+1 j +dij,p + j − vk+1 i j + dij,p (8) (9) (10) (cid:1) where dij,p = sij,p − s⊥ji,p. Constraint (8) corresponds to "crossing situations", where a vehicle has to wait for another to pass; constraints (9) and (10) correspond to "following situa- tions", where a vehicle needs to maintain a certain longitudinal distance from another. Note that constraints (8) to (10) use the values of the indicator variables at step k to force the positions of the vehicles at step k + 1 in order to avoid a "corner cutting" phenomenon; the additional constraint (10) prevents collisions between two time steps. These constraints are very slightly stronger than that of collision avoidance, i.e. for all t ≥ tκ, (si(t), sj(t)) /∈ Cij. Consequently, the results in the rest of this article are to be understood replacing the exact collision avoidance constraints in definition 1 by conditions (8)-(10). Finally, to ensure the consistency of the formulation, we add the mutual exclusion constraint for all conflicting vehicles i, j ∈ Ntκ: πp ij + πp ji = 1. (11) 4) Deadlock avoidance: As described in Section III-A6, we require all vehicles to maintain a minimum speed inside their no-stop region Di = [s⊥i , s⊥i ]. This requirement is enforced by defining additional binary variables, for all i ∈ Ntκ and all k ≥ κ: i ζ acc (k) =χ[sacc i ζ in i (k) =χ[s⊥ ζ out (k) =χ[s⊥ i ηi(k) =χ[vmin−uaτ,+∞[(vk i ) ,+∞[(sk i ) i ,+∞[(sk i ) i ,+∞[(sk i ) (12) (13) (14) (15) and using the constraints: (cid:0)ζ acc i (k) ∧ ¬ ηi(k)(cid:1) (k)(cid:1) (cid:0)ζ in i (k) ∧ ¬ ζ in (16) (17) As long as the acceleration regions Ai are large enough, constraint (16) prevents vehicles from remaining blocked due i ≥ vk i ≥ vmin. ⇒ vk+1 ⇒ vk i (k) ∧ ¬ ζ out i + uaτ, i (6) (7) s⊥ijsijs⊥ijs⊥jisjis⊥jiCij to the minimum speed requirement (17). We will show in the next section that these conditions effectively prevent deadlocks for all future times. 5) Initial conditions: The supervision problem is used in a receding horizon fashion, and we consider that the state of each vehicle of Ntκ at time tκ is known before solving the problem. Therefore, we use the following initial condition for all i ∈ Ntκ: (sκ i , vκ i ) = (si(tκ), vi(tκ)) (18) B. Objective function Any piecewise-constant control verifying constraints (4) to (18) for all k ≥ κ is dynamically admissible and prevents collisions for all future times, and is therefore in U saf e τ,κ (tκ). To remain compatible with human driving, we now formulate an objective function allowing to find a least restrictive and minimally deviating control given a desired control uκ des = i )i∈Ntκ be a set of (uκ strictly positive weights, X be the tuple of all the problem variables, and we define: i,des)i∈Ntκ . In what follows, we let (wκ J κ(X) = wκ i i − uκ i,des . (19) (cid:0)uκ (cid:88) i∈Ntκ (cid:1)2 Noting πuκ the projection operator such that πuκ(X) = uκ, we deduce the following theorem: Theorem 1. The solution of the optimization problem: u∗ = πuκ arg min J κ(X) subj. to ∀k ≥ κ, (4) − (18) X (IH-SP) is a solution to the minimally deviating supervision problem SP ∗ at time tκ, for the norm associated with J κ ◦ πuκ. Note that the weighting terms wκ i allow distinguishing between different types of agents, for instance to prioritize emergency services or high-occupancy vehicles. More com- plex cost functions can also be used, for instance to penalize a forced acceleration more than a forced braking. C. Receding horizon properties We now assume that there exists a solution to IH-SP at time tκ, that the vehicles of Ntκ follow this solution control over [tκ, tκ + τ ], and that the vehicles of Ntκ+1 enter safely with a margin τ. From Definitions 1 and 2, we have the following theorem: Theorem 2 (Recursive feasibility). Let τ > 0, κ ≥ 0, tκ = κτ and tκ+1 = tκ + τ. Assume that: • there exists a solution to IH-SP at time tκ for the vehicles • the vehicles of Ntκ follow this solution control over • the vehicles of Ntκ+1 \Ntκ enter safely with a margin τ. Then there exists a solution to IH-SP at time tκ+1 for the vehicles of Ntκ+1. Proof. From definitions 1 and 2, and using theorem 1, we know that the first two hypotheses guarantee that the vehicles of Ntκ, [tκ, tκ+1], 7 in Ntκ are in a safe state at time tκ+1. Moreover, the third hypothesis ensures that the vehicles in Ntκ+1 also are in a safe state at tκ+1 regardless of the control applied by the vehicles of Ntκ+1 \ Ntκ up to time tκ+1. By definition 1, there exists a feasible solution to IH-SP thus proving the theorem. We now state that the IH-SP formulation effectively prevents the apparition of deadlocksThe proof of this theorem can be found in Appendix A-A. Theorem 3 (Deadlock avoidance). Let κ ≥ 0 and assume that, for all κ ≤ k ≤ κ0, the conditions of theorem 2 remain satisfied at time tk. There exists a feasible solution of IH-SP at time tκ0 in which all the vehicles in Ntκ0 exit the supervision area in finite time. Note that theorem 3 only ensures that, at all times, there exists a solution where all the vehicles inside the supervision at this particular time eventually exit. However, there is no guarantee that such a solution will actually be selected, for instance if one driver wishes to stop although there is no other vehicle. There is also no fairness guarantee, i.e. it is possible that one vehicle is forced to remain stopped for an arbitrarily long time, for instance if there is a very heavy traffic coming from another direction. Future developments will focus devising more complex objectives function to take traffic efficiency and fairness into account. D. Multiple paths choices The above formulation assumes that the path of each vehicle is known in advance. However, this may not be realistic in the context of semi-autonomous cars where drivers can decide to change paths, for instance to avoid an obstacle on the road or use another itinerary. Using additional variables to indicate the path to which a vehicle is assigned, our formulation can be extended to handle multiple possible paths for each vehicle. Due to length limitations, this extension will be detailed in future work. V. FINITE HORIZON FORMULATION In Section IV-C, we presented an infinite horizon formu- lation to solve the minimally deviating supervision problem. However, due to the infinite number of variables, this formu- lation is not suitable for practical resolution. In this section, we derive an equivalent finite horizon formulation that can be implemented and solved using standard numerical techniques. In what follows, we let K ≥ 1 and we denote by FH-SPK the restriction of IH-SP at time tκ to the variables at steps k with κ ≤ k ≤ κ + K, and we only consider the constraints (4) to (18) up to step κ + K. The objective function is unchanged. A solution to FH-SPK at time tκ allows to compute a control preventing collisions up to time tκ + Kτ; however, due to the dynamics of the vehicles, the state reached at tκ + Kτ may not be safe. Since FH-SPK only has a subset of the constraints of IH-SP, we can formulate the following proposition: Proposition 1. Let K ≥ 1 and let X be a solution of IH-SP at step κ. The restriction of X to the first K + 1 time steps is a feasible solution to FH-SPK. Using the global bounds ua, ub, umax and vmax defined in section III-A4, we will now prove a reciprocal implication to proposition 1: if K is chosen large enough, any solution of FH-SPK can be used to construct a solution of IH-SP. As presented in [36], the key idea of the proof lies in the choice of a planning horizon long enough to allow any vehicle to fully stop. The structure of the demonstration is as follows: lemma 1 gives a lower bound on the time horizon to allow a single isolated vehicle to stop using discrete dynamics, although with a potential risk of rear-end collisions from following vehicles. In proposition 2, we give a slightly higher bound on the time horizon ensuring that all vehicles in a line can all safely stop without rear-end collisions. Finally, in proposition 3 we give a bound on K ensuring the recursive feasibility of FH-SPK; this allows formulating theorem 4, stating the equivalence of FH-SPK and IH-SP. In this section, we only present sketches of proofs for each result; detailed demonstrations can be found in Appendix A-B. Lemma 1. At a time tκ, consider a horizon T = Kτ with + τ. Let i ∈ Ntκ be a vehicle for which there exists T ≥ vmax ub a piecewise-constant control (uk i )κ≤k<κ+K such that, for all κ ≤ k < κ+K, uk i ∈ [ui, ui], corresponding to a dynamically feasible trajectory si(t) over [tκ, tκ + T + τ ]. i )κ≤k≤κ+K such that for all There exists a discrete control (uk i , and for which the κ ≤ k ≤ κ + K, uk corresponding dynamically feasible trajectory t (cid:55)→ xi(t) = (si(t), vi(t)) verifies si(tκ + T + τ ) ≤ si(t1 + T ) and vi = 0 over [tκ + T, tκ + T + τ ]. Sketch of proof. vmax is an upper bound on the required time ub for any vehicle to stop by applying a control ub, which by definition is dynamically feasible. The additional τ accounts for the fact that we require uκ i ∈ [ui, ui] and uκ i at the first time step. i = uκ i = uκ 1 + ub (cid:109)(cid:17) (cid:108) umax In the following proposition and noting (cid:100)·(cid:101) the ceiling function, we prove a bound ensuring that a line of vehicles can safely stop before the leader reaches its final computed position at the end of the time horizon, without risk of rear- end collisions: Proposition 2. At a time tκ, suppose that p vehicles of Ntκ (cid:16) (denoted by 1, . . . , p from rear to front) are following one another. Consider a horizon Tstop = Kstopτ ≥ vmax + (p − ub τ + τ, and assume that every vehicle i ∈ 1) i )κ≤k<κ+K such that, {1, . . . , p} has a safe discrete control (uk for all κ ≤ k < κ + K, uk i ∈ [ui, ui]. We let t (cid:55)→ xi(t) be the trajectory over [tκ, tκ + T ] for vehicle i under control (uk i ). For all i ∈ {1, . . . , p}, there exists a safe discrete control i )κ≤k≤κ+K such that for all κ ≤ k ≤ κ + K, uk i ∈ [ui, ui], (uk i and for which the corresponding dynamically feasible uκ i = uκ and safe trajectory t (cid:55)→ xi(t) = (si(t), vi(t)) verifies si(tκ + T + τ ) ≤ si(t1 + T ) and vi = 0 over [tκ + T, tκ + T + τ ]. Sketch of proof. The worst case that needs to be taken into account corresponds to a situation where the initial states of the vehicles require each of them to accelerate in order to avoid a rear-end collision from the vehicle behind. This rather extreme situation happens when a vehicle goes faster than the 8 one it is following, and the two are too close to allow a safe deceleration. In this case, the rearmost vehicle can always brake with the control from lemma 1, until it decelerates below the speed of the vehicle in front of it. The second rearmost vehicle can then decelerate, then the third and up to τ arises from the front-most vehicle. The term the piecewise-constant control hypothesis, and vanishes as τ goes to 0. Note that the condition Kstopτ ≥ vmax + τ ub also provides the same guarantees; depending on the value of p, this second bound might be more efficient. (cid:108) umax + vmax ua (cid:109)(cid:17) (cid:16) ub 1 + Remark 1. The bound from proposition 2 depends on the number of vehicles in a line, and can become quite high when p is large. It can be proven that the condition Kstopτ ≥ vmax + ub + τ also provides the same guarantees; depending on vmax ua the value of p, this second bound might be more efficient. i ua We can now prove the recursive feasibility of FH-SPK for vmin + d (cid:0)s⊥i − sacc (cid:1) and we let Tstop be the a large enough K, as follows: Proposition 3. Consider a time tκ, and assume that at most p vehicles are following one another at all times t ≥ tκ. We set d = maxt≥tκ,i∈Nt stopping horizon from proposition 2 for p vehicles; moreover, we define Trec = Krecτ ≥ Tstop + vmin + τ. We assume that all vehicles of Nt for all t > tκ enter safely with a margin τ. Problem FH-SPKrec is recursively feasible under the hy- potheses of theorem 2, i.e. if there exists a solution to FH- SPKrec at time tκ for the vehicles of Ntκ, there exists a solution at tκ + τ for the vehicles of Ntκ+τ . Sketch of proof. The idea between the choice of Trec is to ensure that each vehicle can either stop safely before entering its acceleration region (without generating rear-end collisions), or has already planned to exit its no-stop region safely. Moreover, the safe entering hypothesis ensures that the entry of new vehicles does not invalidate previously safe solutions, which can therefore be extended. We obtain the equivalence between IH-SP and FH-SPK: Theorem 4. Problems IH-SP and FH-SPK with Kτ ≥ Trec are equivalent, i.e. an optimal solution to one is also an optimal solution to the other. Proof. Proposition 1 ensures that any optimal solution to IH- SP is a feasible solution of FH-SPK. Proposition 3 shows that a solution to FH-SPK (with Kτ ≥ Trec) can be recursively extended to a solution of IH-SP; therefore, the optimal solution of FH-SPK is feasible for IH-SP. Using these two results, we deduce the stated theorem. An important corollary of theorems 1, 3 and 4 is that the control obtained by solving FH-SPK with K large enough is also a solution to the minimally deviating supervision problem, and ensures deadlock avoidance as well. Contrary to IH-SP, FH-SPK is relatively easy to solve with dedicated mixed- integer quadratic programming solvers, as will be demon- strated in the following section. VI. SIMULATION RESULTS A. Simulation environment 9 The presented Supervisor framework has been validated using extensive computer simulations on various test scenar- ios. In the absence of standardized test situations and since no open-sourced implementation of comparable methods [7], [8] is available, this section does not aim at a quantitative comparison with existing algorithms. Since our Supervisor is by design guaranteed to output an optimal1 safe control, the major evaluation criterion is rather its ability to handle a wider variety of traffic scenarios than existing techniques, which is demonstrated in the rest of this section. Due to implementation reasons, the resolution of the su- pervision problem is performed off-line and simulations are run in two successive phases. In the first phase, we define the geometry of the roads inside the supervision area and the corresponding possible paths, and compute the collision and acceleration regions information for each pair of paths. Since these sets only depend on the geometry of vehicles and paths, the corresponding parameters are computed off-line. In the second phase, we run the simulation by coupling the high-fidelity vehicle physics simulator PreScan [39] with an external Python implementation of our supervisor. The actual resolution uses the commercial MIQP solver GUROBI [35]; the Python program runs a coarse simulation over a set time horizon with a fixed time step duration. Vehicles are generated using random Poisson arrivals, with a predefined arrival rate for each possible path, while respecting the safe entering con- dition; the initial velocity of each generated vehicle is chosen randomly according to a truncated Gaussian distribution. At each time step, the finite horizon supervision problem FH-SP is solved for the vehicles inside the supervision area, and yields the best safe control for the set of vehicles. The state of these vehicles at the next time step is then computed according to equations (4) and (5). In parallel, we use PreScan to validate the consistency of this output: from the safe controls computed in the Python supervisor and knowing the reference paths of the vehicles, we compute a target state comprising a desired position, heading and longitudinal velocity for each vehicle. This target state is fed into a low-level controller which outputs a steering and an acceleration or braking control. The vehicle model used in the validation phase takes into account engine response as well as chassis and suspensions dynamics, but does not model road- tire friction. PreScan's collision detection and visualization capacities are then used to validate the absence of collision or dangerous situations. Note that vehicles controllers are designed to ensure a bounded positioning error for any vehicle, relative to their prescribed path and velocity profile. This error is taken into account in the computation of the collision regions, so that the system is robust to control imperfections. B. Test scenarios In the rest of this section, we consider three test scenarios – chosen to represent a wide variety of driving situations – (a) Longitudinal positions; the shaded area is the collision region. (b) Longitudinal velocities Fig. 5. Vehicles positions and velocities in the merging scenario; solid lines correspond to vehicles on the entry lane, dashed lines to vehicles starting on the highway. The thick colored portions show overriding intervals. consisting of merging on a highway, crossing an intersection or driving inside a roundabout. To showcase the performance of our framework in avoiding accidents and deadlocks, we assume that drivers are "oblivious" and focused on tracking a desired speed, regardless of the presence of other vehicles. A video of the presented simulations is available online2. 1) Highway merging: We first consider a very simple highway merging scenario, where an entry lane merges into a single-lane road; the possible paths for the vehicles are the same as in fig. 2c. The collision region between a vehicle i in the entry lane and a vehicle j on the highway have a single connected component given as s⊥ij = s⊥ji = 89 m and sij = sji = 94 m, taking control errors into account. To illustrate the action of the supervisor, we consider a set of six vehicles, three of which are on the highway and three on the entry lane. All vehicles are assumed to have "oblivious" drivers maintaining a constant speed, thus resulting in potential collisions. This admittedly unrealistic behavior has been chosen to generate a higher probability of collisions in absence of supervision. Figure 5 shows the longitudinal trajectories of the supervised vehicles; colored (thick) portions of the lines represent intervals of time during which overriding occurs. The area in gray corresponds to the collision region between entering vehicles and vehicles on the highway; thanks to the action of the supervisor, all collisions are successfully avoided. 2) Intersection crossing: The second scenario is the cross- ing of a + shaped intersection by a total of eight vehicles, with two vehicles per branch. In each branch, the front vehicle goes straight, and the rear vehicle turns left; moreover, all vehicles in front start at the same distance from the center of the intersection, and the same is true for the vehicles in the 1Among the set of piecewise-constant controls with a given time step duration and in the sense of Definition 4 2Available at https://youtu.be/JJZKfHMUeCI 024681012050100024681012050100Time(s)Position(m)0246810120102002468101201020Time(s)Speed(m/s) (a) Longitudinal positions; the shaded area is the collision region. (b) Longitudinal velocities Fig. 6. Vehicles positions and velocities in the intersection crossing scenario; solid lines correspond to vehicles on the entry lane, dashed lines to vehicles starting on the highway. The thick colored portions show overriding intervals. 10 vehicles, a different class of solution is chosen. A video of a longer, one hour simulation is also available online4. 4) Computation time: Due to the relatively short time hori- zon needed to ascertain infinite horizon safety, computation time remains reasonable despite the NP-hardness of the MIQP formulation. Figure 8 shows the evolution of the computation time in the intersection crossing and roundabout scenarios; the limited available space in the merging scenario does not allow enough vehicles for a similar diagram. These measurements have been obtained on a computer equipped with an Intel Core i7-6700K CPU clocked at 4 GHz with 16 GB of RAM, using the GUROBI solver in version 7.0. It can be seen that computation time remains below the duration of a time step in 90% of cases for up to approximately ten simultaneous vehicles, thus allowing real-time computation at 2 Hz. Note that the MIQP problem only loosely depends on the paths geometry, but rather on the average number of conflicts per vehicle which is higher in the case of roundabout driving, thus explaining the longer times reported in fig. 8b. Moreover, the implemented algorithm has been devised for readability over efficiency, and can be optimized by removing redundant variables to further reduce computation time. In practice, this refresh rate means that vehicles could apply a new acceleration every 0.5 s, which is faster than the typical reaction time of one second for a human driver, and should therefore be barely perceived. Note that for practical implementation purposes, the input of the supervisor should be predicted states at the end of the computation period instead of current states; since the acceleration of each vehicle is assumed to be known to the supervisor, these predictions can be easily performed by forward integration. Fig. 7. Illustration of three possible classes of trajectories found by the solver, depending on the initial states of the vehicles. Trajectories 1 and 2 correspond to one vehicle passing the two collision points before the other. Trajectory 3 corresponds to the case where the vehicle on the inner lane enters after the other, and overtakes it inside the roundabout. rear. This scenario illustrates the symmetry-breaking capacities of our framework, which handles this perfectly symmetrical scenario well, as shown in fig. 6. The area in gray corresponds to the collision region between vehicles on different branches. A video of a longer, one hour simulation is available also online3. 3) Roundabout driving: Finally, the third scenario consists of vehicles driving inside a two-lanes roundabout. The par- ticularity of this situation is that collision regions can have multiple connected components, for instance for the paths shown in fig. 2b. Since our formulation explicitly distinguishes each of these connected components, the supervisor is able to choose an ordering for each point of conflict, as illustrated in fig. 7: depending on the initial states and control targets of the VII. DISCUSSION ON IMPLEMENTATION In the previous sections, we presented an optimization-based algorithm for the supervision of semi-autonomous vehicles; we now briefly discuss obstacles and possible solutions for actual implementation. First and foremost, not all vehicles will be equipped with the required communication capacities at the same time; therefore, the ability to deal with unequipped vehicles and other traffic participants is key to envision actual applications. Second, this work assumes perfect communica- tion and control, and in general ignores uncertainties arising from real-world constraints. A. Dealing with unequipped vehicles As with all innovations, the penetration rate of our system would gradually increase overtime, but remain below 100 % for years, yet the formulation proposed in Section IV re- quires all vehicles to be equipped with supervision capacities. Although a detailed study on the integration of unequipped vehicles in our framework is out of the scope of this paper, we present a possible technique to handle these vehicles provided that they can avoid longitudinal collisions with the leading vehicle, and have a bounded reaction time. First, note that it is always possible to consider unequipped vehicles conservatively as proposed in [40]: at a given step k, 3https://youtu.be/cl32nbceZvw 4https://youtu.be/pLoG32wFnkE 0246810121402040608002468101214020406080Time(s)Position(m)02468101214051015200246810121405101520Time(s)Speed(m/s)4060801001202040608010040608010012020406080100Positionvehicle1(m)Positionvehicle2(m)123 11 into account by adjusting the lower bound on the longitudinal acceleration of vehicle ie. Note that this approach still guarantees that no collision can happen between an unequipped and an equipped vehicle; moreover, as the penetration rate of equipped vehicles in- creases, additional rules may be enforced to reduce the number of occurrences in which conflicting unequipped vehicles are simultaneously allowed in the conflict region, thus increasing safety even for the unequipped vehicles. Future work will study the impact of penetration rate on safety and efficiency for both equipped and unequipped vehicles. B. Practical implementation (a) Intersection scenario We propose a centralized implementation, where a roadside computer (supervisor) with communication capacities is added to the infrastructure, and is tasked with repeatedly solving FH-SPK. Note that resolution could also be performed using cloud computing, possibly providing much faster computations without necessitating fully dedicated hardware. The supervisor is also assumed to be equipped with a set of sensors (e.g., cameras), so that the arrival of new vehicles in the supervision area can be monitored (in order to account for unequipped vehicles and other traffic participants). Equipped vehicles are supposed to regularly communicate their current state, includ- ing position, velocity and driver's control input, and receive instructions (the safe acceleration sequence (uk i ) solution of FH-SPK) from the roadside supervisor. The vehicle's on-board computer then uses these instructions to override the driver's control inputs when needed. We argue that the main sources of uncertainty, i.e. communication, sensing and control errors, can be taken into account by using safety margins when computing collision regions. Communications are assumed to have similar performance to current 802.11p specifications; we use the figures provided in [43], [44] as reference, with latency below 20 ms, and packet loss probability of less than 30 % under 300 m. To ac- count for network congestion, we use more conservative values than those reported experimentally in [44]. Moreover, using the additional roadside sensors, we estimate that uncertainty in each vehicle's localization could be reduced to below 1 m longitudinally. First, the 20 ms latency corresponds to less than 1 m at highway speed. Second, since they do not require exchanging a lot of data, such messages can be sent much more frequently than the refresh rate of the supervisor. Considering messages can be sent at 20 Hz, the probability of a message not being received in 0.25 s is roughly 0.2 %, and 6 × 10−6 after 0.5 s. Since they receive a whole sequence of safe accelerations, individual vehicles can keep executing this sequence until a new one is successfully received. A worst-case scenario would be having one vehicle using acceleration ua (maximum acceleration) where it should have used ub (maximum brak- ing): after a duration t, the corresponding positioning error is 2 t2(ua +ub), which is roughly 30 cm after 0.25 s and 1.3 m 1 after 0.5 s for typical values of ua and ub of 5 m s−2. More robust contingency protocols could likely be developed, and will be the subject of future work, but these values can be used as safety margins without compromising performance. (b) Roundabout scenario Fig. 8. Distribution of computation times depending on the number of vehicles, for τ = 0.5 s. Shaded areas represent the [0, 90%] percentiles. we compute the minimum and maximum curvilinear position that can be reached at time tk by the unequipped vehicle iu, denoted by sk iu,max respectively. Using the same notations as in Section IV, we then define: iu,min and sk εiuj,p(k) = χ[siuj,p,+∞[(sk ε⊥iuj,p(k) = χ[s⊥ iuj,p,+∞[(sk iu,max), iu,min). (20) (21) Therefore, the unequipped vehicle is considered as occupying the conflict region at step k when there exists a control (maximum acceleration) for which it could be inside this region at step k. Similarly, the vehicle is only considered as liberating the conflict region when, even by applying a maximum braking, it would exit it. The collision avoidance constraints (9) and (10) are also modified to use sk+1 iu,min and vk+1 iu,min, where vk+1 iu,min is the minimum speed reachable by iu at k + 1. Other traffic participants such as cyclists (and, to a lesser extent, pedestrians) could also be taken into account in this fashion. Recently proposed "non-conservatively defensive strategies" [41] could also be applied. A limitation of this simple approach is that it can lead equipped vehicles to often yield right-of-way to unequipped vehicles, which may be problematic and can slow the accep- tance of the system. A possible method (introduced in [42]) to reduce this problem while improving the global level of safety is to use the existing equipped vehicles to force the unequipped ones to stop when required. Suppose that an unequipped vehicle (denoted by iu) follows an equipped one (ie), both crossing the path of another equipped vehicle je. By setting πieje = 0 (thus requiring je to pass before ie), we effectively force the unequipped vehicle iu to also pass after je; the reaction time of the unequipped vehicle can be taken 510152000.511.52NumberofvehiclesComputationtime(s)Min.Medianp90[0,90%]2468101214161800.511.52NumberofvehiclesComputationtime(s)Min.Medianp90[0,90%] Similarly, positioning and control uncertainty can be ac- counted for as margins in the collision regions, provided they can be bounded. In this work, we assume that vehicle self- positioning can be improved using the roadside sensors from the supervisor (which can be precisely calibrated), which could provide relatively tight bounds on error. VIII. CONCLUSION In this article, we designed a framework allowing safe semi- autonomous driving of multiple cooperative vehicles in various traffic situations. We first introduce a set of linear constraints ensuring infinite horizon safety for a group of human-driven vehicles, traveling inside predefined corridors with the help of existing lane-keeping technologies. Based on this set of constraints, a discrete-time Supervisor is allowed to override the drivers' longitudinal control inputs if they would lead the vehicles into an inevitable collision state. In this case, the control used for overriding is chosen as close as possible to the one originally requested by the drivers. These two properties ensure that intervention only occurs when strictly necessary to maintain safety, thus facilitating the acceptation of the system by human drivers. Theoretical considerations prove this supervisor guarantees both safety and deadlock avoidance, and can be applied with- out distinction to multiple situations such as traffic intersec- tion, highway entry lanes or roundabouts. Using the realistic vehicle physics simulator PreScan, we demonstrated that our algorithm can handle complex situations over an arbitrary duration, with continuous arrivals of vehicles. Moreover, the proposed formulation can be solved in real-time on a standard desktop computer for up to ten vehicles, which makes it suitable for practical applications. Additionally, this work opens up many perspectives for future research. First and foremost, the current framework does not deal with non-equipped vehicles or other traffic participants such as cyclists or pedestrians, nor does it take sensor and communication uncertainties into account. Before considering an actual implementation, the system should be more robust to these various sources of noise. Moreover, our formulation has been designed in a mostly centralized fashion; various approaches need to be explored to design a more realistic decentralized system, that could be implemented in actual cars. APPENDIX A DEMONSTRATIONS A. Proofs for Section IV Before proving theorem 3, we introduce the following lemma stemming from graph theory: Lemma 2. Let G = (V, E) a directed graph with vertices set V and edges set E. All cycles in G can be removed by reversing a set of edges, each of them contributing to at least one cycle. Proof. The proof is based on the existence of minimum feedback arc sets [45], i.e. a minimum set Ef eedback ⊂ E such that G(cid:48) = (V, E \ Ef eedback) is acyclic. By minimality 12 of Ef eedback, any e ∈ Ef eedback belongs to at least one cycle of G. Moreover, it can be seen that reversing the edges of Ef eedback also leads to an acyclic graph, thus proving the lemma. Proof of Theorem 3. Note that the only constraints requiring a vehicle to stop are (8) to (10), forcing a vehicle j to wait for a vehicle i with πp ij = 1. From the hypotheses and theorem 2, there exists a solution X to IH-SP at time tκ0. We define a directed priority graph GX = (V, E) with V = Ntκ0 and where an edge i → j belongs to E if there exists p such that πp ij = 1. Using this representation, a cycle in GX corresponds to a chain of q conflicting vehicles i1, i2, . . . , iq, iq+1 = i1 for which there exists a connected component Cpn inin+1 such that πpn inin+1 = 1 for all n = 1 . . . q. If GX is acyclic, it defines a (partial) topological order, and it is always possible to admit the vehicles one by one in that order. Therefore, there exists a feasible solution where all the vehicles of Ntκ0 exit the supervision area in finite time. We now assume that there exists at least one cycle in GX. If all the vehicles involved in the cycle can exit in finite time, the result of the theorem is proven. Otherwise, we note Ndead ⊂ Ntκ0 a set of vehicles corresponding to a cycle in GX: all of these vehicles are stopped at infinity, and are prevented to move further by a constraint of form (8), for a certain j ∈ Ndead. Moreover, the no-stop condition (17) ensures that, for all i ∈ Ndead and all k ≥ κ, sk From lemma 2, we know that it is possible to change the values of the variables πp ij for i, j ∈ Ndead to render GX acyclic. Using the fact that sk for all of these vehicles, we know that modifying these priorities does not violate constraints (8) to (10). Therefore, we can build a solution X(cid:48) for which the corresponding priority graph is acyclic, which proves the theorem. i ≤ s⊥i . i ≤ s⊥i is trivial B. Proofs for Section V Proof of Lemma 1. The proof if we consider continuous-time dynamics, as a single vehicle can always apply a control lower or equal to ub starting from time tk + τ, which ensures it is stopped for t ≥ tk + τ + vmax . A slight additional complexity happens at the final braking time step when considering piecewise-constant controls, applying ub for a duration τ might result in a negative velocity, which is not allowed in our framework. We now proceed to the formal proof, as below. ub Let (uk let us define a control (wk for κ < k < κ + K, and wκ+K (uk i ) be the control corresponding to trajectory si, and i , wk i = min(ub, uk i ) = ub. We construct i = i is the speed of vehicle i and, for k ≥ κ + 1, uk , where vk i ) as: wκ i = uκ i i = uk i τ ≥ 0 (cid:40) i + wk if vk otherwise i ) iteratively as uκ wk i − vk As vκ+1 = vκ+1 i τ i at time tk under control (uk i ). i i ≤ vmax ≤ (K − 1)τub from the hypothesis, there exists a minimal value of k0 ≥ κ such that vk0 i ≤ ubτ; moreover, the condition on K ensures that vκ+1 i − (K − 2)ub∆t ≤ ub∆t, and so k0 ≤ (κ + 1) + (K − 2) = κ + K − 1. 13 0 i i i i i j ≤ uk i ≤ uk We now let i ≥ 2 and assume that every vehicle j ∈ j ). We note {1, . . . , i− 1} follows its corresponding control (uk j the position and speed of vehicle j at step k under j and vk sk this control. Since uk j for these vehicles, we deduce from the monotony of the system that the original control solution for vehicle i (uk i )κ≤k<κ+K prevents rear-end collisions if vehicle i − 1 applies (uk i−1). Therefore, any dynamically feasible extension of (uk i ) is safe over [κτ, (κ + K + 1)τ [. As a result, the set U saf e i , [κ, κ + K]) of all admissible (uκ controls (uk i and i )κ≤k≤κ+K for vehicle i such that uκ i for κ ≤ k < κ + K is not empty. We note i ≤ uk uk i ) a minimum element of this set (and so uk i ); we (uk will prove that vκ+Ki If for all k ≥ κ, vk i−1, we conclude that vehicle i stops before vehicle i−1 which proves the result from the induction hypothesis. Otherwise, we let ki 0 ≥ κ be the minimum k such i−1, and we know that vki 0−1 that vk i−1 + umaxτ. i ≥ vk 0, we know from the monotony of the system For all k ≥ ki that the control min(uk i , ub) prevents rear-end collisions; i−1, uk i ≤ vk−1 we deduce that, for k ≥ ki i−1 + umaxτ. Therefore, 0, vk (cid:109) vκ+Ki−1+1 i−1 + umaxτ and we deduce from the induc- tion hypothesis that vκ+Ki−1+1 ≤ umaxτ + ubτ. Therefore, we obtain the recursion relation Ki = Ki−1 + 1 + which yields the announced result. (cid:108) umax i ≤ vki ≤ vKi−1 ≤ ubτ. i ≤ uk i ≤ vk i = uκ ub (cid:109) + vmax ua (cid:108) umax i , we deduce that sκ+K ub i ≤ uk which proves the proposition. Finally, we conclude that vehicle i can fully stop (without rear-end collisions) at step κ + Ki + 1; therefore the set of p vehicles can safely stop before the beginning of step κ + K if K ≥ Kp = vmax + 1. Since the recursion ubτ + (p − 1) ensures that for all i and k, uk ≤ sκ+K i Note that the time needed for vehicles to match speeds can also be bounded by vmax regardless of the value of p. ua Therefore, all vehicles can also fully stop within the time horizon if T = Kτ ≥ vmax + 2τ. Depending on ub the value of p, this bound may be better than the previously demonstrated one. Proof of Proposition 3. We consider a time tκ = κτ, and we let Trec = Krecτ ≥ Tstop + vmin + τ. Consider a solution X of FH-SPKrec for the vehicles of Ntκ, defined for steps κ ≤ k ≤ κ + K. We will first show that this solution can be extended to a solution of FH-SPK+1 for the vehicles in Ntκ. Note that the only constraints which can be unfeasible are the safety constraints (8)-(10) and the minimum velocity constraints (16) and (17). Consider a vehicle i ∈ Ntκ: using the control corresponding to this solution, two cases can arise: , in which case proposition 2 ensures that i and all the vehicles behind it can fully stop before , and can remain stopped up to step Krec+1. reaching sacc Since we also require that sacc if j follows i, this ensures that keeping i and its followers stopped satisfies all the above constraints; • si(Tstop) ≤ sacc j ≥ sacc + d vmin ua i i i • otherwise, si(Trec) ≥ s⊥i , in which case the crossing and minimum velocity constraints (8), (16) and (17) are satisfied for all conflicting vehicle j up to step Krec. The requirement Trec ≥ Tstop and proposition 2 ensure that the safe following constraints (9) and (10) involving Fig. 9. spond to integer multiples of the time step. Illustration of the "overshoot" phenomenon; the vertical grid corre- i = 0. Since uk From the definition of (uk k ≤ κ + K, vk we also know that sk0 the minimal admissible control starting from xk0 i sk0+1 i i ), we know that for all k0 + 1 ≤ i for κ ≤ k ≤ k0 − 1, i ≤ vk0 is ; therefore, which proves the above lemma. . Finally, uk0 i i ≤ uk and vk0 i ≤ sk0 = sκ+K i i i ≤ sk0+1 i Proof of Proposition 2. We first consider the continuous-time case to give an intuition of the proof. We build upon the fact that the rearmost vehicle in a line can always brake with acceleration ub until it fully stops. However, some the initial conditions may require vehicles in front to accelerate in order to avoid collisions, for instance if the rearmost vehicle is too fast. However, even in this case, we know that the second rearmost vehicle can brake with ub as soon as it has matched the speed of the rearmost vehicle, and by induction this is true for all the vehicles in the line. In the continuous-time case, all of these vehicles can therefore stop in a time bounded by vmax . ub When considering piecewise-continuous controls, an addi- tional complexity arises from the fact that vehicles may match speed between two time steps, resulting in an "overshoot" in velocity. We use the hypotheses on the acceleration to bound this overshoot, as illustrated in fig. 9: we consider a fast vehicle (noted 1, blue curve) following a slower vehicle (noted 2, red curve). To avoid collisions, vehicle 2 is required to accelerate; vehicles match speed at time t2→1; however, due to the time discretization, the overshoot phenomenon can occur. Using the bounds on the acceleration, noting k2→1 the time step immediately following t2→1, we know that 1 + τ (umax + ub). Moreover, after step k, vehicle 2 ≤ vk vk 2 can brake with a control ub up to time t1, corresponding to the first integer time step k1 when vk1 1 ≤ τub. Since both vehicles 1 and 2 have the same acceleration of [t2→1, t1], we know that vk1 2 ≤ τub + τ (ub + umax). Therefore, noting 2 ≤ τub. The k2 = k1 + 1 + same reasoning can then be repeated for the vehicles preceding vehicle 2. We will now formalize this recursion, as below. , we know that vk2 (cid:108) umax (cid:109) ub We will prove by induction that, for i ∈ {1, . . . , p}, there exists a dynamically feasible control (uk i and (cid:16) i for k ≥ κ such that the corresponding vehicle speed i ≤ uk uk i ) verifies vκ+Ki (vk + (i − τ. First, for the rearmost vehicle i = 1, the ≤ ubτ with Kiτ = (cid:108) umax (cid:108) vmax 1) proof of lemma 1 provides the result with uk i ) with uκ (cid:109)(cid:17) i = uκ (cid:109) ub ub 1 + i . i = uk i t1≤umaxτ≤ubτt2→1≤τ(umax+ub)t1timespeed i d vehicle i remain satisfiable for the vehicles of Ntκ up to step Krec + 1. Indeed, if s⊥i ≥ si(Tstop) > sacc , condition (16) ensures that vehicle i accelerates at least with acceleration ua until reaching speed vmin, which takes at most a time vmin . The vehicle is ua then required to maintain speed vmin until reaching s⊥i , which . Therefore, vehicle i necessarily takes at most a time reaches s⊥i by time Trec; the additional τ accounts for vehicles reaching doing so between two time steps. vmin The above considerations ensure that the solution of FH- SPK at time tκ can be prolongated to a solution of FH-SPK+1 for the vehicles of Ntκ. Finally, noting that the safe entry hypothesis ensures that this solution remains safe even when taking the vehicles of Ntκ+τ \ Ntκ into consideration. By definition, there also exists a safe control (and therefore a solution to FH-SPK) for these vehicles at time tκ + τ. As a result, there exists a solution to FH-SPK at time tκ + τ for the vehicles of Ntκ+τ which proves the stated result. REFERENCES [1] A. Vahidi and A. Eskandarian, "Research advances in intelligent col- lision avoidance and adaptive cruise control," IEEE Transactions on Intelligent Transportation Systems, vol. 4, no. 3, pp. 143–153, sep 2003. [2] E. Coelingh, A. Eidehall, and M. Bengtsson, "Collision Warning with Full Auto Brake and Pedestrian Detection - a practical example of Automatic Emergency Braking," in 13th International IEEE Conference on Intelligent Transportation Systems. IEEE, sep 2010, pp. 155–160. [3] D. Geronimo, A. M. Lopez, A. D. Sappa, and T. Graf, "Survey of Pedestrian Detection for Advanced Driver Assistance Systems," IEEE Transactions on Pattern Analysis and Machine Intelligence, no. 7, pp. 1239–1258, jul. [4] M. Diaz-Cabrera, P. Cerri, and P. Medici, "Robust real-time traffic light detection and distance estimation using a single camera," Expert Systems with Applications, vol. 42, no. 8, pp. 3911–3923, may 2015. [5] D. Kim, J. Choi, H. Yoo, U. Yang, and K. Sohn, "Rear obstacle detection system with fisheye stereo camera using HCT," Expert Systems with Applications, vol. 42, no. 17-18, pp. 6295–6305, oct 2015. [6] Z. Kim, "Robust Lane Detection and Tracking in Challenging Scenar- ios," IEEE Transactions on Intelligent Transportation Systems, vol. 9, no. 1, pp. 16–26, mar 2008. [7] A. Colombo and D. Del Vecchio, "Least Restrictive Supervisors for Intersection Collision Avoidance: A Scheduling Approach," IEEE Trans- actions on Automatic Control, vol. 60, no. 6, pp. 1515–1527, jun 2014. [8] G. R. Campos, F. Della Rossa, and A. Colombo, "Optimal and least restrictive supervisory control: Safety verification methods for human- driven vehicles at traffic intersections," in 2015 54th IEEE Conference on Decision and Control. IEEE, dec 2015, pp. 1707–1712. [9] T. Fraichard and H. Asama, "Inevitable Collision States. A Step Towards Safer Robots?" Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, vol. 1, no. October, pp. 388–393, 2003. [10] R. Naumann, R. Rasche, and J. Tacken, "Managing autonomous vehi- cles at intersections," IEEE Intelligent Systems and their Applications, vol. 13, no. 3, pp. 82–86, 1998. [11] K. Dresner and P. Stone, "Multiagent traffic management: a reservation- based intersection control mechanism," in Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. IEEE Computer Society, July 2004, pp. 530–537. [12] L. Makarem and D. Gillet, "Fluent coordination of autonomous vehi- cles at intersections," in Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, vol. 18, no. 1. IEEE, oct 2012, pp. 2557–2562. [13] X. Qian, J. Gregoire, A. de La Fortelle, and F. Moutarde, "Decentralized model predictive control for smooth coordination of automated vehicles at intersection," in 2015 European Control Conference (ECC). IEEE, jul 2015, pp. 3452–3458. [14] K. Mu, F. Hui, and X. Zhao, "Merging Driver Assistance Decision Sys- tem Using Occupancy Grid-Based Traffic Situation Representation," in 2015 IEEE 18th International Conference on Intelligent Transportation Systems. IEEE, sep 2015, pp. 231–237. 14 [15] I. A. Ntousakis, I. K. Nikolos, and M. Papageorgiou, "Optimal vehicle trajectory planning in the context of cooperative merging on highways," Transportation Research Part C: Emerging Technologies, vol. 71, pp. 464–488, oct 2016. [16] A. Mosebach, S. Rochner, and J. Lunze, "Merging control of cooperative vehicles," IFAC-PapersOnLine, vol. 49, no. 11, pp. 168–174, 2016. [17] V. Desaraju, H. Ro, M. Yang, E. Tay, S. Roth, and D. Del Vecchio, "Partial order techniques for vehicle collision avoidance: Application to an autonomous roundabout test-bed," in 2009 IEEE International Conference on Robotics and Automation. IEEE, may 2009, pp. 82–87. [18] R. Vasudevan, V. Shia, Yiqi Gao, R. Cervera-Navarro, R. Bajcsy, and F. Borrelli, "Safe semi-autonomous control with enhanced driver modeling," in 2012 American Control Conference. IEEE, jun 2012, pp. 2896–2903. [19] A. Gray, Y. Gao, J. K. Hedrick, and F. Borrelli, "Robust Predictive Control for semi-autonomous vehicles with an uncertain driver model," in 2013 IEEE Intelligent Vehicles Symposium, no. 1239323. IEEE, jun 2013, pp. 208–213. [20] A. Gray, Y. Gao, T. Lin, J. K. Hedrick, and F. Borrelli, "Stochastic predictive control for semi-autonomous vehicles with an uncertain driver model," in 16th International IEEE Conference on Intelligent Transportation Systems. IEEE, oct 2013, pp. 2329–2334. [21] C. Liu, A. Gray, C. Lee, J. K. Hedrick, and J. Pan, "Nonlinear stochastic predictive control with unscented transformation for semi-autonomous vehicles," in 2014 American Control Conference. IEEE, jun 2014, pp. 5574–5579. [22] T.-C. Au, S. Zhang, and P. Stone, "Autonomous Intersection Manage- ment for Semi-Autonomous Vehicles," Handbook of Transportation, pp. 88–104, 2015. [23] S. A. Reveliotis and E. Roszkowska, "On the Complexity of Maximally Permissive Deadlock Avoidance in Multi-Vehicle Traffic Systems," IEEE Transactions on Automatic Control, vol. 55, no. 7, pp. 1646–1651, jul 2010. [24] L. Bruni, A. Colombo, and D. Del Vecchio, "Robust multi-agent collision avoidance through scheduling," in 52nd IEEE Conference on Decision and Control. IEEE, dec 2013, pp. 3944–3950. [25] H. Ahn and D. Del Vecchio, "Semi-autonomous intersection collision avoidance through job-shop scheduling," in Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control. ACM, 2016, pp. 185–194. [26] J. Gregoire, "Priority-based coordination of mobile robots," Ph.D. [Online]. Available: http: dissertation, MINES ParisTech, 2014. //arxiv.org/abs/1410.0879 [27] K. D. Kim and P. R. Kumar, "An MPC-based approach to provable system-wide safety and liveness of autonomous ground traffic," IEEE Transactions on Automatic Control, vol. 59, no. 12, pp. 3341–3356, dec 2015. [28] T. Sim´eon, S. Leroy, and J. P. Laumond, "Path coordination for multiple mobile robots: A resolution-complete algorithm," IEEE Transactions on Robotics and Automation, vol. 18, no. 1, pp. 42–49, 2002. [29] J. Peng, "Coordinating Multiple Robots with Kinodynamic Constraints Along Specified Paths," The International Journal of Robotics Research, vol. 24, no. 4, pp. 295–310, apr 2005. [30] E. R. Muller, R. C. Carlson, and W. K. Junior, "Intersection control for automated vehicles with MILP," IFAC-PapersOnLine, vol. 49, no. 3, pp. 37–42, 2016. [31] J. Park, S. Karumanchi, and K. Iagnemma, "Homotopy-Based Divide- and-Conquer Strategy for Optimal Trajectory Planning via Mixed- Integer Programming," IEEE Transactions on Robotics, vol. 31, no. 5, pp. 1101–1115, 2015. [32] F. Borrelli, D. Subramanian, A. Raghunathan, and L. Biegler, "MILP and NLP Techniques for centralized trajectory planning of multiple unmanned air vehicles," in 2006 American Control Conference. IEEE, 2006, pp. 5763–5768. [33] S. Cafieri and N. Durand, "Aircraft deconfliction with speed regulation: New models from mixed-integer optimization," Journal of Global Op- timization, vol. 58, no. 4, pp. 613–629, 2014. [34] N. Murgovski, G. R. de Campos, and J. Sjoberg, "Convex modeling of conflict resolution at traffic intersections," in 2015 54th IEEE Conference on Decision and Control (CDC). IEEE, dec 2015, pp. 4708–4713. [35] Gurobi Optimization, Inc., "Gurobi optimizer reference manual," 2015. [Online]. Available: http://www.gurobi.com [36] F. Altch´e, X. Qian, and A. De La Fortelle, "Least Restrictive and Minimally Deviating Supervisor for Safe Semi-Autonomous Driving at an Intersection: An MIQP Approach," in 2016 IEEE 19th International Conference on Intelligent Transportation Systems, Nov. 2016. [37] P. Polack, F. Altch´e, B. d'Andr´ea-Novel, and A. de La Fortelle, "The Kinematic Bicycle Model : a Consistent Model for Planning Feasible Trajectories for Autonomous Vehicles ?" 2017 IEEE Intelligent Vehicles Symposium (IV), no. IV, 2017. [38] F. Altch´e, X. Qian, and A. De La Fortelle, "Time-optimal Coordination of Mobile Robots along Specified Paths," in 2016 IEEE/RSJ Interna- tional Conference on Intelligent Robots and Systems, Oct. 2016. [39] TASS International. [Online]. Available: http://www.tassinternational. com/prescan [40] G. Schildbach, M. Soppert, and F. Borrelli, "A collision avoidance system at intersections using Robust Model Predictive Control," in 2016 IEEE Intelligent Vehicles Symposium (IV). IEEE, jun 2016, pp. 233– 238. [41] W. Zhan, C. Liu, C.-y. Chan, and M. Tomizuka, "A non-conservatively defensive strategy for urban autonomous driving," in 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). IEEE, nov, pp. 459–464. [42] X. Qian, J. Gregoire, F. Moutarde, and A. De La Fortelle, "Priority-based coordination of autonomous and legacy vehicles at intersection," in 17th International IEEE Conference on Intelligent Transportation Systems (ITSC). IEEE, pp. 1166–1171. [43] D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich, "Design of 5.9 ghz dsrc-based vehicular safety communication," IEEE Wireless Communications, no. 5, pp. 36–43, oct. [44] S. Demmel, A. Lambert, D. Gruyer, A. Rakotonirainy, and E. Monacelli, "Empirical IEEE 802.11p performance evaluation on test tracks," in 2012 IEEE Intelligent Vehicles Symposium. IEEE, jun, pp. 837–842. [45] D. Younger, "Minimum feedback arc sets for a directed graph," IEEE Transactions on Circuit Theory, vol. 10, no. 2, pp. 238–245, Jun 1963. 15 Arnaud de La Fortelle (M10) received the M.S. degree in engineering from ´Ecole Polytechnique and ´Ecole des Ponts et Chausses, Paris, France, in 1994 and 1997 respectively and the Ph.D. degree from ´Ecole des Ponts et Chausses in 2000, with a spe- cialization in applied mathematics. He is professor at MINES ParisTech, Paris, France. From 2003 to 2005, he investigated communica- tions for cooperative systems and the architecture required in distributed systems at INRIA, participat- ing in the CyberCars project. Since 2006, he has been the director of the Joint Research Unit LaRA (La Route Automatis´ee) of INRIA and MINES ParisTech and, since 2008, has also served as the Director of the Center of Robotics in MINES ParisTech. His research inter- ests include cooperative systems (communication, data distribution, control, and mathematical certification) and their applications (Autonomous vehicles, collective taxis...). He coordinates the international research chair Drive for All (with partners UC Berkeley, Shanghai JiaoTong University and EPFL). Dr. de La Fortelle has been elected to the Board of Governors of IEEE Intelligent Transportation System Society in 2009 and is member of the Board of the French Automotive Engineers Society. He is President of the French ANR evaluation committee for sustainable transport and mobility since 2015 and served as expert in European H2020 program. Florent Altch´e received the M.S. degree in engi- neering from French ´Ecole Polytechnique in 2014 and a Specialized Master degree of public policies from ´Ecole des Ponts ParisTech in 2015. He is currently working towards a Ph.D. degree at the Centre for Robotics at Mines ParisTech. His research interests include coordination and cooperation of autonomous vehicles or robots, as well as planning in an uncertain environment. Xiangjun Qian received the B.S. degree in com- puter science from Shanghai Jiao Tong University, Shanghai, China in 2010, the Dip-Ing degree from MINES ParisTech, Paris, France, in 2012, and re- ceived his Ph.D. degree in robotics and automation at MINES ParisTech in 2016. His main research interest lies in the control and coordination of au- tonomous vehicles. He is also interested in the application of machine-learning techniques on the analysis of large-scale transportation networks.
1901.08492
1
1901
2019-01-24T16:44:16
Feudal Multi-Agent Hierarchies for Cooperative Reinforcement Learning
[ "cs.MA", "cs.AI", "cs.LG" ]
We investigate how reinforcement learning agents can learn to cooperate. Drawing inspiration from human societies, in which successful coordination of many individuals is often facilitated by hierarchical organisation, we introduce Feudal Multi-agent Hierarchies (FMH). In this framework, a 'manager' agent, which is tasked with maximising the environmentally-determined reward function, learns to communicate subgoals to multiple, simultaneously-operating, 'worker' agents. Workers, which are rewarded for achieving managerial subgoals, take concurrent actions in the world. We outline the structure of FMH and demonstrate its potential for decentralised learning and control. We find that, given an adequate set of subgoals from which to choose, FMH performs, and particularly scales, substantially better than cooperative approaches that use a shared reward function.
cs.MA
cs
Feudal Multi-Agent Hierarchies for Cooperative Reinforcement Learning Sanjeevan Ahilan 1 Peter Dayan 2 9 1 0 2 n a J 4 2 ] A M . s c [ 1 v 2 9 4 8 0 . 1 0 9 1 : v i X r a Abstract We investigate how reinforcement learning agents can learn to cooperate. Drawing inspiration from human societies, in which successful coordination of many individuals is often facilitated by hierar- chical organisation, we introduce Feudal Multi- agent Hierarchies (FMH). In this framework, a 'manager' agent, which is tasked with maximis- ing the environmentally-determined reward func- tion, learns to communicate subgoals to multiple, simultaneously-operating, 'worker' agents. Work- ers, which are rewarded for achieving managerial subgoals, take concurrent actions in the world. We outline the structure of FMH and demonstrate its potential for decentralised learning and control. We find that, given an adequate set of subgoals from which to choose, FMH performs, and partic- ularly scales, substantially better than cooperative approaches that use a shared reward function. reinforcement 1. Introduction In cooperative multi-agent learning, simultaneously-acting agents must learn to work together to achieve a shared set of goals. A straightforward approach is for each agent to optimise a global objective using single-agent reinforcement learning (RL) methods such as Q-Learning (Watkins & Dayan, 1992) or policy gradients (Williams, 1992; Sutton et al., 2000). Unfortunately this suffers various problems in general. First, from the perspective of any one agent, the environ- ment is non-stationary. This is because as other agents learn, their policies change, creating a partially unobservable influ- ence on the effect of the first agent's actions. This issue has recently been addressed by a variety of deep RL methods, for instance with centralised training of ultimately decen- 1Gatsby Computational Neuroscience Unit, University College London, London, United Kingdom 2Max Planck Institute for Bio- logical Cybernetics, 72076 Tubingen, Germany. Correspondence to: Sanjeevan Ahilan <[email protected]>. tralised policies (Lowe et al., 2017; Foerster et al., 2018). However, this requires that the centralised critic or critics have access to the actions and observations of all agents during training, which may not always be possible. A second problem is coordination; agents must learn how to choose actions coherently, even in environments in which many optimal equilibria exist (Matignon et al., 2012). Whilst particularly challenging when agents are completely independent, such problems can be made more feasible if a form of communication is allowed (Vlassis, 2007). Nev- ertheless, it is difficult for agents to learn how to communi- cate relevant information effectively to solve coordination problems, with most approaches relying on further helpful properties such as a differentiable communication channel (Sukhbaatar et al., 2016; Foerster et al., 2016) and/or a model of the world's dynamics (Mordatch & Abbeel, 2018). Third, multi-agent methods scale poorly -- the effective state space grows exponentially with the number of agents. Learn- ing a centralised value function therefore suffers the curse of dimensionality, whilst the alternative of decentralised learn- ing often appears inadequate for addressing non-stationarity. Optimising a global objective also becomes challenging at scale, as it becomes difficult to assign credit to each agent (Wolpert & Tumer, 2002; Chang et al., 2004). A clue for meeting this myriad of challenges may lie in the way in which human and animal societies are hierarchically structured. In particular, even in broadly cooperative groups, it is frequently the case that different individuals agree to be assigned different objectives which they work towards for the benefit of the collective. For example, members of a company typically have different roles and responsibili- ties. They will likely report to managers who define their objectives, and they may in turn be able to set objectives to more junior members. At the highest level, the CEO is responsible for the company's overall performance. Inspired by this idea, we propose an approach for the multi- agent domain, which organises many, simultaneously acting agents into a managerial hierarchy. Whilst typically all agents in a cooperative task seek to optimise a shared re- ward, in Feudal Multi-agent Hierarchies (FMH) we instead only expose the highest-level manager to this 'task' reward. Feudal Multi-Agent Hierarchies The manager must therefore learn to solve the principal- agent problem (Jensen & Meckling, 1976) of communicat- ing subgoals, which define a reward function, to the worker agents under its control. Workers learn to satisfy these sub- goals by taking actions in the world and/or by setting their own subgoals for workers immediately below them in the hierarchy. FMH allows for a diversity of rewards. This can provide individual agents with a rich learning signal, but necessarily implies that interactions between agents will not in general be fully cooperative. However, the intent of our design is to achieve collective behaviours which are apparently cooperative, from the perspective of an outside observer viewing performance on the task objective. Our idea is a development of a single-agent method for hier- archical RL known as feudal RL (Dayan & Hinton, 1993; Vezhnevets et al., 2017), which involves a 'manager' agent defining subgoals for a 'worker' agent in order to achieve temporal abstraction. Feudal RL allows for the division of tasks into a series of subtasks, but has largely been investi- gated with only one worker per manager acting at any one time. By introducing a feudal hierarchy with multiple agents acting simultaneously in FMH, we not only divide tasks over time but also across worker agents. Furthermore, we em- brace the full multi-agent setting, in which observations are not in general shared across agents. We outline a method to implement FMH for concurrently acting, communicating agents trained in a decentralised fash- ion. Our approach pre-specifies appropriate positions in the hierarchy as well as a mapping from the manager's choice of communication to the workers' reward functions. We show how to facilitate learning of our deep RL agents within FMH through suitable pretraining and repeated communication to encourage temporally extended goal-setting. We conduct a range of experiments that highlight the advan- tages of FMH. In particular, we show its ability to address non-stationarity during training, as managerial reward ren- ders the behaviour of workers more predictable. We also demonstrate FMH's ability to scale to many agents and many possible goals, as well as to enable effective coordina- tion amongst workers. It performs substantially better than both decentralised and centralised approaches. 2. Background 2.1. Markov Decision Processes Single-agent RL can be formalised in terms of Markov Decision Processes, which consist of sets of states S and actions A, a reward function r : S×A → R and a transition function T : S × A → ∆(S), where ∆(S) denotes the set of discrete probability distributions over S. Agents act future reward, defined as Eπ[(cid:80)∞ according to a stochastic policy π : S × A → [0, 1]. One popular objective is to maximise the discounted expected t=0 γtr(st, at)] where the expectation is over the sequence of states and actions which result from policy π, starting from an initial state distribution ρ0 : S → [0, 1]. Here γ ∈ [0, 1) is a discount factor and t is the time step. This objective can be equivalently expressed as Es∼ρπ,a∼π[r(s, a)], where ρπ is the discounted state distribution induced by policy π starting from ρ0. 2.2. Deterministic Policy Gradient Algorithms Deterministic policy gradients (DPG) is a frequently used single-agent algorithm for continuous control using model- free RL (Silver et al., 2014). It uses deterministic policies µθ : S → A, whose parameters θ are adjusted in an off- policy fashion using an exploratory behavioural policy to perform stochastic gradient ascent on an objective J(θ) = Es∼ρµ,a∼µθ [r(s, a)]. We can write the gradient of J(θ) as: ∇θJ(θ) = Es∼ρµ[∇θµθ(s)∇aQµ(s, a)a=µθ(s)]. (1) Deep Deterministic Policy Gradients (DDPG) (Lillicrap et al., 2015) is a variant with policy µ and critic Qµ being represented via deep neural networks. Like DQN (Mnih et al., 2015), DDPG stores experienced transitions in a re- play buffer and replays them during training. 2.3. Markov Games A partially observable Markov game (POMG) (Littman, 1994; Hu et al., 1998) for N agents is defined by a set of states S, and sets of actions A1, ...,AN and observations O1, ...,ON for each agent. In general, the stochastic policy of agent i may depend on the set of action-observation histories Hi ≡ (Oi × Ai)∗ such that πi : Hi × Ai → [0, 1]. In this work we restrict ourselves to history-independent stochastic policies πi : Oi × Ai → [0, 1]. The next state is generated according to the state transition function T : S × A1 × ... × An → ∆(S). Each agent i obtains deterministic rewards defined as ri : S ×A1× ...×An → R and receives a private observation oi : S → Oi. There is an initial state distribution ρ0 : S → [0, 1] and each agent aims to maximise its own discounted sum of future rewards. 2.4. Centralised and Decentralised Training In multi-agent RL, agents can be trained in a centralised or decentralised fashion. In decentralised training, agents have access only to local information: their own action and observation histories during training (Tan, 1993). Agents are often trained using single-agent methods for RL, such as Q-Learning or DDPG. In centralised training, the action and observation histories Feudal Multi-Agent Hierarchies of all agents are used, effectively reducing the multi-agent problem to a single-agent problem. Although it may appear restrictive for agents to require access to this full informa- tion, this approach has generated recent interest due to the potential for centralised training of ultimately decentralised policies (Lowe et al., 2017; Foerster et al., 2018). For exam- ple, in simulation one can train a Q-function, known as a critic, which exploits the action and observation histories of all agents to aid the training of local policies for each one. These policies can then be deployed in multi-agent systems in the real world, where centralisation may be infeasible. 2.5. Multi-Agent Deep Determinstic Policy Gradients Multi-agent deep deterministic policy gradients (MADDPG) (Lowe et al., 2017) is an algorithm for centralised training and decentralised control of multi-agent systems. It uses deterministic polices, as in DDPG, which condition only on each agent's local observations and actions. MADDPG handles the non-stationarity associated with the simultane- ous adaptation of all the agents by introducing a separate centralised critic for each agent. Lowe et al., trained history- independent feedforward networks on a range of mixed cooperative-competitive environments, significantly improv- ing upon agents trained independently with DDPG. 3. Methods We propose FMH, a framework for multi-agent RL which addresses the three major issues outlined in the introduction: non-stationarity, scalability and coordination. In order to increase the generality of our approach, we do so without requiring a number of potentially helpful features: access to the observations of all agents (as in centralised training), a differentiable model of the world's dynamics or a differen- tiable communication channel between agents. 3.1. Hierarchies We begin by defining the type of hierarchical structure we create for the agents. In its most straightforward setting, this hierarchy corresponds to a rooted directed tree, with the highest level manager as the root node and each worker reporting to only a single manager. Our experiments use this structure, although, for simplicity, using just two-level hierarchies. However, we also note the possibility, in more exotic circumstances, of considering more general directed acyclic graphs in which a single worker reports to multiple managers, and allowing for more than one manager at the highest level of the hierarchy. Acyclicity prevents poten- tially disastrous feedback cycles for the reward. Appropriate assignment of agents to positions in a hierarchy should depend on the varied observation and action capa- bilities of the agents. Agents exposed to key information associated with global task performance are likely to be suited to the role of manager, whereas agents with more narrow information, but which can act to achieve subgoals are more naturally suited to being workers. As we show in our experiments, identifying these differences can often make assigning agents straightforward. Here, we specify positions directly, to focus on demonstrating the resulting effectiveness of the hierarchy. However, extensions in which the hierarchy is itself learned would be interesting. 3.2. Goal-Setting In FMH, managers set goals for workers by defining their rewards. To arrange this, managers communicate a special kind of message to workers that defines the workers' reward functions according to a specified mapping. For example, if there are three objects in a room, we might allow the manager to select from three different messages, each defin- ing a worker reward function proportional to the negative distance from a corresponding object. Our experiments ex- plore variants of this scheme, imposing the constraint that the structure of the reward function remain fixed whilst the target is allowed to change. In this context and task, mes- sages therefore correspond to 'goals' requiring approach to different objects. The manager must learn to communicate these goals judiciously in order to solve complex tasks. In turn, the workers must learn how to act in the light of the re- sulting managerial reward, in addition to immediate rewards (or costs) they might also experience. Figure 1. An example of a worker-computed Feudal Multiagent Hierarchy with one manager agent and two worker agents. Worker rewards are goal-dependent and computed locally, the manager's reward is provided by the environment. Since a communicated goal is simply another type of action for the manager, our approach is consistent with the formal- ism of a (partially-observable) Markov game, for which the ManagerWorker 1Worker 2Environment Feudal Multi-Agent Hierarchies reward for agent i is defined as ri : S ×A1 × ...×An → R. However, the worker's reward need not be treated as part of the environment. For instance, each worker agent i could compute its own reward locally ri : Oi×Ai → R, where Oi includes the observed goal from the manager. We illustrate this 'worker-computed' interpretation in Fig. 1. 3.3. Pretraining and Temporally Extended Subgoals We next consider the issue of non-stationarity. This fre- quently arises in multi-agent RL because the policies of other agents may change in unpredictable ways as they learn. By contrast, in FMH we allow manager agents to determine the reward functions of workers, compelling the workers towards more predictable behaviour from the perspective of the manager. However, the same issue applies at the starting point of learning for workers: they will not yet have learned how to satisfy the goals. We would therefore expect a manager to underestimate the value of the subgoals it se- lects early in training, potentially leading it sub-optimally to discard subgoals which are harder for the worker to learn. Thus, it would be beneficial for worker agents already to have learned to fulfill managerial subgoals. We address this issue practically in two steps. First, we introduce a bottom-up 'pretraining' procedure, in which we initially train the workers before training the manager. Although the manager is not trained during this period, it still acts in the multi-agent environment and sets subgoals for the worker agents. As subgoals are initially of (approximately) equal value, the manager will explore them uniformly. If the set of possible subgoals is sufficiently compact, this will enable workers to gain experience of each potential subgoal. This pretraining does not completely solve the non- stationarity problem. This is because the untrained manager will, with high probability, vacillate between subgoals, pre- venting the workers under its command from having any reasonable hope of extracting reward. We therefore want managers not only to try out a variety of subgoals but also to commit to them long enough that they have any hope of being at least partially achieved. Thus, the second compo- nent of the solution is a communication-repeat heuristic for the manager such that goal-setting is temporally extended. We demonstrate its effectiveness in our experiments. 3.4. Coordination Multi-agent problems may have many equilibria, and good ones can only be achieved through effective coordination of agent behaviour. In FMH, the responsibility of coordination is incumbent upon the manager, which exerts control over its workers through its provision of reward. We show in the simplified setting of a matrix game, how a manager may coordinate the actions of its workers (see Suppl. Mat. C). 3.5. FMH-DDPG FMH provides a framework for rewarding agents in multi- agent domains, and can work with many different RL algo- rithms. In our experiments, we chose to apply FMH in com- bination with the single-agent algorithm DDPG, trained in a fully decentralised fashion. As we do not experiment with combining FMH with any other algorithm, we frequently refer to FMH-DDPG simply as FMH. 3.6. Parameter Sharing We apply our method to scenarios in which a large number of agents have identical properties. For convenience, when training using a decentralised algorithm (FMH-DDPG or vanilla DDPG) we implement parameter sharing among identical agents, in order to train them efficiently. We only add experience from a single agent (among those sharing parameters) into the shared replay buffer, and carry out a single set of updates. We find this gives very similar results to training without parameter sharing, in which each agent is updated using its own experiences stored in its own replay buffer (see Suppl. Mat. A.2). 4. Experiments and Results We used the multi-agent particle environment1 as a frame- work for conducting experiments to test the potential of our method to address the issues of non-stationarity, scala- bility and coordination, comparing against MADDPG and DDPG. We will release code for both the model and the environments after the reviewing process ends. The RL agents have both an actor and a critic, each cor- responding to a feedforward neural network. We give a detailed summary of all hyperparameters used in Suppl. Mat. A.1. 4.1. Cooperative Communication We first experiment with an environment implemented in Lowe et al. (2017) called 'Cooperative Communication' (Figure 2a), in which there are two cooperative agents, one called the 'speaker' and the other called the 'listener', placed in an environment with many landmarks of differing colours. On each episode, the listener must navigate to a randomly selected landmark; and in the original problem, both lis- tener and speaker obtain reward proportional to the negative distance2 of the listener from the correct target. However, whilst the listener observes its relative position from each of the differently coloured landmarks, it does not know to which landmark it must navigate. Instead, the colour of the 1https://github.com/openai/multiagent-particle-envs 2The original implementation used the negative square distance; we found this slightly worse for all algorithms. Feudal Multi-Agent Hierarchies Figure 2. Cooperative Communication with 1 listener and 12 landmarks. (a) The speaker (grey circle) sees the colour of the listener (green circle) , which indicates the target landmark (green square). It communicates a message to the listener at every time step. Here there are 12 landmarks and the agent trained using FMH has successfully navigated to the correct landmark. (b) FMH substantially outperforms MADDPG and DDPG. The dotted green line indicates the end of pretraining for FMH. (c) FMH worker reward and the probability of the manager correctly assigning the correct target to the worker. The manager learns to assign the target correctly with probability 1. target landmark can be seen by the speaker, which cannot observe the listener and is unable to move. The speaker can however communicate to the listener at every time step, and so successful performance on the task corresponds to the speaker enabling the listener to reach the correct target. We also note that, although reward is provided during the episode, it is used only for training agents and not directly observed, which means that agents cannot simply learn to follow the gradient of reward. Although this task seems simple, it is challenging for many RL methods. Lowe et al. (2017) trained, in a decentralised fashion, a variety of single-agent algorithms, including DDPG, DQN and trust-region policy optimisation (Schul- man et al., 2015) on a version of this problem with three landmarks and demonstrated that they all perform poorly on this task. Of these methods, DDPG reached the highest level of performance and so we use DDPG as the strongest commonly used baseline for the decentralised approach. We also compare our results to MADDPG, which combines DDPG with centralised training. MADDPG was found to perform strongly on Cooperative Communication with three landmarks, far exceeding the performance of DDPG. For our method, FMH, we also utilised DDPG, but reverted to the more generalizable decentralized training that was previously ineffective. Crucially, we assigned the speaker the role of manager and the listener the role of worker. The speaker can therefore communicate messages which corre- spond to the subgoals of the different coloured landmarks. The listener is not therefore rewarded for going to the correct target but is instead rewarded proportional to the negative distance from the speaker-assigned target. The speaker itself is rewarded according to the original problem definition, the negative distance of the listener from the true target. We investigated in detail a version of Cooperative Commu- nication with 12 possible landmarks (Figure 2a). FMH per- formed significantly better than both MADDPG and DDPG (Figure 2b) over a training period of 100 epochs (each epoch corresponds to 1000 episodes). For FMH, we pretrained the worker for 10 epochs and enforced extended communication over 8 time steps (each episode is 25 time steps). In Figure 2c, the left axis shows the reward received by the FMH worker (listener) over training. This increased during pretraining and again immediately after pretraining concludes. Managerial learning after pretraining resulted in decreased entropy of communication over the duration of an episode (see Suppl. Mat. A.3), allowing the worker to optimise the managerial objective more effectively. This in turn enabled the manager to assign goals correctly, with the rise in the probability of correct assignment occurring shortly thereafter (right axis), then reaching perfection. Our results show how FMH resolves the issue of non- stationarity. Initially, workers are able to achieve reward by learning to optimise managerial objectives, even whilst the manager itself is not competent. This learning elicits robust behaviour from the worker, conditioned on manage- rial communication, which makes workers more predictable from the persepective of the manager. This then enables the manager to achieve competency -- learning to assign goals so as to solve the overall task. Our implementation of FMH used both pretraining and ex- tended goal-setting with a communication repeat heuristic. In Suppl. Mat. A.4, we show that pretraining the worker improved performance on this task, although even with- out pretraining FMH still performed better than MADDPG and DDPG. The introduction of extended communication is however more critical. In Figure 3 we show the performance of FMH with goal-setting over various number of time steps (and fixed pretraining period of 10 epochs). When there (a)(b)(c) NUMBER OF LISTENERS LANDMARKS 1 1 1 3 5 10 3 6 12 6 6 6 Feudal Multi-Agent Hierarchies FINAL REWARD MADDPG DDPG FMH −6.63 ± 0.05 −6.58 ± 0.03 −14.26 ± 0.07 −17.28 −6.91 ± 0.07 −6.69 ± 0.06 −18.10 ± 0.07 −18.95 −7.79 ± 0.06 −15.96 ± 0.09 −19.32 ± 0.11 −19.56 −7.10 ± 0.04 −11.13 ± 0.03 −18.90 ± 0.05 −18.95 −7.17 ± 0.03 −18.47 ± 0.04 −19.73 ± 0.06 −18.95 −8.96 ± 0.03 −19.80 ± 0.06 −21.19 ± 0.03 −18.95 COM FMH MADDPG 24 66 − − 75 59 EPOCHS UNTIL CONVERGENCE DDPG 55 42 36 50 53 32 56 57 − 77 79 − Table 1. Performance of FMH, MADDPG and DDPG for versions of Cooperative Communication with different numbers of listeners and landmarks. Final reward is determined by training for 100 epochs and evaluating the mean reward per episode in the final epoch. We indicate no convergence with a − symbol. For further details see Sup. Mat. A.6. were no communication repeats (Comm 1), performance was similar to MADDPG, but introducing even a single repeat greatly improved performance. By contrast, introduc- ing communication repeats to MADDPG did not improve performance (see Suppl. Mat. A.5). Figure 3. Communication sent by the manager is re- peated for extended goal-setting over var- ious numbers of time steps. 4.1.1. SCALING TO MANY AGENTS We next scaled Cooperative Communication to include many listener agents. At the beginning of an episode each listener is randomly assigned a target out of all the possible landmarks and the colour of each listener's target is ob- served by the speaker. The speaker communicates a single message to each listener at every time step. To allow for easy comparison with versions of Cooperative Communi- cation with only one listener, we normalised the reward by the number of listeners. As discussed in the methods, we shared parameters across listeners for FMH and DDPG. In Table 1 we show the performance of FMH, MADDPG and DDPG for variants of Cooperative Communication with different numbers of listener agents and landmarks. Con- sider the version with 6 landmarks, which we found that MADDPG could solve with a single listener within 100 epochs (unlike for 12 landmarks). On increasing the num- ber of listeners up to a maximum of 10, we found that FMH scales much better than MADDPG; FMH was able to learn an effective policy with 5 listener agents whereas MAD- DPG could not. Further, FMH even scaled to 10 listeners, although it did not converge over the 100 epochs. To aid interpretation of the reward values in Table 1 we also compare performance to a policy which simply moves to the centroid of the landmarks. This 'Centre of Mass' (CoM) agent was trained using MADDPG until convergence on a synthetic task in which reaching the centroid is maximally rewarded, and then evaluated on the true version of the task. We find that both MADDPG and DDPG do not perform better than the CoM agent when there are 10 listeners and 6 landmarks. In Figure 4 we show the final state achieved on an example episode of this version of the task, for agents trained using MADDPG and FMH. After training for 100 epochs, MAD- DPG listeners do not find the correct targets by the end of the episode whereas FMH listeners manage to do so. Figure 4. Scaling Cooperative Communication to 10 listeners with 6 landmarks - final time step on example episode. 4.2. Cooperative Coordination We then designed a task to test coordination called 'Coop- erative Coordination' (Figure 5a). In this task, there are 6 landmarks. At the beginning of each episode 3 landmarks are randomly selected to be green targets and 3 blue decoys. A team of 3 agents must navigate to cover the green targets whilst ignoring the blue decoys, but they are unable to see the colours of the landmarks. A fourth agent, the speaker, can see the colours of the landmarks and can send messages to the other agents (but cannot move). All agents can see MADDPGFMH Feudal Multi-Agent Hierarchies Figure 5. Cooperative Coordination (a) Three listeners (light grey agents) must move to cover the green landmarks whilst ignoring the blue landmarks. However, only the speaker (dark grey agent) can see the landmarks' colours; it communicates with the listeners at every time step. In this example, FMH agents have successfully coordinated to cover the three correct targets. (b) FMH performs significantly better than MADDPG and DDPG. The dotted green line indicates the end of pretraining for FMH. (c) Agents trained using FMH cover on average more targets, by the end of the episode, than MADDPG and DDPG (d) Agents trained using FMH avoid collisions more effectively than MADDPG and DDPG over the duration of an episode. each others' positions and velocities, are large in size and face penalties if they collide with each other. The task shares aspects with 'Cooperative Navigation' from (Lowe et al., 2017) but is considerably more complex due to the greater number of potential targets and the hidden information. We apply FMH to this problem, assigning the speaker agent the role of manager. One consideration is whether the man- ager, the worker, or both should receive the negative penal- ties due to worker collisions. Here we focus on the case in which the manager only concerns itself with the 'task' re- ward function. Penalties associated with collisions are there- fore experienced only by the workers themselves, which seek to avoid these whilst still optimising the managerial objective. In Figure 5b we compare the performance of FMH to MAD- DPG and DDPG. As with Cooperative Communication, FMH does considerably better than both after training for 150 epochs. This is further demonstrated when we evaluate the trained policies over a period of 10 epochs: Figure 5c shows the mean number of targets covered by the final time step of the episode, for which FMH more than doubles MADDPG. Figure 5d shows the mean number of collisions (which are negatively rewarded) during an episode. FMH collides very rarely whereas MADDPG and DDPG collide over 4 times more frequently. We also implement a version of Cooperative Coordination in which the manager is responsible not only for coordinating its workers but must also navigate to targets itself. We find that it can learn to do both roles effectively (see Suppl. Mat. B.2.1). 4.2.1. EXPLOITING DIVERSITY One role of a manager is to use the diversity it has available in its workers to solve tasks more effectively. We tested this in a version of Cooperative Coordination in which one of the listener agents was lighter than the other two and so could reach farther targets more quickly. We trained FMH (without parameter sharing due to the diversity) on this task and then evaluated the trained policies on a 'Two-Near, One-Far' (TNOF) version of the task in which one target is far away and the remaining two are close (see Suppl. Mat. B.2.2). We did this to investigate whether FMH, which was trained on the general problem, had learned the specific strategy of assigning the farthest target to the fastest agent. We found this this to be true 100 percent of the time (evaluating over 10 epochs); we illustrate this behaviour in Figure 6. Figure 6. FMH solves the TNOF task (example episode). Left: Agents are initialised at the bottom of the environment, two targets are close by, and one far away. Right: By the end of the episode, the faster (red) agent covers the farther target on the right, despite starting on the left. (a)(b)(c)(d) Feudal Multi-Agent Hierarchies 5. Discussion We have shown how cooperative multi-agent problems can be solved efficiently by defining a hierarchy of agents. Our hierarchy was reward-based, with manager agents setting goals for workers, and with the highest level manager opti- mising the overall task objective. Our method, called FMH, was trained in a decentralised fashion and showed consider- ably better scaling and coordination than both centralised and decentralised methods that used a shared reward func- tion. Our work was partly inspired by the feudal RL architecture (FRL) (Dayan & Hinton, 1993), a single-agent method for hierarchical RL (Barto & Mahadevan, 2003) which was also developed in the context of deep RL by Vezhnevets et al. (2017). In particular, FMH addresses the 'too many chiefs' inefficiency inherent to FRL, namely that each manager only has a single worker under its control. A much wider range of management possibilities and benefits arises when multiple agents operate at the same time to achieve one or more tasks (Busoniu et al., 2008). We focused on the cooperative setting (Panait & Luke, 2005); however, unlike the fully-cooperative setting, in which all agents optimise a shared reward function (Boutilier, 1996) our approach introduces a diversity of rewards, which can help with credit- assignment (Wolpert & Tumer, 2002; Chang et al., 2004) but also introduces elements of competition. This competition need not always be deleterious; for example, in some cases, an effective way of optimising the task objective might be to induce competition amongst workers, as in generative adversarial networks (Goodfellow et al., 2014). We followed FRL (though not all its successors; (Vezhn- evets et al., 2017) in isolating the workers from much of the true environmental reward, making them focus on their own narrower tasks. Such reward hiding was not complete -- we considered individualised or internalised costs from collisions that workers experienced directly, such that their reward was not purely managerially dependent. A more complete range of possibilities for creating and decompos- ing rewards between managers and workers when the objec- tives of the two are not perfectly aligned, could usefully be studied under the aegis of principal-agent problems (Jensen & Meckling, 1976; Laffont & Martimort, 2009). Goal-setting in FMH was achieved by specifying a relation- ship between the chosen managerial communication and the resulting reward function. The communication was also incorporated into the observational state of the worker; how- ever, the alternative possibility of a goal-embedding would be worth exploring (Vezhnevets et al., 2017). We also speci- fied goals directly in the observational space of the workers, whereas Vezhnevets et al. specified goals in a learned hidden representation. This would likely be of particular value for problems in which defining a set of subgoals is challenging, such as those which require learning directly from pixels. More generally, work on the way that agents can learn to construct and agree upon a language for goal-setting would be most important. To train our multi-agent systems we leveraged recent ad- vances in the field of deep RL; in particular the algorithm DDPG (Lillicrap et al., 2015), which can learn in a de- centralised fashion. Straightforward application of this al- gorithm has been shown to achieve some success in the multi-agent domain (Gupta et al., 2017) but also shown it to be insufficient in handling more complex multi-agent problems (Lowe et al., 2017). By introducing a managerial hierarchy, we showed that FMH-DDPG has the potential to greatly facilitate multi-agent learning whilst still retaining the advantage of decentralised training. Our proposed ap- proach could also be combined with centralised methods, and this would be worth further exploration. Other work in multi-agent RL has also benefitted from ideas from hierarchical RL. The MAXQ algorithm (Dietterich, 2000) has been used to train homogenous agents (Makar et al., 2001), allowing them to coordinate by communicat- ing subtasks rather than primitive actions, an idea recently re-explored in the context of deep RL (Tang et al., 2018). A meta-controller which structures communication between agent pairs in order to achieve coordination has also been proposed (Kumar et al., 2017) (and could naturally be hy- bridized with FMH), as well as the use of master-slave architecture which merges the actions of a centralised mas- ter agent with those of decentralised slave agents (Kong et al., 2017). Taken together, these methods represent inter- esting alternatives for invoking hierarchy which are unlike our primarily reward-based approach. There are a number of additional directions for future work. First, the hierarchies used were simple in structure and spec- ified in advance, based on our knowledge of the various information and action capabilities of the agents. It would be interesting to develop mechanisms for the formation of complex hierarchies. Second, in settings in which workers can acquire relevant task information, it would be worth- while investigating how a manager might incentivise them to provide this. Third, it would be interesting to consider how a manager might learn to allocate resources, such as money, computation or communication bandwidth to en- able efficient group behaviour. Finally, we did not explore how managers should train or supervise the workers beneath them, such as through reward shaping (Ng et al., 1999). Such an approach might benefit from recurrent networks, which could enable managers to use the history of worker performance to better guide their learning. Feudal Multi-Agent Hierarchies 6. Acknowledgements We would like to thank Heishiro Kanagawa, Jorge A. Menen- dez and Danijar Hafner for helpful comments on a draft ver- sion of the manuscript. Sanjeevan Ahilan received funding from the Gatsby Computational Neuroscience Unit and the Medical Research Council. Peter Dayan received funding from the Max Planck Society. References Barto, A. G. and Mahadevan, S. Recent advances in hier- archical reinforcement learning. Discrete event dynamic systems, 13(1-2):41 -- 77, 2003. Boutilier, C. Planning, learning and coordination in multia- gent decision processes. In Proceedings of the 6th confer- ence on Theoretical aspects of rationality and knowledge, pp. 195 -- 210. Morgan Kaufmann Publishers Inc., 1996. Hu, J., Wellman, M. P., et al. Multiagent reinforcement In learning: theoretical framework and an algorithm. ICML, volume 98, pp. 242 -- 250. Citeseer, 1998. Jensen, M. C. and Meckling, W. H. Theory of the firm: Man- agerial behavior, agency costs and ownership structure. Journal of financial economics, 3(4):305 -- 360, 1976. Kong, X., Xin, B., Liu, F., and Wang, Y. Revisiting the master-slave architecture in multi-agent deep reinforce- ment learning. arXiv preprint arXiv:1712.07305, 2017. Kumar, S., Shah, P., Hakkani-Tur, D., and Heck, L. Fed- erated control with hierarchical multi-agent deep rein- forcement learning. arXiv preprint arXiv:1712.08266, 2017. Laffont, J.-J. and Martimort, D. The theory of incentives: the principal-agent model. Princeton university press, 2009. Busoniu, L., Babuska, R., and De Schutter, B. A comprehen- sive survey of multiagent reinforcement learning. IEEE Transactions on Systems, Man, And Cybernetics-Part C: Applications and Reviews, 38 (2), 2008, 2008. Lillicrap, T. P., Hunt, J. J., Pritzel, A., Heess, N., Erez, T., Tassa, Y., Silver, D., and Wierstra, D. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971, 2015. Chang, Y.-H., Ho, T., and Kaelbling, L. P. All learning is local: Multi-agent learning in global reward games. In Advances in neural information processing systems, pp. 807 -- 814, 2004. Dayan, P. and Hinton, G. E. Feudal reinforcement learning. In Advances in neural information processing systems, pp. 271 -- 278, 1993. Dietterich, T. G. Hierarchical reinforcement learning with the maxq value function decomposition. Journal of Arti- ficial Intelligence Research, 13:227 -- 303, 2000. Foerster, J., Assael, I. A., de Freitas, N., and Whiteson, S. Learning to communicate with deep multi-agent rein- forcement learning. In Advances in Neural Information Processing Systems, pp. 2137 -- 2145, 2016. Foerster, J. N., Farquhar, G., Afouras, T., Nardelli, N., and Whiteson, S. Counterfactual multi-agent policy gradi- In Thirty-Second AAAI Conference on Artificial ents. Intelligence, 2018. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. Generative adversarial nets. In Advances in neural information processing systems, pp. 2672 -- 2680, 2014. Gupta, J. K., Egorov, M., and Kochenderfer, M. Cooperative multi-agent control using deep reinforcement learning. In International Conference on Autonomous Agents and Multiagent Systems, pp. 66 -- 83. Springer, 2017. Littman, M. L. Markov games as a framework for multi- agent reinforcement learning. In Machine Learning Pro- ceedings 1994, pp. 157 -- 163. Elsevier, 1994. Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, O. P., and Mordatch, I. Multi-agent actor-critic for mixed cooperative-competitive environments. In Advances in Neural Information Processing Systems, pp. 6379 -- 6390, 2017. Makar, R., Mahadevan, S., and Ghavamzadeh, M. Hierarchi- cal multi-agent reinforcement learning. In Proceedings of the fifth international conference on Autonomous agents, pp. 246 -- 253. ACM, 2001. Matignon, L., Laurent, G. J., and Le Fort-Piat, N. Inde- pendent reinforcement learners in cooperative markov games: a survey regarding coordination problems. The Knowledge Engineering Review, 27(1):1 -- 31, 2012. Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje- land, A. K., Ostrovski, G., et al. Human-level control through deep reinforcement learning. Nature, 518(7540): 529, 2015. Mordatch, I. and Abbeel, P. Emergence of grounded com- positional language in multi-agent populations. In Thirty- Second AAAI Conference on Artificial Intelligence, 2018. Ng, A. Y., Harada, D., and Russell, S. Policy invariance under reward transformations: Theory and application to reward shaping. In ICML, volume 99, pp. 278 -- 287, 1999. Feudal Multi-Agent Hierarchies Panait, L. and Luke, S. Cooperative multi-agent learning: The state of the art. Autonomous agents and multi-agent systems, 11(3):387 -- 434, 2005. Schulman, J., Levine, S., Abbeel, P., Jordan, M., and Moritz, In International P. Trust region policy optimization. Conference on Machine Learning, pp. 1889 -- 1897, 2015. Silver, D., Lever, G., Heess, N., Degris, T., Wierstra, D., and Riedmiller, M. Deterministic policy gradient algorithms. In ICML, 2014. Sukhbaatar, S., Fergus, R., et al. Learning multiagent com- munication with backpropagation. In Advances in Neural Information Processing Systems, pp. 2244 -- 2252, 2016. Sutton, R. S., McAllester, D. A., Singh, S. P., and Mansour, Y. Policy gradient methods for reinforcement learning with function approximation. In Advances in neural in- formation processing systems, pp. 1057 -- 1063, 2000. Tan, M. Multi-agent reinforcement learning: Independent vs. cooperative agents. In Proceedings of the tenth inter- national conference on machine learning, pp. 330 -- 337, 1993. Tang, H., Hao, J., Lv, T., Chen, Y., Zhang, Z., Jia, H., Ren, C., Zheng, Y., Fan, C., and Wang, L. Hierarchical deep multiagent reinforcement learning. arXiv preprint arXiv:1809.09332, 2018. Vezhnevets, A. S., Osindero, S., Schaul, T., Heess, N., Jader- berg, M., Silver, D., and Kavukcuoglu, K. Feudal net- works for hierarchical reinforcement learning. In Interna- tional Conference on Machine Learning, pp. 3540 -- 3549, 2017. Vlassis, N. A concise introduction to multiagent systems and distributed artificial intelligence. Synthesis Lectures on Artificial Intelligence and Machine Learning, 1(1): 1 -- 71, 2007. Watkins, C. J. and Dayan, P. Q-learning. Machine learning, 8(3-4):279 -- 292, 1992. Williams, R. J. Simple statistical gradient-following algo- rithms for connectionist reinforcement learning. Machine learning, 8(3-4):229 -- 256, 1992. Wolpert, D. H. and Tumer, K. Optimal payoff functions for members of collectives. In Modeling complexity in eco- nomic and social systems, pp. 355 -- 369. World Scientific, 2002. Feudal Multi-Agent Hierarchies A. Experimental Results A.1. Parameter settings In all of our experiments, we used the Adam optimizer with a learning rate of 0.001 and τ = 0.01 for updating the target networks. γ was 0.75. The size of the replay buffer was 107 and we updated the network parameters after every 100 samples added to the replay buffer. We used a batch size of 1024 episodes before making an update. For our feedforward networks we used two hidden layers with 256 neurons per layer. We trained with 10 random seeds (except otherwise stated). Hyperparameters were optimised using a line search centred on the experimental parameters used in (Lowe et al., 2017). Our optimised parameters were found to be identical except for a lower value of γ (0.75) and of the learning rate (0.001), and a larger replay buffer (107). We found these values gave the best performance for both MADDPG and FMH on a version of Cooperative Communication with 6 landmarks evaluated after 50 epochs (an epoch is defined to be 1000 episodes). S2). Agents are trained on Cooperative Communication with 12 landmarks and a single listener. As the target does not change during the middle of an episode, we expect the entropy to decrease as agents learn. For FMH, during pretraining, entropy is high as all goals are sampled approximately uniformly (but with enforced ex- tended communication over 8 time steps). However, shortly after pretraining ends the entropy of managerial communi- cation rapidly decreases. This is in contrast to MADDPG which decreases in entropy more steadily. Figure S2. Entropy of managerial com- munication over the duration of an episode at different stages in training A.2. Parameter Sharing A.4. Pretraining We implemented parameter sharing for the decentralised algorithms DDPG and FMH. To make training results ap- proximately similar to implementations which do not use parameter sharing we restrict updates to a single agent and add experience only from a single agent to the shared re- play buffer (amongst those sharing parameters). We find in practice that both approaches give very similar results for FMH, whereas parameter sharing slightly improves the performance of DDPG -- we show this for a version of Cooperative Communication with 3 listeners and 6 targets (Figure S1). In general sharing parameters reduces train- ing time considerably, particularly as the number of agents scales. does Figure S1. Parameter sharing not affect performance for FMH but slightly improves DDPG. Agents trained using FMH were pretrained for 10 epochs across all experiments. During pretraining all agents act in the multi-agent environment. Although all experiences are added appropriately into the replay buffers, the manager does not update its parameters during pretraining whereas the workers do. We show the benefits of pretraining on Cooperative Com- munication with 12 landmarks and a single listener agent in Figure S3. Figure S3. Pretraining improves FMH, al- though agents can still learn effectively without it. We use extended communi- cation (goal-setting) for 8 time steps. A.3. Entropy of Communication We show the change in entropy of communication over the duration of an episode for the various algorithms (Figure A.5. Extended Communication In the main text we showed that extended goal-setting in FMH lead to substantially improved performance. We also considered whether a similar approach would benefit meth- ods which do not treat communication as goals. We found that extended communication did not help MAD- DPG on the same task, with learning curves being in all Feudal Multi-Agent Hierarchies cases virtually identical (Figure S4). Figure S4. Extended commu- nication does not significantly improve the performance of MADDPG. A.6. Further details on Table 1 Values in the table were determined using 10 random seeds in all cases, except for the one exception of MADDPG with 10 listeners and 6 landmarks, which used 3 random seeds (training time is substantially longer as we do not share parameters). The CoM agent was trained on the synthetic task with different numbers of landmarks. Performance of the trained CoM policies was then evaluated over a period of 10 epochs on the corresponding true tasks. Convergence was determined by comparing the mean perfor- mance in the final 5 epochs with the mean performance of a sliding window 5 epochs in width (we also take the mean across random seeds). If the mean performance within the window was within 2 percent of the final performance, and remained so for all subsequent epochs, we defined this as convergence, unless the first time this happened was within the final 10 epochs. In such a case, we define the algorithm as not having converged. For assessing the exact time of convergence in the case of FMH we report values which include the 10 epochs of pretraining. A.7. Cooperative Communication with 3 landmarks For reference we show performance of the various algo- rithms on Cooperative Communication with 3 landmarks. Both MADDPG and FMH perform well on this task, al- though MADDPG reaches convergence more rapidly (Fig- ure S5). Figure S5. Cooperative Communication with 1 listener and 3 landmarks. B. Environments B.1. Cooperative Communication We provide further details on our version of Cooperative Communication (see main text for original description). In general, we keep environment details the same as Lowe et al., including the fact that the manager only has access to the target colour. However, we also scale up the number of coloured landmarks, which we do by taking the RGB values provided in the multi-agent particle environment, [0.65, 0.15, 0.15], [0.15, 0.65, 0.15], [0.15, 0.15, 0.65], and adding 9 more by placing them on the remaining vertices of the corresponding cube and at the centre-point of four of the faces (in RGB space). The colours for the 12 landmarks are therefore: [0.65, 0.15, 0.15], [0.15, 0.65, 0.15], [0.15, 0.15, 0.65], [0.65, 0.65, 0.15], [0.15, 0.65, 0.65], [0.65, 0.15, 0.65], [0.65, 0.65, 0.65], [0.15, 0.15, 0.15], [0.40, 0.40, 0.65], [0.40, 0.40, 0.15], [0.15, 0.40, 0.40], [0.65, 0.40, 0.40]. The particular colour values used for the landmarks influ- ences the performance of RL algorithms as landmarks which have similar colours are harder for the speaker to learn to distinguish. B.2. Cooperative Coordination We provide further details on our version of Cooperative Coordination (see main text for original description). The task provides a negative reward of -1 to each agent involved in a collisions. For DDPG and MADDPG this penalty is shared across agents, whereas in FMH only the agents involved in the collision experience this penalty. We also evaluated performance of trained policies in Figures 5c and 5d with slight modifications to the overall task. In the case of Figure 5c, to ensure that targets were never impossible to achieve by overlapping with the immobile manager, we moved the manager off-screen. For Figure 5d we ensured that agent positions were never initialised in a way such that they would automatically collide (such cases are rare). B.2.1. COORDINATION WITH A MOBILE MANAGER We implemented a version of Cooperative Coordination with 2 listeners and 1 speaker which together need to cover the 3 green targets. The manager must multi-task, directing workers to the correct targets whilst also covering these targets itself. We find that the manager learns to do this, outperforming both MADDPG and DDPG (Figure S6) Feudal Multi-Agent Hierarchies Figure S6. FMH performs well, even when the manager is required to move to cover targets whilst also setting goals for workers B.2.2. THE TWO-NEAR, ONE-FAR TASK This task is not used for training but to evaluate the per- formance of agents trained on a version of Cooperative Coordination in which one agent is twice as light as normal and the remaining two are twice as heavy. Evaluating the optimal assignments on this task can be dif- ficult, so we assess it in the more easily interpreted TNOF environment. In TNOF, the agents start at the bottom of the environment. Two green targets are located nearby (in bot- tom 40 percent of screen) whereas one target is far away (in top 30 percent of screen). The x-coordinates are randomly sampled at the beginning of each episode and blue decoys are also added (one nearby, two far). C. Solving a Coordination Game Some of the most popular forms of multiagent task are coordination games from microeconomics in which there are multiple good and bad Nash equilibria, and it is necessary to find the former. It is intuitively obvious that appointing one of the agents as a manager might resolve the symmetries inherent in cooperative coordination game in which agents need to take different actions to receive reward: Player Y A B Player X A (0, 0) B (1, 1) (1, 1) (0, 0) This game has two pure strategy Nash equilibria and one mixed strategy Nash equilibrium which is Pareto dominated by the pure strategies. The challenge of this game is for both agents to choose a single Pareto optimal Nash equilibrium, either (A, B) or (B, A). For a matrix game, we define the feudal approach as allowing Player X, the manager, to specify the reward player Y will receive for its actions. This is a simplification when compared to the more general setting of a Markov game in which the feudal manager can reward not only actions but also achievement of certain states.3. In order to specify the reward, we assume that Player X communicates a goal, either gA or gB, prior to both players taking their actions. If Player X sends gA it means that action A is now rewarded for Player Y and action B is not. Player X's rewards are unchanged, and so together this induces the following matrix game: Player Y A B Player X A (0, 1) B (1, 1) (1, 0) (0, 0) Action A for player Y is now strictly dominant and so a rational Player Y will always choose it. By iterated elimi- nation of strictly dominated strategies we therefore find the resulting matrix game: Player Y A (0, 1) (1, 1) Player X A B And so a rational Player X will always choose B, resulting in an overall strategy of (B, A) conditioned on an initial communication of gA. By symmetry, we can see that con- ditioned on gB, rational players X and Y will play (A, B). The feudal approach therefore allows the manager to flexibly coordinate the pair of agents to either Nash equilibrium. For games involving N players, coordination can be achieved by the manager sending out N-1 goals. 3Typically we prefer the manager to choose distal states as targets rather than actions as this requires the manager to micro- manage less and so supports temporal abstraction
1604.04180
2
1604
2017-05-26T09:23:13
Job Selection in a Network of Autonomous UAVs for Delivery of Goods
[ "cs.MA", "cs.RO" ]
This article analyzes two classes of job selection policies that control how a network of autonomous aerial vehicles delivers goods from depots to customers. Customer requests (jobs) occur according to a spatio-temporal stochastic process not known by the system. If job selection uses a policy in which the first job (FJ) is served first, the system may collapse to instability by removing just one vehicle. Policies that serve the nearest job (NJ) first show such threshold behavior only in some settings and can be implemented in a distributed manner. The timing of job selection has significant impact on delivery time and stability for NJ while it has no impact for FJ. Based on these findings we introduce a methodological approach for decision-making support to set up and operate such a system, taking into account the trade-off between monetary cost and service quality. In particular, we compute a lower bound for the infrastructure expenditure required to achieve a certain expected delivery time. The approach includes three time horizons: long-term decisions on the number of depots to deploy in the service area, mid-term decisions on the number of vehicles to use, and short-term decisions on the policy to operate the vehicles.
cs.MA
cs
Job Selection in a Network of Autonomous UAVs for Delivery of Goods Pasquale Grippa1, Doris A. Behrens2,3, Christian Bettstetter1,4, and Friederike Wall5 1Institute of Networked and Embedded Systems Alpen-Adria-Universitat Klagenfurt, Klagenfurt, Austria 2School of Mathematics, Cardiff University 23 Senghennydd Road, Cardiff CF24 4AG 3Aneurin Bevan University Health Board Lodge Road, Caerleon NP18 3XQ 4Lakeside Labs GmbH, Klagenfurt, Austria 5Institute for Business Management, Alpen-Adria-Universitat Klagenfurt, Klagenfurt, Austria Emails: [email protected], [email protected] Abstract 1 Introduction This article analyzes two classes of job selection poli- cies that control how a network of autonomous aerial vehicles delivers goods from depots to customers. Cus- tomer requests (jobs) occur according to a spatio-temporal stochastic process not known by the system. If job selec- tion uses a policy in which the first job (FJ) is served first, the system may collapse to instability by removing just one vehicle. Policies that serve the nearest job (NJ) first show such threshold behavior only in some settings and can be implemented in a distributed manner. The timing of job selection has significant impact on delivery time and stability for NJ while it has no impact for FJ. Based on these findings we introduce a methodological approach for decision-making support to set up and operate such a system, taking into account the trade-off between mone- tary cost and service quality. In particular, we compute a lower bound for the infrastructure expenditure required to achieve a certain expected delivery time. The approach includes three time horizons: long-term decisions on the number of depots to deploy in the service area, mid-term decisions on the number of vehicles to use, and short-term decisions on the policy to operate the vehicles. Manuscript submitted on 30 January 2017. Small unmanned aerial vehicles (UAVs) have successfully found their way to civil applications. A broad variety of UAV models has been commercialized in the past few years. They fly routes in an autonomous manner, carry cameras for aerial photography, and may transport goods from one place to another. The range of applications is broad, including aerial monitoring of plants and agricul- ture fields as well as support for first time responders in disasters [21, 35, 27, 1]. Delivering goods via a network of UAVs becomes an option if classical means of trans- portation - like trucks, trains, and planes - are inappro- priate. First, this comes about if roads, railway tracks, or landing facilities do not exist, if weather conditions make it impossible to use them, or if their use is too danger- ous or time-consuming. In this context, a compelling ser- vice would be the delivery of medicine, vaccinations, or laboratory samples for patients in remote areas and cri- sis regions. Second, such a service is also worthwhile in densely populated metropolitan areas, when congestion makes roads nearly impassable. The main objective of this paper is to provide theo- retical insight for the architectural setup and control of a UAV-based delivery system. We analyze policies that con- trol how an interconnected team of UAVs resolves service requests that are randomly distributed in space and time. 1 The entities of the system are goods, customers, vehicles, and depots. Customers request goods that are stored in depots and delivered by vehicles. Service requests, also denoted as jobs or customer demands, are not known in advance and arrive over time at certain locations accord- ing to a space-time stochastic process. We analyze both centralized and distributed policies. In the latter, the sys- tem's "intelligence" is literally embedded into each vehi- cle, i.e., each vehicle decides by its own which job to se- lect next, thus raising the autonomy of vehicles to a level that goes beyond autonomous flying. If the vehicles are capable of consecutively serving sev- eral customers before they return to a depot, e.g., if goods are lightweight and total distances are small, the problem of selecting customer requests to be served falls into the domain of dynamic vehicle routing with stochastic de- mands, dating back to [5, 6, 7]. In contrast to this, ve- hicles in our system serve no more than one customer per trip for capacity reasons, and we use the term job selec- tion to emphasize the difference to routing. By focusing on non-partitioning job selection for delivery, we comple- ment research that focused on partitioning routing policies for wide-area surveillance (see [18, 37, 16, 31, 10]). Our performance measure is delivery time, i.e., the time it takes for a customer from requesting to obtaining a good. The stability of such a service is linked to the queu- ing of jobs, i.e., customers may have to wait until other customers have received the goods they requested. The system becomes unstable if the average number of waiting customers persistently increases over time. We show fea- tures of distributed non-partitioning job selection policies that are found by simulation for M/G/K queues, with K > 1, and described in terms of delivery time, which is related to system stability [5, 6, 7]. Using simulations, we deduce some results of general validity on the system behavior. A key insight is that the timing of job selection matters for distributed non-partitioned policies but has no impact on the centralized ones. If, for example, a policy is applied in which the job that first comes in is first served, denoted as FJ-policy, the selection can occur as soon as possible (just after the service of the last cutomer) or as late as possible (just before loading a good). If, in con- trast, a policy is applied in which vehicles decide that the currently nearest job is first served, denoted as NJ-policy, the decision on job selection should be made as early as possible. Moreover, we find that a shift in the timing of job selection even alters the structure of the policy in case of NJ-policies (altering also its vulnerability with respect to changes in customer demand). These insights into system behavior are accompanied by findings about the relation between job selection poli- cies and system setup, the total volume of demand, and system performance. It is known, for example, that FJ- policies outperform NJ-policies for low system loads, while the opposite is true for higher loads, e.g., caused by higher customer arrival rates or a smaller number of vehicles [5]. So far, it is not emphasized in the literature that a system operating according to a FJ-policy will lit- erally collapse all of a sudden and tip into instability if the vehicle fleet is reduced by a single entity. We high- light this threshold effect, as it is essential for both system implementation and operation. Based on these findings, we derive decision making support for the investment in a delivery system and its op- eration. In particular, the infrastructure of depots is sub- ject of a long-term decision, the number of vehicles can be modified in mid-term, and the job selection policy is a short-term choice. The set-up of the system (number of depots and vehicles) shapes its monetary costs and, in conjunction with the job selection policy, the service qual- ity provided to the customers for which they are willing to pay for. Hence, for investing in such a delivery system an interesting question is which minimum expenditure is required to provide a certain service quality. For this, we compute a lower bound for the expenditure necessary to set up a stable system as a function of the targeted ser- vice quality in terms of average delivery time and exem- plarily illustrate the application of this service-possibility- frontier for parameters reported by the company Matter- net. 2 Related Work 2.1 Types of Vehicle Routing Problems (VRPs) The framework of the used model dates back to [13], who introduced their formulation of the vehicle routing prob- lem (VRP) as a generalization of the traveling salesman problem [17]. Ever since then, the operations research community has intensively studied how a central plan- ner determines optimal sets of routes for fleets of homo- geneous vehicles, supplying given sets of geographically dispersed customers with goods [19]. In the context of a "classical VRP", such an optimal set of routes accom- plishes that (i) all customers are supplied with the de- manded products, (ii) none of the vehicles exceeds its ca- pacity traveling along its route, (iii) no customer is visited more than once, (iv) all routes start and end at a central depot, and (v) the overall routing cost is minimized. In practical applications, VRPs have a broad diversity of ad- ditional requirements and operational constraints affect- ing the construction of the optimal set of routes. Among these are periodic VRPs [2], VRP with pickup and deliv- ery [14], VRP with split deliveries [15], and VRP with time windows within which customers have to be served [11], to mention but a few. For reviews of exact and ap- proximate methods of solving the classical VRP, we refer to [4, 12, 23, 24, 22, 40, 41], and, for an exhaustive bibli- ography on vehicle routing to [25]. VRPs are classified according to the nature of system input information. If all system input is known before the vehicles leave the depot(s) and does not change dur- ing mission execution, the problem of concern is like the one described in the paragraph above, and said to be both static and deterministic. For many real-world ap- plications, at least some input information, like customer arrivals, behaves according to a probability distribution rather than being known a priori. These VRPs are de- noted as stochastic. If some input information appears or changes during missing execution, which has to be imme- diately integrated into decision-making, the VRP is called dynamic ([33, 34], or, for a recent review, [32]). Then, designing sets of routes has to be replaced by designing routing policies, which describe the evolution of motion paths as a function of newly arriving input. 2.2 Stochastic and Dynamic Vehicle Rout- ing in Robotics and Aeronautics The papers [5, 6, 7] were the first to comprehensively an- alyze the stochastic and dynamic VRP. A generalization of the VRP is the pickup and delivery problem (PDP) [39, 42]. While the VRP was originally investigated for applicability in classical forms of transportation and logis- tics, there has been a shift towards applications in robotics and aeronautics in the last decade. Particular attention was devoted to the motion coordination of mobile robots, which includes, among others, a VR-based development of spatially-distributed (surveillance) policies for UAVs that are adaptive to network changes [18, 37, 16, 31, 10]. Strategies were developed that ensure that a certain frac- tion of stochastically generated service requests is served before the jobs expire [29], that account for service priori- ties [38] and translating demands [8], and that accomplish an effective system management without explicit commu- nication [3]. These approaches utilize partitioning poli- cies to find ways to operate a distributed system that are scalable to large-vehicle networks [31]. These partition- ing policies applied to the control of dynamic and stochas- tic VRPs methodologically differ from distributed parti- tioning algorithms [30] that analyze how to partition the service area prior to applying a control rule. We deviate from both of above approaches and seek to find policies that are adaptive in an alternative way. For our application, not partitioning the service area (since de- pots are fixed) allows for greater system adaptability if vehicles need to endogenously pool in "hot spot" regions of the service area, e.g., whenever disasters or diseases shift demands to certain regions, and if depots run out of goods. Especially in the latter case, non-partitioning job selection policies allow for regarding fixed depots as "cus- tomers" that have to be supplied with whatever it is that is needed. 3 System Model 3.1 Entities of a UAV Delivery System The system is composed of K ∈ N vehicles moving in a bounded and convex service area A ⊂ R2 of size A := A, where  ·  is the Euclidean norm. A vehicle is denoted by vk with identifier k∈ {1, . . . , K}. The cur- rent position of vehicle vk at time t is vk(t)∈ A with t ≥ 0. All vehicles travel at the same constant velocity ν ∈ R+ and are equipped with a battery, whose level at time t is represented by bk(t)∈ [ 0, 1]. The fact that bat- teries have to be recharged or exchanged is quantified by the parameter α ∈ (0, 1], which is the air-time ratio, i.e., α = air time/(air time + charge time). The arrival of customer demands, i.e., delivery requests for goods within A, is generated by a Poisson process with finite intensity λ∈ R+, where λ is the customer ar- rival rate. The demands, also called jobs, are indexed by the job identifier n ∈ N, which indicates the order of re- quest arrivals. The corresponding customer is called cn; his or her position is denoted by cn ∈ A and assumed to be independently and uniformly distributed in A. Cus- tomer demands do not only differ with respect to timing and locations but also with respect to the goods that are requested to be delivered. Goods are, in general, different but have the same ex- piration date and are treated with identical priority. There are L∈ N depots in the system, which store the goods. The depots are interconnected and provide a sufficient number of all goods and service activities, like recharg- ing batteries. We assume that, for capacity reasons, a ve- hicle cannot serve more than one customer demand per trip (see [6, p. 71]). The depots are set up at locations d = [d1 d2 ... dL]∈ AL, where d is chosen such that the expected distances between a random point q∈ A (poten- tial demand) generated according to a uniform distribu- tion over A and the closest depot are minimal: HL(d, A) := 1 A ·A min l:l∈{1,...,L}dl−qdq. (1) This corresponds to the solution of the continuous mul- timedian problem known from geometric optimization [28, 44]): d∗ = arg min d∈AL HL(d, A), with H ∗ L(A) := HL(d∗, A). (2) (3) A depot is a storage but not a permanent home base for particular vehicles. Whenever a vehicle has delivered a good, it either approaches the nearest depot or another one that is more appropriate to handle the next customer demand. Appropriateness is determined by the job selec- tion rule that is implemented (see Section 5). This non- restricted movement of all K vehicles to all corners of an L-depot system is a major difference to related work in [5, 6, 7, 18, 37, 16, 31, 10]. 3.2 Service Operations and Delivery Time The delivery time for the customer cn (n∈ N) is denoted by the stochastic variable Tn = Wn + Rn + Sn, where c . ( d i) ( d e g r e t u r n i n c h g if n g a r g i n d i n a l o i) g eli n v tr a a n l o u ( c n − ) g a r g i n l o g if n d i n a g h g d i n r e t u r n i n c j ) e c . ( d j ) ( d eli n v tr a u n ) ( c g d i n a g n l o τ0 τ1 τ2 τ3 τ4 τ5 τ6 τ7 τ8 τ9 τ10 t Wn Rn Sn Tn Figure 1: Time intervals involved in a customer service: delivery time T , waiting time W , return time R, and ser- vice time S. Wn is the waiting time, Sn is the service time, and Rn is the return time. Fig. 1 illustrates all operations involved in the service of cn from arrival at t = τ0 to the service completion at t = τ10. The waiting time is Wn = τ5−τ0. The return time is Rn = τ7−τ5, and depends on the posi- tion of the customer cn− being served before cn and on the system's load. Rn is included in [0, R′ n]: It is null if the vehicle is ready at the depot, and maximum if the service of cn− is not completed at the arrival of cn. The service time is Sn = τ10−τ7. This definition differs Bert- simas and van Ryzin's on-site service time [5, 6, 7] which corresponds to the time a vehicle is "unloading" goods at a customer. It also differs from the notion of service time Bn in classical queuing theory: Sn = Bn − Rn. 3.3 Queuing Phenomena and Stability A job selection policy, called π = (π1, π2, ..., πK ), has to restrain the outstanding jobs [5, 6, 7, 18, 37, 16, 31, 10]. Policy π is said to be stabilizing if the expected number of pending jobs (customers waiting for service) stays con- fined over time, i.e., if there exists an arbitrary constant κ <∞ such that ¯Nπ := lim t→∞ E[N(t)π] ≤ κ, (4) where N(t) denotes the number of pending jobs at time t. We assume that N (0) = 0, i.e., no customer is waiting at t = 0. The return and service times are crucial for the stability of the system. A necessary condition for stability is [6, p. 63]: ¯D ν ≤ K λ (5) if the on-site service time is null. ¯D is the average Eu- clidean distance between two customers served in se- quence, λ is the arrival intensity, and ν is the vehicle speed. This condition applies to our problem with two changes: First, the distance becomes the distance function customer-depot-customer, which divided by the speed gives ¯R′ + ¯S (Fig. 1), where ¯R′ is the average return time in high load and steady state, and ¯S is the average service time in steady state. Second, the effective number of used vehicles is on average αK, where α is the airtime ratio. Therefore, our stability condition is ¯R′ + ¯S ≤ αK λ . (6) The problem analyzed in this paper can be modeled as an M/G/K queue with interdependent service times Bn. M indicates Poisson distributed customer arrivals, G indi- cates service times distributed according to a generic dis- tribution, and K is the number of servers. For M/G/K queues with independent service times [20], the load fac- tor is defined as ρ := . (7) λ ¯B αK The system is said to be in light load condition if ρ → 0 and in heavy load condition if ρ → 1. A necessary con- dition for the stability of the system is ρ < 1. In case of stability, ρ can be interpreted as the expected value of the fraction of busy servers. This definition does not apply to our case because ¯B depends on the system state [20], which includes the number of waiting customers. Nev- ertheless, the condition of stability is still valid: ¯B ap- proaches ¯R′ + ¯S for ρ → 1, leading to (6). In words, to stabilize the system, it is necessary that the average time between two successfully completed service requests is not larger than the average time between two customer arrivals multiplied by the average number of available ve- hicles. 4 Expenditure for Minimum Infras- tructure We start to derive the minimum expenditure for infras- tructure necessary to build a stable system as a func- tion of system performance by deriving a lower bound on average delivery time, ¯T . This time is bounded by the minimum service time, ¯T ≥ ¯Smin. The latter can be expressed in terms of the multi-median function (3), i.e., ¯Smin = H ∗ L(A) can be bounded by 2√A/3√πL [44], which implies that L(A)/ν. H ∗ ¯Tmin≥ L(A) H ∗ ν > 2 3ν A πL . (8) By rephrasing (8) we derive a condition for the minimum number of depots necessary to yield a certain average de- livery time (larger than minimum time), i.e., L ≥ 4A 9πν2 ¯T 2 min . (9) From the definition of the load factor (given by (7)) and in consideration of ¯S, ¯R ≥ ¯Tmin together with ρ < 1, we derive a condition for the minimum number of vehicles necessary to yield a certain average delivery time, i.e., K > 2λ α · ¯Tmin. (10) For Cv and Cd denoting the costs of a vehicle and a de- pot, respectively, total infrastructure expenditure is deter- mined by C(K, L) = Cd ·L + Cv ·K. (11) With the necessary conditions for a "stabilizing" infras- tructure required to yield a particular delivery time, given by (9) and (10), we use (11) to compute an auxiliary func- tion, i.e., g( ¯Tmin) = Cd · 4A 9πν2 ¯T 2 min + Cv · 2λ α · ¯Tmin, (12) and intend to develop a lower bound for total infrastruc- ture expenditure as a function of ¯T . In this context, it is important to make aware that the values of ¯Tmin in (12) are contained in a countable set: one value for every L, i.e., ¯Tmin = ¯Tmin(L). If we changed ¯Tmin into a continu- ous variable, ¯τ ∈ R, the auxiliary function g would have a minimum at ¯τ ∗ = 3 4αA·Cd 9πλν ·Cv . (13) Assume that there exists an L = L′ for which the corre- sponding minimum delivery time is larger than the one min > ¯T ′′ min := ¯Tmin(L′) > ¯τ ∗. Then, the defined by (13), i.e., ¯T ′ configuration L = L′, with L′ < L′′ but ¯T ′ min, may lead to a higher total expenditure for infrastructure than the configuration L = L′′. I.e., decreasing the number of depots increases minimum delivery time and may, there- fore, increase the number of vehicles necessary to stabi- lize the system. Depending on the ratio between Cd and Cv this may increase total infrastructure expenditure nec- essary to build a stable system, denoted by Imin. Yet, Imin has to be a non-increasing function of ¯T . By construction this is accomplished in the following way: min > ¯T ′′ For any two configurations of depots such that L′ < L′′, ¯T ′ min, and g(L′) > g(L′′), we are able to obtain delivery time ¯T ′ min and reduce total expenditure by employing L = L′′ instead of L = L′ depots along- side delaying any delivery by ¯T ′ min time units. This makes Imin a piecewise constant function. Additionally, our construction of Imin has to account for 2λ· ¯Tmin/α being an integer. Altogether, this yields min− ¯T ′′ Imin( ¯T ) = min l:l∈{L,...,∞} Cd · 4A 9π(H ∗ l (A))2 + Cv · 2λH ∗ l (A) αν for  H ∗ H ∗ ν ν L(A) L(A) H ∗ L−1(A) ν ≤ ¯T < ≤ ¯T L = 2, 3, . . . L = 1 (14) these two policies, we seek to gain insight to the follow- ing question: Is it worth to delay the decision on job se- lection to obtain more information about new customer requests in order to reduce the delivery time? For both classes we evaluate two extreme cases: when selection is made as soon as possible (just after the previous service), and when selection is made as late as possible (just before loading the good). A first issue in this context is whether the vehicles con- sider the arrival order of customers in the waiting queue. A second issue is the timing of job selection. In particu- lar, it seems plausible to assume that decisions should be made "as late as possible" to utilize the most recent infor- mation about the system status, basically postponing the individual job selection until loading goods in the depot. Such delayed decisions could also have a negative effect. This relates to the fact that, for L ≥ 2, one of the most important decisions to be made is where a vehicle should return to after satisfying a customer demand. If a non- postponed decision about the next job includes a "clever" selection of the depot to travel to, while a postponed de- cision leads to being at a suboptimal place at the moment of job selection, the advantage gained by processing more recent information is counteracted by the disadvantage of the extra distance traveled to the customer to be served next. We will investigate this effect in Section 7.  A third issue is the coordination of job selections to avoid that more than one vehicle selects the same job. Such a scenario where a particular customer, say cn, is selected by K ′ vehicles with 2≤ K ′≤ K, can easily hap- pen if the system is not fully utilized, i.e., for ρ→ 0. FJ- policies are centralized, i.e. there is an inherent coordina- tion mechanism among vehicles. We refer to this mech- anism as assortative: a central entity selects the next job and assigns it to the nearest vehicle. Hence, the selec- tion is based on time arrival and positions of waiting cus- tomers, positions of depots, and positions of all vehicles. NJ-policies are distributed. Every vehicle makes selec- tions based on its own position with respect to the po- sitions of customers and depots, and whenever a vehicle selects a job this is removed form the list of waiting jobs. Every vehicle only knows its own position, the positions of depots, and the positions of waiting customers. For these policies, the coordination mechanism is random- ized: Every time that more than one vehicle has the same time of job selection, a random priority order is assigned which constitutes the minimum infrastructure expenditure necessary for building a stable system that meets a tar- geted performance ¯T . Note that (14) does not constitute the amount of financial resources sufficient to guarantee system stability because the bound on delivery time is not tight for ρ → 1, and, in general, policies do not stabilize the system for all ρ < 1. 5 Job Selection Policies Job selection goes beyond merely picking the next de- mand. It has to specify all decisions needed to operate a delivery system, including which customer demand to serve first, which vehicle to let serve the next customer demand, at which depot to let vehicles load up goods, which paths to let vehicles follow, and where to let ve- hicles return to if no customers are waiting. We analyze two classes of job selection policies: nearest job first (NJ) and first job first (FJ). NJ-policies select jobs based on the location of the customer; FJ-policies select jobs based on the arrival time of the customer's job. By comparing to the vehicles involved. The randomize mechanism cor- responds to a real case where vehicles are not coordinated at all and the connection delay to the list of waiting cus- tomers is not predictable because it depends on the net- work conditions. Table 1 shows the job selection policies used in this ar- ticle and classifies them according to three features: the order of jobs to be done, the timing of job selection, and the coordination of jobs in case of ambiguous selection. 1) Policies in which vehicles select jobs according to their current distance from the customer can be named "near- est job first served" and are called NJ-policies. Policies in which vehicles select the smallest n with cn∈ N(t) (where t indicates the instance of job selection) are named "first job first served" and are called FJ-policies. 2) If ve- hicles make their individual job selection immediately af- ter completion of a service, the policy is marked with sub- script +. If vehicles make their job selection later in time, when they are ready to upload goods at a depot, the policy is marked with a subscript −. 3) The subscripts r and a correspond to random and assortative job coordination in case of an ambiguous job selection process, respectively. The following four policies are used as reasonable com- binations: πNJ −a. A feature included in all policies is the effect of a vehicle vk's battery level, bk(t), on whether or not a vehicle selects a job at time t at all. In particular, if at the instance of job selection the battery level is less than 30 % the vehicle approaches the nearest depot to recharge and does not select a job until its battery level has again reached 80 %. If there is no newly upcoming service request, vk goes on with charging until the battery is full. +a, and πFJ +r , πNJ −r, πFJ 5.1 NJ-Policies With Randomized Job Co- ordination Policy πNJ +r is called Do Nearest Job. After completion of a service, the vehicle vk selects the next customer such that the travel distance to this customer via a generic depot is minimized. In mathematical terms, we solve min l:l∈{1,...,L} n:cn ∈N(τ ) vk(τ ) − dl + dl − cn , (15) where τ is the time instant of completion of the previous job, which is here equal to the time instant of the new job selection. Such selection is made if the battery level at time τ is large enough, i.e., bk(τ )≥ 0.3; otherwise a ve- hicle will return to the nearest depot. Every vehicle has to make L · N(τ ) comparisons to conclude individual job selection. If a job minimizes the traveling distance for more than one vehicle, according to the random coordina- tion described above, only one vehicle randomly chosen will serve the job. Policy πNJ −r is called Rush to Depots. After completion of a service, the vehicle vk first travels to the closest de- pot. The vehicle then selects the nearest customer, i.e., it solves: min n:cn∈N (τ+R)vk(τ +R) − cn, (16) where τ+R is the time instant vk arrives at the depot. The vehicle remains in the depot if there is no waiting cus- tomer. If a job minimizes the traveling distance for more than one vehicle, the supplying vehicle is determined ran- domly. This policy requires L+N(τ + R) comparisons. 5.2 FJ-Policies With Assortative Job Coor- dination Following a first come first served (FCFS) policy, a cen- tral unit always selects the "oldest" demand request still unaddressed, i.e., the smallest n with cn∈ N(t), where t indicates the instance of job selection. Let this demand be called n(t). In particular, policy πFJ +a (also called FCFS by Nearest Vehicle; see Tab. 1) implies that whenever one or more than one vehicles complete a service, at time t = τ , a central controller selects the next customer in line, i.e., demand n(τ ), and chooses the vehicle vk∗ and the path through the depot, dl∗ , that minimizes the total distance between its current position vk(τ ), a depot's position dl, and the customer's position cn(τ ): l:l∈{1,...,L} min k:k∈K′ vk(τ ) − dl + dl − cn(τ ), (17) where K′ is the number of vehicles ready for the service. Obeying (17) a total of K ′ ·L computations is needed to come up with a vehicle's individual selection of whom to next serve. Obeying the rules of policy πFJ −a (or FCFS by First Ve- hicle at Depot; see Tab. 1), whenever one or more than one vehicle is available to a depot, the central unit selects Table 1: Features of Job Selection Policies Features Do Nearest NJ +r ) Job (π Rush to Depots (π NJ −r ) FCFS by Nearest Vehicle (π FJ +a) by First FCFS Vehicle at Depot (π FJ −a) Jobs are selected in first come first served (FCFS) order from a shared queue. There is no specific selection order of jobs. Decisions are made at a customer, just after completing a service. Decisions are made at a depot, just before loading goods. If more than one vehicle seeks to select a job, a random one does. If more than one vehicle seeks to select a job, the nearest one does. If there are no jobs a vehicle goes to the nearest depot. If a vehicle's battery level is less that 30% the vehicle approaches the nearest depot. If due to recharging a vehicle's battery reaches a level higher than 80% the vehicle is ready again for service. If there is no customer the vehicle fully recharges its battery. - Yes Yes - Yes - Yes Yes - Yes - Yes Yes - Yes Yes Yes - Yes - - Yes Yes Yes Yes - - Yes - Yes Yes Yes the demand n(τ + R) and performs K ′ computations to determine the vehicle nearest to that job. Subsequently L computations are performed to find the depot nearest to the selected customer where the vehicle has to return to after the delivery: k:k∈K′ vk(τ +R)−cn(τ +R)+ min min l:l∈{1,...,L}cn(τ +R)−dl. (18) 6 Simulation Setup −r, πFJ +a, πFJ +r, πNJ For π ∈ {πNJ −a}, we simulate the move- ment of K ∈ {1, . . . , 24} vehicles in a square area of A = 16 km2. The L∈ {1, 4, 9, 16} depots are located such that they minimize the average distance of any poten- tial demand in A from the nearest depot. Customer de- mands are assumed to randomly arrive over time at a rate λ = 0.65 requests/minute. We consider the non-variation of λ as feasible, since with K we vary λ's counterpart in affecting the load factor, defined by (7), so to derive suffi- cient information about the performance of the system for varying levels of resource utilization. All vehicles travel at a constant velocity of ν = 30 km/h, neglecting acceleration and deceleration phases and neglecting the extra time for starting and landing. Ve- hicles' air time are limited due to their finite battery ca- pacity, which is assumed to be full at t = 0. We choose the ratio between air time and charge time as being 1/3, i.e., α = 0.25. Moreover, we assume that at t = 0 every vk is placed at one of the depots. Finally, we neglect the loading time (goods). In the simulations, the system presented in Section 3 is observed every δ time units. Interarrival times are gen- erated according to a geometric distribution so that the number of customer arrivals per time unit follows a bino- mial distribution with parameters h = 1/δ and p = λδ. The Poisson distribution is a sufficient approximation of the binomial distribution if p ≤ 0.08 and h≥ 1500p [9]. Therefore, for all of our simulation runs, we choose δ such that δ≤ min{0.08/λ, 1/√1500λ}. The data collected from the simulations are used to compute the average delivery time. Specifically, we firstly estimate the length of the warm-up phase using Welch's method [43]. Secondly, we compute the average deliv- ery time with the replication/deletion method [26], which is equivalent to the independent replications method [43]. These methods are used for statistical analysis of data and enable us to estimate expected values and confidence in- tervals. For every parameter setup, we perform 10 simulations with a minimum of 4,000 customer requests for every simulation. If it is impossible to evaluate whether the sys- tem reaches the steady state within this period, we sim- ulate 10,000 customers requests, which is more than 10 days of continuous operation. 7 Simulation Results 7.1 Warm-Up Phase We discuss the computation of the warm-up phase for the policies Do Nearest Job and FCFS by Nearest Vehi- cle for K ∈ {11, 12, 14, 16} vehicles and L = 16 depots. ) w ( n ¯T , s e t u n m n i i e m i t y r e v i l e d e g a r e v A 6 5 4 3 2 1 ¯Tmin 0 0 Do Nearest Job (πNJ +r ) FCFS by Nearest Vehicle (πFJ +a) K = 11 K = 12 K = 14 K = 16 K = 11 K = 12 K ∈ {14, 16} 500 1,000 1,500 2,000 2,500 3,000 Demand, n Figure 2: Delivery time averaged over 10 simulation runs and 2 w + 1 = 1001 demands vs. demand index n for K vehicles. Fig. 2 reveals that the length of the transient phase de- creases with an increasing number of vehicles, i.e., with a decreasing load factor. We conclude that delivery sys- tems provided with fewer vehicles must be simulated for a longer period (higher number of demands n) to reach steady state conditions. Being conservative, we estimate that the length of the warm-up phase is nwu = 3000 for the case K = 11, while being nwu = 2000 for the case K = 12, and nwu = 500 for all other cases. Moreover, Fig. 2 introduces a result addressed when discussing Fig. 3d below: FCFS by Nearest Vehicle (πFJ +a) can yield a substantially better system performance than Do Nearest Job (πNJ +r). The only drawback observed is that, while πFJ +a gets very close to the minimum average delivery time ¯Tmin for K ∈ {12, 14, 16}, it cannot stabi- lize the system for K = 11. 7.2 Evaluating Job Selection Policies Fig. 3 shows the average delivery time ¯T for different job selection policies as a function of the number of vehi- cles K and the number of depots L. The shaded areas in- dicate "impossible regions", i.e., all ordered pairs (K, ¯T ) for which either ρ > 1 or ¯T < ¯Tmin or both. Depot num- bers are in the set {2n; n = 0, 1, 2, 4} so that the multi- median problem has traceable mathematical solution for a squared service area: The area is divided into L iden- tical squares, and the depots are located in the centroids of the squares. The following basic phenomena can be observed. Increasing the number of ve- Tipping Point Behavior hicles K has no effect on system performance once K exceeds a certain threshold K. This observation holds for all studied policies. It results from the fact that, for any K larger than K, there is a vehicle in the chosen depot ready to serve a new demand, such that the overall delivery time T just consists of the service time S. In such light load conditions, FJ-policies (πFJ −a) yield better system performance than NJ-policies (πNJ −r). Such policy differences in system performance are known from [5, 6], and they are amplified by the differences in job coordina- tion in case of ambiguity. +r and πNJ +a and πFJ Decreasing the number of vehicles K improves re- source utilization but in turn increases the load factor, which eventually implies system instability. The deliv- ery time of Do Nearest Job (πNJ +r) increases slowly with a decreasing K, i.e., the system shows a gradual transi- tion from the region of system underuse to the region of instability. In contrast to this, for all other policies, the system tips into instability all of a sudden. This tipping point behavior of πNJ −a can be explained by the fact that these policies resemble the behavior of the K stochastic queue median (K-SQM) policy introduced by [6, p. 65], while πNJ +r in heavy load behaves similar to the nearest neighbor (NN) policy presented by [5, p. 612]. +a, and πFJ −r, πFJ Timing Matters The timing of the job selection deci- sion has an impact on delivery time and system stability. Let us compare two extreme cases for both FJ and NJ- policies: the decision is made as soon as possible (just upon the service at the previous customer), or the deci- sion is made as late as possible (just before loading the good at the depot). Using FJ-policies, timing has no effect on delivery time and system stability (see Fig. 3). In contrast, using NJ- policies, an early decision is beneficial for stability, i.e., Do Nearest Job πNJ +r is more robust than Rush To Depots πNJ −r. The positive effect of more recent information out- weighs the negative effect of returning to a depot located sub-optimally (on average) for the next job. The gap be- tween the two NJ-policies widens with more depots, i.e., the effect of "being at a suboptimal place" is more pro- nounced in systems with many depots. This happens be- ¯T , s e t u n m n i i e m i t y r e v i l e d e g a r e v A ¯T , s e t u n m n i i e m i t y r e v i l e d e g a r e v A 20 15 10 Do Nearest Job (πNJ +r ) Rush to Depots (πNJ −r ) FCFS by Nearest V. (πFJ +a) FCFS by First V. at Depot (πFJ −a) 5 ¯Tmin 0 0 4 8 Number of vehicles, K 12 16 ¯T , s e t u n m n i i e m i t y r e v i l e d e g a r e v A 20 15 10 5 ¯Tmin 0 Rush to Depots (πNJ −r ) FCFS by First V. at Depot (πFJ −a) Do Nearest Job (πNJ +r ) FCFS by Nearest V. (πFJ +a) 20 24 0 4 8 Number of vehicles, K 12 16 (a) Number of depots L = 1 (b) Number of depots L = 4 20 15 10 5 ¯Tmin 0 Do Nearest Job (πNJ +r ) Rush to Depots (πNJ −r ) FCFS by Nearest V. (πFJ +a) FCFS by First V. at Depot (πFJ −a) ¯T , s e t u n m n i i e m i t y r e v i l e d e g a r e v A 20 15 10 5 ¯Tmin 0 Do Nearest Job (πNJ +r ) Rush to Depots (πNJ −r ) FCFS by Nearest V. (πFJ +a) FCFS by First V. at Depot (πFJ −a) 0 4 8 Number of vehicles, K 12 16 20 24 0 4 8 Number of vehicles, K 12 16 20 24 20 24 (c) Number of depots L = 9 (d) Number of depots L = 16 Figure 3: Average delivery time (with 90% confidence) vs. number of vehicles for L depots. cause, in heavy load conditions, randomized job coordina- tion is rarely necessary (if at all), and πNJ +r behaves similar to a NN policy (as mentioned above), which serves the nearest demand available after every service completion. In summary, the timing of job selection has fundamen- tal impact on the qualitative behavior of NJ-policies: it changes the vulnerability with respect to variation in cus- tomer demand. This phenomenon does not occur for our FJ-policies: both maintain structurally equivalent to K- SQM policies. 7.3 Decision Making Support We have seen that the number of depots must be chosen in relation to the size of the service area, and that this long- term choice on depot infrastructure must be coordinated with the mid-term choice on vehicles and the short-term choice on the job selection policy. For company-specific parameter values, a diagram like Fig. 4 translates the in- sights derived in the subsection above into the monetary domain. It relates a company's expenditure I for depots and vehicles to average delivery time ¯T . The purpose of such a plot is to provide decision making support for com- panies that set up an airborne delivery system equipped with small UAVs. To give an example, Fig. 4 is produced on the as- sumption that the cost of a UAV suitable to deliver two- kilogram packages is 1,000 US$ plus a maintenance cost of 100 US$ per annum, and the cost of a depot is 15,000 US$ plus a maintenance cost of 500 US$ per annum. Op- erating the system over ten years, the costs per vehicle and depots are Cv = 2,000 US$ and Cd = 20,000 US$, respec- tively. These parameter values are those assumed by the ¯T 10 , s e t u n m n i i e m i t y r e v i l e d e g a r e v a d e t e g r a T 9 8 7 6 5 4 3 2 1 0 Serve Closest Demand (πNJ +r ) FCFS by First Vehicle at Depot (πFJ −a) Lower bound on infrastructure expenditure (Imin) L = 1 L = 4 L = 9 L = 16 L = 1 2 3 4 5 · · · 9 · · · 16 · · · 0 50 100 150 200 250 300 350 400 Expenditure for infrastructure in 1,000 US$ Figure 4: Relation between infrastructure expen- diture and average delivery time; Cv = 2, 000 US$, Cd = 20, 000 US$. company Matternet [36]. A lower bound on the expenditure required to build a stable system, denoted by Imin, is derived in Sec. 4 and is given by (14). Fig. 4 plots this bound for the given pa- rameters, where all values below the bound are shown as a shaded area. The bound has a "staircase" shape with tread levels being the minimum average delivery time achiev- able with a particular number of depots. No operable sys- tem exists for parameters in this area, while every combi- nation of I and targeted ¯T located above fulfills ρ < 1 and ¯T > ¯Tmin. The bound corresponds to a service possibility frontier; it gives a necessary but not a sufficient condition for infrastructure expenditure. The actual performance is, policy depended, and more financial resources than Imin may be needed to operate the system in a stable manner and to meet the targeted performance. A company that wants to operate a delivery service and serve a customer within a certain average delivery time can employ such a diagram as follows: If the average de- livery time should be no more than τ , the company has to look for feasible combinations of infrastructure and sta- bilizing policies, i.e., squares and triangles, that are lo- cated as close as possible to the origin and below the ( ¯T = τ )-line. If the customers' willingness to pay for several levels of service quality is given, it is possible to quantify the company's marginal revenues of increasing performance. From Fig. 4 we know the marginal cost of decreasing delivery time. Then, we are able to determine the combination of infrastructure and job selection policy that maximizes the company's profit. For the parameters of Matternet we find that a system with L = 1 depot can serve a customer in about three minutes on average in an area of 16 km2, which comes at a cost of 60,000 US$. This time can be reduced to less than 1.5 minutes if the company spends more than 100,000 US$ for infrastruc- ture (associated with L = 4 depots). If the company's marginal revenue of reducing delivery time by 1.5 min- utes (50 %) is larger than approximately 40,000 US$, the four-depot configuration is better than the one-depot con- figuration. In other words, Fig. 4 informs about the finan- cial resources required for achieving a certain quality of service with a certain policy and about the volume of ad- ditional monetary resources obligatory to "buy" a shorter delivery time. 8 Conclusions We addressed the architectural setup and mechanisms of self-control in a network of UAVs for delivery of goods. We combine short-term decisions (e.g., job selection pol- icy), mid-term decisions (e.g., number of vehicles), and long-term decisions (e.g., number of depots) into an in- tegrated decision making model. Taking into account the short and mid-term horizons, the delivery time of the sys- tem experiences a threshold behavior: a stable system could lead to instability all of a sudden if one vehicle fails; adding vehicles has almost no positive influence on deliv- ery time once the number of vehicles exceeds a certain threshold. The timing of job selection has significant im- pact on delivery time and stability for NJ-policies while it has no relevance for FJ-policies. We also introduced a methodological approach for decision making support to setup a stable delivery system for efficiently resolving the tradeoff between expenditure and service quality. This approach reflects all three time horizons and includes an analytically derived service possibility frontier. Acknowledgement This work was funded in part by ERDF, BABEG, and KWF under grant number KWF-20214/23793/35529. It was carried out in the SOSIE project by Lakeside Labs GmbH. References [1] Torsten Andre, Karin A. Hummel, Angela P. Schoel- lig, Evsen Yanmaz, Mahdi Asadpour, Christian Bettstetter, Pasquale Grippa, Hermann Hellwagner, Stephan Sand, and Siwei Zhang. Application-driven design of aerial communication networks. IEEE Commun. Mag., 52(5):129–137, May 2014. [2] Enrico Angelelli and Maria G. Speranza. A periodic vehicle routing problem with intermediate facilities. European J. Oper. Res., 137:233–247, Mar. 2002. [3] Alessandro Arsie, Ketan Savla, and Emilio Fraz- zoli. Efficient routing algorithms for multiple ve- hicles with no explicit communication. IEEE Trans. Autom. Control, 54(10):2302–2317, Oct. 2009. [4] Roberto Baldacci, Paolo Toth, and Daniele Vigo. Recent advances in vehicle routing exact algorithms. 4OR, 5(4):269–298, Dec. 2007. [5] Dimitris J. Bertsimas and Garrett J. van Ryzin. A stochastic and dynamic vehicle routing problem in the Euclidean plane. Oper. Res., 39(4):601–615, July/Aug. 1991. [6] Dimitris J. Bertsimas and Garrett J. van Ryzin. Stochastic and dynamic vehicle routing in the Eu- clidean plane with multiple capacitated vehicles. Oper. Res., 41(1):60–76, Jan./Feb. 1993. [7] Dimitris J. Bertsimas and Garrett J. van Ryzin. Stochastic and dynamic vehicle routing with general demand and interarrival time distributions. Adv. in Appl. Probab., 25:947–978, Dec. 1993. [8] S. D. Bopardikar, Stephen L. Smith, Franceso Bullo, and J. P. Hespanha. Dynamic vehicle rout- ing for translating demands: Stability analysis and receding-horizon policies. IEEE Trans. Autom. Con- trol, 55(11):2554–2569, Nov. 2010. [9] Ilja N. Bronshtein, Konstantin A. Semendyayev, Gerhard Musiol, and Heiner Muhlig. Handbook of Mathematics. Springer, Berlin, DE, 5 edition, 2007. [10] Francesco Bullo, Emilio Frazzoli, Marco Pavone, Ketan Savla, and Stephen L. Smith. Dynamic ve- hicle routing for robotic systems. Proc. IEEE, 99 (9):1482–1504, Aug. 2011. [11] Jean-Franc¸ois Cordeau, Guy Desaulniers, Jacques Desrosiers, Marius M. Solomon, and Franc¸ois Soumis. The VRP with time windows. In The Vehicle Routing Problem, chapter 7, pages 157– 172. Society for Industrial and Applied Mathemat- ics, Philadelphia, PA, 2002. [12] Jean-Franc¸ois Cordeau, Gilbert Laporte, Mar- tin W.P. Savelsbergh, and Daniele Vigo. Vehicle routing. In Cynthia Barnhart and Gilbert Laporte, editors, Transportation, volume 14 of Handbooks Oper. Res. Management Sci., chapter 6, pages 367– 428. Elsevier B.V. (North Holland), Amsterdam, NL, 1 edition, 2007. [13] George B. Dantzig John H. Ramser. The truck dispatching problem. Manage. Sci., 6(1):81–90, Oct. 1959. and [14] Guy Desaulniers, Jacques Desrosiers, Andreas Erd- mann, Marius M. Solomon, and Franc¸ois Soumis. The VRP with pickup and delivery. In The Vehicle Routing Problem, chapter 9, pages 225–242. Society for Industrial and Applied Mathematics, Philadel- phia, PA, 2002. [15] Moshe Dror, Gilbert Laporte, and Pierre Trudeau. Vehicle routing with split deliveries. Discrete Appl. Math., 50(3):239–254, May 1994. [16] John J. Enright, Ketan Savla, Emilio Frazzoli, and Francesco Bullo. Stochastic and dynamic rout- ing problems for multiple uninhabitated aerial vehi- cles. J. of Guid. Control Dynam., 32(4):1152–1168, July/Aug. 2009. [17] Merrill M. Flood. The traveling-salesman problem. Oper. Res., 4(1):61–75, Feb. 1956. [18] Emilio Frazzoli and Francesco Bullo. Decentralized algorithms for vehicle routing in a stochastic time- varying environment. In Proc. IEEE Conf. Deci- sion and Control, pages 3357–3363, Paradise Island, BHA, Dec. 2004. [19] Bruce L. Golden and Arjang A. Assad, editors. Ve- hicle Routing: Methods and Studies. Elsevier B.V. (North Holland), Amsterdam, NL, 1988. [20] Leonard Kleinrock. Queueing Systems, Volume I: Theory. Wiley Interscience, New York, 1975. [21] Michael A. Kovacina, Daniel Palmer, Guang Yang, and Ravi Vaidyanathan. Multi-agent control algo- rithms for chemical cloud detection and mapping us- ing unmanned air vehicles. In Proc. IEEE/RSJ Int. Conf. Intelligent Robots and Systems, pages 2782– 2788, Lausanne, CH, Oct. 2002. [22] Gilbert Laporte. The vehicle routing problem: An overview of exact and approximate algorithms. Eu- ropean J. Oper. Res., 52(3):345–358, June 1992. [23] Gilbert Laporte. What you should know about the vehicle routing problem. Nav. Res. Log., 54(8):811– 819, Dec. 2007. [24] Gilbert Laporte. Fifty years of vehicle routing. Transport. Sci., 43(4):408–416, Nov. 2009. [25] Gilbert Laporte and Ibrahim H. Osman. Routing problems: A bibliography. Ann. Oper. Res., 61(1): 227–262, 1995. [26] Averill M. Law. Simulation Modeling and Analysis. McGraw-Hill, Boston, MA, 4 edition, 2007. [27] Pedro Lima, Dario Floreano, Felix S. Schill, and Meysam Basiri. Audio-based localization system for swarms of micro air vehicles. In Proc. IEEE Int. Conf. Robotics and Automation, page forthcoming, Hong Kong, CHN, June 2014. [30] Marco Pavone, Alessandro Arsie, Emilio Fraz- zoli, and Francesco Bullo. Distributed algorithms for environment partitioning in mobile robotic net- works. IEEE Trans. Autom. Control, 56(8):1834– 1847, Aug. 2011. [31] Marco Pavone, Emilio Frazzoli, and Francesco Bullo. Adaptive and distributed algorithms for ve- hicle routing in a stochastic and dynamic environ- ment. IEEE Trans. Autom. Control, 56(6):1259– 1274, June 2011. [32] Victor Pillac, Michel Gendreau, Christelle Gu´eret, and Andr´es L. Medaglia. A review of dynamic ve- hicle routing problems. European J. Oper. Res., 225 (1):1–11, Feb. 2013. [33] Harilaos N. Psaraftis. Dynamic vehicle routing problems. In Vehicle Routing: Methods and Stud- ies, pages 223–248. Elsevier B.V. (North Holland), Amsterdam, NL, 1988. [34] Harilaos N. Psaraftis. Dynamic vehicle routing: Sta- tus and prospects. Ann. Oper. Res., 61(1):143–164, 1995. [35] Markus Quaritsch, Emil Stojanovski, Christian Bettstetter, Gerhard Friedrich, Herrmann Hellwag- ner, Bernhard Rinner, Michael Hofbaur, and Mubrak Shah. Collaborative microdrones: Applications and research challenges. In Proc. Int. Conf. Autonomic Compu. and Commun. Sys., pages 38:1–38:7, Turin, IT, Sept. 2008. [36] Andreas Raptopoulos. Physical (Solve for X talk), Feb. 2012. port. https://www.youtube.com/watch?v=7B3E4OOuGDk. trans- URL [28] Christos H. Papadimitriou. Worst-case and prob- abilistic analysis of a geometric location problem. SIAM J. Comput., 10(3):542–557, 1981. [29] Marco Pavone, Nabhendra Bisnik, Emilio Frazzoli, and Volker Isler. A stochastic and dynamic vehi- cle routing problem with time windows and cus- tomer impatience. Mobile Netw. Appl., 14(3):350– 364, June 2009. [37] Ketan Savla, Emilio Frazzoli, and Francesco Bullo. Traveling salesperson problems for the dubins vehi- cle. IEEE Trans. Autom. Control, 53(6):1378–1391, July 2008. [38] Stephen L. Smith, Marco Pavone, Francesco Bullo, and Emilio Frazzoli. Dynamic vehicle routing with priority classes of stochastic demands. SIAM J. Con- trol Optim., 48(5):3224–3245, Jan. 2010. [39] Michael R. Swihart and Jason D. Papastavrou. A stochastic and dynamic model for the single-vehicle pick-up and delivery problem. Eur. J. Oper. Res., 114(3):447–464, 1999. [40] Paolo Toth and Daniele Vigo. Models, relaxations and exact approaches for the capacitated vehicle routing problem. Discrete Appl. Math., 123(1-3): 487–512, Nov. 2002. [41] Paolo Toth and Daniele Vigo, editors. The Vehicle Routing Problem. Society for Industrial and Applied Mathematics, Philadelphia, PA, 2002. [42] Holly A. Waisanen, Devavrat Shah, and Munther A. Dahleh. A dynamic pickup and delivery problem in mobile networks under information constraints. Automatic Control, IEEE Transactions on, 53(6): 1419–1433, July 2008. [43] Peter D. Welch. The statistical analysis of simula- tion results. In Stephen S. Lavenberg, editor, Com- puter Performance Modeling Handbook, chapter 6. Academic Press, Inc., New York, NY, 1983. [44] Eitan Zemel. Probabilistic analysis of geometric lo- cation problems. Ann. Oper. Res., 1(3):215–238, 1984.
1802.07187
1
1802
2018-02-18T04:05:41
Leader-follower based Coalition Formation in Large-scale UAV Networks, A Quantum Evolutionary Approach
[ "cs.MA", "cs.GT" ]
The problem of decentralized multiple Point of Interests (PoIs) detection and associated task completion in an unknown environment with multiple resource-constrained and self-interested Unmanned Aerial Vehicles (UAVs) is studied. The UAVs form several coalitions to efficiently complete the compound tasks which are impossible to be performed individually. The objectives of such coalition formation are to firstly minimize resource consumption in completing the encountered tasks on time, secondly to enhance the reliability of the coalitions, and lastly in segregating the most trusted UAVs amid the self interested of them. As many previous publications have merely focused on minimizing costs, this study considers a multi-objective optimization coalition formation problem that considers the three aforementioned objectives. In doing so, a leader-follower- inspired coalition formation algorithm amalgamating the three objectives to address the problem of the computational complexity of coalition formation in large-scale UAV networks is proposed. This algorithm attempts to form the coalitions with minimally exceeding the required resources for the encountered tasks while maximizing the number of completed tasks. The proposed algorithm is based on Quantum Evolutionary Algorithms(QEA) which are a combination of quantum computing and evolutionary algorithms. Results from simulations show that the proposed algorithm significantly outperforms the existing coalition formation algorithms such as merge-and-split and a famous multi-objective genetic algorithm called NSGA-II.
cs.MA
cs
Leader-follower based Coalition Formation in Large-scale UAV Networks, A Quantum Evolutionary Approach 8 1 0 2 b e F 8 1 ] A M . s c [ 1 v 7 8 1 7 0 . 2 0 8 1 : v i X r a Sajad Mousavi∗, Fatemeh Afghah∗, Jonathan D. Ashdown† and Kurt Turck† ∗School of Informatics, Computing and Cyber Systems, Northern Arizona University, Flagstaff, AZ, United States †Air Force Research Laboratory, Rome, NY, United States Email: {sajadmousavi, fatemeh.afghah}@nau.edu Email: {jonathan.ashdown, kurt.turck}@us.af.mil Abstract-The problem of decentralized multiple Point of Interests (PoIs) detection and associated task completion in an unknown environment with multiple resource-constrained and self-interested Unmanned Aerial Vehicles (UAVs) is studied. The UAVs form several coalitions to efficiently complete the compound tasks which are impossible to be performed individually. The objectives of such coalition formation are to firstly minimize resource consumption in completing the encountered tasks on time, secondly to enhance the reliability of the coalitions, and lastly in segregating the most trusted UAVs amid the self interested of them. As many previous publications have merely focused upon minimizing costs, this study considers a multi- objective optimization coalition formation problem that considers the three aforementioned objectives. In doing so, a leader- follower-inspired coalition formation algorithm amalgamating the three objectives to address the problem of the computational complexity of coalition formation in large-scale UAV networks is proposed. This algorithm attempts to form the coalitions with minimally exceeding the required resources for the encountered tasks while maximizing the number of completed tasks. The proposed algorithm is based on Quantum Evolutionary Algo- rithms (QEA) which are a combination of quantum computing and evolutionary algorithms. Results from simulations show that the proposed algorithm significantly outperforms the existing coalition formation algorithms such as merge-and-split and a famous multi-objective genetic algorithm called NSGA-II 1. Keywords-Unmanned aerial vehicles, coalition formation, mis- sion completion, evolutionary algorithms. I. INTRODUCTION A single agent system is often unable to perform complex tasks considering the limited individual capabilities of such an agent. Therefore, cooperative multi-agent systems (MASs) can offer a practical solution to this problem by ensembling a complementary set of different capabilities/resources from several agents. However, one of the key challenges in such cooperative MASs is forming optimal sub-groups of agents (i.e., coalition formation) in order to efficiently perform the existing tasks, especially in a distributed case where no central controller is available. That being said, the coalition formation problem concerns how different coalitions can be formed considering the tasks' requirements and the agents' capabilities so much so that the collective goals of the tasks are reached in the most effective manner. 1DISTRIBUTION A. Approved for public release: distribution unlimited. Case Number: 88ABW-2018-0096 . Dated 10 Jan 2018. A considerable amount of research has been recently carried out in solving coalition formation problems. This has spawned several classic methods to form stable coalitions that follow common stability concepts based on Core, Shapley value, Bargaining Set, and Kernel [1], [2], [3]. However, achieving such stability concepts often mandates high compu- tational complexity. Many researchers have attempted to deal with the problem of coalition formation in multi-agent systems by applying various approaches including genetic algorithms [4], dynamic programing methods [5], graph theory [6], [7], iterative processes [8], cooperative Multi-Agent Reinforcement Learning (MARL) [9], and temporal-spatial abstraction MARL [10], [11], [12]. The majority of these reported studies have focused mainly in reducing costs and only a few of them have focused upon multiple objectives in solving the problem. In this paper, a solution for coalition formation problem in a heterogeneous resource-constraint UAV network in which multiple objectives are considered to form the optimal coali- tions is proposed. The objectives of the coalition formation method proposed here are : minimizing the cost associated with consumption of resources of the coalitions formed, maximizing the reliability of the formed coalitions, and lastly to select the most trustworthy of UAVs among the available self-interested UAVs in the network. Finding the solution of such a multi-objective coalition formation problem involves an NP-hard problem. Many ap- proaches such as mixed integer linear programming [13], [14] and dynamic network flow optimization [15] have been utilized to provide an exact solution to this problem. However, since these approaches seek such a solution, applying them to a large-scale problem is computationally taxing. More recently, metaheuristic algorithms such as Particle Swarm Optimization (PSO) [16], Ant Colony Optimization [17], Genetic Algo- rithms (GAs) [18], and Simulated Annealing (SA) [19] have offered reasonable solutions in efficient times for a variation of multi-objective optimization problems. Inspired by the success of evolutionary approaches, this paper presents a novel leader- follower-based coalition formation algorithm using a quantum evolutionary approach whilst considering the aforementioned objectives in addressing the problem. As an unknown, dynamic environment is assumed where no prior knowledge is available about targets or Point of Interests (PoIs) and UAVs need to gain the knowledge of environment dynamically [20], [21]. Some potential applications of the proposed method are search and rescue, humanitarian relief, and public safety operations in unknown remote environments or military operations in remote fields. In such environments, it can be safely assumed that ground station does not have prior information about the PoIs and their positions. To evaluate the performance of the proposed method in such an unknown environment, several scenarios with different numbers of tasks ranging from 4 to 24, and a heterogeneous network of UAVs consists of a different number of UAVs ranging from 8 to 124 were simulated. The rest of the paper is organized as follows: Section II presents the problem statement and the formulation of the multi-UAV coalition formation as a multi-objective optimiza- tion problem. Section III describes the proposed coalition formation algorithm. Section IV reports the simulation results followed by concluding remarks in section V. II. PROBLEM STATEMENT ui , r2 ui , . . . , rNr ui A heterogeneous In this section, the decentralized task allocation problem in a network of autonomous UAVs by forming optimum coalitions are formulated. The possibility of selfish behavior of these self-interested UAVs are accounted for and reputation guidelines in selecting the most reliable of UAVs to participate in the formed coalitions are also defined. It is vital to note that the proposed algorithm considers minimizing the cost of coalition formation in terms of overspending the resources on particular tasks as well as enhancing the reliability of the formed coalitions as paramount. network of N UAVs U each UAV, ui } denotes the set of = {u1, u2, . . . , uN}, where can carry a different set of resources compared to another is considered. Rui = {r1 resources available at UAV, ui where Nr is the number of possible resources in the network. It is also assumed that there exists n tasks in the environment T = {T1, T2, . . . , Tn}. Each task, Ti requires a certain amount available resource in each of Rui in order to be completed. The vector of required resources for task i is defined as follows: 2, τ i (1) where τ i j is the required amount of resource j for task i. It is assumed that each task is associated to one PoI (target) and the PoIs can be located in different positions with a diverse set of resource requirements. All UAVs are able to search the unknown environment for new PoIs. The tasks are carried out by the formed coalitions S = {S1, S2, . . . , Sm}, where each coalition Si is responsible for one task. A large search space where the PoIs are distributed far apart from each other are considered. It can therefore be assumed that the formed coalitions are sufficiently far from one another that each UAV can only be a member of a single coalition, i.e., Sk ∩ Sl = ∅,∀Sk, Sl ∈ S. This also means that the coalitions are non-overlapping. The capability of each coalition Si to complete its encountered task is defined as the value of coalition v(Si), (v(Si) ∈ R) as described in the next section. Moreover, cost(Si, Ti) is defined as the cost of coalition Si in performing task Ti. The cost function for coalition Si captures the cost imposed on all UAV members of this coalition cost(Si, uj)) in which their resources have been (i.e.,(cid:80) τ i = {τ i 3, . . . , τ i Nr 1, τ i }, uj∈Si shared to accomplish task Ti. Another key contribution of the proposed model is consid- ering the reliability factor in forming the optimal coalitions. While in the majority of existing techniques, it is assumed that the UAV members of formed coalitions are perfectly operational during the mission lifetime, this is obviously not a realistic assumption as the UAVs' operation can be interrupted for several reasons (e.g., exhaustion of battery or a particular resource). A practical scenario is considered where the UAVs are assumed to be either fully operational or one of their capabilities (e.g., resources) are bound to fail during the mission. Such failures in various capabilities are considered to be statistically independent. Furthermore, involving different types of UAVs in a coalition may result in different execution times of accomplishing the sub-tasks as the UAVs have a different set of capabilities. For instance, a given UAV may be able to fulfill its duty in a shorter time than another. The cost and reliability of a coalition indeed depend on these execution times where lower execution times are favored for incurring lower execution costs. In the next section, we define and formulate these factors (i.e., cost, reliability and reputation). A. Definition of Cost, Reliability, and Reputation A set of UAVs in the form of a coalition collaborate with one another to carry out the encountered task. Participation in such coalitions involves a cost of sharing and consuming the resources for the member UAVs. For a given task Tk }, where with the required resources τ k = {τ k i ≥ 0, the amount of resource i for task k is denoted by τ k the execution cost of consuming resource j of UAV i is ∀i, j and µj is a constant denoted by eij, where eij = µjrj ui coefficient in order to convert the amount of resource j to a time dependent value to have the same unit as the execution time. Thus, the cost of coalition Sk, C(Sk) can be calculated as follows: 3 , . . . , τ k Nr 1 , τ k 2 , τ k C(Sk) = eijkij + aij, (2) i=1 j=1 where kij is the execution time if UAV i carrying resource j is involved in task k, and aij is the travel time of UAV i to task j. Possibility of potential defects in the UAVs' resources that may result in performance failure of these UAVs during the mission is also accounted for. Considering so, the reliability of coalition Sk for a give task Tk, denoted by R(Sk) is defined as follows: e−(cid:80)Nr j=1 λij kij , R(Sk) = (3) i=1 is the failure rate of ln(R(Sk)) = −(cid:80)Nk where λij resource j of UAV i. For simplicity, loge transfer of R(Sk) function as follows, j=1 λijkij is used. The formulation of the reliability has been inspired by works reported in [22] and [23]. Interested readers are referred to these papers for more details on the probability that a system can accomplish a particular task without failure. Similar to other cognitive agents, the UAVs are expected to be self-interested in the sense that they prefer to save their limited resources, and act selfishly by not consuming enough resources during the mission. To monitor the cooperative behavior of these UAVs, an accumulative cooperative reputation related to the amount of resources that each UAV shares during the mission is defined. During each mission t (i.e., accomplishing an assigned task), the cooperative reputation of each UAV i, ρi is updated as follows: ρt i = i, i + ∆ρt ρt−1 i , ∃kui ∈ Sk otherwise (4) (cid:26) ρt−1 Nk(cid:88) Nr(cid:88) Nk(cid:89) (cid:80)Nr i=1 Table I: Notations aij eij kij λij ρi Nk Nr N Travel time of UAV i to task j. Execution cost of involving resource j of UAV i in a coalition. It is computed per unit time. Execution time of involving resource j of UAV i in a coalition. It depends on the task and capability of the UAV. Failure rate of involving the resource j of UAV i in a coalition. Credit of UAV i. Number of UAVs in coalition k. Number of network resources. Number of network UAVs. i is the amount of contribution of UAV i to coalition where ∆ρt Sk in terms of sharing resources to carry out the assigned task k and can be defined as follows: Υk(cid:80) m∈Sk fi, fm ∆ρt i = (5) denoting as Υk =(cid:80)Nr contributions of UAV i, defined as fi =(cid:80)Nr where Υk is the sum of the resource requirements of task Tk j and fi is the sum of the resource . As such, the coalition reputation of all involved UAVs in the coalition Sk is computed as follows: j=1 τ k rj ui τ k j j=1 Nk(cid:88) Nk(cid:88) P (Sk) = ρt i (6) i=1 B. Formulation of Multi-objective Optimization To consider all aforementioned optimization criteria including reducing the coalition cost, and increasing the reliability, and reputation of the formed coalitions, Multi- Objective Optimization Problem (MOOP) as a weighted-sum of three objectives is defined. The multi-objective optimization and its required constraints are defined as follows. min O(Sk) = C(Sk) − η1 ln R(Sk) − η2P (Sk) subject to eij ≥ τ k j ∀j = 1, 2, 3, . . . , Nr, i=1 where η1 and η2 are weighting parameters to assign the desired importance to each objective and scale them to be in comparative ranges. Constraint (8) refers to the requirement to secure enough resources in the formed coalition to complete the encountered task Tk. In table I, a summary of the notations used throughout this paper is presented. III. PROPOSED ALGORITHM The objective function described in section II-B is a NP- hard problem. Standard approaches such as dynamic program- ming and exact algorithms involve computational complexity of O(n2) that could be intractable in large-scale networks. Hence, evolutionary algorithms such as genetic algorithm can be considered as potential options to find feasible solutions of this problem. In this paper, we propose a coalition for- mation algorithm based on a version of genetic algorithm called Quantum-Inspired Genetic Algorithm (QIGA) to find the solution of the multi-objective problem in (7). A. Review of Quantum-Inspired Genetic Algorithm (QIGA) The idea behind QIG algorithms is to take advantage of both GA and quantum computing mechanisms [22]. In quantum computation, the data representation is based on qubit is considered as a superposition of two different states 0(cid:105) and 1(cid:105) that can be denoted as: information unit. A qubit is the smallest that ψ(cid:105) = α0(cid:105) + β1(cid:105), (9) where α and β are complex numbers such that α2 +β2 = 1. α2 and β2 are the probability of amplitudes where the qubit can be at states 0(cid:105) and 1(cid:105), respectively. With m the model can represent 2m independent states. qubits, However, when the value of the qubit is measured, it leads 0(cid:105) or 1(cid:105)). to a single state of the quantum state (i.e., Similar to a standard genetic algorithm, a chromosome's representation is defined as a string of m information units. Thus, a chromosome can be defined as a string of m qubits as: (cid:26)(cid:18)α0 (cid:19) (cid:18)α1 (cid:19) (cid:18)α2 (cid:19) (cid:18)αm−1 (cid:19)(cid:27) , (10) where each pair (αi, βi), i = 1, 2, 3, . . . , m− 1 denotes a gene of the chromosome. βm−1 , . . . , β0 β1 β2 , , To evaluate a quantum chromosome, a transfer function called measure is applied to convert the quantum states to a classical chromosome representation. For example, each pair (αi, βi) is converted to a value ci ∈ {0, 1} so that the m-qubit chromosome may result in a binary string {c1, c2, c3, . . . , cm}. More specifically, each pair becomes 0 or 1 using the corre- sponding qubit probabilities αi2 and βi2. To perform this conversion, we use the measure function defined as follow: function MEASURE(α) set r to a random number between 0 and 1; if r > α2 then else return 0; Each binary string is a possible solution which is evaluated via a problem dependent fitness function. In the following section, the proposed fitness function is described. B. Fitness function The fitness function or evaluation function determines how to fit a solution with respect to the constrained optimization problem. To build the fitness function, the negative sign of the objective function O(Sk), defined in (7), is used. In addition, as the solutions which meet all of the constraints get higher fitness value, the solutions which violate some of the constrains should achieve a lower objective value from the fitness function. To prevent potential violations, a penalty function technique that penalizes the solutions according to amount of constraints' mismatches is applied. Considering these facts, the fitness function is proposed as: F (Sk) = −(O(Sk) + g(Sk)), (11) where g(Sk) is the penalty function such that if there is no violation, its value will be zero, and positive otherwise. g(Sk) (7) (8) return 1; end if end function is defined as: g(Sk) = γ × Nr(cid:88) j − Ns(cid:88) max(0, τ k i=1 i=1 eij), (12) where γ is the penalty coefficient that controls the weight of the amount of constraints violated. Evolutionary strategies (e.g., crossover and mutation op- erations) are often considered in GA algorithms to improve their performance. However, as stated in [22], applying the crossover and mutation operators do not significantly improve the performance of the QIGA. Therefore, in the QIGAs, usually a qubit rotation gates strategy is used. Qubit (αi, βi) of the m-qubit chromosome is updated according to the rotation gates in order to get more or less probabilities to states 0(cid:105) and 1(cid:105). Therefore, at each time step t, the update of qubit is performed based on the following rotation gate matrix L(θi): (cid:18)cos(θi) −sin(θi) (cid:19) (cid:18)αt (cid:19) (cid:18)αt−1 (cid:19) ; cos(θi) sin(θi) L(θi) = , (13) where θi is the amount of angle rotation of qubit gate i. Algorithm 1 presents the pseudo-code for QIGA as described in [22]. = L(θi) βt−1 i βt i i i the relative significance of the travel time compared to the expected credit. Algorithm 2 shows the pseudo-code for the multi-UAV coalition formation. Algorithm 2 Multi-UAV coalition formation using the leader- follower method and QIGA 1: Search PoIs in the search space 2: Initialize each leader as a singleton coalition committed to 3: coalition members ← [ ] 4: while there exists an idle UAV around do 5: 6: coal mems ← execute MOQIG method regarding for all unsatisfied PoIs so far do a single PoI algorithm 1 coalition members.append(coal mems) end for Send bids to UAVs as potential followers Calculate the utility values of the followers and receive Update coalition members of each leader with respect 7: 8: 9: 10: 11: bid responses to the bid responses 12: end while Algorithm 1 Quantum-Inspired Genetic Algorithm 1: t ← 0 2: Initialize Q(t) as the population 3: Make P (t) by measuring Q(t) 4: Evaluate P (t) 5: Store the best solution b among P (t) 6: repeat 7: 8: 9: 10: 11: 12: until the termination-condition t ← t + 1 Make P (t) by measuring Q(t − 1) Evaluate P (t) Update Q(t) using quantum gates L(t) Store the best solution b among P (t) C. Multi-UAV Coalition Formation To establish a multi-UAV coalition, a leader-follower coali- tion formation method is followed. Initially, the UAVs are uniformly distributed in a search space to look for the PoIs. When a PoI is detected by a UAV, this UAV computes the resource requirements of the detected PoI and serves as a leader to form an optimal coalition. After calculating the required resources, the leader UAV calls other UAVs within a certain distance to join it in forming a coalition. Then, the UAVs with at least one of the required resources can respond to this call by reporting the amount of resources that they are able to contribute to help accomplish the task. It is also assumed that the UAVs are self-interested, meaning that if a UAV receives multiple requests, it will consider joining the coalition which offers the highest benefit. The UAV i, ui measures the value of each request based on travel time to reach the task and the expected cooperative reputation credit received. Thus, its utility value can be defined as: U (ui, Sk) = ρi − δaij, (14) where ρi and ai are the cooperation credit and travel time of ui when it attempts to join coalition k. δ is the weight indicating IV. EXPERIMENTAL RESULTS To evaluate the performance of the proposed QIGA-based coalition formation method, several scenarios with different number of UAVs and PoIs were simulated. It is assumed that the UAVs and PoIs are uniformly distributed across the region and the closest UAV to the PoI is considered to be the one that first detects the PoI and form a coalition (as a coalition leader). It is also assumed that each UAV has five different types of resources. The values for the UAVs' resources are generated with a random uniform distribution and the UAV's resource failure rates are produced randomly in the range (5× 10−5, 10−4). Furthermore, the execution times of the identified tasks are computed randomly in the range between 10 and 20, depending on the task and the capability of the UAV. The performance of our proposed algorithm is compared with three well-known algorithms including: i) the distance- based coalition formation method in which the coalitions are formed with the closest UAVs to the leader (i.e., the leader only considers the UAVs in a certain distance of the PoI to be in the coalition and do not evaluate them in terms of cooperative reputation or available resources), ii) the common merge- and-split coalition formation [24], and iii) a Non-Dominated Sorting Genetic Algorithm (NSGA-II) which is a fast, elitist and heuristic-based multi-objective algorithm. Table II shows the corresponding parameters for these algorithms. Table III represents some statistics regarding the completed tasks and resources violations for different algorithms. It demonstrates that the performance of the proposed coalition formation method is quite better than other algorithms ad- dressed here in terms of percentage of completed tasks and average of resource violations. We also compared the proposed method against the merge-and-split coalition formation algo- rithm. The percentage of completed tasks for the merge-and- split method in 30 missions for different numbers of UAVs and tasks were between 46% and 50%, while, as shown in table III, our method could achieve rate of 90% in task completion. Table II: Algorithms' parameters Parameter Population size Maximum number of iterations Number of objectives Mutation probability Crossover probability Distribution index for crossover Distribution index for mutation NA: Not Available Distance − Based N SGA − II M OQGA Method N A N A 1 N A N A N A N A 200 500 3 10% 90% 20 100 200 500 3 N A N A N A N A (a) 8-2 (b) 16-4 (c) 32-8 (d) 64-16 Figure 1: Comparison the qualities of solutions provided by the proposed method (MOQGA) and NSGA-II. Table III: Percentage of completed tasks and average of resource violations for different algorithms in 30 missions (with different numbers of UAVs and tasks). Distance − Based Method NSGA − II MOQGA No. of UAVs and tasks Completed tasks Resource violations Completed tasks Resource violations Completed tasks Resource violations 8-2 16-4 32-8 64-16 128-24 67% 43% 39% 45% 47% 1.6 3.83 6.93 11.97 20.33 80% 86% 91% 92% 90% 0.43 0.6 0.73 2.03 4.33 90% 90% 97% 95% 94% 0.3 0.43 0.20 1.23 2.47 100150200250300350400objective function 1 (Cost)-70-60-50-40-30-20-10objective function 2 (Reliability)NSGA-IIMOQGA150200250300350400450500550600650objective function 1 (Cost)-140-120-100-80-60-40-20objective function 2 (Reliability)NSGA-IIMOQGA100150200250300350400450objective function 1 (Cost)-150-100-500objective function 2 (Reliability)NSGA-IIMOQGA020040060080010001200objective function 1 (Cost)-400-350-300-250-200-150-100-500objective function 2 (Reliability)NSGA-IIMOQGA Table IV: The selected UAVs by leaders in 10 missions, where it is assumed the failure rate of the UAVs u5 and u6 is 90%. Time slot 1 2 3 4 5 6 7 8 8 9 10 L: Leader, F: Follower Coalition 1 L{u6}; F{u3, u4, u8} L{u2}; F{u3, u8, u4} L{u2}; F{u3, u5, u8} L{u2}; F{u4, u7, u3} L{u5}; F{u1, u3, u4} L{u1}; F{u3, u4} L{u5}; F{u2, u3, u8} L{u5}; F{u2, u3, u6} L{u5}; F{u2, u6, u7, u8} L{u5}; F{u2, u7, u8} L{u5}; F{u1, u3, u4} Satisfied Yes Yes Yes Yes Yes Yes Yes Yes Yes No Yes Coalition 2 L{u1}; F{u7, u2} L{u1}; F{u3, u7} L{u6}; F{u4} L{u1}; F{u5, u6, u8} L{u2}; F{u7, u8} L{u2}; F{u5, u6, u8, u7} L{u1}; F{u4, u7} L{u1}; F{u4, u7} L{u1}; F{u3, u4} L{u1}; F{u3, u4} L{u2}; F{u7, u8} Satisfied Yes Yes Yes No Yes No Yes Yes Yes Yes No Unreliable UAVs {} {} {u5} {u5, u6} {} {u5, u6} {} {u6} {u6} {} {} to completing a higher number of tasks and minimally over- spending the resources. VI. ACKNOWLEDGMENT OF SUPPORT AND DISCLAIMER The authors acknowledge the U.S. Government's support in the publication of this paper. This material is based upon work funded by AFRL. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the US government or AFRL. REFERENCES [1] T. W. Sandholm, "Distributed rational decision making," Multiagent systems: a modern approach to distributed artificial intelligence, pp. 201–258, 1999. [3] [2] S. P. Ketchpel, "Coalition formation among autonomous agents," in European Workshop on Modelling Autonomous Agents in a Multi-Agent World. Springer, 1993, pp. 73–88. J. Contreras, M. Klusch, and J. Yen, "Multi-agent coalition formation in power transmission planning: A bilateral shapley value approach." in AIPS, 1998, pp. 19–26. J. Yang and Z. Luo, "Coalition formation mechanism in multi-agent systems based on genetic algorithms," Applied Soft Computing, vol. 7, no. 2, pp. 561–568, 2007. [4] [5] F. Cruz-Menc´ıa, J. Cerquides, A. Espinosa, J. C. Moure, and J. A. Rodriguez-Aguilar, "Optimizing performance for coalition structure generation problems' idp algorithm," in Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2013, p. 706. [6] F. Bistaffa, A. Farinelli, J. Cerquides, J. Rodr´ıguez-Aguilar, and S. D. Ramchurn, "Anytime coalition structure generation on synergy graphs," in Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. International Foundation for Au- tonomous Agents and Multiagent Systems, 2014, pp. 13–20. [7] L. Sless, N. Hazon, S. Kraus, and M. Wooldridge, "Forming coalitions and facilitating relationships for completing tasks in social networks," in Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems, 2014, pp. 261–268. [8] P. Janovsky and S. A. DeLoach, "Multi-agent simulation framework for large-scale coalition formation," in Web Intelligence (WI), 2016 IEEE/WIC/ACM International Conference on. IEEE, 2016, pp. 343– 350. [9] B. Ghazanfari and N. Mozayani, "Enhancing nash q-learning and team q-learning mechanisms by using bottlenecks," Journal of Intelligent & Fuzzy Systems, vol. 26, no. 6, pp. 2771–2783, 2014. [10] B. Ghazanfari and M. E. Taylor, "Autonomous extracting a hierarchical structure of tasks in reinforcement learning and multi-task reinforcement learning," arXiv preprint arXiv:1709.04579, 2017. Figure 2: Changes in UAVs' cooperative reputation over time, where UAVs u5 and u6 are assumed to be selfish Figure 1 compares the qualities of solutions of the MO- QGA to NSGA-II algorithm. The plots demonstrate that the performance of the proposed method is better than the NSGA- II algorithm and result in superior quality solutions in terms of lower cost and higher reliability. Figure 2 shows changes in UAV's cooperative reputation over the course of time. It is assumed that UAVs, u5 and u6 are not trustworthy. As seen in the figure, the reputations of these UAVs decrease at each time slot, therefore it is less likely that these UAVs are selected by the leaders over time. The impact of reliability in coalition formation is also studied, where a pre-defined failure rate of 90% is considered for resources of UAVs u5 and u6. Table IV represents the selected UAVs (e.g., followers) by leaders where there are two unreliable UAVs. As shown in the table, the proposed method tries to not select unreliable UAVs in most cases. The reason for the selection of unreliable UAVs in some cases is that the problem is a MOOP and the method has to consider other objectives (i.e., cost and reputation) to optimize as well. V. CONCLUSION A leader-follower UAV coalition formation method is proposed to provide a practical solution for distributed task allocation in an unknown environment. Three critical aspects of cost minimization, reliability maximization, and the po- tential selfish behavior of the UAVs were considered in this coalition formation, and a quantum-inspired genetic algorithm is proposed to find the optimal coalitions with a low level of computational complexity. The proposed approach led to promising results compared to existing solutions with respect 51015202530Time Slots00.10.20.30.40.50.60.70.80.91CreditC1C3C4C5C6C8 [11] B. Ghazanfari and N. Mozayani, "Extracting bottlenecks for rein- forcement learning agent by holonic concept clustering and attentional functions," Expert Systems with Applications, vol. 54, pp. 61–77, 2016. [12] S. S. Mousavi, B. Ghazanfari, N. Mozayani, and M. R. Jahed-Motlagh, "Automatic abstraction controller in reinforcement learning agent via automata," Applied Soft Computing, vol. 25, pp. 118–128, 2014. [13] C. Schumacher, P. Chandler, M. Pachter, and L. Pachter, "Uav task assignment with timing constraints via mixed-integer linear program- ming," in Proc. AIAA 3rd Unmanned Unlimited Systems Conference, 2004. [14] M. A. Darrah, W. M. Niland, and B. M. Stolarik, "Multiple uav dynamic task allocation using mixed integer linear programming in a sead mission," Infotech@ Aerospace, pp. 26–29, 2005. [15] C. Schumacher, P. R. Chandler, and S. R. Rasmussen, "Task allocation for wide area search munitions," in American Control Conference, 2002. Proceedings of the 2002, vol. 3. J. Kennedy, "Particle swarm optimization," in Encyclopedia of machine learning. Springer, 2011, pp. 760–766. IEEE, 2002, pp. 1917–1922. [16] [17] M. Dorigo and L. M. Gambardella, "Ant colony system: a cooperative learning approach to the traveling salesman problem," IEEE Transac- tions on evolutionary computation, vol. 1, no. 1, pp. 53–66, 1997. [18] D. E. Goldberg, Genetic algorithms. Pearson Education India, 2006. [19] P. J. Van Laarhoven and E. H. Aarts, "Simulated annealing," in Springer, 1987, pp. Simulated annealing: Theory and applications. 7–15. [20] A. Rovira-Sugranes and A. Razi, "Predictive routing for dynamic uav networks," in 2017 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Oct 2017, pp. 43–47. [21] A. Razi, F. Afghah, and J. Chakareski, "Optimal measurement policy for predicting uav network topology," arXiv preprint arXiv:1710.11185, 2017. [22] K.-H. Han and J.-H. Kim, "Genetic quantum algorithm and its appli- cation to combinatorial optimization problem," in Evolutionary Com- putation, 2000. Proceedings of the 2000 Congress on, vol. 2. IEEE, 2000, pp. 1354–1360. [23] P.-Y. Yin, S.-S. Yu, P.-P. Wang, and Y.-T. Wang, "Multi-objective task allocation in distributed computing systems by hybrid particle swarm optimization," Applied Mathematics and Computation, vol. 184, no. 2, pp. 407–420, 2007. [24] F. Afghah, M. Zaeri-Amirani, A. Razi, J. Chakareski, and E. Bentley, "A coalition formation approach to coordinated task allocation in heterogeneous uav networks," arXiv preprint arXiv:1711.00214, 2017.
1902.09359
1
1902
2019-02-25T15:24:19
Anytime Heuristic for Weighted Matching Through Altruism-Inspired Behavior
[ "cs.MA", "cs.AI" ]
We present a novel anytime heuristic (ALMA), inspired by the human principle of altruism, for solving the assignment problem. ALMA is decentralized, completely uncoupled, and requires no communication between the participants. We prove an upper bound on the convergence speed that is polynomial in the desired number of resources and competing agents per resource; crucially, in the realistic case where the aforementioned quantities are bounded independently of the total number of agents/resources, the convergence time remains constant as the total problem size increases. We have evaluated ALMA under three test cases: (i) an anti-coordination scenario where agents with similar preferences compete over the same set of actions, (ii) a resource allocation scenario in an urban environment, under a constant-time constraint, and finally, (iii) an on-line matching scenario using real passenger-taxi data. In all of the cases, ALMA was able to reach high social welfare, while being orders of magnitude faster than the centralized, optimal algorithm. The latter allows our algorithm to scale to realistic scenarios with hundreds of thousands of agents, e.g., vehicle coordination in urban environments.
cs.MA
cs
Anytime Heuristic for Weighted Matching Through Altruism-Inspired Behavior Panayiotis Danassis, Aris Filos-Ratsikas, Boi Faltings Artificial Intelligence Laboratory (LIA), École Polytechnique Fédérale de Lausanne (EPFL) {panayiotis.danassis,aris.filosratsikas,boi.faltings}@epfl.ch 9 1 0 2 b e F 5 2 ] A M . s c [ 1 v 9 5 3 9 0 . 2 0 9 1 : v i X r a ABSTRACT We present a novel anytime heuristic (ALMA), inspired by the human principle of altruism, for solving the assignment problem. ALMA is decentralized, completely uncoupled, and requires no com- munication between the participants. We prove an upper bound on the convergence speed that is polynomial in the desired number of resources and competing agents per resource; crucially, in the realistic case where the aforementioned quantities are bounded independently of the total number of agents/resources, the conver- gence time remains constant as the total problem size increases. We have evaluated ALMA under three test cases: (i) an anti- coordination scenario where agents with similar preferences com- pete over the same set of actions, (ii) a resource allocation scenario in an urban environment, under a constant-time constraint, and finally, (iii) an on-line matching scenario using real passenger-taxi data. In all of the cases, ALMA was able to reach high social wel- fare, while being orders of magnitude faster than the centralized, optimal algorithm. The latter allows our algorithm to scale to real- istic scenarios with hundreds of thousands of agents, e.g., vehicle coordination in urban environments. KEYWORDS Coordination and Cooperation; Resource Allocation; Multi-agent Learning 1 INTRODUCTION One of the most relevant problems in multi-agent systems (MAS) is finding an optimal allocation between agents. This pertains to role allocation (e.g., team formation for autonomous robots [GA13]), task assignment (e.g., employees of a factory, taxi-passenger match- ing [VCGA12]), resource allocation (e.g., parking spaces and/or charging stations for autonomous vehicles [GC13]), etc. What fol- lows is applicable to any such scenario, but for concreteness we will refer to the allocation of a set of resources to a set of agents, a set- ting known as the assignment problem, one of the most fundamental combinatorial optimization problems [Mun57]. When designing algorithms for assignment problems, a signif- icant challenge emerges from the nature of real-world applica- tions, which is often distributed and information-restrictive. For the former part, a variety of decentralized algorithms have been developed [GLM10, IS17, ZSP08, BNBA12], all of which, though, require polynomial in the problem size number of messages. How- ever, inter-agent interactions often repeat no more than a few hun- dreds of times. Moreover, sharing plans and preferences creates high overhead, and there is often a lack of responsiveness and/or communication between the participants [SKKR10]. Achieving fast convergence and high efficiency in such information-restrictive settings is extremely challenging. Yet, humans are able to routinely and robustly coordinate in similar everyday scenarios. One driv- ing factor that facilitates human cooperation is the principle of altruism [CR02, NS05, Gin00]. Inspired by human behavior, the proposed heuristic is modeled on the principle of altruism. This results to fast convergence to highly efficient allocations, without any communication between the agents. A distinctive characteristic of ALMA is that agents make deci- sions locally, based on (i) the contest for resources that they are interested in, (ii) the agents that are interested in the same re- sources. If each agent is interested in only a subset of the total resources, ALMA converges in time polynomial in the maximum size of the subsets; not the total number of resources. In particular, if the size of each subset is a constant fraction of the total number of resources, then the convergence time is constant, in the sense that it does not grow with the problem size. The same is not true for other algorithms (e.g., the optimal centralized solution) which require time polynomial in the total number of agents/resources, even if the aforementioned condition holds. The condition holds by default in many real-world applications; agents have only lo- cal knowledge of the world, there is typically a cost associated with acquiring a resource, or agents are simply only interested in resources in their vicinity (e.g., urban environments). This is important, as the proposed approach avoids having to artificially split the problem in subproblems (e.g, by placing bounds or spatial constraints) and solve those separately, in order to make it tractable. Instead, ALMA utilizes a natural domain characteristic, instead of an artificial optimization technique (i.e., artificial bounds). Coupled to the convergence time, the decentralized nature of ALMA makes it applicable to large-scale, real-world applications (e.g., IoT devices, intelligent infrastructure, autonomous vehicles, etc.). 1.1 Our Results Our main contributions in this paper are: (1) We introduce a novel, anytime ALtruistic MAtching heuristic (ALMA) for solving the assignment problem. ALMA is decentral- ized, completely uncoupled (i.e., each agent is only aware of his own history of action/reward pairs [Tal13]), and requires no com- munication between the agents. (2) We prove that if we bound the maximum number of resources an agent is interested in, and the maximum number of agents com- peting for a resource, the expected number of steps for any agent to converge is independent of the total problem size. Thus, we do not require to artificially split the problem, or similar techniques, to render it manageable. (3) We provide a thorough empirical evaluation of ALMA on both synthetic and real data. In particular, we have evaluated ALMA un- der three test cases: (i) an anti-coordination scenario where agents with similar preferences compete over the same set of actions, (ii) a resource allocation scenario in an urban environment, under a constant-time constraint, and finally, (iii) an on-line matching scenario using real passenger-taxi data. In all of the cases, ALMA achieves high social welfare (total satisfaction of the agents) as com- pared to the optimal solution, as well as various other algorithms. 1.2 Related Work The assignment problem consists of finding a maximum weight matching in a weighted bipartite graph and it is one of the best- studied combinatorial optimization problems in the literature. The first polynomial time algorithm (with respect to the total number of nodes, and edges) was introduced by Jacobi in the 19th century [BJ65, Oll09], and was succeeded by many classical algorithms [Mun57, EK72, Ber79] with the Hungarian algorithm of [Kuh55] being the most prominent one (see [Su15] for an overview). The problem can also be solved via linear programming [Dan90], as its LP formulation relaxation admits integral optimal solutions [PS82]. In Section 3.3, we will apply ALMA on a non-bipartite setting, which corresponds to the more general maximum weight matching problem on general graphs. To compute the optimal in this case, we will use the blossom algorithm of [Edm65] (see [LP09]). In reality, a centralized coordinator is not always available, and if so, it has to know the utilities of all the participants, which is often not feasible. In the literature of the assignment problem, there also exist several decentralized algorithms (e.g., [GLM10, IS17, ZSP08, BNBA12] which are the decentralized versions of the aforemen- tioned well-known centralized algorithms). However, these algo- rithms require polynomial computational time and polynomial number of messages (such as cost matrices [IS17], pricing infor- mation [ZSP08], or a basis of the LP [BNBA12], etc.). Yet, agent interactions often repeat no more than a few hundreds of times. To the best of our knowledge, a decentralized algorithm that requires no message exchange (i.e., no communication network) between the participants, and achieves high efficiency, like ALMA does, has not appeared in the literature before. Let us stress the importance of such a heuristic: as autonomous agents proliferate, and their num- ber and diversity continue to rise, differences between the agents in terms of origin, communication protocols, or the existence of sub-optimal, legacy agents will bring forth the need to collaborate without any form of explicit communication [SKKR10]. Finally, inter-agent communication creates high overhead as well. ALMA is inspired by the decentralized allocation algorithm of [DF19]. Using such a simple learning rule which only requires en- vironmental feedback, allows our approach to scale to hundreds of thousands of agents. Moreover, it does not require global knowl- edge of utilities; only local knowledge of personal utilities (in fact, we require knowledge of pairwise differences which are far easier to estimate). 2 ALTRUISTIC MATCHING HEURISTIC In this section, we define ALMA and prove its convergence proper- ties. We begin with the definition of the assignment problem, and its interpretation in our setting. 2 2.1 The Assignment Problem The assignment problem consists of finding a maximum weight matching in a weighted bipartite graph, G = {N ∪ R, E}. In the studied scenario, N = {1, . . . , N} agents compete to acquire R = {1, . . . , R} resources. We assume that each agent n is interested in a subset of the total resources, i.e., Rn ⊂ R. The weight of an edge (n, r) ∈ E represents the utility (un(r)) agent n receives by acquiring resource r. Each agent can acquire at most one resource, and each resource can be assigned to at most one agent. The goal is to maximize the social welfare (sum of utilities), i.e., max x≥0  subject to   (n,r)∈E (1) un,r xn,r xn,r = 1,∀n ∈ N xn,r = 1,∀r ∈ R r (n,r)∈E n(n,r)∈E 2.2 Learning Rule This section describes the proposed heuristic (ALMA: ALtruistic MAtching heuristic) for weighted matching. We make the follow- ing two assumptions: First, we assume (possibly noisy) knowledge of personal preferences by each agent. Second, we assume that agents can observe feedback from their environment. This is used to inform collisions and detect free resources. It could be achieved by the use of visual, auditory, olfactory sensors etc., or by any other means of feedback from the resource (e.g., by sending an occupancy message). Note here that these messages would be between the requesting agent and the resource, not between the participating agents themselves, and that it suffices to send only 1 bit of informa- tion (e.g., 0, 1 for occupied / free respectively). ALMA learns the right action through repeated trials as follows. Each agent sorts his available resources (possibly Rn ⊆ R) in decreasing order of utility (r1, r2, . . . , ri , ri +1, . . . , rRn ). The set of available actions is denoted as A = {Y , Ar1 , . . . , ArRn }, where Y refers to yielding, and Ar refers to accessing resource r. Each agent has a strategy (дn) that points to a resource and it is initialized to the most preferred one. As long as an agent has not acquired a resource yet, at every time-step, there are two possible scenarios. If дn = Ar (strategy points to resource r), then agent n attempts to acquire that resource. If there is a collision, the colliding parties back-off with some probability. Otherwise, if дn = Y, the agent choses a resource r for monitoring. If the resource is free, he sets дn ← Ar . Alg. 1 presents the pseudo-code of ALMA, which is followed by every agent individually. The back-off probability and the next resource to monitor are computed individually and locally based on the current resource and each agent's utilities, as will be explained in the following section. Finally, note that if the available resources change over time, the agents simply need to sort again the currently available ones. 2.3 Back-off Probability & Resource Selection Let R be totally ordered in decreasing utility under ≺n, ∀n ∈ N. If more than one agent compete for resource ri (step 4 of Alg. 1), each of them will back-off with probability that depends on their utility n = lossi k − i (2) where k ∈ {i + 1, . . . , Rn} denotes the number of remaining re- sources to be considered. For k = i + 1, the formula only takes into account the utility loss of switching to the immediate next best resource, while for k = Rn it takes into account the average utility loss of switching to all of the remaining resources. In the remainder n = un(ri)−un(ri +1). The of the paper we assume k = i +1, i.e., lossi actual back-off probability can be computed with any monotoni- cally decreasing function f on lossn, i.e., Pn(ri , ≺n) = fn(lossi n). In the evaluation section, we have used two such functions, a linear (Eq. 3), and the logistic function (Eq. 4). The parameter ϵ places a threshold on the minimum / maximum back-off probability for the linear curve, while γ determines the steepness of the logistic curve.  f (loss) = 1 − ϵ, ϵ, 1 − loss, if loss ≤ ϵ if 1 − loss ≤ ϵ otherwise f (loss) = 1 1 + e−γ(0.5−loss) (3) (4) loss of switching to their respective remaining resources. The loss is given by Eq. 2. k j=i +1 un(ri) − un(rj) Using the aforedescribed rule, agents that do not have good al- ternatives will be less likely to back-off and vice versa. The ones that do back-off select an alternative resource and examine its avail- ability. The resource selection is performed in sequential order, i.e., Sn(rprev, ≺n) = rprev+1, where rprev denotes the resource selected by that agent in the previous round. We also examined the possi- bility of using a weighted or uniformly at random selection, but achieved inferior results. 2.4 Altruism-Inspired Behavior ALMA is inspired by the human principle of altruism. We would expect an altruistic person to give up a resource either to some- one who values it more, if that resulted in an improvement of the well-being of society [CR02], or simply to be nice to others [Sim16]. Such behavior is especially common in situations where the backing-off subject has equally good alternatives. For example, in human pick-up teams, each player typically attempts to fill his most preferred position. If there is a collision, a colliding player might back-off because his teammate is more competent in that role, or because he has an equally good alternative, or simply to be polite; the player backs-off now and assumes that role at some future game. From an alternative viewpoint, following such an al- truistic convention leads to a faster convergence which outweighs the loss in utility. Such conventions allow humans to routinely and robustly coordinate in large scale and under dynamic and unpre- dictable demand. Behavioral conventions are a fundamental part of human societies [Lew08], yet they have not appeared meaningfully in empirical modeling of multi-agent systems. Inspired by human behavior, ALMA attempts to reproduce these simple rules in an artificial setting. 3 r1, r2, . . . , ri , ri +1, . . . , rRn . Algorithm 1 ALMA: Altruistic Matching Heuristic. Require: Sort resources (Rn ⊆ R) in decreasing order of utility Require: Initialize дn ← Ar1, and rprev ← r1. 1: procedure ALMA 2: 3: 4: 5: 6: 7: 8: Agent n attempts to acquire resource r. Set rprev ← r. if Collision(r) then back-off (set дn ← Y) with probability Pn(r , ≺n). Agent n monitors r ← Sn(rprev, ≺n). Set rprev ← r. if Free(r) then set дn ← Ar . if дn = Ar then else (дn = Y) 2.5 Convergence Agents who have not acquired a resource (дn = Y) will not claim an occupied one. Additionally, every time a collision happens, there is a positive probability that some agents will back-off. As a result, the system will converge. The following theorem proves that the expected convergence time is logarithmic in the number of agents N and quadratic in the number of resources R. Theorem 2.1. For N agents and R resources, the expected number of steps until the system of agents following Alg. 1 converges to a complete matching is bounded by (5), where p∗ = f (loss∗), and loss∗ is given by Eq. 6. (cid:18) O R (cid:18) 1 p∗ log N + R (cid:19)(cid:19) (cid:18) 2 − p∗ 2(1 − p∗) r ∈R,n∈N(lossr min n), 1 − max r ∈R,n∈N(lossr n) (cid:19) (5) (6) loss ∗ = arg min loss r n Proof. To improve readability, we will only provide a sketch of the proof. Please see the appendix for the complete version. The proof is based on [CF11, DF19]. We first assume that every agent, on every collision, backs-off with the same constant probability p. We start with the case of having N agents competing for 1 resource and model our system as a discrete time Markov chain. Intuitively, this Markov chain describes the number of individuals in a decreasing population, but with two caveats: the goal (absorbing state) is to reach a point where only one individual remains, and if we reach zero, we restart. We prove that the expected number of steps until we reach a state log N where either 1 or 0 agents compete for that resource is O(cid:16) 1 (cid:16) 2(1−p) Moreover, we prove that with high probability, Ω agent will remain (contrary to reaching 0 and restarting the process of claiming the resource), no matter the initial number of agents. Having proven that, we move to the general case of N agents competing for R resources. (cid:17). (cid:17), only 1 At any time, at most N agents can compete for each resource. We call this period a round. During a round, the number of agents competing for a specific resource monotonically decreases, since that resource is perceived as occupied by non-competing agents. Let the round end when either 1 or 0 agents compete for the resource. (cid:17) steps. If all agents backed-off, it will This will require O(cid:16) 1 2−p log N p p p 2−p 2(1−p) take on average R steps until at least one of them finds a free resource. We call this period a break. In the worst case, the system will oscillate between a round and a break. According to the above, R = 1, as mentioned in the previous paragraph, in expectation there will be 2−p 2(1−p) oscillations. For R > 1 the expected number of one oscillation requires in expectation O(cid:16) 1 oscillations is bounded by O(cid:16) (cid:16) 1 matching is O(cid:16) (cid:17) steps. If (cid:17). Thus, we conclude that if (cid:17)(cid:17). all the agents back-off with the same constant probability p, the expected number of steps until the system converges to a complete log N + R 2−p 2(1−p) log N + R R R p ) and outer ( 2−p Next, we drop the constant probability assumption. Intuitively, the worst case scenario corresponds to either all agents having a small back-off probability, thus they keep on competing for the same resource, or all of them having a high back-off probability, thus the process will keep on restarting. These two scenarios correspond to the inner ( 1 2(1−p)) probability terms of bound (5) p respectively. Let p∗ = f (loss∗) be the worst between the smallest or highest back-off probability any agent n ∈ N can exhibit, i.e., having loss∗ given by Eq. 6. Using p∗ instead of the constant p, we bound the expected convergence time according to bound (5). □ It is worth noting that the back-off probability p∗ in bound (5) does not significantly affect the convergence time. For example, using Eq. 3 with a quite small ϵ = 0.01, the resulting quantities 2. Most importantly, though, would be at most 100R log N , and 50R this is a rather loose bound (e.g., agents would rarely back-off with probabilities as extreme as p∗). Apart from the convergence of the whole system, we are inter- ested in the expected number of steps any individual agent would require in order to acquire a resource. In real-world scenarios, there is typically a cost associated with acquiring a resource. For example, a taxi driver would not be willing to drive to the other end of the city to pick up a low fare passenger. As a result, each agent is typically interested in a subset of the total resources, i.e., Rn ⊂ R, thus at each resource there is a bounded number of competing agents. Let Rn denote the maximum number of resources agent n is interested in, and N r denote the maximum number of agents competing for resource r. By bounding these two quantities (i.e., we consider Rn and N r to be constant functions of N , R), Corollary 2.2 proves that the expected number of steps any individual agent requires in order to claim a resource is independent of the total problem size (i.e., N , and R), or, in other words, that the convergence time is constant in these quantities. Corollary 2.2. Let Rn = Rn, such that ∀r ∈ Rn : un(r) > 0, and N r = Nr , such that ∀n ∈ Nr : un(r) > 0. The expected number of steps until an agent n ∈ N following Alg. 1 successfully acquires a resource is bounded by (7), where p∗ n = f (loss⋆) and loss⋆ (cid:18) (cid:19)(cid:19) is given by Eq. 8, independent of the total problem size N , R. (cid:19) N r) + max Rn′ n′∈∪r∈Rn Nr 2 − p∗ n 2(1 − p∗ n) max Rn′ n′∈∪r∈Rn Nr log( max r ∈Rn (cid:18) 1 p∗ n (cid:18) (7) O min r ∈Rn,n∈Nr (lossr n), 1 − max r ∈Rn,n∈Nr (lossr n) loss⋆ = arg min loss r n (8) 4 Proof. The expected number of steps until an agent n ∈ N successfully acquires a resource is upper bounded by the total con- vergence time of the sub-system he belongs to, i.e., the sub-system consisting of the sets of Rn resources and ∪r ∈RnNr agents. In such scenario, at most maxr ∈Rn N r agents can compete for any resource. Using Theorem 2.1 for maxr ∈Rn N r agents, maxn′∈∪r∈Rn Nr Rn′ re- sources, and worst-case loss⋆ given by any agent in ∪r ∈RnNr (i.e., Eq 8) results in the desired bound. Note that agents do not compete for already claimed resources (step 8 of Alg. 1), thus the conver- gence of an agent does not require the convergence of agents of overlapping sub-systems. □ i optimal)/ i achieved − in social welfare is ( 3 EVALUATION In this section we evaluate ALMA under various test cases. For the first two, we focus on convergence time and relative difference in social welfare (SW), i.e., (achieved − optimal)/optimal. In every reported metric, except for the social welfare, we report the average value out of 128 runs of the same problem instance. Error bars repre- sent one standard deviation (SD) of uncertainty. As a measure of so- cial welfare, we report the cumulative regret of the aforementioned 128 runs, i.e., for i ∈ [1, 128] runs, the reported relative difference i optimal. This was done to improve visualization of the results in smaller problem sizes, where really small differences result in high SD bars (e.g., if achieved = 1 × 10−5, and optimal = 2 × 10−5, the relative difference would be −50% for practically the same matching). The optimal matchings were computed using the Hungarian algorithm 1. The third test case is an on-line setting, thus we report the achieved SW (not the relative difference to the optimal), and the empirical competitive ratio (average out of 128 runs, as before). All the simu- lations were run on 2x Intel Xeon E5-2680 with 256 GB RAM. In Section 3.1 we use the logistic function (Eq. 4) with γ = 2, while in Sections 3.2 & 3.3 we use the linear function (Eq. 3) with ϵ = 0.1. It is important to stress that our goal is not to improve the convergence speed of a centralized, or decentralized algorithm. Rather, the computation time comparisons of Sections 3.1 & 3.2 are meant to ground the actual speed of ALMA, and argue in favor of its applicability on large-scale, real-world scenarios. Given the nature of the problem, we elected to use a specialized algorithm to compute the optimal solution, rather than a general LP-based technique (e.g., the Simplex method). Specifically, we opted to use the Hungarian algorithm which, first, has proven polynomial worse case bound, and second, as our simulations will demonstrate, can handle sufficiently large problems. 3.1 Test Case #1: Uniform, and Noisy Common Preferences 3.1.1 Setting. As a first evaluation test case, we cover the ex- treme scenarios. The first pertains to an anti-coordination scenario in which agents with similar preferences compete over the same set of actions [DF18]. For example, autonomous vehicles would prefer the least congested route, bidding agents participating in multiple auctions would prefer the ones with the smallest number of partici- pants, etc. We call this scenario 'noisy common preferences' and 1We used Kevin L. Stern's O(N 3) implementation: https://github.com/KevinStern/. (a) (c) (b) (d) Figure 1: From left to right, top to bottom: (1a) Total convergence time (#steps), (1b) average time (#steps) for an individual agent to successfully acquire a resource, (1c) Computation time (ns), and (1d) Relative difference in social welfare (%), for increasing number of resources, and N = R. Fig. 1a, 1c, and 1b are in double log. scale, while Fig. 1d is in single log. scale. model the utilities as follows: ∀n, n′ ∈ N, un(r) − un′(r) ≤ noise, where the noise is sampled from a zero-mean Gaussian distribu- tion, i.e., noise ∼ N(0, σ 2) 2. In the second scenario the utilities are initialized uniformly at random (U aR) for each agent and resource. 3.1.2 Convergence Time. Starting with Fig. 1a, we can see that the convergence time for the system of agents following Alg. 1 is linear to the number of resources R. From the perspective of a single agent, Fig. 1b shows that on average he will successfully acquire a resource significantly (> 2×) faster than the total convergence time. This suggest that there is a small number of agents which take longer in claiming a resource and which in turn delay the system's convergence. We will exploit this property in the next section to present the anytime property of ALMA. Fig. 1c shows that ALMA requires approximately 4 to 6 orders of magnitude less computa- tion time than the centralized Hungarian algorithm. Furthermore, ALMA seems to scale more gracefully, an important property for real world applications. Note also that in real-world applications we would have to take into account communication time, communica- tion reliability protocols, etc., which create additional overhead for the Hungarian or any other algorithm for the assignment problem. 3.1.3 Efficiency. The relative difference in social welfare (Fig. 1d) reaches asymptotically zero as R increases. For a small number of resources, ALMA achieves the worst social welfare, approximately 11% worse than the optimal. Intuitively this is because when we have a small number of choices, a single wrong matching can have a significant impact to the final social welfare, while as the number of resources grow, the impact of an erroneous matching is mitigated. For 16384 resources we lose less than 2.5% of the optimal. As a reference, Fig. 1d depicts the centralized greedy, and the random solutions as well. The greedy solution goes through the partici- pating agents randomly, and assigns them their most preferred unassigned resource. In this scenario, the random solution loses up to 50% of the optimal SW, while the greedy solution achieves similar results to ALMA, especially in high noise situations. This is to be expected, since first, all agents are interested in all the resources, and second, as the noise increases, the agents' preferences become more distinguishable, more diverse. ALMA is of a greedy nature as well, albeit it utilizes a more intelligent backing-off scheme. Con- trary to that, the greedy solution does not take into account the utilities between agents, thus there are scenarios where ALMA would significantly outperform the greedy (e.g., see Section 3.3). Finally, recall that ALMA operates in a significantly harder domain with no communication, limited feedback, and time constraints. In contrast, the greedy method requires either a central coordinator or message exchange (to communicate users' preferences and resolve collisions). Adopting a simple rule allows the applicability of ALMA to large scale multi-agent systems. In this section we will analyze such a scenario. Specifically we are interested in resource allocation in urban environments (e.g., parking spots / charging stations for 3.2 Test Case #2: Resource Allocation in a Cartesian Map with Manhattan Distances 2Similar results achieved using uniform noise, i.e., ∼ U(−ν, ν). 5 (a) (c) (e) (g) (b) (d) (f) (h) Figure 2: Left to right, top to bottom: (2a) Average time (#steps) for an agent to acquire a resource, (2b) Total convergence time (#steps), (2c) Computation time (ns), (2d) Relative difference in SW (%), (2e) Percentage of 'winners', (2f) Relative difference in SW (%) in interrupted execution, (2g) Percentage of 'winners' in interrupted execution. The aforementioned are for increasing number of resources, and N = R. Fig. (2a), (2b), and (2c) are in double log scale, while the rest are in single log scale. Fig. (2h) √4 × N . presents an example of the studied resource allocation scenario in an urban environment. We assume grid length of 6 autonomous vehicles, taxi - passenger matchings, etc.). The afore- mentioned problems become ever more relevant due to rapid ur- banization, and the natural lack of coordination in the usage of resources [Var16]. The latter result in the degradation of response (e.g., waiting time) and quality metrics in large cities [Var16]. 3.2.1 Setting. Let us consider a Cartesian map representing a city on which are randomly distributed vehicles and charging stations, as depicted in Fig. 2h. The utility received by a vehicle n for using a charging station r is proportional to the inverse of their distance, i.e., un(r) = 1/dn,r . Since we are in an urban environment, let dn,r denote the Manhattan distance. Typically, there is a cost each agent is willing to pay to drive to a resource, thus there is a cut-off distance, upon which the utility of acquiring the resource is zero (or possibly negative). This is a typical scenario encountered in resource allocation in urban environments, where there are spatial constraints and local interactions. The way such problems are typically tackled, is by dividing the map to sub-regions, and solving each individual sub-problem. For example, Singapore is divided into 83 zones based on postal codes [CN11], and taxi drivers' policies are optimized according to those [NKL17, VCGA12]. On the other hand, not placing bounds means that the current solutions will not scale. To the best of our knowl- edge, we are the first to propose an anytime heuristic for resource allocation in urban environments that can scale in constant time without the need to artificially split the problem. Instead, ALMA ex- ploits the two typical characteristics of an urban environment: the anonymity in interactions and homogeneity in supply and demand [Var16] (e.g., assigning any of two equidistant charging stations to a vehicle, would typically result to the same utility). This results in a simple learning rule which, as we will demonstrate in this section, can scale to hundreds of thousands of agents. 3.2.2 Convergence Time. To demonstrate the latter, we placed a bound on the maximum number of resources each agent is in- terested in, and on the maximum number of agents competing for a resource, specifically Rn = N r ∈ {8, 16, 32, 64, 128}. According to Corollary 2.2, bounding these two quantities should result in convergence in constant time, regardless of the total problem size (R, N). The latter is corroborated by Fig. 2a, which shows that the average number of time-steps until an agent successfully claims a resource remains constant as we increase the total problem size. Same is true for the system's convergence time (Fig. 2b), which caps as R increases. The small increase is due to outliers, as Fig. 2b reports the convergence time of the last agent. This results to ap- proximately 7 orders of magnitude less computation time than the centralized Hungarian algorithm (Fig. 2c), and this number would grow boundlessly as we increase the total problem size. Moreover, as mentioned, in an actual implementation, any algorithm for the assignment problem would face additional overhead due to com- munication time, reliability protocols, etc. 3.2.3 Efficiency. Along with the constant convergence time, ALMA is able to reach high quality matchings, achieving less than 7.5% worse social welfare (SW) than the optimal (Fig. 2d). The latter refers to the small bound of Rn = 8. As observed in Section 3.1, with a small number of choices, a single wrong matching can have a sig- nificant impact to the final social welfare. By increasing the bound 7 to a more realistic number (e.g., Rn = 32), we achieve less than 2.5% worse SW. In general, for R > 2 resources and different values of Rn, ALMA achieves between 1.9− 12% loss in SW, while the greedy approach achieves 8.0 − 24% and the random 7.3 − 43.4%. The be- havior of the graphs depicted in Fig. 2d for Rn ∈ {8, 16, 32, 64, 128} indicate that, as the problem size (R) increases, the social welfare reaches its lowest value at R = 2 × Rn. To investigate the latter, we have included a graph for increasing Rn (instead of constant to the problem size), specifically Rn = R/2. ALMA achieves a constant loss in social welfare (approximately 11%). The greedy approach achieves loss of 14%, while the random solution degrades towards 44% loss. Compared to Test Case #1, this is a significantly harder prob- lem for a decentralized algorithm with no communication and no global knowledge of the resources. The set of resources each agent is interested in is a proper subset of the set of the total resources, i.e., Rn ⊊ R (or could be R < N ). Furthermore, the lack of commu- nication between the participants, and the stochastic nature of the algorithm can lead to deadlocks, e.g., in Fig. 2h, if vehicle 2 acquires resource 1, then vehicle 1 does not have an available resource in range. Nonetheless, ALMA results in an almost complete matching. Fig. 2e, depicts the percentage of 'winners' (i.e., agents that have successfully claimed a resource r such that un(r) > 0). The afore- mentioned percentage refers to the total population (N ) and not the maximum possible matchings (potentially < N ). As depicted, the percentage of 'winners' is more than 90%, reaching up to 97.8% for Rn = 128. We also employed ALMA in larger simulations with up to 131072 agents, and equal resources. As seen in Fig. 2e, the percentage of winners remains stable at around 98%. Even though the size of the problem prohibited us from running the Hungar- ian algorithm (or an out-of-the-box LP solver) and validating the quality of the achieved matching, the fact that the percentage of winners remains the same suggests that the relative difference in SW will continue on the same trend as in Fig. 2d. Moreover, the average steps per agent to claim a resource remains, as proven, constant (Fig. 2a). The latter validate the applicability of ALMA in large scale applications with hundreds of thousands of agents. 3.2.4 Anytime Property. In the real world, agents are required to run in real time, which imposes time constraints. ALMA can be used as an anytime heuristic as well. To demonstrate the latter, we compare four configurations: the 'full' one, which is allowed to run until the systems converges, and three 'constant time' versions which are given a time budget of 32, 256, and 1024 time-steps. In this scenario, we do not impose a bound on Rn, N r , but we assume a cut-off distance, upon which the utility is zero. The cut-off distance was set to 0.25 of the maximum possible distance, i.e., as the prob- lem size grows, so do the Rn, N r . On par with Test Case #1, the full version converges in linear time. As depicted in Fig. 2f, the achieved SW is less than 9% worse than the optimal. The inferior results in terms of SW compared to Test Case #1 are because this is a signifi- cantly harder problem due to the aforementioned deadlocks. On the other hand though, ALMA benefits from the spatial constraints of the problem. The average number of time-steps an individual agent needs to successfully claim a resource is significantly smaller, which suggest that we can enforce computation time constraints. Restrict- ing to only 32, 256, and 1024 time-steps, results in 1.25%, 0.12%, and 0.03% worse SW than the unrestricted version, respectively. Even in larger simulations with up to 131072 agents, the percentage of winners (Fig. 2g) remains stable at 98.6%, which suggests that the relative difference in SW will continue on the same trend as in Fig. 2f (we do not suggest that this is the case in any domain. For example, in the noisy common preferences domain of Test Case #1, the quality of the achieved matching decreases boundlessly as we decrease the alloted time. Nevertheless, the aforedescribed domain is a realistic one, with a variety of real-world applications). Finally, the repeated nature of such problems suggests that even in the case of a deadlock, the agent which failed to win a resource, will do so in some subsequent round. 3.3 Test Case #3: On-line Taxi Request Match In this section we present a motivating test case involving ride- sharing, via on-line taxi request matching, using real data of taxi rides in New York City. Ride-sharing (or carpooling), offers great potential in congestion relief and environmental sustainability in urban environments. In the past few years, several commercially successful ride-sharing companies have surfaced (e.g., Uber, Lyft, etc.), giving rise to a new incarnation of ride-sharing: dynamic ride- sharing, where passengers are matched in real-time. Ride-sharing, though, results to some passenger disruption due to loss in flexi- bility, security concerns, etc. Compensation comes in the form of monetary incentives, as it allows passengers to share the travel ex- penses, and thus reduce the cost. Ride-sharing companies account for a plethora of factors, like current demand, prime time pricing, the cost of the route without any ride-sharing, the likelihood of a match, etc. Yet, a fundamental factor of the cost of any shared ride, no matter if it is a company or a locally-organized car sharing scheme, is the traveled distance. In this test case, we attempt to maximize the total distanced saved, by matching taxi requests of high overlap. Fig. 3 provides an illustrative example. There are two passengers (depicted as yel- low and red) with high overlap routes. Each can drive on their own to their respective destinations (dashed yellow and red line respectively), or share a ride (green line) and reduce travel costs. Dynamic ride-sharing is an inherently on-line setting, as a match- ing algorithm is unaware of the requests that will appear in the future and needs to make decisions for the requests before they 'ex- pire' (a similar setting was studied in [ABD+18]). ALMA is highly befitting for such a scenario, as it involves large-scale matchings under dynamic demand, it is highly decentralized, and partially observable. 3.3.1 Setting. We use a dataset 3 of all taxi requests (ρ) in New York City during one week ({01-01-16 0:00 - 01-07-16 23:59}, 34077 requests in total). The data include pickup and drop-off times, and geolocations. Requests appear (become open) at their respective pickup time, and wait kρ time-steps to find a match. Let a time-step be one minute. After kρ time-steps we call request ρ, critical. If a critical request is not matched, we assume they drive off to their destination in a single passenger ride. Let open, critical denote the sets of open, and critical requests respectively, and let current = open ∪ critical. To compute kρ we assume the following: There is Figure 3: Example of the studied taxi request matching sce- nario. a minimum minW , and a maximum maxW waiting time set by the ride-sharing company, i.e., minW ≤ kρ ≤ maxW ,∀ρ. Moreover, since each passenger specifies his destination in advance, we can compute the trip time (lρ). Assuming people are willing to wait for a time that is proportional to their trip time, let kρ = q × lρ, where q ∈ [0, 1]. The parameters minW , maxW , and q can be set by the ride-sharing company. We report results on different values for all of the above parameters. For each pair ρ1, ρ2 of requests, we compute the driving distance (dρ1, ρ2 = min of all possible combinations of driving between ρ1, ρ2's pickup and drop-off locations) that would be traveled if ρ1, ρ2 are matched, i.e., if they share the same taxi. Subsequently, the utility of matching ρ1 to ρ2 (distance saved) is uρ1(ρ2) = dρ1, ρ2 (km). Given the on-line nature of the setting, it might be beneficial to use the following non-myopic heuristic: avoid matching low utility pairs, as long as the requests are not critical, since more valuable pairs might be presented in the future. Thus, if uρ1(ρ2) < dmin, and ρ1, ρ2 (cid:60) critical, we do not match ρ1, ρ2. In what follows, we select for each algorithm and for each simulation the value dmin ∈ {0, 500, 1000, 1500, 2000, 2500} that results in the highest score. To compute the actual trip time, and driving distance, we have used the Open Source Routing Machine 4, which computes shortest paths in road networks. 3.3.2 Computation of the optimal matching. In this scenario, each request has a dual role, being both an agent and a resource, i.e., we have a non-bipartite graph. For computing the optimal (maxi- mum weight) matching for the employed on-line heuristics, we use the blossom algorithm of [Edm65], which computes a maximum weight matching in general graphs. This enables us to compute the best possible matching among current requests, i.e., requests that have not 'expired' at the time of the computation. In fact, the follow- ing observation allows us to compute the optimal off-line matching as well, i.e., the best possible matching over the whole time interval. Let aρ be the pick-up time of request ρ and let eρ = aρ + kρ be the time when it becomes critical. Then, we can redefine the utility of a matching as: (cid:40) uρ1(ρ2) = dρ1, ρ2 , −1, if ai ≤ ej and ei ≤ ej otherwise (9) i.e., the utility is the distance saved if both requests are simultane- ously active when matched and −1 otherwise. The latter effectively results in this pair never being matched in an optimal solution. We remark that this clairvoyant matching is not feasible in the on-line setting and serves as a benchmark against which we can compare 3https://www.kaggle.com/debanjanpaul/new-york-city-taxi-trip-distance-matrix/ 4http://project-osrm.org/ 8 the performance of on-line algorithms, as is common in the litera- ture of competitive analysis [BEY05]. The measure of efficiency, as compared to the off-line optimal, will be the empirical competitive ratio, i.e., the ratio of the social welfare of the on-line algorithm over the welfare of the optimal, as measured empirically for our dataset. 3.3.3 The Blossom Algorithm vs Linear Programming. Contrary to the other test cases, the fact that the graph is not bipartite has implications on how linear programming can be used to compute the optimal solution. In particular, in all of the presented test cases (#1, #2, and #3), one can formulate the problem of computing the optimal solution as an Integer Linear Program (ILP) and then solve it using some general solver like CPLEX 5. Yet, the computational complexity of solving the aforementioned ILP varies amongst the different test cases. Solving integer linear programs is generally quite computation- ally demanding. Thus, it is common to resort to solving the LP relaxation (where the integrality constraints have been 'relaxed' to fractional constraints), which can be computed in polynomial time. In the case of bipartite graphs (such as test cases #1 and #2), the standard LP relaxation admits integer solutions, i.e., solutions to the actual maximum weight bipartite matching problem (because the constraint matrix is totally unimodular). In the case of general (non-bipartite) graphs, this is no longer the case, thus we have to resort to solving the LP relaxation. It is known that the (fractional) optimal solution to the LP relaxation might be better than the (integral) optimal solution to the original ILP formulation (i.e., it has an integrality gap which is larger than 1, in fact 2). In other words, solving the LP relaxation will not provide solutions for the maximum weight matching problem but for an 'easier version' with fractional matchings. Thus, comparing against that solution could only give very pessimistic ratios, when the real empirical competitive ratios are much better. One can derive a different ILP formulation of the problem using more involved constraints (called 'blossom' constraints [Edm65]), whose relaxation admits integer solutions (i.e., the integrality gap is now 1). However, the latter would result in an exponential number of constraints, and one would need to employ the Ellipsoid method with an appropriately chosen separation oracle to solve it in poly- nomial time (see [FOW02, page 4] for more details]. Overall, the employment of the combinatorial algorithm of [Edm65] for find- ing the maximum weight matching is a cleaner and more efficient solution. 3.3.4 Benchmarks. Each request runs ALMA independently. ALMA waits until the request becomes critical, and then matches it by running Alg. 1, where N = critical, and R = current. In this non-bipartite scenario, if an agent is matched under his dual role as a resource, he is immediately removed. As we explained earlier, it is infeasible for an on-line algorithm to compute the optimal match- ing over the whole period of time. Instead, we consider just-in-time and in batches optimal solutions. Specifically, we compare to the following [AESW11, ABD+18]: 5https://www.ibm.com/analytics/cplex-optimizer 9 (a) (b) Figure 4: Total distance saved (km) for various values of minW , maxW , q. (4a, left) Pragmatic scenario, (4a, right) Re- quests become critical in just one time-step, (4b) Various levels of waiting time (q) assuming no bounds, i.e., minW = 0, maxW = ∞, (double log. scale). • Just-in-time Max Weight Matching (JiTMWM): Waits until a request becomes critical and then computes a maximum- weight matching of all the current requests, i.e N = R = current. • Batching Max Weight Matching (BMWM): Waits x time- steps and then computes a maximum-weight matching of all the current requests, i.e N = R = current. • Batching Greedy (BG): Waits x time-steps and then greed- ily matches current requests, i.e N = R = current (ties are broken randomly). Unmatched open requests are removed. For batch size x = 1 we get the simple greedy approach where requests are matched as soon as they appear. 3.3.5 Efficiency. Starting with the social welfare, Fig. 4 presents the total distance saved (km) for various values of minW , maxW , and q. ALMA loses 8.3% of SW in the pragmatic scenario of Fig. 4a (left), and 6.5% when the requests become critical in just one time-step (Fig. 4a (right)). If no bounds are placed on the minimum and maximum waiting time (i.e., minW = 0, maxW = ∞), ALMA exhibits loss of 8 − 11.5%, for various values of q (Fig. 4b). The above are compared to the best performing benchmark on each scenario (JiTMWM, or BMWM, x = 5). Moreover, it significantly outperforms every greedy approach. In the first scenario the BGs lose between 35.8 − 53.5%, in the second between 24 − 68.2%, and in the third between 31.5 − 69%. Once more, it is worth noting that ALMA requires just a broad- cast of a single bit to indicate the occupancy of a resource, while the Table 1: Empirical Competitive Ratio. (minW , maxW , q) ALMA JiTMWM BMWM, x = 1 BMWM, x = 2 BMWM, x = 5 BG, x = 1 BG, x = 2 BG, x = 5 (1, 3, 0.1) 0.4603 (1, 1,−) 0.3038 (0,∞, 0.1) 0.4840 (0,∞, 0.2) 0.5688 (0,∞, 0.5) 0.5133 (0,∞, 1.0) 0.4606 0.5883 0.3810 0.6221 0.7616 0.7668 0.7706 0.7890 0.8491 0.7835 0.7546 0.6939 0.6695 0.8621 0.9243 0.8528 0.8207 0.7439 0.7390 0.3991 0.5112 0.3900 0.3399 0.2731 0.2440 0.5422 0.6891 0.5299 0.4604 0.3714 0.3306 0.8568 0.9190 0.8486 0.8158 0.7368 0.7254 0.8283 0.8663 0.8211 0.8000 0.7448 0.7343 compared approaches require either message exchange for sharing the utility table, or the use of a centralized authority. For example, the greedy solution would require message exchange to commu- nicate users' preferences and resolve collisions in a decentralized setting, and every batching approach would require a common centralized synchronization clock. Table 1 presents the empirical competitive ratio for the first day of the week of the employed dataset. As we can see, even in the extreme, unlikely scenarios where we assume that people would be willing to wait for more than 10 or 20 minutes (which correspond to large values of q), ALMA achieves high relative efficiency, compared to the off-line (infeasible) benchmark. These scenarios are favorable to the off-line optimal, because requests stay longer in the system and therefore the algorithm takes more advantage of its foreseeing capabilities (hence, the drop in the competitive ratios is observed in all of the employed algorithms). In particular, ALMA achieves an empirical competitive ratio of 0.67 for q = 1 and even better ratios for more realistic scenarios (as large as 0.85). The just-in-time and batch versions of the maximum weight matching perform slightly better, but this is to be expected, as they compute the maximum weight matching on the graphs of the current requests. In spite of the unpredictability of the on-line setting, and the dynamic nature of the demand, ALMA is consistently able to exhibit high performance, in all of the employed scenarios. 4 CONCLUSION Algorithms for solving the assignment problem, whether central- ized or distributed, have runtime that increases with the total prob- lem size, even if agents are interested in a small number of re- sources. Thus, they can only handle problems of some bounded size. Moreover, they require a significant amount of inter-agent communication. Humans on the other hand are routinely called upon to coordinate in large scale in their everyday lives, and are able to fast and robustly match with resources under dynamic and unpredictable demand. One driving factor that facilitates human co- operation is the principle of altruism. Inspired by human behavior, we have introduced a novel anytime heuristic (ALMA) for weighted matching in both bipartite and non-bipartite graphs. ALMA is de- centralized and requires agents to only receive partial feedback of success or failure in acquiring a resource. Furthermore, the running time of the heuristic is constant in the total problem size, under reasonable assumptions on the preference domain of the agents. As autonomous agents proliferate (e.g., IoT devices, intelligent in- frastructure, autonomous vehicles, etc.), having robust algorithms 10 that can scale to hundreds of thousands of agents is of utmost importance. The presented results provide an empirical proof of the high quality of the achieved solution in a variety of scenarios, including both synthetic and real data, time constraints and on-line settings. Furthermore, both the proven theoretical bound (which guarantees constant convergence time), and the computation speed comparison (which grounds ALMA to a proven fast centralized algorithm), argue for its applicability to large scale, real world problems. As future work, it would be interesting to identify meaningful domains in which ALMA can provide provable worst-case performance guarantees, as well as to empirically evaluate its performance on other real datasets, corresponding to important real-world, large- scale problems. REFERENCES [ABD+18] Itai Ashlagi, Maximilien Burq, Chinmoy Dutta, Patrick Jaillet, Amin Saberi, and Chris Sholley. Maximum weight online matching with deadlines. arXiv preprint arXiv:1808.03526, 2018. [AESW11] Niels Agatz, Alan L Erera, Martin WP Savelsbergh, and Xing Wang. Dy- namic ride-sharing: A simulation study in metro atlanta. Procedia-Social and Behavioral Sciences, 17:532 -- 550, 2011. [Ber79] DP Bertsekas. A distributed algorithmfor the assignment problem. Labo- ratory for Information and Decision Systems Working Paper, Massachusetts Institute of Technology, Cambridge, MA, 1979. [BEY05] Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. cambridge university press, 2005. [BJ65] CW Borchardt and CGJ Jocobi. De investigando ordine systematis aequa- tionum differentialium vulgarium cujuscunque. Journal für die reine und angewandte Mathematik, 64:297 -- 320, 1865. [BNBA12] Mathias Bürger, Giuseppe Notarstefano, Francesco Bullo, and Frank All- göwer. A distributed simplex algorithm for degenerate linear programs and multi-agent assignments. Automatica, 48(9):2298 -- 2304, 2012. [CF11] Ludek Cigler and Boi Faltings. Reaching correlated equilibria through multi-agent learning. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pages 509 -- 516. International Foundation for Autonomous Agents and Multiagent Systems, 2011. [CN11] S. F. Cheng and T. D. Nguyen. Taxisim: A multiagent simulation platform for evaluating taxi fleet operations. In 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, volume 2, pages 14 -- 21, Aug 2011. [CR02] Gary Charness and Matthew Rabin. Understanding social preferences with simple tests*. The Quarterly Journal of Economics, 117(3):817 -- 869, 2002. [Dan90] George B Dantzig. Origins of the simplex method. ACM, 1990. [DF18] Panayiotis Danassis and Boi Faltings. Learning in ad-hoc anti-coordination scenarios. AAAI Spring Symposium Series, 2018. [DF19] Panayiotis Danassis and Boi Faltings. Courtesy as a means to coordi- nate. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS '19. International Foundation for Autonomous Agents and Multiagent Systems, 2019. [Edm65] Jack Edmonds. Maximum matching and a polyhedron with 0, 1-vertices. Journal of research of the National Bureau of Standards B, 69(125-130):55 -- 56, 1965. [EK72] Jack Edmonds and Richard M. Karp. Theoretical improvements in algo- rithmic efficiency for network flow problems. J. ACM, 19(2):248 -- 264, April 1972. [FOW02] Uriel Feige, Eran Ofek, and Udi Wieder. Approximating maximum edge coloring in multigraphs. In International Workshop on Approximation Algorithms for Combinatorial Optimization, pages 108 -- 121. Springer, 2002. [GA13] Tyler Gunn and John Anderson. Dynamic heterogeneous team formation for robotic urban search and rescue. Procedia Computer Science, 19:22 -- 31, 2013. The 4th International Conference on Ambient Systems, Net- works and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013). [GC13] Yanfeng Geng and Christos G Cassandras. New âĂIJsmart parkingâĂİ system based on resource allocation and reservations. IEEE Transactions on Intelligent Transportation Systems, 14(3):1129 -- 1139, 2013. [Gin00] Herbert Gintis. Strong reciprocity and human sociality. Journal of theoret- ical biology, 206(2):169 -- 179, 2000. [GLM10] Stefano Giordani, Marin Lujak, and Francesco Martinelli. A distributed algorithm for the multi-robot task allocation problem. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pages 721 -- 730. Springer, 2010. [IS17] S. Ismail and L. Sun. Decentralized hungarian-based approach for fast and scalable task allocation. In 2017 International Conference on Unmanned Aircraft Systems (ICUAS), pages 23 -- 28, June 2017. [Kuh55] Harold W Kuhn. The hungarian method for the assignment problem. Naval Research Logistics (NRL), 2(1-2):83 -- 97, 1955. American Mathematical Soc., 2009. [Lew08] David Lewis. Convention: A philosophical study. John Wiley & Sons, 2008. [LP09] László Lovász and Michael D Plummer. Matching theory, volume 367. [Mun57] James Munkres. Algorithms for the assignment and transportation prob- lems. Journal of the society for industrial and applied mathematics, 5(1):32 -- 38, 1957. [NKL17] Duc Thien Nguyen, Akshat Kumar, and Hoong Chuin Lau. Collective multiagent sequential decision making under uncertainty. In Thirty-First AAAI Conference on Artificial Intelligence, 2017. [Nor98] James R Norris. Markov chains. Number 2. Cambridge university press, 1998. [NS05] Martin A Nowak and Karl Sigmund. Evolution of indirect reciprocity. Nature, 437(7063):1291, 2005. [Oll09] François Ollivier. Looking for the order of a system of arbitrary ordinary differential equations. Applicable Algebra in Engineering, Communication and Computing, 20(1):7 -- 32, 2009. [PS82] Christos H. Papadimitriou and Kenneth Steiglitz. Combinatorial Optimiza- tion: Algorithms and Complexity. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1982. [Reg92] Vernon Rego. Naive asymptotics for hitting time bounds in markov chains. 2015. Acta Informatica, 29(6):579 -- 594, 1992. [Sim16] Jay Simon. On the existence of altruistic value and utility functions. Theory and Decision, 81(3):371 -- 391, 2016. [SKKR10] Peter Stone, Gal A. Kaminka, Sarit Kraus, and Jeffrey S. Rosenschein. Ad hoc autonomous agent teams: Collaboration without pre-coordination. In Proceedings of the Twenty-Fourth Conference on Artificial Intelligence, July 2010. [Su15] Hsin-Hao Su. Algorithms for fundamental problems in computer networks. [Tal13] Mohammad Sadegh Talebi. Uncoupled learning rules for seeking equilibria [Var16] Pradeep Varakantham. Sequential decision making for improving effi- in repeated plays: An overview. CoRR, abs/1310.5660, 2013. ciency in urban environments. 2016. [VCGA12] Pradeep Reddy Varakantham, Shih-Fen Cheng, Geoff Gordon, and Asrar Ahmed. Decision support for agent populations in uncertain and congested environments. 2012. [ZSP08] Michael M Zavlanos, Leonid Spesivtsev, and George J Pappas. A distributed auction algorithm for the assignment problem. In Decision and Control, 2008. CDC 2008. 47th IEEE Conference on, pages 1212 -- 1217. IEEE, 2008. 11 A APPENDIX A.1 Proof of Theorem 2.1 Theorem 2.1. For N agents and R resources, the expected number of steps until the system of agents following Alg. 1 converges to a complete matching is bounded by (10), where p∗ = f (loss∗) and loss∗ is given by Eq. 11. (cid:18) (cid:18) (cid:19)(cid:19) (cid:18) 1 p∗ log N + R n), 1 − max R 2 − p∗ 2(1 − p∗) r ∈R,n∈N(lossr min r ∈R,n∈N(lossr n) O loss ∗ = arg min loss r n (cid:19) (10) (11) In this section we provide a formal proof of Theorem 2.1. 6 To facilitate the proof, we will initially assume that every agent, on every collision, backs-off with the same constant probability, i.e.,: Pn(r , ≺n) = p > 0,∀n ∈ N,∀r ∈ R (12) A.1.1 Case #1: Multiple Agents, Single resource (R = 1). We will describe the execution of the proposed learning rule as a discrete time Markov chain (DTMC) 7. In every time-step, each agent per- forms a Bernoulli trial with probability of 'success' 1 − p (remain in the competition), and failure p (back-off). When N agents com- pete for a single resource, a state of the system is a vector {0, 1}N denoting the individual agents that still compete for that resource. But, since the back-off probability is the same for everyone (Eq. 12), we are only interested in how many agents are competing and not which ones. Thus, in the single resource case (R = 1), we can de- scribe the execution of the proposed algorithm using the following chain: Definition A.1. Let {Xt }t ≥0 be a DTMC on state space S = {0, 1, . . . , N} denoting the number of agents still competing for the resource. The transition probabilities are as follows: Pr(Xt +1 = N Xt = 0) = 1 Pr(Xt +1 = 1Xt = 1) = 1 Pr(Xt +1 = jXt = i) = (cid:18)i (cid:19) j restart absorbing i > 1, j ≤ i pi−j(1 − p)j (all the other transition probabilities are zero) Intuitively, this Markov chain describes the number of individ- uals in a decreasing population, but with two caveats: The goal (absorbing state) is to reach a point where only one individual remains, and if we reach zero, we restart. Before proceeding with Theorem 2.1's convergence proof, we will restate Mityushin's Theorem [Reg92] for hitting time bounds in Markov chains, define two auxiliary DTMCs, and prove two auxiliary lemmas. Theorem A.2. (Mityushin's Theorem [Reg92]) Let A = {0} be the absorbing state of a Markov chain {Xt }t ≥0. If E(Xt +1Xt = i) < i β , ∀i ≥ 1 and some β > 1, then: 6The proof is an adaptation of the convergence proof of [CF11] and [DF19]. 7For an introduction on Markov chains see [Nor98] 12 E(T A i ) < ⌈logβ i⌉ + β β − 1 (13) where T A i. i denotes the hitting time of a state in A, starting from state Definition A.3. Let {Yt }t ≥0 be a DTMC on state space S = {0, 1, . . . , N} with the following transition probabilities (two ab- sorbing states, 0 and 1): Pr(Yt +1 = 0Yt = 0) = 1 Pr(Yt +1 = 1Yt = 1) = 1 Pr(Yt +1 = jYt = i) = (cid:18)i j (cid:19) pi−j(1 − p)j absorbing absorbing i > 1, j ≤ i (all the other transition probabilities are zero) Definition A.4. Let {Zt }t ≥0 be a DTMC on state space S = {0, 1, . . . , N} with the following transition probabilities (state 0 the only absorbing state): Pr(Zt +1 = 0Zt = 0) = 1 Pr(Zt +1 = jZt = i) = (cid:18)i j (cid:19) pi−j(1 − p)j absorbing i ≥ 1, j ≤ i (all the other transition probabilities are zero) Lemma A.5. The expected hitting time of the set of absorbing states A = {0}, starting from state Z0 = N , of the DTMC {Zt } of Definition A.4 is bounded by O(cid:16) 1 p (cid:17) log N . Proof. If the DTMC {Zt } is in state Zt = i, the next state Zt +1 is drawn from a binomial distribution with parameters (i, 1 − p). Thus, the expected next state is E(Zt +1Zt = i) = i(1 − p). Using Theorem A.2 with β = 1 1−p E(T A N ) = O results in the required bound: (cid:18) 1 log N (14) (cid:19) p □ Corollary A.6. The expected hitting time of the set of absorbing states A = {0, 1}, starting from state Y0 = N , of the DTMC {Yt } of Definition A.3 is bounded by O(cid:16) 1 log N (cid:17) . p Proof. The expected hitting time of the absorbing state of {Zt } is an upper bound of the expected hitting time of {Yt }. This is because any path that leads into state 0 in {Zt } either does not go through state 1 (thus happens with the same probability as in {Yt }), or goes through state 1. But, state 1 in {Yt } is an absorbing state, hence in the latter case the expected hitting time for {Yt } would be one step shorter. □ Let hA i denote the hitting probability of a set of states A, starting from state i. We will prove the following lemma. if i ∈ A if i (cid:60) A pijhA j , (16) By replacing pij with the probabilities of Definition A.3, the system of equations 16 becomes: (cid:0)i j (cid:1)pi−j(1 − p)jhA j , if i ∈ A if i (cid:60) A (17) =  = 1, j∈S i hA i hA i = 1, = j=0 hA i hA i Lemma A.7. The hitting probability of the absorbing state {1}, starting from any state i ≥ 1, of the DTMC {Yt } of Definition A.3 is given by Eq. 15. This is a tight lower bound. {1} i h = Ω ,∀i ≥ 1 (15) (cid:18) 2(1 − p) (cid:19) 2 − p {1} i ∆= h Proof. For simplicity we denote hi . We will show that 2−p ,∀i ≥ 1 using induction. First note 2(1−p) for p ∈ (0, 1), hi ≥ λ = that since state {0} is an absorbing state, h0 = 0, h1 = 1 ≥ λ and that λ ∈ (0, 1). for a set of states A is the minimal non-negative solution to the system of linear equations 16: The vector of hitting probabilities hA = (hA i : i ∈ S = {0, 1, . . . , N}) Base case: 2p(1 − p) 1 − (1 − p)2 2 = h0 = ≥ λ h2 + 2p(1 − p)h1 + p h2 = (1 − p)2 2(1 − p) 2 − p Inductive step: We assume that ∀j ≤ i − 1 ⇒ hj ≥ λ. We will prove that hi ≥ λ,∀i > 2. (cid:19) i (cid:18)i pi−j(1 − p)jhj hi = j j=0 i−1 i−1 j=2 (cid:19) (cid:19) (cid:18)i (cid:18)i j pi−j(1 − p)jhj = pih0 + ipi−1(1 − p)h1 + + (1 − p)ihi ≥ pih0 + ipi−1(1 − p)h1 + + (1 − p)ihi = ipi−1(1 − p) + [1 − pi − (1 − p)i − ipi−1(1 − p)]λ + (1 − p)ihi pi−j(1 − p)j λ ipi−1(1 − p) + [1 − pi − (1 − p)i − ipi−1(1 − p)]λ j=2 j ⇒ hi = ⇒ hi = λ − pi 1 − (1 − p)i λ + We want to prove that: 1 − (1 − p)i ipi−1(1 − p) 1 − (1 − p)i (1 − λ) hi ≥ λ ⇒ ipi−1(1 − p) 1 − (1 − p)i (1 − λ) ≥ pi 1 − (1 − p)i λ ⇒ ipi−1(1 − p) ≥ [pi + ipi−1(1 − p)]λ ⇒ pi ipi−1(1 − p) + pi − pi ≥ λ ⇒ pi + ipi−1(1 − p) pi + ipi−1(1 − p) ≥ λ ⇒ 1 − pi + ipi−1(1 − p) ≥ 2(1 − p) 2 − p pi + ipi−1(1 − p) ≥ 1 − p 2 − p pi + ipi−1(1 − p) ≤ p ⇒ 2 − p 1 − 1 − pi pi pi ⇒ ⇒ pi(2 − p) ≤ p[pi + ipi−1(1 − p)] ⇒ pi(2 − p) ≤ pi[p + i(1 − p)] ⇒ 2 − 2p − i + ip ≤ 0 ⇒ 2 − i − p(2 − i) ≤ 0 ⇒ (2 − i)(1 − p) ≤ 0 ⇒ 2 − i ≤ 0 which holds since i > 2. The above bound is also tight since ∃i ∈ S : hi = λ, specifically □ h2 = λ. Now we can prove the following theorem that bounds the con- vergence time of the DTCM of Definition A.1, which corresponds to the proposed learning rule for the case of a single available resource (R = 1) and constant back-off probability. O (cid:19) Theorem A.8. The expected hitting time of the set of absorbing states A = {1} of the DTMC {Xt } of Definition A.1, starting from any initial state X0 ∈ {0, 1, . . . , N}, is bounded by: 2 − p 2p(1 − p) log N (cid:18) (cid:17) steps (Corollary A.6). Thus, the expected Proof. Using Lemma A.7 we can derive that the DTMC {Xt } 2−p 2(1−p) passes until it hits state 1. Each needs in expectation 1 λ log N pass requires O(cid:16) 1 hitting time of state A = {1} is O(cid:16) (cid:17). 2−p 2p(1−p) log N (18) □ = p A.1.2 Case #2: Multiple Agents, Multiple resources (R > 1). Theorem A.9. For N agents and R resources, assuming a constant back-off probability for each agent, i.e., Pn(r , ≺n) = p > 0,∀n ∈ N,∀r ∈ R, the expected number of steps until the system of agents following of Alg. 1 converges to a complete matching is bounded by (19). (cid:18) 2 − p 2(1 − p) R (cid:18) 1 p (cid:19)(cid:19) log N + R (19) O 13 log N Proof. At most N agents can compete for each resource. We call this period a round. During a round, the number of agents competing for a specific resource monotonically decreases, since that resource is perceived as occupied by non-competing agents. Let the round end when either 1 or 0 agents compete for the re- source. Corollary A.6 states that in expectation this will require p If all agents backed-off, it will take on average R steps until at least one of them finds a free resource. We call this period a break. In the worst case, the system will oscillate between a round and a break. According to the above, one oscillation requires in (cid:17) steps. O(cid:16) 1 expectation O(cid:16) 1 expected number of oscillations is bounded by O(cid:16) (cid:17) steps. If R = 1, Lemma A.7 states that (cid:17). Thus, 2−p 2(1−p) oscillations. For R > 1 the in expectation there will be 1 λ log N + R = p we derive the required bound (19). □ A.1.3 Dynamic back-off Probability. So far we have assumed a constant back-off probability for each agent, i.e., Pn(r , ≺n) = p > 0,∀n ∈ N,∀r ∈ R. In this section we will drop this assumption. Let ψ = max(log N , R). Bound (19) becomes: 2−p 2(1−p) R 2 2 − p 2(1 − p) p ψ + 1 (20) Intuitively, the worst case scenario corresponds to either all agents having a small back-off probability, thus they keep on com- peting for the same resource, or all of them having a high back-off probability, thus the process will keep on restarting. These two scenarios correspond to the inner ( 1 2(1−p)) probability p terms of bound (20) respectively. We can rewrite the right part of bound (20) as: ) and outer ( 2−p 2 − p 2(1 − p) 1 p 1 1 − p 1 2 = τ + = + + 1 lim p→1−τ = lim (21) As seen by Eq. 21, τ assumes its maximum value on the two extremes, either with a high (p → 1−), or a low (p → 0+) back- p→0+τ = ∞. Let p∗ = f (loss∗) be off probability, i.e., the worst between the smallest or highest back-off probability any agent n ∈ N can exhibit, i.e., having loss∗ given by Eq. 23. Using p∗ instead of the constant p, we bound the expected convergence (cid:18) 1 time according to bound (22). 2 − p∗ p∗ log N + R 2(1 − p∗) n), 1 − max r ∈R,n∈N(lossr min r ∈R,n∈N(lossr n) ∗ = arg min loss r n (cid:18) (cid:18) (cid:19)(cid:19) (22) (23) (cid:19) loss O R This concludes the proof of Theorem 2.1. (cid:18) O (cid:18) 1 (cid:19)(cid:19) (cid:19) (cid:18) 1 p 14
1310.6704
1
1310
2013-10-24T18:49:31
A Hierarchical Dynamic Programming Algorithm for Optimal Coalition Structure Generation
[ "cs.MA" ]
We present a new Dynamic Programming (DP) formulation of the Coalition Structure Generation (CSG) problem based on imposing a hierarchical organizational structure over the agents. We show the efficiency of this formulation by deriving DyPE, a new optimal DP algorithm which significantly outperforms current DP approaches in speed and memory usage. In the classic case, in which all coalitions are feasible, DyPE has half the memory requirements of other DP approaches. On graph-restricted CSG, in which feasibility is restricted by a (synergy) graph, DyPE has either the same or lower computational complexity depending on the underlying graph structure of the problem. Our empirical evaluation shows that DyPE outperforms the state-of-the-art DP approaches by several orders of magnitude in a large range of graph structures (e.g. for certain scalefree graphs DyPE reduces the memory requirements by $10^6$ and solves problems that previously needed hours in minutes).
cs.MA
cs
A Hierarchical Dynamic Programming Algorithm for Optimal Coalition Structure Generation Meritxell Vinyals, Thomas Voice, Sarvapali Ramchurn, Nicholas R. Jennings School of Electronics and Computer Science University of Southampton, UK Abstract We present a new Dynamic Programming (DP) for- mulation of the Coalition Structure Generation (CSG) problem based on imposing a hierarchical organiza- tional structure over the agents. We show the efficiency of this formulation by deriving DyPE, a new optimal DP algorithm which significantly outperforms current DP approaches in speed and memory usage. In the classic case, in which all coalitions are feasible, DyPE has half the memory requirements of other DP approaches. On graph-restricted CSG, in which feasibility is restricted by a (synergy) graph, DyPE has either the same or lower computational complexity depending on the underly- ing graph structure of the problem. Our empirical eval- uation shows that DyPE outperforms the state-of-the- art DP approaches by several orders of magnitude in a large range of graph structures (e.g. for certain scale- free graphs DyPE reduces the memory requirements by 106 and solves problems that previously needed hours in minutes). Introduction (i.e. this the last A key part of any coalition formation process involves partitioning the set of agents into the most effective coalitions, the optimal coalition structure). How- ever, this Coalition Structure Generation problem (CSG) is akin to the set partitioning problem and hence NP- Hard (Sandholm et al. 1999). Over few years, several optimal CSG algorithms have been designed to combat complexity (Service and Adams 2011; Rahwan, Michalak, and Jennings 2012). cases, these algorithms were formulated for the classic CSG model in which all coalitions are feasible. In contrast, in this paper, we tackle the problem in which coalition membership is restricted by some kind of (synergy) graph. Such restrictions have been widely studied in the context of cooperative game theory (Greco et al. 2011; Demange 2004) since they naturally reflect many real-life settings, such as communication networks (Myerson 1977) and logistic networks (Johnson and Gilles 2000). In most In these restricted settings, Dynamic Programming (DP) approaches are attractive since they can solve the CSG problem by simply assigning an infinite negative Copyright c(cid:13) 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. value to non-feasible coalitions. To date, all DP algo- rithms build on the same DP formulation of the CSG problem, due to (Rothkopf, Pekec, and Harstad 1995). As noted in (Rahwan and Jennings 2008), this DP formula- tion leads to a redundant search of the CSG space al- though some of this unnecessary calculations are avoided by IDP, the fastest DP algorithm for classic CSG. For (sparse) graph-restricted CSG, the fastest algorithm is DyCE (Voice, Ramchurn, and Jennings 2012), that outper- forms IDP by several orders of magnitude in sparse graphs by restricting the DP formulation to feasible coali- tions in the graph. Despite these advances, to date, the CSG problem can only be solved optimally for up to 32 agents, even when considering graph restrictions (Voice, Ramchurn, and Jennings 2012). Against this background, this paper presents DyPE, a new optimal DP algorithm which significantly outperforms cur- rent DP approaches and scales to larger problems. DyPE op- erates on a novel formulation of the CSG problem that im- poses a hierarchical structure over the set of agents. In more detail, this paper makes the following contributions: • We introduce a new DP formulation for the CSG prob- lem that builds its search on a pseudotree hierarchy of the agents' synergy graph. We further show how this formu- lation enables a new search of the CSG space in which the coalitions an agent can join are conditioned on the coali- tions formed by agents in earlier positions; • We propose and prove the correctness of our new algo- rithm, DyPE (Dynamic programming Pseudotree-based optimal coalition structure Evaluation) which is an effi- cient implementation of the hierarchical DP formulation; • We analyse the complexity of DyPE showing that it has either the same or lower computational complexity (de- pending on the structure of the synergy graph) than the current state-of-the-art DP algorithms; • We empirically show that DyPE solves the CSG problem faster than both IDP and DyCE in a range of graph struc- tures, including the classic case (e.g. with a tree-restricted problem with 40 agents it is 104 times faster and reduces by 107 times the memory requirements). Moreover, for particular graph classes, DyPE solves the CSG problem for hundreds of agents in minutes. This paper is organised as follows. We proceed with a back- ground section, followed by formulation, algorithm, com- P[C] P [1] P [2] P [3] P [1, 2] P [1, 3] P [2, 3] P [1, 2, 3] n o i t a r e m u n E SC v(1) v(2) v(3) v(1, 2) P [1] + P [2] v(1, 3) P [1] + P [3] v(2, 3) P [2] + P [3] v(1, 2, 3) P [1] + P [2, 3] P [1, 3] + P [2] P [1, 2] + P [3] # s13 s12 s11 s9 s10 s7 s8 s5 s6 s1 s2 s3 s4 {1}{2}{3} s6 s1 0 s 8 {1, 2}{3} {1}{2, 3} {1, 3}{2} s4 s 3 s2 {1, 2, 3} (a) DP computations. Figure 1: a) Sequences of computations performed by DP and b) CS graph given A = {1, 2, 3}. plexity and empirical sections, and then conclusions. (b) CS graph. Background Basic Definitions Let A = {1, . . . , A} be a set of agents. A subset C ⊆ A is termed a coalition. We denote the coalition composed of all agents in A as the grand coalition and the coalition com- posed of a single agent i as its singleton. A CSG problem is completely defined by its characteristic function v : 2A → ℜ (with v(∅) = 0), which assigns a real value representing util- ity to every coalition. The CSG problem involves finding the exhaustive disjoint partition of the set of agents into coali- tions (or, Coalition Structure (CS)) CS = {C1, . . . , Ck} so i=1 v(Ci), is maximised. that the total sum of values,Pk Now consider a CSG problem in which not all coalitions are assumed feasible. Rather their feasibility is restricted by a synergy graph G = (A, E) where: (i) each node of the graph represents an agent; and (ii) a coalition C is al- lowed to form iff every two agents in C are connected by some path in the subgraph induced by C.1 We denote the set of feasible coalitions in a G-restricted CSG problem as F (G). The characteristic function of a G-restricted CSG problem returns minus infinity for any non-feasible coali- tion ∀C 6∈ F (G) : v(C) = −∞. We will denote as K3 the complete graph among three agents and as L3 the graph G = ({1, 2, 3}, {{1, 2}, {2, 3}}) in which the three agents interact in a line. Then, in a L3-restricted CSG problem agent 1 can not form a coalition with agent 3 without agent 2 (e.g. C = {1, 3} 6∈ F (G)). In preparation for the further description of DP algo- rithms, we will denote, for any subset C ⊆ A, Φ(C) as the connected components of the induced subgraph of C on G and ΠC k as the set of all partitions of C into k parts. Existing DP Approaches for CSG DP solves optimization problems recursively: a problem is solved by independently solving a collection of subprob- lems. In CSG, a subproblem P [C] stores the value of the best CS that can be formed among agents in C ⊆ A. 1It is noteworthy that this representation subsumes classic CSG: any classic CSG problem can be modeled as a graph-restricted one by assuming a complete graph among agents. Current DP algorithms compute P [C] by splitting the CSG search space into n subspaces (SC): one containing coalition C and one for each partition of C into two sets Ck, Cl: P [C] = max(cid:18)v(C), max (Ck ,Cl)∈ΠC 2 P [Ck] + P [Cl](cid:19) (1) Figure 1a shows the trace of this DP formulation specify- ing the set of evaluated subproblems (P [C]), the subspaces evaluated for each subproblem (SC) and the number of sub- space (#) over the classic CSG among three agents. To make sure that a problem is computed before its sub- problems in Equation 1, DP algorithms iteratively com- pute subproblems by size: subproblems corresponding to all coalitions of size 1, to all coalitions of size 2, and so on un- til it reaches the grand coalition (note the direction of the enumeration arrow in Figure 1a). IDP algorithm by (Rahwan and Jennings 2008) is an improved implementation of Equation 1 that prunes the evaluations of some subspaces that are proven to be redundant during the search. DyCE algorithm by (Voice, Ramchurn, and Jennings 2012), specifically devised for graph-restricted problems, implements a variant of this DP formulation that restricts coalitions in Equation 1 to be feasible in the graph (Ck, Cj ∈ F (G)). Thus, in Figure 1a, if the CSG problem is restricted to the L3 graph, DyCE omits the evaluation of subproblem P [1, 3], as well as of subspace s3, since both involve {1, 3} 6∈ F (G) whereas IDP goes through all subspaces independently of the graph. The operation of these algorithms is typically visualized on the coalition structure (CS) graph. In this graph, nodes stand for coalition structures and, following Equation 1, an edge connects two coalition structures iff one of the coalition structures can be obtained from the other by splitting one coalition into two. Figure 1b depicts the CS graph among three agents with edges numbered with the number of the corresponding subspace that generated it. A Hierarchical Formulation for CSG This section presents a novel hierarchical DP formulation of the CSG problem based on a pseudotree of the agents' synergy graph. This pseudotree structure allows us to de- fine a more efficient search of the CSG space in which the coalitions an agent can join are explored conditioned on the coalitions formed by agents in earlier positions in the hier- archy. We further show how this search can be visualised in a particular graph of coalition structures that we refer to as a hierarchical coalition structure (HCS) graph. Synergy Graph Pseudotree A pseudotree (PT) is a directed tree structure commonly used in search and inference procedures (?). A pseudotree P T of synergy graph G is a rooted tree with agents A as nodes and the property that any two agents that share an edge in G are on the same branch in P T . Here we restrict our at- tention to edge-traversal pseudotrees, namely those whose edges correspond to edges in G. An edge-traversal pseu- dotree of a graph G can be computed by running a depth-first traversal search (DFS) algorithm (?). Specifically, Figure 2 2 1 3 2 3 1 (a) PT for K3. (b) PT for L3. Figure 2: Pseudotrees for synergy graphs K3 and L3. P[C] P [3] P [1] P [1, 3] P [1, 2, 3] n o i t a r e m u n E SC v(3) v(1) v(1, 3) v(1) + P [3] v(1, 2, 3) v(2) + P [1, 3] v(1, 2) + P [3] v(2, 3) + P [1] s# s8 s7 s5 s6 s1 s2 s3 s4 {1}{2, 3} {1}{2}{3} 6 s {1, 3}{2} s3 2 s s4 {1, 2, 3} {1, 2}{3} (a) Hierarchical DP. (b) HCS graph. Figure 3: a) Hierarchical DP and b) HCS graph for the clas- sic CSG with O = {2, 1, 3}. Frontier coalitions are under- lined. P[C] P [3] P [1] P [1, 2, 3] n o i t a r e m u n E SC v(3) v(1) v(1, 2, 3) v(2) + P [1] + P [3] v(1, 2) + P [3] v(2, 3) + P [1] s# s6 s5 s1 s2 s3 s4 (a) Hierarchical DP. {1}{2, 3} {1}{2}{3} s3 s4 2 s {1, 2}{3} {1, 2, 3} (b) HCS graph. Figure 4: a) Hierarchical DP and b) HCS graph for the 3L- restricted CSG with O = {2, 1, 3}. Frontier coalitions are underlined. depicts two P T s where boldfaced edges are those included in the P T , dashed edges are those in G that are not included in the P T , and the boldfaced node is the root agent. Figure 2a shows a PT for the synergy graph of a 3-agent classic CSG problem rooted at agent 2. Similarly, Figure 2b shows a pseudotree for the L3 graph rooted at agent 2. Unlike in the K3 graph, agent 1 and 3 here can be in different branches since they are not directly connected by an edge. We define the ancestors of an agent i in the P T as all the agents in the path between i and the root. Then, a pseu- dotree defines a partial hierarchical ordering among agents in which any agent should be placed before any of its an- cestors in the graph. We will denote OP T as one ordering for pseudotree P T . Notice that for the P T in Figure 2a, OP T = {2, 1, 3} is the unique ordering that satisfies the P T . In contrast, for the P T in Figure 2b, OP T = {2, 1, 3} and OP T = {2, 3, 1} are both valid orderings. Yet, OP T not only defines an ordering among agents but also on the set of feasible coalitions. Let i be the agent with lowest order included in a coalition C. Then, we define the order of C, O(C), as the position of i in O. Formally, O(C) = min{iO(i) ∈ C}. Thus, given OP T = {2, 1, 3} the order of {1, 2, 3} is 1 whereas of {1, 3} is 2. Hierarchical DP Formulation We next present the hierarchical DP formulation for classic CSG illustrating its operation with two simple examples. First, consider the classic CSG problem among three agents A = {1, 2, 3}. Solving this problem involves com- paring the value of five CSs (depicted as nodes in the CS graph in Figure 1b). Now, suppose that agents are organised as in the PT of Figure 2a with an ordering OP T = {2, 1, 3}. Given the lowest agent in the ordering, agent 2, the CSG space can be divided into four subspaces, one for each fea- sible coalition that contains this agent; namely: s1 contain- ing {{1, 2, 3}}; s2 containing CSs that include {2} and any CS among 1, 3; s3 containing CSs that include {1, 2} and any CS among 3; and s4 containing CSs that include {2, 3} and any CS among 1. Notice that finding the best CS in each subspace involves solving a CSG subproblem and that the agents in this subproblem depend on the particular coali- tion that agent 2 formed in this subspace. Thus, for example, the solution of s2 involves computing the best CS among agents not present in coalition {2}, i.e. computing subprob- lem P [1, 3]. Again, we can solve this problem by taking the agent with lowest order (agent 1), and repeating the above process. Figure 3a shows a complete trace of this exam- ple. It is noteworthy that we reduced the number of oper- ations with respect to the current DP operation: we solved 4 subproblems by evaluating 8 subspaces whereas the current DP operation solves 7 problems by evaluating 13 subspaces (compare Fig. 3a with Fig. 1a). This hierarchical DP search can be similarly applied to any graph-restricted problem. For example, we can follow the same approach in the CSG problem when restricted by the L3 graph (a complete trace is given in Figure 4a). In this case when computing subspace s2, P [1, 3] can be de- composed into two independent subproblems, namely P [1] and P [3], since agents 1, 3 do not interact (are disconnected) given agent 2 formed a coalition without including them. Again, note that this search is more efficient than the cur- rent DP operation: it solves 3 subproblems by evaluating 6 subspaces where the graph-restricted current DP operation solves 6 problems by evaluating 10 subspaces (compare Fig. 4a with Fig. 1a). In general, given an ordering O among agents, the so- lution of a G-restricted CSG problem can be computed as comparing (maximising) over n subspaces where the value of each subspace can be solved by evaluating a feasible coalition and a set of subproblems corresponding to the con- nected components2 of the rest of agents not present in this coalition. Formally, we can define our hierarchical DP for- mulation for the graph-restricted CSG problem as: P [C] = max Ck⊆C: O(Ck)=O(C), Ck∈F (G)  v(Ck) + XCl∈Φ(C\Ck)  P [Cl]  (2) Hierarchical Coalition Structure Graph To discuss how to construct a HCS graph we need first to define the notion of frontier coalitions. Let us define the frontier coalitions of a coalition structure CS as the set of coalitions that are not connected to any other coalitions of 2The connected components of a graph G are the set of the largest subgraphs of G that are connected. higher order in CS. That is, the frontier coalitions are the C ∈ CS such that if O(C′) > O(C) for C′ ∈ CS it implies C ∪ C′ is disconnected. In the HCS graph, nodes stand for feasible coalition structures and, following Equa- tion 2, an edge connects two feasible coalition structures if and only if one of the coalition structures can be obtained from the other by the evaluation of some subspace of one of its frontier coalitions. That is CS is linked to CS′ if and only if there exists C ∈ CS, C′ ∈ CS′ with C′ ⊆ C, CS′ = (CS \ {C}) ∪ {C′, Φ(C \ C′)} and C′ is a frontier coalition of CS. Figure 3b depicts the HCS graph of the 3-agent classic CSG with O = {2, 1, 3} and Figure 4b the graph when the problem is restricted by the L3 graph. Frontier coalitions are underlined in the graph. Notice that frontier coalitions cor- respond to subproblems that would be evaluated during the operation of the hierarchical DP formulation. DyPE We can now describe the operation of DyPE. First, we lay its formal foundations, namely how its search is efficiently derived from the hierarchical DP formulation, then we move to its algorithmic details and, finally, prove its correctness. Formal Foundations DyPE implements the hierarchical recursive formulation in- troduced in the former section. Accordingly, DyPE: (i) enu- merates all subproblems in a bottom-up order (from sub- problems that appear last in the recursion to the grand coali- tion); and (ii) computes the value of each enumerated sub- problem. In the hierarchical recursion formulation a subproblem is computed using the results of a set of subproblems of higher order (a subspace of a subproblem C contains a coalition of the same order as C and a set of subproblems of higher order). Thus, to guarantee a valid exploration order (so no problem is evaluated before one of its subproblems) DyPE evaluates subproblems corresponding to feasible coalitions by its order, from highest to lowest. However, not all fea- sible coalitions are required during the recursion. For ex- ample, the DP execution in Figure 3a requires enumerating subproblems {3}, {1}, {1, 3}, and {1, 2, 3} but not {2, 3}, although it corresponds to a feasible coalition. Detecting which of the subproblems will actually be needed3 is crucial for the performance of the DP implemen- tation. DyPE exploits the fact that the ordering is based on a synergy pseudotree to detect a necessary condition that any feasible coalition needs to satisfy in order to be evaluated as a subproblem during the recursion. In particular, let C be a feasible coalition. If C contains the root of P T , DyPE will only evaluate C if it is the grand coalition (C = A). Other- wise, if C does not include the root, DyPE will only evaluate C if the set of remaining agents, A \ C, is connected. The correctness of these claims is formally proved in next sec- tions, by proving the correctness of DyPE. 3Although a simple solution for only solving subproblems that are actually needed is memoization (?), the exponential overhead that incurs recursion in this case makes it not applicable. P [C] ← −∞; while C ′ ← nextConnectedSet(C ′, i, C) do Algorithm 1 DyPE( v(·), A, G, O) 1: C ← ∅; S ← ∅; /*Current subproblem, current subspace*/ 2: i ← A; /*Start exploring the last agent in the ordering O*/ 3: while (C, i) ←nextSubproblem(C, i) do 4: 5: 6: 7: 8: 9: 10: 11: 12: end while 13: return bestCS(A); V ← v(C ′) + PC′′∈Φ(C\C′) P [C ′′]; if P [C] < V /*Compare the value of subspaces*/ then P [C] ← V ; /*Update subproblem value*/ B[C] ← C ′; /*Update the best subspace*/ end if end while return (A, i); /*Only the grand coalition */ end if return ∅; /*All agents explored, return empty set.*/ while C ← nextConnectedSet(C, i, {i, . . . , A}) do if C = ∅ then Algorithm 2 nextSubproblem(C, i) 1: if i = 1 /*For the root agent */ then 2: 3: 4: 5: 6: else 7: 8: 9: 10: 11: 12: if A \ C is connected then return (C, i); 13: end if end if end while return nextSubproblem(∅,i − 1); /*Recursively call with the previous agent in the ordering*/ The Algorithm For notational convenience, we use nextConnectedSet(·, ·, ·) as an iterator function of a connected subgraph enumeration (CSE) algorithm (Voice, Ramchurn, and Jennings 2012; ?). That is, for any feasible coalitions C′ ⊆ C with i ∈ C′ nextConnectedSet(C′, {i}, C), returns the subset of C that would follow C′ during the process of the chosen CSE al- gorithm as it iterates through all feasible subcoalitions of C that contain i. If C′ is the last subset to be enumerated by the CSE, the function returns the empty set. The pseudocode of DyPE is provided in Algorithm 1. As can be seen, DyPE takes as an input a G-restricted CSG problem and an ordering O that satisfies a synergy pseu- dotree of G. Let us assume, without loss of generality, that agents are numbered according to an ordering that satis- fies P T , so the root is 1. After initialisation, DyPE pro- ceeds to enumerate subproblems, using the iterator func- tion nextSubproblem(·, ·). For each agent i in the ordering O, DyPE goes through all subproblems that need to be eval- uated where i is the agent with lowest order. For each subproblem C, Algorithm 1 computes the value of the CSG problem over agents in C (lines 4-11). To do so, it goes over all subspaces of C that need to be evaluated (SC) by iteratively calling function nextConnectedSet(·, ·, ·) (line 5). In this way, DyPE evaluates one subspace for each feasible subcoalition C′ of C that contains agent i. The value of the subspace is computed as the value of coalition C′, v(C′), plus the value of each subproblem corresponding to each connected component in C \C′, Φ(C \C′) (line 6). The value of P [C] is computed in Algorithm 1 as the maximum between the values of the evaluated subspaces (lines 7-10). At the end of this process, the solution of the subprob- lem corresponding to the grand coalition (P [A]), contains the value of the best CS explored during the execution of the algorithm. To recover the best CS, Algorithm 1 also stores the subspace that maximizes each subproblem C in B[C] (line 12) and at the end of its execution calls a recur- sive procedure bestCS(·) over the grand coalition, where bestCS(C) returns {C} if C \ B[C] = ∅; bestCS(B[C]) ∪ SC ′∈Φ(C\B[C]) bestCS(C′) otherwise. The definition of nextSubproblem(·, ·) is given in Algo- rithm 2. For agents i = A . . . 2 (i.e. excluding the root) DyPE, uses nextConnectedSet(·, ·, ·) to enumerate as sub- problems every feasible coalition C consisting of agent i and any subset of agents placed after i in the ordering, {i, . . . , A} (line 7). DyPE evaluates subproblem C only if the rest of the graph, A \ C, remains feasible (lines 8-10). Lastly, for the root agent (i = 1) , DyPE evaluates a single subproblem corresponding to the grand coalition (lines 1-5). Correctness of DyPE The next theorem proves the correctness of DyPE. Theorem 1 (Correctness) For any given graph-restricted CSG, DyPE calculates an optimal coalition structure. Proof. Since the value of the best coalition structure CS∗ returned by DyPE is equal to P [A], it is sufficient to show that, for every feasible coalition structure CS, on completion of the algorithm, P [A] ≥ v(CS). Given such CS, let L be the order of the coalition with highest order in CS. Let C≤l be the set of coalitions in CS with order equal or lower than l (C≤l = {C ∈ CSO(C) ≤ l}). We prove the result by showing that for all l = 1 . . . L P [A] ≥ Vl where Vl contains the accumulated value (until step l) of an exploration "path", Vl = XC∈C≤l v(C) + XC ′∈Φ(A\C≤l) P [C′], and so VL = v(CS). We prove this by induction on l. In the base case, l = 1 and C≤1 is composed of a sin- gle coalition, C1, the coalition that contains the root agent in CS. Notice that all the subspaces of the grand coali- tion A corresponding to feasible coalitions that contain the root are evaluated. Thus, the subspace C1 of A (v(C1) + PC∈Φ(A\C1) P [C]) is evaluated and so P [A] ≥ V1. In the inductive step, consider the coalition in CS whose level is l + 1, Cl+1, (if there is a coalition with order l + 1, this coalition is unique since it is the one that contains the agent with order l + 1) and that the induction hypothesis holds for all coalitions in CS whose level is less or equal than l. Thus, CS≤l = {C≤l, Φ(A \ C≤l)} is connected through a path to the grand coalition A. Then, there must be one CC ∈ Φ(A \ C≤l) such that Cl+1 ⊆ CC. Since the ordering follows a pseudotree, the union of coalitions in C≤l forms a connected subgraph, A \ CC must be feasible and thus, CC is evaluated as a subproblem. As all agents in CC have higher order than l, O(Cl+1) = O(CC) and v(Cl+1) +PC ′∈Φ(CC\Cl+1) P [C′] must be evaluated in the computation of P [CC]. Thus, Vl+1 ≤ Vl, and so, by the inductive hypothesis, Vl+1 ≤ P [A]. Complexity Analysis 2 is 2A−1 − 1. In tree-restricted CSG, ΠA Next, we determine the complexity of DyPE and compare it to those of DyCE and IDP. Notice that each of these algo- rithms, for each evaluated subproblem: stores its value (and possibly its best space) and evaluates a number of subspaces (with a linear number of operations per subspace). Accord- ingly, we assess their complexity based on the number of subproblems (memory requirements) and the number of sub- spaces evaluated (computational requirements). Memory. DyPE evaluates, in addition to the grand coalition, one subproblem for C ∈ F (G) such that A \ C is feasible and C does not contain the root. This number is equal to the number of feasible coalition structures composed of one (the 2 ). Thus, the memory grand coalition) or two coalitions (ΠA requirements of DyPE are within O(ΠA 2 ). In classic CSG, 2 is equal to ΠA the number of edges in the tree (removing exactly one edge is the only way to disconnect the tree into two connected subsets), so DyPE has memory requirements within O(A). Table 1 shows how the memory requirements of DyPE compares to those of IDP and DyCE on graph-restricted CSG. Table 1 also highlights the particular cases of classic and tree-restricted CSG. Observe that independently from the graph the complexity of IDP is exponential in the num- ber of agents, whereas of DyCE is linear in the number of feasible coalitions. Since the number of feasible coalitions will always be greater than the number of coalition struc- tures composed of two coalitions, the memory requirements of DyPE are bounded above by those of DyCE. In classic CSG, although of the same order, the memory requirements of DyPE are one half those of IDP or DyCE as among sub- problems that contain the root DyPE only stores the grand coalition. Computation. DyPE evaluate subspaces which are sub- sets of subproblems. Thus, the computational complexity is bounded by a constant times the number of pairs of subsets C′, C with C′ ⊆ C, which is O(3A). This is the same or- der of complexity as IDP (and of DyCE in the classic CSG). In classic CSG, DyPE omits the evaluation of all subsets of subproblems that include the root node with exception of those of the grand coalition. Thus, we cannot hope to do better than O(3A). In tree-restricted CSG, for each agent i, DyPE evaluates exactly one subproblem with i as its lowest order agent. Thus, each feasible coalition can only generate a subspace in one subproblem, namely the one that has the same order. Conversely, the subproblem with i as its lowest order agent contains agent i and all agents reachable from i with higher level, and so all feasible coalitions generate ex- actly one subspace. Thus, the computational complexity of DyPE in this case is within O(F (G)), and thus expected to be much lower than those of DyCE since the latter evaluates a potentially large set of subspaces for each feasible coali- tion. Indeed, in the next section we show empirically that this holds true for a wide range of graph structures. Graph (G) O(2A) Classic Tree (T) O(2A) O(2A) IDP DyCE O(F (G)) O(2A) O(F (T )) DyPE O(ΠA O(2A) O(A) 2 ) Table 1: Memory requirements for the graph-restricted, clas- sic, and tree-restricted CSG problems. Experimental Evaluation We evaluate DyPE and compare its performance against IDP and DyCE on a variety of different synergy graph topolo- gies. We then go on to examine the issue of scalability. Benchmarking DyPE In our comparison, we take a similar approach to (Voice, Ramchurn, and Jennings 2012), and investigate per- formance over the following graph classes: random trees (RT), scalefree graphs (SF) (using the standard Barabasi- Albert preferential attachment generation model, with pa- rameters k = 1, 2, 3) and complete graphs (CG). Due to long runtimes we extrapolated the results as follows: from 23 agents onwards for IDP, from 27 onwards for DyCE on RT and SF k = 1, and on 24 onwards for DyCE on k = 2. For each configuration, we run 50 instances recording the number of evaluated subproblems and the running time of each algorithm. We now present the results of this compari- son. Figures 5 (a)-(b) show the results of our performance evaluation over random trees. The memory requirements for DyPE are up to 7 orders of magnitude lower than for DyCE and up to 11 orders of magnitude lower than for IDP (for 40 agents). This is because as the number of agents in- creases, memory requirements grow exponentially for IDP and DyCE, and only linearly for DyPE. In terms of run- time, DyPE can solve problems of 40 agents in about 20 minutes compared against 20 days for DyCE, and years for IDP. These results are in line with the intuition given by our complexity analysis section. The results of our performance evaluation over scalefree graphs are depicted in Figures 5 (c)-(d). For k = 1 the mem- ory requirements of DyPE for 30 agents are up to 6 orders of magnitude lower than for DyCE and up to 9 orders lower than for IDP. For k = 2, these savings are reduced, but still significant; 2 orders of magnitude better with respect to DyCE and 3 orders of magnitude better with respect to IDP in graphs with 30 agents. These results follow the intuition given in our complexity analysis that the computational sav- ings provided by DyPE more significant on sparse graphs. Turning to execution time, DyPE can solve problems with 30 agents in minutes (or hours when k = 2) instead of hours (or days for k = 2) for DyCE. Finally, our results over complete graphs are in line with the complexity analysis, which predicted a similar performance for all algorithms, excepting that: (i) DyCE takes more time than IDP and DyPE due to its less effective pruning; and (ii) DyPE uses half of the memory of the other approaches. Scalability of DyPE We have seen that DyPE performs well on sparse graphs (e.g., trees or scale free with k = 1). However, as argued Figure 6: Runtimes for DyPE on random trees (d=2,3,4). in (Voice, Ramchurn, and Jennings 2012), if the degree of agents is not bounded, even trees can lead to an exponential number of coalitions (e.g., a star has 2A−1 − 1). Based on this, we evaluated DyPE on random trees with bounded de- gree. In particular, Figure 6 shows the execution time where the degree of agents is bounded by d, for d = 2, 3, 4. Ob- serve that for d = 3 and d = 4, DyPE is able to run to completion for problems with 50 agents within 15 minutes and 3 hours respectively. For the particular case of d = 2, DyPE solves problems with 1000 agents within minutes. Conclusions We presented DyPE, a DP algorithm that implements a novel hierarchical DP formulation for CSG using a hierarchy based on pseudotrees. We proved that DyPE is optimal and that it improves upon current DP approaches with savings that go from linear to exponential, depending on the struc- ture of the underlying synergy graph. Our empirical results showed, that DyPE greatly improves on the state-of-the-art, in some cases by several orders of magnitude. Concretely, for random trees with bounded degree, DyPE managed to quickly find the optimal coalition structure for 1000 agents, when even 50 would be intractable for other DP approaches. in (Rahwan, Michalak, and Jennings 2012; the inter- Service and Adams 2011), we ested in enhancing the presented hierarchical DP approach with anytime properties. future work, field particularly following current trends As are (a) Memory requirements RT. (b) Execution Time RT. (c) Memory requirements SF. (d) Execution Time SF. Figure 5: Results for random tree (RT) graphs (a) (b) and scale free (SF) graphs (c)(d). manageable combinatorial auctions. Management Science 44(8):1131 -- 1147. [Sandholm et al. 1999] Sandholm, T.; Larson, K.; Anders- son, M.; Shehory, O.; and Tohm´e, F. 1999. Coalition struc- ture generation with worst case guarantees. Artif. Intell. 111(1-2):209 -- 238. [Service and Adams 2011] Service, T. C., and Adams, J. A. 2011. Constant factor approximation algorithms for coali- tion structure generation. Autonomous Agents and Multi- Agent Systems 23(1):1 -- 17. [Voice, Ramchurn, and Jennings 2012] Voice, T.; Ramchurn, S. D.; and Jennings, N. R. 2012. On coalition formation with sparse synergies. In AAMAS, 223 -- 230. References [Demange 2004] Demange, G. 2004. On Group Stability in Hierarchies and Networks. Journal of Political Economy 112(4):754 -- 778. [Greco et al. 2011] Greco, G.; Malizia, E.; Palopoli, L.; and Scarcello, F. 2011. On the complexity of compact coalitional games. In IJCAI, 147 -- 152. [Johnson and Gilles 2000] Johnson, C., and Gilles, R. 2000. Spatial social networks. Review of Economic Design (5):273300. 1977. Graphs and co- [Myerson 1977] Myerson, R. B. operation in games. Mathematics of Operations Research 2(3):225 -- 229. [Rahwan and Jennings 2008] Rahwan, T., and Jennings, N. R. 2008. An improved dynamic programming algorithm for coalition structure generation. In AAMAS, 1417 -- 1420. [Rahwan, Michalak, and Jennings 2012] Rahwan, Michalak, T. P.; and Jennings, N. R. algorithm for coalition structure generation. In AAAI. [Rothkopf, Pekec, and Harstad 1995] Rothkopf, M. H.; Pekec, A.; and Harstad, R. M. 1995. Computationally T.; 2012. A hybrid This figure "partialResults_ScaleFree_median.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1310.6704v1 This figure "partialResults_Trees_median.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1310.6704v1 This figure "solvingTimes_ScaleFree_largescalemedian.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1310.6704v1 This figure "solvingTimes_ScaleFree_median.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1310.6704v1 This figure "solvingTimes_Trees_median.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1310.6704v1
1508.04531
1
1508
2015-08-19T05:58:36
Modeling emergence of norms in multi-agent systems by applying tipping points ideas
[ "cs.MA" ]
Norms are known to be a major factor determining humans behavior. It's also shown that norms can be quite effective tool for building agent-based societies. Various normative architectures have been proposed for designing normative multi-agent systems (NorMAS). Due to human nature of the concept norms, many of these architectures are built based on theories in social sciences. Tipping point theory, as is briefly discussed in this paper, seems to have a great potential to be used for designing normative architectures. This theory deals with the factors that affect social epidemics that arise in human societies. In this paper, we try to apply the main concepts of this theory to agent-based normative architectures. We show several ways to implement these concepts, and study their effects in an agent-based normative scenario.
cs.MA
cs
Modeling emergence of norms in multi-agent systems by applying tipping points ideas Francisco Lopez School of Computer Science University of Manchester Manchester, United Kingdom [email protected] 5 1 0 2 g u A 9 1 ] A M . s c [ 1 v 1 3 5 4 0 . 8 0 5 1 : v i X r a ABSTRACT Norms are known to be a major factor determining humans behavior. It's also shown that norms can be quite effective tool for building agent-based societies. Various normative architectures have been proposed for designing normative multi-agent systems (NorMAS). Due to human nature of the concept norms, many of these architectures are built based on theories in social sciences. Tipping point theory, as is briefly discussed in this paper, seems to have a great poten- tial to be used for designing normative architectures. This theory deals with the factors that affect social epidemics that arise in human societies. In this paper, we try to apply the main concepts of this theory to agent-based normative architectures. We show several ways to implement these con- cepts, and study their effects in an agent-based normative scenario. Keywords norms, multi-agent systems, tipping points INTRODUCTION 1. Human societies are simultaneously frustratingly unchang- ing and yet susceptible to "epidemics" that sweep across the social fabric causing people to adopt previously rare prac- tices. Tipping point theories attempt to explain the subtle triggers behind these social processes. In 2000, Malcolm Gladwell [25] produced a popular science book summariz- ing three key factors which trigger tipping points: 1) scale- free networks (the Law of the Few); 2) effective messaging (the Stickiness Factor) and 3) environmental influences (the Power of Context). This paper relates tipping point theory to the process of norm emergence in multi-agent systems; we propose that normative agent architectures can serve an ex- cellent computational model for expressing many contagious social phenomena, including tipping points and information cascades. Social norms are known to be a major factor governing hu- mans' behavior; unbeknownst to us, many of our everyday behaviors are influenced by these implicit standards [10]. Various normative architectures have been proposed for de- signing normative multi-agent systems (NorMAS) capable of reasoning about norm adoption. Some of these systems have been grounded in social science theory, but the aim of many architectures is simply to effectively address standard multi-agent system challenges, including agreement forma- tion, coordination and conflict resolution [9]. Despite recent research progress in the area, the complete life-cycle of norms is far from fully understood. The complex nature of human decision-making makes comprehending the rationale behind social interactions difficult, since people are notoriously bad at self-reporting their motivations [15]. The field of agent-based modeling aims to create agents in the image of humans. These agents typically have cognitively- inspired decision-making components, and are situated in life-like scenarios. In both standard multi-agent systems and cognitively-inspired models, existing social theories have been employed toward the construction of normative models [5]. Various stages of the norm life-cycle including recogni- tion, adoption, compliance and emergence are often modeled on similar concepts in social sciences. This paper proposes a unified model of how norm emergence in networked agent societies can be used to predict the ef- fects of common tipping point triggers. Previous work on norm emergence in networks has investigated the effects of social network topology in static [34, 31] and also dynamic networks [29]. Yu et al. [39] presented an evaluation of dif- ferent learning methods on norm emergence in networked systems. In our work, we simply employ network structures as a medium to apply ideas from tipping point theory re- lating to the Law of the Few. Therefore, the structure of agents' network is not of interest by itself, other than mak- ing it congruent with human social networks. Our main contribution is showing the role and significance of tipping point principles in normative agent systems, and evaluating the potential impact of this model on NorMAS design. The next section provides an overview of related work in this area. 2. RELATED WORK Hollander and Wu [24] refer to three categories of normative studies in the social sciences: 1) social function of norms [15], 2) impact of social norms [7], 3) mechanisms leading to the emergence and creation of norms [14]. In the con- text of social function, norms are often concerned with the oughtness and expectations of agent behavior; where ought- ness refers to the condition where an agent should or should not perform an action, and expectation refers to the behav- ior that other agents expect to observe from that agent [13, 2]. An example of work belonging to this category is Boella and Torre's architecture containing separate subsystems for counts-as conditionals, conditional obligations, and condi- tional permissions [16]. Within the second category, social impact, norms are con- sidered in terms of cost provided to or imposed on the par- ties involved in a social interaction [4]. For instance, pun- ishment and sanctions are introduced as two enforcement mechanisms used to achieve the necessary social control re- quired to impose social norms [33]. Here they demonstrate a normative agent that can punish and sanction defectors and also dynamically choose the right amount of punishment and sanction to impose [12]. As noted in [24], the third category is concerned with the how of norms more than the why. Relevant work in Nor- MAS domain that falls into this category is divided into the following groups [11]. The first group is composed of re- search in which norms are practically hard-wired into the system or dictated directly to the agents. In the second set, norms emerge from social interactions among agents. Sen and Airiau's work [32] in which agent interactions are modeled using payoff matrices, focuses on norm emergence through social learning in agent societies. Conte et al.'s EMIL was designed as an architecture for modeling norm emergence [17]. The EMIL architecture includes a dynamic cognitive model of norm emergence and innovation [6]. Much of the existing work in normative multi-agent sys- tems explicitly or implicitly relies on social science theo- ries [8]. In a recent work, some of the well-known theories of philosopher David Hume were evaluated using an agent- based model called HUME2.0 [17]. This work demonstrates how social justice concepts can even emerge from heteroge- neous agents that are not endowed with norm representa- tions. Self-determination theory is also referenced by some of the normative works [3]. Here the focus is on the agents' mo- tivation and the extent to which the motivation is intrinsic or extrinsic. Neumann studied existing normative architec- tures to see how much they comply with self-determination theory [27]. Practice theory is an example drawn from anthropology; this theory describes how changes in the society are based on the interactions between the human agents and social structure. For instance, an agent-based model for energy demand and supply social practices is presented in [1], which shows how energy consumption norms form and evolve in urban soci- eties. The next section provides background on tipping point theory, primarily from a sociology perspective. 3. TIPPING POINT THEORY The term, "tipping point" was initially coined in physics to describe the situation in which the state of an object rapidly changes from one stable equilibrium to another different equilibrium. Morton Grodzins was the first to use term in social sciences to describe an interesting phenomenon he ob- served in the US cities, known as white flight [23]. His obser- vation was that in some metropolitan areas the percentage of African-American people would increase up to a certain point. After that point, those with white ethnicity immi- grated from those cities in large numbers. Thomas Schelling presented the general theory of tipping, which describes how individuals' micromotives and microbehavior can aggregate in the big picture [30]. The model of collective behavior introduced by Mark Granovetter [22] uses thresholds to de- termine the path of social events. This model was initially used to describe how fads are created. In normative studies, tipping points are usually denoted as the point of maximum return at which time the behavior has the highest level of acceptability from the population. For instance, in a certain group of friends, the number of times they shower in a week may vary, but a specific value has the highest acceptability by group members as the conventional pattern of behavior. In this paper, we study the impact of Gladwell's three factors on norm emergence in agent-based normative systems and demonstrate practical ways to apply this versatile theory. 4. EXPERIMENTAL SETUP For our experiments, we employ the classic scenario, rules of the road, that is frequently used to study normative be- havior in multi-agent systems. In this scenario, there exists a population of agents that do not have any preference to- ward driving on the left or right side of a two-way road. No rules or higher enforcement exist to determine the preferred side. This scenario represents a two-action stage game that models the situation where agents need to agree on one of several equally desirable alternatives. The societal norms that we would like to evolve are either driving on the left or driving on the right [32]. In this scenario agents receive a fixed value reward and pun- ishment based on the following payoff matrix shown in Ta- ble 1. Table 1: Payoff matrix for rules of the road scenario As Yu et al. [39] note, although this payoff matrix appears simple, the coordination game poses a very challenging puz- zle for human beings to solve efficiently. The game has two pure Nash-equilibria: both agents drive left or both agents drive right. Classical game theory, however, does not give a coherent account of how people would play a game like this. The conundrum is that there is nothing in the struc- ture of the game itself that allows the players (even purely rational players) to infer what they ought to do. In reality, people can play such games because they can rely on some contextual cues to agree on a particular equilibrium [38]. In similar studies on normative systems, usually the cumula- tive payoff (reward) of the whole population of agents is used as a measure of comparing various methods (see [32] and [39] left right left 1,1 -1,-1 right -1,-1 1,1 This equation shows the weight of the link connecting neigh- bor j to node i. C refers to the corresponding centrality value (degree, betweenness and closeness). Also, Degi de- notes the number of neighbors for node i. The top 10 percent of the population of agents with the greatest centrality val- ues are assumed to be the key elements of a society. At the beginning of our experiments, all of the agents follow a sin- gle norm; in other words, all of them have learned (through social learning [32]) to always drive on one side of the road. In our implementation, each agent has a utility value defined for each of four possible cases: Up-Left, Up-Right, Down- Left and Down-Right, where Up and Down determine the section of road, and Left and Right determine the direction an agent drives. These values are updated while receiving payoffs based on the matrix shown in Table 1. In our experiments, we compare the penetration of norm changing behaviors that emanate from key members of a society vs. other cases. We compare emanation from the top to emanation from the middle and bottom 10 percent of the population. At the beginning of the simulation, the agents (nodes) are ranked based on their centrality value to determine the top, middle and bottom agents. The utility value of these agents is kept fixed. Neighbors of these agents continue updating their behavior until a new norm emerges in the system. Figure 2, Figure 3, and Figure 4 show the number of iterations required for each case to converge. The population of agents contained 100 agents, and the reported results show the average values over 20 runs. Figure 2: Average number of iterations until the emergence of one norm, when using degree centrality to determine key agents. for examples). Instead, we opt to use the norm emergence time for each method as an evaluation metric. This is func- tionally equivalent since the payoff received by all agents post norm emergence is the same, hence a method which leads to faster norm emergence will also yield the higher cumulative payoff. 5. KEY FEW MEMBERS In this section, we study the effects of key members of an agent society on the rate of norm emergence. These key members are selected using standard heuristics for measur- ing influence within a network; we evaluate the performance of three centrality measures: degree, closeness, and between- ness. Degree centrality measures the number of edges con- nected to a node. Closeness is calculated based on the total distance to all other nodes. Nodes with a high betweenness centrality fall on a large proportion of the shortest paths (geodesics) in the graph. To model the characteristics of a real social network, we use an algorithm introduced in [35] to create a synthetic network which follows power law degree distribution and exhibits ho- mophily, a greater number of link connections between sim- ilar nodes.1 The network generator uses link density (ld ) and homophily (dh) to govern network formation. A simpli- fied version of the pseudo-code for this method is shown in Figure 1. For our model, we assumed predefined values for ld and dh. The nodes of the graph represent the individu- als (agents) in the simulation, who can be considered as car drivers. G = Null repeat sample r from uniform distribution U (0, 1) if r ≤ ld then randomChooseSource(G) determineCandidateSink(dh,G) pickSink() connect(source,sink) (cid:46) based on power-law distribution else add a new node to G end if until desired number of nodes added to the network Figure 1: Synthetic friendship network generator We use a weighted voting approach (also known as a struc- ture based method) to determine an agent's decision with regard to its neighbors. The weight for each of an agent's neighbors is computed using a normalized value of that neigh- bor's centrality value as shown in Equation 1. weighti,j = Cj ΣDegi k=1 Ck (1) Figure 3: Average number of iterations until the emergence of one norm, when using betweenness centrality to determine key agents. 1Commonly described as "birds of a feather flock to- gether" [26] The pattern observed in all of three cases was very similar. 40608010005001000150020002500% Norm BehavingTime (Ticks)Top 10%Middle 10%Bottom 10%4060801000500100015002000% Norm BehavingTime (Ticks)Top 10%Middle 10%Bottom 10% Figure 4: Average number of iterations until the emergence of one norm, when using closeness centrality to determine key agents. When the norm propagation starts from the top 10% of the population, the norm emerges much faster compared to the other cases. Moreover, there is a fairly sizable difference among top, middle and bottom agents. The magnitude of difference between the top and middle 10% is more than the difference between the middle and bottom. These results are consistent with the role of connectors in tipping point theory. 6. STICKINESS FACTOR According to the tipping point theory, the extent and rate of emerging social norms in a society is not only related to the members of the society, but also related to the content of the message. An effective message needs to be interesting or "sticky" enough to remain in agents' minds. This fac- tor is almost completely independent of the society and its structure, and is a property of the idea. As Gladwell [21] points out, it is potentially very compli- cated to determine if a certain message has the necessary stickiness or not, but one characteristic that is usually com- mon to sticky ideas is that it frequently returns to a person's mind. This could be in the form of a desire to sit and watch a popular TV show every night, or in a more extreme case, a clinical addiction to smoking or gambling. Conventional marketing and advertising domains refer to this phenomenon as rule of 27. According to this rule, a message (advertise- ment) should be seen at least 27 times, if the message is going to stick [28]. Figure 5: Average number of iterations until the emergence of one norm, when 2 out of 4 agents with fixed utility values play twice with each agent that they encounter. Figure 6: Average number of iterations until the emergence of one norm, when 2 out of 4 agents with fixed utility values go (drive) faster. In order to model this property, we assume that the stick- iness is represented by the number of games that an agent plays with another agent. Therefore a higher number of games will result in the same effect as a stickier belief. In our experiments, this idea is evaluated in two different ways. The first way is to increase the number of games that a cer- tain set of agents play. The second way is to have a certain number of agents driving faster than other agents to be ex- posed to more cars. 4060801000500100015002000250030003500% Norm BehavingTime (Ticks)Top 10%Middle 10%Bottom 10%406080100050010001500% Norm BehavingTime (Ticks)Normal caseSome playing more406080100060012001800% Norm BehavingTime (Ticks)Normal caseSome driving faster Figures 5 and 6 show results related to these two cases. In both cases, we have our original 100 agents plus a group of 2 agents which have a fixed preference to drive on either the left or right. In the first scenario, one group of agents plays two games each time it encounters another agent. In the sec- ond scenario, one group of agents moves faster. Both of these scenarios lead to the same effect: increasing the number of times that an agent is exposed to an idea. This simulates the property of frequently returning to a person's mind. In both cases, when the stickiness factor is implemented, the entire system converges to a single norm faster. 7. POWER OF CONTEXT The third element of the tipping point theory refers to the power of context. As Gladwell points out: it is possible to be a better person on a clean street or in a clean subway, than in one littered with trash and graffiti [21]. The idea is mostly based on what known in criminology as the theory of broken windows [37]. According to this theory, slight changes in the environment could result in tipping effects over the whole society. In order to apply this part of the tipping point theory, we use ideas from the methods for studying fads and cascading effects in networks [36]. First, we build a network using the same approach described in Section 5. Then, we assign a threshold value for each agent. Similar to the probabilis- tic information cascade models, if the cumulative value of the perceived cascade is less than the threshold, nothing will change. If it's higher, the agent will change its cur- rent behavior, which in our scenario would result in driving on the other side of the road. Figure 7 shows the percent- age of times that a norm emerged in the system for a set of threshold values. The columns show the average results over 20 runs. Agents were selected randomly as a source of a small initial shock in the network, which results in negat- ing the current payoff values for driving on each side of the road. The frequency of shocks is determined randomly. The system runs until it reaches some fixed iteration number (50,000), unless a different norm is observed. This experi- ment illustrates how minor shocks can shape a population fad, resulting in a population-level behavior change. The shocks (pulses) in this model can be viewed as any of the small changes that tipping point theory predicts can result in large changes in the whole society. According to the re- sults presented in Figure 7, thresholds as small as 0.02 can lead to the emergence of norms in the system in almost 5 percent of the experiments. The computed values for each agent are compared to its tipping point value (normalized between 0 and 1). There is a second aspect to the power of context, which refers to the number of people in groups. The Rule of 150 says that the size of groups is a subtle contextual factor that makes a big difference. This number is referred as Dunbar's number [18], after the anthropologist who originally proposed the idea. In groups with fewer than 150 members, people will cooperate relatively easily and rapidly become infected with the community ethos. Once that threshold is crossed people begin to behave very differently. 150 is our social chan- nel capacity as determined on the basis of personal loyalties and 1-on-1 contacts. Beyond the tipping point of 150 the group dynamics simply become too complex. For the aver- Figure 7: Percentage of times that a norm emerges in the population, when agents have different threshold values for activating. Figure 8: Average number of iterations until the emergence of one norm, when the network structure of agents follows a power-law distribution and when the network is a complete clique. age person there are just too many relationships to manage. The group then becomes divided and alienated, and usually splits into two. Smaller groups have been shown to be more effective at tasks than larger groups. This may be due to biological limitations of humans which make it very difficult for them to handle a larger community. With the growth of virtual social media sites and the spread of online groups, there has been renewed interest in eval- uating the importance of this limit on Facebook [19], Mys- pace [20] and within massively multiplayer online role-playing games (MMORPGs). The pivotal issue here is that a person cannot maintain a close relationship with all of the mem- bers of a larger group which ultimately sabotages its suc- cess. Having a direct connection with each member of the group is a necessary component to having a positive social relationship. We propose using a clique structure to illustrate this idea. In a clique each node has a direct edge to all of other nodes. There are n∗ (n− 1) edges in the resulting graph. We opt to use a directed graph, as that seems to be the general assump- tion for friendship networks. We compare the emergence of driving norms in a network generated using the method de- scribed in Section 5. It should be noted that having more edges does not result in faster convergence. More connec- tions makes the diffusion of ideas easier, while it makes it 0204060801000.020.040.060.080.10.120.140.160.180.20.220.240.26% of times norm emergedThreshold value406080100050010001500% Norm BehavingTime (Ticks)Power lawClique harder for the agents to find an idea that all agents like. In a clique structure the major voting approach and the weighted voting approach (using the number of edges) are the effectively same, so neither of them elicits earlier norm emergence. Figure 8 shows the number of iterations that were required on average for the two cases to reach norm emergence. The driving norm emerged faster in case of the clique structure than in the power-law degree distribution network. This shows the potential benefit of such a struc- ture in constructing agent systems, at least for ideal cases. 8. CONCLUSION AND FUTURE WORK Norms are complex social behaviors that have been exten- sively studied in sociology, psychology, and other related fields. Most normative architectures draw upon theories from the social sciences. The theory of tipping points has in- spired much research in different disciplines. For this paper, we model some of the well-known elements of this theory, as applied to networked agent populations. We illustrate how three of principle ideas including key few members, sticki- ness factor, and the role of environment can affect the pro- cess of norm emergence. This paper is meant to be an initial step for convincing the NorMAS community of the impor- tance of tipping point theory concepts. For future work, we are interested in mapping the performance of our normative model to a real-dataset. 9. REFERENCES [1] T. Balke, T. Roberts, M. Xenitidou, and N. Gilbert. Modelling energy-consuming social practices as agents. In Social Simulation Conference, Barcelona, 2014. [2] R. Beheshti, A. M. Ali, and G. Sukthankar. Cognitive social learners: an architecture for modeling normative behavior. 2015. [3] R. Beheshti, M. Analui, and B. Minaei-Bidgoli. A pairwise classification method with support vector machines, based on game theory and alpha-beta algorithm. In The 2nd International Conference of Iranian Operation Research Society. Civilica, 2009. [4] R. Beheshti, R. Barmaki, and N. Mozayani. Negotiations in holonic multi-agent systems. In The Seventh International Workshop on Agent-based Complex Automated Negotiations (ACAN2014), 2014. [5] R. Beheshti and N. Mozayani. Predicting opponents offers in multi-agent negotiations using artmap neural network. In Future Information Technology and Management Engineering, 2009. FITME'09. Second International Conference on, pages 600 -- 603. IEEE, 2009. [6] R. Beheshti and N. Mozayani. A new mechanism for negotiations in multi-agent systems based on artmap artificial neural network. In Agent and Multi-Agent Systems: Technologies and Applications, pages 311 -- 320. Springer, 2011. [7] R. Beheshti and N. Mozayani. Homan, a learning based negotiation method for holonic multi-agent systems. Journal of Intelligent and Fuzzy Systems, 26(2):655 -- 666, 2014. [8] R. Beheshti, N. Mozayani, and A. T. Rahmani. A new hybrid evolutionary method with ant colony and pso algorithms based on fuzzy decision making. In The 2nd International Conference of Iranian Operation Research Society. Civilica, 2009. [9] R. Beheshti and A. Rahmani. A multi-objective genetic algorithm method to support multi-agent negotiations. In Future Information Technology and Management Engineering, 2009. FITME'09. Second International Conference on, pages 596 -- 599. IEEE, 2009. [10] R. Beheshti and G. Sukthankar. Extracting agent-based models of human transportation patterns. In Social Informatics (SocialInformatics), 2012 International Conference on, pages 157 -- 164. IEEE, 2012. [11] R. Beheshti and G. Sukthankar. An agent-based transportation simulation of the ucf campus. In SwarmFest 2013: 17th Annual Meeting on Agent-Based Modeling & Simulation, 2013. [12] R. Beheshti and G. Sukthankar. Analyzing agent-based models using category theory. In Web Intelligence (WI) and Intelligent Agent Technologies (IAT), 2013 IEEE/WIC/ACM International Joint Conferences on, volume 2, pages 280 -- 286. IEEE, 2013. [13] R. Beheshti and G. Sukthankar. Improving markov chain monte carlo estimation with agent-based models. In Social Computing, Behavioral-Cultural Modeling and Prediction, pages 495 -- 502. Springer, 2013. [14] R. Beheshti and G. Sukthankar. A hybrid modeling approach for parking and traffic prediction in urban and memory effect on convention emergence. In Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology-Volume 02, pages 233 -- 240. IEEE Computer Society, 2009. [35] X. Wang, M. Maghami, and G. Sukthankar. Leveraging network properties for trust evaluation in multi-agent systems. In Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Volume 02, pages 288 -- 295. IEEE Computer Society, 2011. [36] D. J. Watts. A simple model of fads and cascading failures on sparse switching networks. In Economics with Heterogeneous Interacting Agents, pages 13 -- 25. Springer, 2001. [37] J. Q. Wilson and G. L. Kelling. Broken windows. Atlantic Monthly, 249(3):29 -- 38, 1982. [38] H. P. Young. The economics of convention. The Journal of Economic Perspectives, pages 105 -- 122, 1996. [39] C. Yu, M. Zhang, F. Ren, and X. Luo. Emergence of social norms through collective learning in networked agent societies. In Proceedings of the International Conference on Autonomous Agents and Multi-agent Systems, pages 475 -- 482. International Foundation for Autonomous Agents and Multiagent Systems, 2013. simulations. AI & SOCIETY, pages 1 -- 12, 2014. [15] R. Beheshti and G. Sukthankar. A normative agent-based model for predicting smoking cessation trends. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, pages 557 -- 564. International Foundation for Autonomous Agents and Multiagent Systems, 2014. [16] G. Boella and L. van der Torre. An architecture of a normative system: counts-as conditionals, obligations and permissions. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, pages 229 -- 231. ACM Press, 2006. [17] R. Conte, G. Andrighetto, and M. Campennl. Minding norms: Mechanisms and dynamics of social order in agent societies. Oxford University Press, 2013. [18] R. I. Dunbar. Neocortex size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469 -- 493, 1992. [19] R. I. Dunbar. Primates on facebook. 2009. Retrieved from: http://econ.st/1qgCrDL. [20] J. W. Gibbons. Modeling Content Lifespan in Online Social Networks Using Data Mining. PhD thesis, University of Kansas, 2014. [21] M. Gladwell. The tipping point: How little things can make a big difference. Hachette Digital, Inc., 2006. [22] M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, 83(6), 1978. [23] M. Grodzins. Metropolitan segregation. Scientific American, 1957. [24] C. D. Hollander and A. S. Wu. The current state of normative agent-based systems. Journal of Artificial Societies and Social Simulation, 14(2):6, 2011. [25] G. Malcolm. The tipping point. Little Brown, New York, 2000. [26] M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(1):415 -- 444, 2001. [27] M. Neumann. Norm internalisation in human and artificial intelligence. Journal of Artificial Societies and Social Simulation, 13(1):12, 2010. [28] D. Pepper. How to Start and Grow Your Lawn Care Maintenance Business. Lulu Enterprises Incorporated, 2008. [29] B. T. R. Savarimuthu, S. Cranefield, M. K. Purvis, and M. A. Purvis. Norm emergence in agent societies formed by dynamically changing networks. Web Intelligence and Agent Systems, 7(3):223 -- 232, 2009. [30] T. C. Schelling. Micromotives and macrobehavior. WW Norton & Company, 2006. [31] O. Sen and S. Sen. Effects of social network topology and options on norm emergence. In Coordination, Organizations, Institutions and Norms in Agent Systems V, pages 211 -- 222. Springer, 2010. [32] S. Sen and S. Airiau. Emergence of norms through social learning. In IJCAI, volume 1507, page 1512, 2007. [33] D. Villatoro, G. Andrighetto, J. Sabater-Mir, and R. Conte. Dynamic sanctioning for robust and cost-efficient norm compliance. In IJCAI, volume 11, pages 414 -- 419, 2011. [34] D. Villatoro, S. Sen, and J. Sabater-Mir. Topology
1810.10591
1
1810
2018-10-24T19:52:01
Reasoning about Norms Revision
[ "cs.MA" ]
Norms with sanctions have been widely employed as a mechanism for controlling and coordinating the behavior of agents without limiting their autonomy. The norms enforced in a multi-agent system can be revised in order to increase the likelihood that desirable system properties are fulfilled or that system performance is sufficiently high. In this paper, we provide a preliminary analysis of some types of norm revision: relaxation and strengthening. Furthermore, with the help of some illustrative scenarios, we show the usefulness of norm revision for better satisfying the overall system objectives.
cs.MA
cs
Reasoning about Norms Revision Davide Dell'Anna, Mehdi Dastani, and Fabiano Dalpiaz Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands Abstract. Norms with sanctions have been widely employed as a mech- anism for controlling and coordinating the behavior of agents without limiting their autonomy. The norms enforced in a multi-agent system can be revised in order to increase the likelihood that desirable system properties are fulfilled or that system performance is sufficiently high. In this paper, we provide a preliminary analysis of some types of norm revi- sion: relaxation and strengthening. Furthermore, with the help of some illustrative scenarios, we show the usefulness of norm revision for better satisfying the overall system objectives. 1 Introduction Modern software systems execute in highly dynamic environments [1]. Typi- cal dynamic settings are open environments, where many (heterogeneous) au- tonomous software components coexist, interact and can join and leave as they please. Dynamicity and uncertainty can be caused by many different (often un- predictable) factors: events from the operating environment, behaviors emerging from the effects of software executions and their interactions, the change of ex- ternal norms [2] and the impact of this on software behaviour, etc. [3]. In order to guarantee desirable overall system level properties, in the multi- agent systems research field, norms with sanctions have been proposed as a means to control and coordinate the behavior of autonomous agents without limiting their autonomy [4, 5]. In many cases, however, it is infeasible for a system designer to anticipate all the possible states that the software systems and its operating environment can reach during execution [3], and to define adequate norms for each of them. Furthermore, system objectives are themselves in constant motion [6, 7]: new goals arise while others are dropped, the desired qualities vary, and the relative priority of the objectives evolves. A static predefined set of norms may often result at runtime inadequate to guarantee the overall system objectives in various contexts [8, 9]. Dynamic update of norms at runtime is therefore one of the key factors to build a versatile normative multi-agent system, able to accommodate an hetero- geneous population of agents and capable of ensuring the overall system objec- tives within a dynamic and uncertain environment [10]. In this paper we provide a preliminary analysis of some main types of norm revision that can be applied to a running system with the goal of better satisfying the overall system objectives. We define the concept of norms revision as the act of replacing a set of norms with a new set. We specialize norms revision in three different types: relaxation, strengthening and generic alteration, which differ for the type of relationship that the revised set has with the original one. Finally, we provide a series of practical examples to clarify the different types of revisions and their possible applications. This paper should be considered as the initial step of a research on runtime supervision of normative systems. We do not report on technical nor experimen- tal results, but rather lay down the foundations of our future research. The remainder of this paper is structured as follows: Section 2 frames our work within the existing literature, Section 3 discusses the problem of norms revision, Section 4 provides a series of examples of revisions of norms and possible applicative scenarios. Section 5 ends the paper with concluding remarks and future work. 2 Background Numerous papers over the years have focused on deciding and proving the cor- rectness of normative systems by model checking formulas describing desired properties such as liveness or safety properties [11, 12, 13]. Despite their ele- gance, these approaches do not fully cope properly with the dynamicity of to- day's complex systems, where the behavior of the system may change over time due to changes in the participating agents, their behaviors, or the active norms. As of today, there is no generally agreed formal methodology to reason about the dynamics of norms and their impact on system specification. However some formal frameworks emerged in recent years to cope with these problems. In the rest of this section we discuss these related works on norm dynamics. Knobbout et al. [10] propose a dynamic logic to formally characterize the dynamics of state-based and action-based norms. Both in Knobbout's works [10, 14] and in Alechina et al.'s [13], norm change is intended as norm addition. Taking these approaches as our baseline, we aim to investigate further types of norms update in order to extend the existing framework for dynamic normative systems. Aucher et al. [15] introduce a dynamic context logic in order to describe the operations of contraction and expansion of theories by introducing or removing new rules. Governatori et al. [16] investigate from a legal point of view the application of theory revision to reason about legal abrogations and annulments. The types of revision presented in this paper can be related to theory revision, but we take a multi-agent systems standpoint, in which norms revision should be studied in terms of its impact on agents autonomy and we leave for future work the study of the impact of a revision on the existing normative system. Norms update has also been studied from the perspective of approximation [17], where an approximated version of a norm is formally obtained to cope with imperfect monitors for the original norm. The concept of approximation is similar to our notion of relaxation, however it is defined with respect to a specific monitor: an approximated norm is synthesized from the original one in order to maximize the violations detectable by the available imperfect monitor. Here we assume perfect monitors and we focus instead on the relationship between different norms in terms of behaviors they allow or prohibit. Whittle and colleagues [3] present early studies on relaxation of requirements of a software system. They define a requirements language for self-adaptive sys- tems that allows to specify, with opportune operators, relaxed versions of a requirement during the requirement elicitation phase. While they focus on a language point of view, useful for the acquisition and specification of norms, in this paper we assume the norms are already specified and we provide an analysis of revision from a normative point of view based on a formal model of multi-agent system that abstracts from the language used to define the norms. 3 Norms Revision The class of models that we use to study and describe normative multi-agent systems are transition systems. These models consist of states and transitions between states. The idea is that such model describes all possible transitions of states that can occur within the system as a result of the actions that the agents perform. Definition 1 (Transition System). Given a set of atomic propositions Props, a transition system is a tuple M = (S, T, s0, V ) where S is a set of states, T ⊆ S × S is a transition relation, s0 ∈ S is a distinguished initial state and V is a valuation function V : S → Props associating propositions with states (i.e., defining which propositions hold in a state). Given a transition system M = (S, T, s0, V ), a path r through M is a sequence s0, s1, s2, . . . of states such that siT si+1 for i = 0, 1, . . .. Each path can be seen as a possible behavior of the system. We consider some of the behaviors as desired and others as undesired and we use the concept of norm to identify these behaviors. In this paper we consider conditional norms with sanctions and deadlines, as they are commonly used in the existing literature on normative multi-agent systems [18, 13] and they have proven to be a reasonable compromise between expressiveness and ease of reasoning [17]. Definition 2 (Conditional Norms). Given a propositional language LN , let cond, φ and d be boolean combinations of propositional variables from LN and let san be a propositional atom. A conditional norm n is represented by a tuple (cond; Z(φ); d; san) where Z can be either O (obligation) or F (prohibition). Given a conditional norm, cond represents the condition that must be satisfied in a state of M in order to detach the norm. A detached norm persists as long as it is not obeyed or violated or the deadline d is not reached (a state where d holds is encountered). Conditional norms are evaluated on paths of the transition system. In this paper we omit a formal definition of a violation, which is strictly dependent on the language used to express them. In the following we denote a violation formula for a conditional norm n by v(n) (see previous publication [17] for a formal definition for PLTL formulae). A norm n is violated on a path r if, and only if, v(n) holds in some state on r. We denote by Viol(M, n) the set of paths through M that violate the norm n. Fig. 1 sketches the main components of a runtime supervision framework that continuously monitors the execution of a multi-agent system (MAS), evaluates its behavior against the currently en- forced norms, and intervenes by deciding which norms should be revised. Norm violation is monitored (and sanctioned) by the Monitoring and sanctioning component. In this paper we ignore the techniques of monitoring and evaluation of norms, for which many works can be found in literature (e.g. [19]), and we assume there exists a perfect monitor for each norm. The aim of this paper is to provide a study of the possible revisions of norms and of the possible conditions when a revision may be useful. The study is a starting point to build a Norm update component able to revise at runtime the currently enforced norms in order to ensure the achievement of the overall objectives. We assume that the Monitoring and sanctioning component stores at runtime information about the obedience or violation of the norms and about the operating contexts in which they are evaluated (e.g. the hour of the day, etc.). This information, to- gether with information about the satisfaction of the overall systems objectives, is used by the Norms update component in order to decide if and how to revise the currently enforced norms. Fig. 1. The main components of the proposed runtime supervision framework aimed at revising norms enforced into a normative MAS. Dotted lines represent the scope of the components. Norm enforcement in multi-agent systems can be done in two possible ways: regimentation and sanctioning [13]. Regimentation makes bad behaviors impos- sible, i.e., it makes some of the paths of M inaccessible. With regimentation, violations of the norms are not possible, however the autonomy of the agents is reduced. Sanctioning norms violation is instead a means to discourage the violation. Sanctions are essentially treated like fines. They penalize agents when Norms with sanctionsS0S1S2.........MASMonitoring and sanctioningNorms update they bring the system on an undesired path, however they leave autonomy to the agents, even if their resources are reduced if they violate the norms. A regimented norm n can be described by Viol(M, n) (i.e., by the set of paths of M that violate the norm), while a norm n with a sanction is described by both Viol(M, n) and a propositional sanction atom that is asserted in case of violation of n. We assume in the following to be able to compare two sanctions (e.g., consider the case of numeric sanctions such as money). Given a set of norms N = {n1, ..., nk}, we denote by Viol(M, N ) the set of all paths through M each violating at least one norm in N (i.e., Viol(M, N ) = Viol(M, n1) ∪ ... ∪ Viol(M, nk)), and by San a conjunction of all sanctions asso- ciated with the norms in N (i.e., SanN = san1 ∧ ... ∧ sank). Given a pair of sets of norms, N1 and N2, we denote by -- N1 < N2: the fact that Viol(M, N1) ⊃ Viol(M, N2). In this case, we say that N1 is a set of norms more restrictive than N2, or that N2 is more relaxed than N1. -- N1 ≡ N2: the fact that Viol(M, N1) = Viol(M, N2). We say that the sets of norms N1 and N2 are equally restrictive. Note that the relationships between norms above reported can only be sat- isfied by pairs of sets of norms such that Viol(M, N1) ⊆ (⊇)Viol(M, N n2). Definition 3 (Norms Revision). Let N be a set of norms, a revision of N is a replacement of N with a new set N R. N R may be a more/equivalently/less restrictive set of norms or an alternative set where no relationship can be stated. We distinguish two main types of revision: relaxation and strengthening, and we consider all the other types of revisions as regular alteration. Definition 4 (Revision, Relaxation, Strengthening). A relaxation of a set of norms N is a revision of N with a new set N R such that N R > N . A strengthening of a set of norms N is a revision of N with a new set N R such that N R < N . Any other revision of N with a new set N R such that either N R ≡ N or no relationship can be stated are regular alterations of N . Given a pair of norms, n1 and n2 such that n1 = (cond1; Z(φ1); d1; san1) and n2 = (cond2; Z(φ2); d2; san2), 1. n2 is a relaxation of n1 if and only if at least one of the following holds (all else being equal): (a) cond2 is a stricter formula cond1. Note that with stricter (less strict) formula we mean a formula that is satisfied in strictly less (more) paths of M . A stricter formula for a condition of a conditional norm makes therefore the norm applicable in fewer paths than the original. (b) φ2 is a less strict formula than φ1 if Z = O (obligation), or φ2 is a stricter formula than φ1 if Z = F (prohibition). A less strict obligation (or a stricter prohibition) makes the norm violated in fewer paths, which means that more agents' behaviors are allowed. (c) d2 is a less strict formula than d1. Note that this is valid since we only accept propositional formulae, therefore a less strict deadline for a con- ditional norm means that it can be withdrawn in more states. 2. n2 is a strengthening of n1 if and only if n1 is a relaxation of n2. 3. n2 is a regular alteration of n1 if it is neither a relaxation nor a strengthening Note that while a revision of a single norm can be analyzed in terms of all its components, revision of a set of norms involving more than one norm can only be compared in terms of the set of paths of M and the sanctions. A revision N R of a set N obtained by relaxing some of the norms and strengthening some others can be compared to N only in terms of the resulting set of behaviors allowed in M , since Viol(M, N R) can be either a subset or a superset of Viol(M, N ) or even a disjoint set. However if the revised norms are all relaxed (strengthened) the resulting revised set is a relaxed (strengthened) set of N . Notably, increasing or decreasing sanctions associated to norms, under the assumption that such sanctions are comparable, is an alternative means to in- fluence the behavior of agents that goes beyond relaxation or strengthening of norms. Thus, increasing the sanctions SanN associated with a set of norms N is a way to bring the system to the desired paths defined by N , while decreasing the sanctions is a way to accept undesired paths. In the next section we provide an intuitive explanation of this concept with the help of illustrative examples. 4 Illustrative Examples In this section we provide some illustrative examples of the different types of revision of norms and some illustrative scenarios where to revise norms may be useful to ensure the overall system objectives. Note that in this paper we are not interested in how the norms that we use are acquired. Moreover, to consider only relevant norms, we assume that we are provided with information about the rationale behind norms, that relates them to the overall system objectives. Finally, we assume every parameter of the norms as perfectly monitorable. 4.1 Relaxation Consider norm n1: "cars speed in road r shall be kept below 15km/h, other- wise e10k fine", formally (for brevity assume car and road as implicit) n1 = (inRoad, F (speedAbove15),(cid:62), 10keuros), where (cid:62) provides "always" interpreta- tion. Possible examples of relaxations of n1 are the following (possibly combined): -- r1 = ((inRoad ∧ trafficHigh), F (speedAbove15),(cid:62), 10keuros). r1 differs from n1 only for the condition: (inRoad ∧ trafficHigh) is a stricter formula than inRoad. Since the condition is more specific and the rest of parameters is analogous (case 1a of Definition 4 holds), r1 is applicable in fewer paths of M , therefore fewer paths are violations and more behaviors are allowed in the system. -- r2 = (inRoad, F (speedAbove20),(cid:62), 10keuros). r2 differs from n1 only for the prohibition (case 1b): speedAbove20 is stricter than speedAbove15 because fewer paths are considered prohibited. -- r3 = (inRoad, F (speedAbove15), firstHalfCompleted, 10keuros). r3 differs from n1 only for the deadline (case 1c): firstHalfCompleted is less strict than (cid:62) ("always", e.g. firstHalfCompleted ∧ secondHalfCompleted) since the norm remains valid only when the car is in the first half of the road. Again more behaviors are allowed. Example. Consider a simple scenario where a population of autonomous vehi- cles can take a road r where their speed and the traffic level can be perfectly monitored. The designer of the system M wants to be sure that "no cars stay in road r (10km long) for more than 35 minutes". Norm n1 is currently enforced and at runtime it appears to be too strict for achieving the overall objective: if it is obeyed it prevents the fulfilment of the objective. Since n1 is too strict, one (or a combination) of the following relaxations may be useful to improve the performance of the system: -- replace n1 with r1, r2 or r3. In case of r1, choosing a stricter condition al- lows agents to perform more actions without incurring in sanctions (agents are allowed to drive above 15km/h unless the traffic level is high). Since obeying to n1 prevents the fulfillment of the objective, reducing the con- ditions where it applies means allowing behaviors previously forbidden. An analogous explanation can be provided also for r2 and r3. Notice that an analogous effect can be obtained by replacing n1 with another norm s1 = (inRoad, F (speedAbove15),(cid:62), 5euros), differing from n1 only for the sanction: 5euros < 10keuros. Reducing the fine incentives more agents to violate n1. Since the objective is achieved when n1 is violated we increase the chances the objective is achieved. 4.2 Strengthening Consider a norm n2 = (inRoad, O(speedbelow50), outOfRoad, 5euros). Possible examples of strengthening of n2 are the following (possibly combined): -- r5 = ((inRoad ∨ aroundTheRoad), O(speedbelow50), (outOfRoad ∧ 1kmFarAway), 5euros). r5 differs from n2 for both the condition and the deadline: (inRoad ∨ aroundTheRoad) is less strict than inRoad, while (outOfRoad ∧ 1kmFarAway) is stricter than outOfRoad. Since the condition is less specific, r5 is detached in more paths, and since the deadline is more specific, r5 remains valid in more cases, therefore more paths violate it and less behaviors are allowed. -- r6 = (inRoad, O(typeScooter), outOfRoad, 5euros). O(typeScooter) is stricter than O(speedbelow50): while n2 accepts all execu- tions involving vehicles (scooters or not) that keep the speed below 50km/h, r6 accepts only executions involving scooters (assumed here to have maxi- mum speed of 50km/h). Again less behaviors are allowed. Example. Consider a scenario where a population of autonomous vehicles can take a road r where their speed, type of vehicle and noise they produce can be perfectly monitored. There is an overall system objective "vehicle's noise in the neighborhood is below x db". Norm n2 is currently enforced and it is proven that violation of n2 prevents the achievement of the overall objective. Norm n2 appears at runtime to be too weak to ensure the overall system objective (e.g. it is often violated). One (or a combination) of the following strengthening of n2 may therefore be useful to improve the performance of the system: -- replace n2 with r5. Choosing a less strict condition makes the norm valid in more cases. Deincentivating agents to drive faster than 50km/h also around the road may prevent vehicles to accelerate immediately out of the road, which may be harmful for the achievement of the overall objective of keeping the noise in the neighborhood low. -- replace n2 with r6. Assuming scooters have maximum speed of 50km/h, if the new norm is obeyed by agents, the goal is ensured. Notice one more time that an analogous effect can be obtained by replac- ing n2 with another norm s2 = (inRoad, O(speedbelow50), outOfRoad, 10keuros), differing from n2 only for the sanction: 10keuros > 5euros. Increasing the fine incentives more agents to obey n2. Since the objective is achieved when n2 is obeyed we increase the chances to achieve it. 4.3 Alteration Consider norm n3: "if two cars c1 and c2 are at the opposite ends of the narrowed road, c1 shall move and c2 shall wait, otherwise 10k euros fine to c2", formally n3 = ((firstEnd(c1) ∧ secEnd(c2)), O(move(c1) ∧ wait(c2)), (cid:62), c2 10keuros). Possible examples of alteration of n3 are the following: -- r8 = ((firstEnd(c1) ∧ secEnd(c2)), O(wait(c1) ∧ move(c2)), (cid:62), c1 10keuros). -- r9 = (inRoad(c1), O(speedbelow50), (cid:62), c1 10keuros). Both r8 and r9 define a set of underused paths that is neither a subset or a superset of the paths defined by n3. Therefore they cannot be considered neither a relaxation nor a strengthening. Notice that r9 is reported as an example of a generic alteration, which reflects the definition we provided, even if it is not strictly related to n3. Example. Consider a scenario of a narrowed road and cars coming from both directions. The overall objective is "keep cars queue size in both directions be- low a threshold t". Norm n3 is currently enforced and it proved to be useful to achieve the objective when traffic is low in both directions. However, when traffic is high in the direction of car c1 the queue in the opposite direction grows too much. Norm n3 appears therefore to be not good to ensure the overall system objective in such case. An alteration such as replacing n3 with r9 may be use- ful to improve the performance of the system. Notice that a generic alteration involves a new norm that either is not strictly related to the existing one or it is equally restrictive, therefore it is hard to predict the outcome of the enforce- ment of the new norm. However, assuming the considered norms are related to the same overall system objective, enforcing an alteration in the system may lead to different (hopefully better) performances. 5 Conclusion and Future Work In this paper we proposed a preliminary study of some types of revision of norms that can be enacted on a running multi-agent system in order to enhance its per- formance. We defined the concept of norms revision as a replacement of a set of norms with a new set and we formally defined the notions of relaxation and strengthening, which introduce supersets and subsets of the allowed behaviors, respectively. We provided some examples of revisions and some application sce- narios where a revision of the current set of enforced norms may be useful in order to achieve the overall system objectives. The analysis of different types of norms update provided in this paper is a first step in order to extend existing works for dynamic normative systems (see [14, 10]) with revision of norms. As future work we plan to provide a formal semantics for the concepts here introduced and to develop a syntactically sound and complete reasoning system. We also want to consider the effects of a revision in terms of update of the normative system and to analyse the relation of the revisions here presented with standard operators from the literature (e.g. from AGM framework). Finally we plan to provide a formal discussion about the correlation between the enforced norms and the fulfilment of the overall system objectives and to develop techniques to automatically reason at runtime about this correlation and to automatically suggest and perform a revision. These developments are meant to be part of an adaptive runtime supervision framework that continuously monitors the execution of a normative multi-agent system and intervenes on it in order to improve its performance. References [1] Sommerville, I., Cliff, D., Calinescu, R., Keen, J., Kelly, T., Kwiatkowska, M.Z., McDermid, J.A., Paige, R.F.: Large-scale complex IT systems. Commun. ACM 55(7) (2012) 71 -- 77 [2] Rosemann, M., Recker, J., Flender, C.: Contextualisation of business processes. IJBPIM 3(1) (2008) 47 -- 60 [3] Whittle, J., Sawyer, P., Bencomo, N., Cheng, B.H.C., Bruel, J.: RELAX: a lan- guage to address uncertainty in self-adaptive systems requirement. Requir. Eng. 15(2) (2010) 177 -- 196 [4] Boella, G., van der Torre, L.W.N.: Regulative and constitutive norms in normative multiagent systems. In: Principles of Knowledge Representation and Reasoning: Proceedings of the Ninth International Conference (KR2004), Whistler, Canada, June 2-5, 2004. (2004) 255 -- 266 [5] Bulling, N., Dastani, M.: Norm-based mechanism design. Artif. Intell. 239 (2016) 97 -- 142 [6] Zowghi, D., Gervasi, V.: On the interplay between consistency, completeness, and correctness in requirements evolution. Information & Software Technology 45(14) (2003) 993 -- 1009 [7] Ernst, N.A., Borgida, A., Jureta, I., Mylopoulos, J.: An overview of requirements evolution. In: Evolving Software Systems. (2014) 3 -- 32 [8] Ali, R., Dalpiaz, F., Giorgini, P., Souza, V.E.S.: Requirements evolution: From assumptions to reality. In: Enterprise, Business-Process and Information Systems Modeling - 12th International Conference, BPMDS 2011, and 16th International Conference, EMMSAD 2011, held at CAiSE 2011, London, UK, June 20-21, 2011. Proceedings. (2011) 372 -- 382 [9] Letier, E., van Lamsweerde, A.: Reasoning about partial goal satisfaction for requirements and design engineering. In: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31 - November 6, 2004. (2004) 53 -- 62 [10] Knobbout, M., Dastani, M., Meyer, J.C.: A dynamic logic of norm change. In: ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands - Including Prestigious Applica- tions of Artificial Intelligence (PAIS 2016). (2016) 886 -- 894 [11] Dastani, M., Grossi, D., Meyer, J.C., Tinnemeier, N.A.M.: Normative multi- In: Normative Multi-Agent Systems, 15.03. - agent programs and their logics. 20.03.2009. (2009) [12] Knobbout, M., Dastani, M.: Reasoning under compliance assumptions in norma- tive multiagent systems. In: International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012 (3 Volumes). (2012) 331 -- 340 [13] Alechina, N., Dastani, M., Logan, B.: Reasoning about normative update. In: IJCAI 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013. (2013) 20 -- 26 [14] Knobbout, M., Dastani, M., Meyer, J.C.: Reasoning about dynamic normative systems. In: Logics in Artificial Intelligence - 14th European Conference, JELIA 2014, Funchal, Madeira, Portugal, September 24-26, 2014. Proceedings. (2014) 628 -- 636 [15] Aucher, G., Grossi, D., Herzig, A., Lorini, E.: Dynamic context logic. In: Logic, Rationality, and Interaction, Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings. (2009) 15 -- 26 [16] Governatori, G., Rotolo, A.: Changing legal systems: legal abrogations and an- nulments in defeasible logic. Logic Journal of the IGPL 18(1) (2010) 157 -- 194 [17] Alechina, N., Dastani, M., Logan, B.: Norm approximation for imperfect monitors. In: International conference on Autonomous Agents and Multi-Agent Systems, AAMAS '14, Paris, France, May 5-9, 2014. (2014) 117 -- 124 [18] Tinnemeier, N.A.M., Dastani, M., Meyer, J.C., van der Torre, L.W.N.: Pro- gramming normative artifacts with declarative obligations and prohibitions. In: Proceedings of the 2009 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2009, Milan, Italy, 15-18 September 2009. (2009) 145 -- 152 [19] Bulling, N., Dastani, M., Knobbout, M.: Monitoring norm violations in multi- agent systems. In: International conference on Autonomous Agents and Multi- Agent Systems, AAMAS '13, Saint Paul, MN, USA, May 6-10, 2013. (2013) 491 -- 498
1404.2367
2
1404
2015-02-15T19:41:45
Detecting Possible Manipulators in Elections
[ "cs.MA", "cs.GT" ]
Manipulation is a problem of fundamental importance in the context of voting in which the voters exercise their votes strategically instead of voting honestly to prevent selection of an alternative that is less preferred. The Gibbard-Satterthwaite theorem shows that there is no strategy-proof voting rule that simultaneously satisfies certain combinations of desirable properties. Researchers have attempted to get around the impossibility results in several ways such as domain restriction and computational hardness of manipulation. However these approaches have been shown to have limitations. Since prevention of manipulation seems to be elusive, an interesting research direction therefore is detection of manipulation. Motivated by this, we initiate the study of detection of possible manipulators in an election. We formulate two pertinent computational problems - Coalitional Possible Manipulators (CPM) and Coalitional Possible Manipulators given Winner (CPMW), where a suspect group of voters is provided as input to compute whether they can be a potential coalition of possible manipulators. In the absence of any suspect group, we formulate two more computational problems namely Coalitional Possible Manipulators Search (CPMS), and Coalitional Possible Manipulators Search given Winner (CPMSW). We provide polynomial time algorithms for these problems, for several popular voting rules. For a few other voting rules, we show that these problems are in NP-complete. We observe that detecting manipulation maybe easy even when manipulation is hard, as seen for example, in the case of the Borda voting rule.
cs.MA
cs
Detecting Possible Manipulators in Elections Palash Dey, Neeldhara Misra, and Y. Narahari [email protected], [email protected], [email protected] Department of Computer Science and Automation Indian Institute of Science - Bangalore, India. Date: September 25, 2018 Abstract. Manipulation is a problem of fundamental importance in the context of voting in which the voters exercise their votes strategically in- stead of voting honestly to prevent selection of an alternative that is less preferred. The Gibbard-Satterthwaite theorem shows that there is no strategy-proof voting rule that simultaneously satisfies certain combina- tions of desirable properties. Researchers have attempted to get around the impossibility results in several ways such as domain restriction and computational hardness of manipulation. However these approaches have been shown to have limitations. Since prevention of manipulation seems to be elusive, an interesting research direction therefore is detection of manipulation. Motivated by this, we initiate the study of detection of possible manipulators in an election. We formulate two pertinent computational problems - Coalitional Pos- sible Manipulators (CPM) and Coalitional Possible Manipulators given Winner (CPMW), where a suspect group of voters is provided as input to compute whether they can be a potential coalition of possible manipu- lators. In the absence of any suspect group, we formulate two more com- putational problems namely Coalitional Possible Manipulators Search (CPMS), and Coalitional Possible Manipulators Search given Winner (CPMSW). We provide polynomial time algorithms for these problems, for several popular voting rules. For a few other voting rules, we show that these problems are in NP-complete. We observe that detecting manipu- lation maybe easy even when manipulation is hard, as seen for example, in the case of the Borda voting rule. Keywords: Computational social choice, voting, manipulation, detection 5 1 0 2 b e F 5 1 ] A M . s c [ 2 v 7 6 3 2 . 4 0 4 1 : v i X r a 1. INTRODUCTION 1 Introduction On many occasions, agents need to agree upon a common decision although they have different preferences over the available alternatives. A natural approach used in these situations is voting. Some classic examples of the use of voting rules in the context of multiagent systems are in collaborative filtering [Pennock et al., 2000], rank aggregation in web [Dwork et al., 2001] etc. In a typical voting scenario, we have a set of m candidates and a set of n vot- ers reporting their rankings of the candidates called their preferences or votes. A voting rule selects one candidate as the winner once all the voters provide their votes. A set of votes over a set of candidates along with a voting rule is called an election. A basic problem with voting rules is that the voters may vote strategically instead of voting honestly, leading to the selection of a candidate which is not the actual winner. We call a candidate actual winner if, it wins the election when every voter votes truthfully. This phenomenon of strategic vot- ing is called manipulation in the context of voting. The Gibbard-Satterthwaite (G-S) theorem [Gibbard, 1973, Satterthwaite, 1975] says that manipulation is unavoidable for any unanimous and non-dictatorial voting rule if we have at least three candidates. A voting rule is called unanimous if whenever any can- didate is most preferred by all the voters, such a candidate is the winner. A voting rule is called non-dictatorial if there does not exist any voter whose most preferred candidate is always the winner irrespective of the votes of other vot- ers. The problem of manipulation is particularly relevant for multiagent systems since agents have computational power to determine strategic votes. There have been several attempts to bypass the impossibility result of the G-S theorem. Economists have proposed domain restriction as a way out of the impossibil- ity implications of the G-S theorem. The G-S theorem assumes all possible pref- erence profiles as the domain of voting rules. In a restricted domain, it has been shown that we can have voting rules that are not vulnerable to manipulation. A prominent restricted domain is the domain of single peaked preferences, in which the median voting rule provides a satisfactory solution [Mas-Collel et al., 1995]. To know more about other domain restrictions, we refer to [Gaertner, 2001, Mas-Collel et al., 1995]. This approach of restricting the domain, however, suffers from the requirement that the social planner needs to know the domain of preference profiles of the voters, which is often impractical. 1.1 Related Work Researchers in computational social choice theory have proposed invoking com- putational intractability of manipulation as a possible work around for the G-S theorem. Bartholdi et al. [Bartholdi and Orlin, 1991, Bartholdi et al., 1989] first proposed the idea of using computational hardness as a barrier against manip- ulation. Bartholdi et al. defined and studied the computational problem called manipulation where a set of manipulators have to compute their votes that make their preferred candidate win the election. The manipulators know the votes of the truthful voters and the voting rule that will be used to compute the winner. 2 1. INTRODUCTION Following this, a large body of research [Conitzer et al., 2007, Davies et al., 2011, Dey and Narahari, 2014, Elkind and Erd´elyi, 2012, Elkind and Lipmaa, 2005, Faliszewski et al., 2010, 2013, 2014, Gaspers et al., 2013, Narodytska and Walsh, 2013, Narodytska et al., 2011, Obraztsova and Elkind, 2012, Obraztsova et al., 2011, Xia et al., 2010, 2009, Zuckerman et al., 2011] shows that the manipula- tion problem is in NP-complete (NPC) for many voting rules. However, Procaccia et al. [Procaccia and Rosenschein, 2006, 2007] showed average case easiness of manipulation assuming junta distribution over the voting profiles. Friedgut et al. [Friedgut et al., 2008] showed that any neutral voting rule which is suffi- ciently far from being dictatorial is manipulable with non-negligible probabil- ity at any uniformly random preference profile by a uniformly random prefer- ence. The above result holds for elections with three candidates only. A voting rule is called neutral if the names of the candidates are immaterial. Isaksson et al. [Isaksson et al., 2012] generalize the above result to any number of can- didates. Walsh [Walsh, 2010] empirically shows ease of manipulating an STV (single transferable vote) election -- one of the very few voting rules where ma- nipulation even by one voter is in NPC [Bartholdi and Orlin, 1991]. In addition to the results mentioned above, there exist many other results in the litera- ture that emphasize the weakness of considering computational complexity as a barrier [Conitzer and Sandholm, 2006, Faliszewski and Procaccia, 2010, Walsh, 2011, Xia and Conitzer, 2008b,c]. Hence, the barrier of computational hardness is ineffective against manipulation in many settings. 1.2 Motivation In a situation where multiple attempts for prevention of manipulation fail to provide a fully satisfactory solution, detection of manipulation is a natural next step of research. There have been scenarios where establishing the occurrence of manipulation is straightforward, by observation or hindsight. For example, in sport, there have been occasions where the very structure of the rules of the game have encouraged teams to deliberately lose their matches. Observing such occurrences in, for example, football (the 1982 FIFA World Cup football match played between West Germany and Austria) and badminton (the quarter-final match between South Korea and China in the London 2012 Olympics), the relevant authorities have subsequently either changed the rules of the game (as with football) or disqualified the teams in question (as with the badminiton example). The importance of detecting manipulation lies in the potential for implementing corrective measures in the future. For reasons that will be evident soon, it is not easy to formally define the notion of manipulation detection. Assume that we have the votes from an election that has already happened. A voter is potentially a manipulator if there exists a preference ≻, different from the voter's reported preference, which is such that the voter had an "incentive to deviate" from the former. Specifically, suppose the candidate who wins with respect to this voter's reported preference is preferred (in ≻) over the candidate who wins with respect to ≻. In such a situation, ≻ could potentially be the voter's truthful preference, and the voter could be refraining from being truthful because 3 1. INTRODUCTION an untruthful vote leads to a more favorable outcome with respect to ≻. Note that we do not (and indeed, cannot) conclusively suggest that a particular voter has manipulated an election. This is because the said voter can always claim that she voted truthfully; since her actual preference is only known to her, there is no way to prove or disprove such a claim. Therefore, we are inevitably limited to asking only whether or not a voter has possibly manipulated an election. Despite this technical caveat, it is clear that efficient detection of manipula- tion, even if it is only possible manipulation, is potentially of interest in practice. We believe that, the information whether a certain group of voters have possi- bly manipulated an election or not would be very useful to social planners. For example, the organizers of an event, say London 2012 Olympics, maybe very interested to have this information. Also, in settings where data from many past elections (roughly over a fixed set of voters) is readily available, it is con- ceivable that possible manipulation could serve as suggestive evidence of real manipulation. Aggregate data about possible manipulations, although formally inconclusive, could serve as an important evidence of real manipulation. We re- mark that having a rich history is typically not a problem, particularly for AI related applications, since the data generated from an election is normally kept for future requirements (for instance, for data mining or learning). For exam- ple, several past affirmatives for possible manipulation is one possible way of formalizing the notion of erratic past behavior. Also, applications where benefit of doubt maybe important, for example, elections in judiciary systems, possi- ble manipulation detection seems useful. Thus the computational problem of detecting possible manipulation is of definite interest in this setting. 1.3 Contributions The novelty of this paper is in initiating research on detection of possible ma- nipulators in elections. We formulate four pertinent computational problems in this context: -- CPM: In the coalitional possible manipulators problem, we are interested in whether or not a given subset of voters is a possible coalition of manipulators [Definition 4]. -- CPMW: The coalitional possible manipulators given winner is the CPM problem with the additional information about who the winner would have been if the possible manipulators had all voted truthfully [Definition 2]. -- CPMS, CPMSW: In CPMS (Coalitional Possible Manipulators Search), we want to know, whether there exists any coalition of possible manipulators of a size at most k [Definition 6]. Similarly, we define CPMSW (Coalitional Possible Manipulators Search given Winner ) [Definition 5]. Our specific findings are as follows. -- We show that all the four problems above, for scoring rules and the max- imin voting rule, are in P when the coalition size is one [Theorem 1 and Theorem 4]. 4 2. PRELIMINARIES -- We show that all the four problems, for any coalition size, are in P for a wide class of scoring rules which include the Borda voting rule [Theorem 2, Theorem 3 and Corollary 1]. -- We show that, for the Bucklin voting rule [Theorem 6], both the CPM and CPMW problems are in P. The CPMS and CPMSW problems for the Buck- lin voting rule are also in P, when we have maximum possible coalition size k = O(1). -- We show that both the CPM and the CPMW problems are in NPC for the STV voting rule [Theorem 7 and Corollary 2]. We also prove that the CPMW problem is in NPC for maximin voting rule [Theorem 5]. We observe that all the four problems are computationally easy for many voting rules that we study in this paper. This can be taken as a positive result. The results for the CPM and the CPMW problems are summarized in Table 1. Voting Rule CPM,c = 1 CPM CPMW,c = 1 CPMW Scoring Rules Borda k-approval Maximin Bucklin STV P P P P P ? P P ? P P P P P P ? P P NPC P NPC NPC NPC NPC Table 1. Results for CPM and CPMW (c denotes coalition size). The '?' mark means that the problem is open. This paper is a significant extension of the conference version of this work Dey et al. [2015]: this extended version includes all the proofs. Organization The rest of the paper is organized as follows. We describe the necessary preliminaries in Section 2; we formally define the computational prob- lems in Section 3; we present the results in Section 4 and finally we conclude in Section 5. 2 Preliminaries Let V = {v1, . . . , vn} be the set of all voters and C = {c1, . . . , cm} the set of all candidates. Each voter vi's vote is a preference ≻i over the candidates which is a linear order over C. For example, for two candidates a and b, a ≻i b means that the voter vi prefers a to b. We will use a >i b to denote the fact that 5 3. PROBLEM FORMULATION a ≻i b, a 6= b. We denote the set of all linear orders over C by L(C). Hence, L(C)n denotes the set of all n-voters' preference profile (≻1, · · · , ≻n). We denote the (n − 1)-voters' preference profile by (≻1, · · · , ≻i−1, ≻i+1, · · · , ≻n) by ≻−i. We denote the set {1, 2, 3, . . . } by N+. The power set of C is denoted by 2C, and ∅ denotes the empty set. A map rc : ∪n,C∈N+L(C)n −→ 2C \ {∅} is called a voting correspondence. A map t : ∪C∈N+2C \ {∅} −→ C is called a tie breaking rule. Commonly used tie breaking rules are lexicographic tie breaking rules where ties are broken according to a predetermined preference ≻t∈ L(C). A voting rule is r = t ◦ rc, where ◦ denotes composition of mappings. Given an election E, we can construct a weighted graph GE called weighted majority graph from E. The set of vertices in GE is the set of candidates in E. For any two candidates x and y, the weight on the edge (x, y) is DE(x, y) = NE(x, y) − NE(y, x), where NE(x, y)(respectively NE(y, x)) is the number of voters who prefer x to y (re- spectively y to x). Some examples of common voting correspondences are as follows. -- Positional scoring rules: Given an m-dimensional vector α = (α1, α2, . . . , αm) ∈ Rm with α1 ≥ α2 ≥ · · · ≥ αm and α1 > αm, we can naturally define a voting rule - a candidate gets score αi from a vote if it is placed at the ith position, and the score of a candidate is the sum of the scores it receives from all the votes. The winners are the candidates with maximum score. A scoring rule is called a strict scoring rule if α1 > α2 > · · · > αm. For α = (m − 1, m − 2, . . . , 1, 0), we get the Borda voting rule. With αi = 1 ∀i ≤ k and 0 else, the voting rule we get is known as the k-approval voting rule. The plurality voting rule is the 1-approval voting rule and the veto voting rule is the (m − 1)-approval voting rule. -- Maximin: The maximin score of a candidate x is miny6=xD(x, y). The win- ners are the candidates with maximum maximin score. -- Bucklin: A candidate x's Bucklin score is the minimum number l such that at least half of the voters rank x in their top l positions. The winners are the candidates with lowest Bucklin score. This voting rule is also sometimes referred as the simplified Bucklin voting rule. -- Single Transferable Vote: In Single Transferable Vote (STV), a candidate with least plurality score is dropped out of the election and its votes are transferred to the next preferred candidate. If two or more candidates receive least plurality score, then some predetermined tie breaking rule is used. The candidate that remains after (m − 1) rounds is the winner. 3 Problem Formulation Consider an election that has already happened in which all the votes are known and thus the winner x ∈ C is also known. We call the candidate x the current winner of the election. The authority may suspect that the voters belonging to M ⊂ V have formed a coalition among themselves and manipulated the election by voting non-truthfully. The authority believes that other voters who do not belong to M , have voted truthfully. We denote the coalition size M by c. 6 3. PROBLEM FORMULATION Suppose the authority has auxiliary information, maybe from some other sources, which says that the actual winner should have been some candidate y ∈ C other than x. We call a candidate actual winner if it wins the election where all the voters vote truthfully. This means that the authority thinks that, had the voters in M voted truthfully, the candidate y would have been the winner. We remark that there are practical situations, for example, 1982 FIFA World cup or 2012 London Olympics, where the authority knows the actual winner. This situation is formalized below. Definition 1. Let r be a voting rule, and (≻i)i∈V be a voting profile of a set V of n voters. Let x be the winning candidate with respect to r for this profile. For a candidate y 6= x, M ⊂ V is said to be a coalition of possible manipulators j)j∈M ∈ L(C)M against y with respect to r if there exists a M -voters' profile (≻′ such that x ≻′ j y, ∀j ∈ M , and further, r((≻j )j∈V\M , (≻′ i)i∈M ) = y. Using the notion of coalition of possible manipulators, we formulate a computational problem called Coalitional Possible Manipulators given Winner (CPMW) as follows. Definition 2. (CPMW Problem) Given a voting rule r, a preference profile (≻i)i∈V of a set of voters V over a set of candidates C, a subset of voters M ⊂ V, and a candidate y, determine if M is a coalition of possible manipulators against y with respect to r. In the CPMW problem, the actual winner is given in the input. However, it may very well happen that the authority does not have any other information to guess the actual winner - the candidate who would have won the election had the voters in M voted truthfully. In this situation, the authority is interested in knowing whether there is a M -voter profile which along with the votes in V \ M makes some candidate y ∈ C the winner who is different from the current winner x ∈ C and all the preferences in the M -voters' profile prefer x to y. If such a M -voter profile exists for the subset of voters M , then we call M a coalition of possible manipulators and the corresponding computational problem is called Coalitional Possible Manipulators (CPM). These notions are formalized below. Definition 3. Let r be a voting rule, and (≻i)i∈V be a voting profile of a set V of n voters. A subset of voters M ⊂ V is called a coalition of possible manipula- tors with respect to r if M is a coalition of possible manipulators against some candidate y with respect to r. Definition 4. (CPM Problem) Given a voting rule r, a preference profile (≻i)i∈V of a set of voters V over a set of candidates C, and a subset of voters M ⊂ V, determine if M is a coalition of possible manipulators with respect to r. In both the CPMW and CPM problems, a subset of voters which the au- thority suspect to be a coalition of manipulators, is given in the input. However, there can be situations where there is no specific subset of voters to suspect. In 7 3. PROBLEM FORMULATION those scenarios, it may still be useful to know, what are the possible coalition of manipulators of size less than some number k. Towards that end, we extend the CPMW and CPM problems to search for a coalition of potential possible ma- nipulators and call them Coalitional Possible Manipulators Search given Winner (CPMSW) and Coalitional Possible Manipulators Search (CPMS) respective. Definition 5. (CPMSW Problem) Given a voting rule r, a preference profile (≻i)i∈V of a set of voters V over a set of candidates C, a candidate y, and an integer k, determine whether there exists any M ⊂ V with M ≤ k such that M is a coalition of possible manipulators against y. Definition 6. (CPMS Problem) Given a voting rule r, a preference profile (≻i)i∈V of a set of voters V over a set of candidates C, and an integer k, determine whether there exists any M ⊂ V with M ≤ k such that M is a coalition of possible manipulators. 3.1 Discussion The CPMW problem may look very similar to the manipulation prob- lem [Bartholdi et al., 1989, Conitzer et al., 2007]- in both the problems a set of voters try to make a candidate winner. However, in the CPMW problem, the actual winner must be less preferred to the current winner. Although it may look like a subtle difference, it changes the nature and complexity theoretic behavior of the problem completely. For example, we show that all the four problems have an efficient algorithm for a large class of voting rules that includes the Borda voting rule for which the manipulation problem is in NPC, even when we have at least two manipulators [Betzler et al., 2011, Davies et al., 2011]. Another im- portant difference is that the manipulation problem, in contrast to the problems studied in this paper, does not take care of manipulators' preferences. We believe that there does not exist any formal reduction between the CPMW problem and the manipulation problem. On the other hand, the CPMS problem is similar to the margin of victory problem defined by Xia [Xia, 2012], where also we are looking for changing the current winner by changing at most some k number of votes, which in turn identical to the destructive bribery problem [Faliszewski et al., 2009]. Whereas, in the CPMS problem, the vote changes can occur in a restricted fashion. Here also, the margin of victory problem has the hereditary property which the CPMS problem does not possess. These two problems do not seem to have any obvious complexity theoretic implications. Now, we explore the connections among the four problems that we study here. Notice that, a polynomial time algorithm for the CPM and the CPMW problems gives us a polynomial time algorithm for the CPMS and the CPMSW problems for any maximum possible coalition size k = O(1). Also, observe that, a polynomial time algorithm for the CPMW (respectively CPMSW) problem implies a polynomial time algorithm for the CPM (respectively CPMS) problem. Hence, we have the following propositions. 8 4. RESULTS Proposition 1. For every voting rule, if the maximum possible coalition size k = O(1), then, CP M W ∈ P ⇒ CP M, CP M SW, CP M S ∈ P Proposition 2. For every voting rule, CP M SW ∈ P ⇒ CP M S ∈ P 4 Results In this section, we present our algorithmic results for the CPMW, CPM, CPMSW, and CPMS problems for various voting rules. 4.1 Scoring Rules Below we have certain lemmas which form a crucial ingredient of our algorithms. To begin with, we define the notion of a manipulated preference. Let r be a scoring rule and ≻:= (≻i, ≻−i) be a voting profile of n voters. Let ≻′ i be a preference such that r(≻) >′ i r(≻′ i, ≻−i). Then, we say that ≻′ omit the reference to r if it is clear from the context. i is a (≻, i)-manipulated preference with respect to r. We Lemma 1. Let r be a scoring rule and ≻:= (≻i, ≻−i) be a voting profile of n voters. Let a and b be two candidates such that score≻−i (a) > score≻−i (b), and let ≻′ i be (≻, i)-manipulated preference where a precedes b: ≻′ i:= · · · > a > · · · > b > · · · If a, b are not winners with respect to either (≻′ ≻′′ i obtained from ≻′ i by interchanging a and b is also (≻, i)-manipulated. i, ≻−i) or ≻, then the preference Proof. Let x := r(≻′ proposed profile (≻′′ b with respect to x. First, consider the score of b in the new profile: i, ≻−i). If suffices to show that x continues to win in the i , ≻−i). To this end, it is enough to argue the scores of a and score(≻′′ i ,≻−i)(b) = score≻′′ < score≻′ = score(≻′ ≤ score(≻′ = score(≻′′ i (b) + score≻−i(b) i(a) + score≻−i (a) i,≻−i)(a) i,≻−i)(x) i ,≻−i)(x) (1) i (a) and score≻−i (b) < The second line uses the fact that score≻′′ score≻−i (a). The fourth line comes from the fact that x is the winner and the last line follows from the fact that the position of x is same in both profiles. i (b) = score≻′ 9 4. RESULTS Similarly, we have the following argument for the score of a in the new profile (the second line below simply follows from the definition of scoring rules). score(≻′′ i ,≻−i)(a) = score≻′′ ≤ score≻′ = score(≻′ ≤ score(≻′ = score(≻′′ i (a) + score≻−i (a) i(a) + score≻−i (a) i,≻−i)(a) i,≻−i)(x) i ,≻−i)(x) (2) Since the tie breaking rule is according to some predefined fixed order ≻t∈ L(C) and the candidates tied with winner in (≻′′ i , ≻−i) also tied with winner in (≻′ , ≻−i), we have the following, i r(≻) >′′ i r(≻′′ i , ≻−i) ⊓⊔ We now show that, if there is some (≻, i)-manipulated preference with respect to a scoring rule r, then there exists a (≻, i)-manipulated preference with a specific structure. Lemma 2. Let r be a scoring rule and ≻:= (≻i, ≻−i) be a voting profile of n voters. If there is some (≻, i)-manipulated preference with respect to r, then there also exists a (≻, i)-manipulated preference ≻′ i where the actual winner y immediately follows the current winner x: ≻′ i:= · · · > x > y > · · · and the remaining candidates are in nondecreasing ordered of their scores from ≻−i. Proof. Let ≻′′ be a (≻, i)-manipulated preference with respect to r. Let x := r(≻ ), y := r(≻′′, ≻−i). From Lemma 1, without loss of generality, we may assume that, all candidates except x, y are in nondecreasing order of score≻−i (.) in the preference ≻′′. If ≻′′ i:= · · · ≻ x ≻ y ≻ · · · ≻ · · · from ≻′′ i where y is moved to the position following x and the position of the candidates in between x and y in ≻′′ is deteriorated by one i position each. The position of the rest of the candidates remain same in both ≻′′ i := · · · ≻ x ≻ · · · ≻ y ≻ · · · ≻ · · · , we define ≻′ i. Now we have following, i and ≻′ score(≻′ i,≻−i)(y) = score≻′ ≥ score≻′′ = score(≻′′ i (y) + score≻−i (y) i (y) + score≻−i (y) i ,≻−i)(y) We also have, score(≻′ i,≻−i)(a) ≤ score(≻′′ i ,≻−i)(a), ∀a ∈ C \ {y} (1) (2) 10 4. RESULTS Since the tie breaking rule is according to some predefined order ≻t∈ L(C), we have the following, r(≻) >′ i r(≻′, ≻−i) ⊓⊔ Using Lemmas 1 and 2, we now present the results for the scoring rules. Theorem 1. When c=1, the CPMW, CPM, CPMSW, and CPMS problems for scoring rules are in P. Proof. From Proposition 1, it is enough to give a polynomial time algorithm for the CPMW problem. So consider the CPMW problem. We are given the actual winner y and we compute the current winner x with respect to r. Let ≻[j] be a preference where x and y are in positions j and (j + 1) respectively, and the rest of the candidates are in nondecreasing order of the score that they receive from ≻−i. For j ∈ {1, 2, . . . , m − 1}, we check if y wins with the profile (≻−i, ≻[j]). If we are successful with at least one j we report YES, otherwise we say NO. The correctness follows from Lemma 2. Thus we have a polynomial time algorithm ⊓⊔ for CPMW when c = 1 and the theorem follows from Proposition 1. Now, we study the CPMW and the CPM problems when c > 1. If m = O(1), then both the CPMW and the CPM problems for any anonymous and efficient voting rule r can be solved in polynomial time by iterating over all possible (cid:0)m!+c−1 (cid:1) ways the manipulators can have actual preferences. A voting rule is called efficient if winner determination under it is in P. m! Theorem 2. For scoring rules with α1 − α2 ≤ αi − αi+1, ∀i, the CPMW and the CPM problems are in P. Proof. We provide a polynomial time algorithm for the CPMW problem in this setting. Let x be the current winner and y be the given actual winner. Let M be the given subset of voters. Let ((≻i)i∈M , (≻j)j∈V \M ) be the reported preference profile. Without loss of generality, we assume that x is the most preferred candidate in every ≻i, i ∈ M . Let us define ≻′ i, i ∈ M, by moving y to the second position in the preference ≻i. In the profile ((≻′ i)i∈M , (≻j)j∈V \M ), the winner is either x or y since only y's score has increased. We claim that M is a coalition of possible manipulators with respect to y if and only if y is the winner in preference profile ((≻′ i)i∈M , (≻j)j∈V \M ). This can be seen as follows. Suppose there exist preferences ≻′′ i , with x ≻′′ i y, i ∈ M, for which y wins in the profile ((≻′′ i )i∈M , (≻j)j∈V \M ). Now without loss of generality, we can assume that y immediately follows x in all ≻′′ i , i ∈ M, and α1 − α2 ≤ αi − αi+1, ∀i implies that we can also assume that x and y are in the first and second positions respectively in all ≻′′ i)i∈M , (≻j)j∈V \M ) and ((≻′′ i )i∈M , (≻j)j∈V \M ), the score of x and y are same. But in the first profile ⊓⊔ x wins and in the second profile y wins, which is a contradiction. i , i ∈ M . Now in both the profiles, ((≻′ Theorem 3. For scoring rules with α1 − α2 ≤ αi − αi+1, ∀i, the CPMSW and the CPMS problems are in P. 11 4. RESULTS Proof. From Proposition 2, it is enough to prove that CP M SW ∈ P. Let x be the current winner, y be the given actual winner and s(x) and s(y) be their current respective scores. For each vote v ∈ V, we compute a number ∆(v) = α2 − αj − α1 + αi, where x and y are receiving scores αi and αj respectively from the vote v. Now, we output yes iff there are k votes vi, 1 ≤ i ≤ k such that, Pk i=1 ∆(vi) ≥ s(x) − s(y), which can be checked easily by sorting the ∆(v)'s in nonincreasing order and checking the condition for the first k ∆(v)'s, where k is the maximum possible coalition size specified in the input. The proof of correctness follows by exactly in the same line of argument as the proof of ⊓⊔ Theorem 2. For the plurality voting rule, we can solve all the problems easily using max flow. Hence, from Theorem 2 and Theorem 3, we have the following result. Corollary 1. The CPMW, CPM, CPMSW, and CPMS problems for the Borda and k-approval voting rules are in P. 4.2 Maximin Voting Rule For the maximin voting rule, we show that all the four problems are in P, when we have a coalition size of one to check for. Theorem 4. The CPMW, CPM, CPMSW, and CPMS problems for maximin voting rule are in P for coalition size c = 1 or maximum possible coalition size k = 1. Proof. Given a n-voters' profile ≻∈ L(C)n and a voter vi, let the current winner be x := r(≻) and the given actual winner be y. We will construct ≻′= (≻′ i, ≻−i), if it exists, such that r(≻) >′ i r(≻′) = y, thus deciding whether vi is a possible manipulator or not. Now, the maximin score of x and y in the profile ≻′ can take one of values from the set {score≻−i (x) ± 1} and {score≻−i (y) ± 1}. The algorithm is as follows. We first guess the maximin score of x and y in the profile ≻′. There are only four possible guesses. Suppose, we guessed that x's score will decrease by one and y's score will decrease by one assuming that this guess makes y win. Now notice that, without loss of generality, we can assume that y immediately follows x in the preference ≻′ i since y is the winner in the profile ≻′. This implies that there are only O(m) many possible positions for x and y in ≻′ i. Let B(x) and B(y) be the sets of candidates with whom x and respectively y performs worst. Now since, x's score will decrease and y's score will decrease, we have the following constraint on ≻′ i. There must be a candidate each from B(y) and B(x) that will precede x. We do not know a-priori if there is one candidate that will serve as a witness for both B(x) and B(y), or if there separate witnesses. In the latter situation, we also do not know what order they appear in. Therefore we guess if there is a common candidate, and if not, we guess the relative ordering of the distinct candidates from B(x) and B(y). Now we place any candidate at the top position of ≻′ i if this action does not make y lose the election. If there i. We guess the position of x and thus the position of y in ≻′ 12 4. RESULTS are many choices, we prioritize in favor of candidates from B(x) and B(y) -- in particular, we focus on the candidates common to B(x) and B(y) if we expect to have a common witness, otherwise, we favor a candidate from one of the sets according to the guess we start with. If still there are multiple choices, we pick arbitrarily. After that we move on to the next position, and do the same thing (except we stop prioritizing explicitly for B(x) and B(y) once we have at least one witness from each set). The other situations can be handled similarly with minor modifications. In this way, if it is able to get a complete preference, then it checks whether vi is a possible manipulator or not using this preference. If yes, then it returns YES. Otherwise, it tries other positions for x and y and other possible scores of x and y. After trying all possible guesses, if it cannot find the desired preference, then it outputs NO. Since there are only polynomial many possible guesses, this algorithm runs in a polynomial amount of time. The proof of correctness follows from the proof of Theorem 1 in [Bartholdi et al., 1989]. ⊓⊔ We now show that the CPMW problem for maximin voting rule is in NPC when we have c > 1. Towards that, we use the fact that the unweighted coalitional manipulation (UCM) problem for maximin voting rule is in NPC [Xia et al., 2009], when we have c > 1. The UCM problem is as follows. Definition 7. (UCM Problem) Given a voting rule r, a set of manipulators M ⊂ V, a profile of non- manipulators' vote (≻i)i∈V\M , and a candidate z ∈ C, we are asked whether j)j∈M such that r((≻i)i∈V\M , (≻′ there exists a profile of manipulators' votes (≻′ )j∈M ) = z. Assume that ties are broken in favor of z. j We define a restricted version of the UCM problem called R-UCM as follows. Definition 8. (R-UCM Problem) This problem is the same as the UCM problem with a given guarantee - let c := M . The candidate z loses pairwise election with every other candidate by 4c votes. For any two candidates a, b ∈ C, either a and b ties or one wins pairwise election against the other one by margin of either 2c + 2 or of 4c or of 8c. We denote the margin by which a candidate a defeats b, by d(a, b). The R-UCM problem for maximin voting rule is in NPC [Xia et al., 2009], when we have c > 1. We will need the following lemma to manipulate the pairwise difference scores in the reduction. The lemma has been used before [McGarvey, 1953, Xia and Conitzer, 2008a]. Lemma 3. For any function f : C × C −→ Z, such that 1. ∀a, b ∈ C, f (a, b) = −f (b, a). 2. ∀a, b ∈ C, f (a, b) is even, there exists a n voters' profile such that for all a, b ∈ C, a defeats b with a margin of f (a, b). Moreover, n = O   X {a,b}∈C×C f (a, b)  13 4. RESULTS Theorem 5. The CPMW problem for maximin voting rule is in NPC, for c > 1. Proof. Clearly the CPMW problem for maximin voting rule is in NP. We provide a many-one reduction from the R-UCM problem for the maximin voting rule to it. Given a R-UCM problem instance, we define a CPMW problem instance Γ = (C′, (≻′ i)i∈V ′ , M ′) as follows. C′ := C ∪ {w, d1, d2, d3} We define V ′ such that d(a, b) is the same as the R-UCM instance, for all a, b ∈ C and d(d1, w) = 2c+ 2, d(d1, d2) = 8c, d(d2, d3) = 8c, d(d3, d1) = 8c. The existence of such a V ′ is guaranteed from Lemma 3. Moreover, Lemma 3 also ensures that V ′ is O(mc). The votes of the voters in M is w ≻ . . . . Thus the current winner is w. The actual winner is defined to be z. The tie breaking rule is ≻t= w ≻ z ≻ . . . , where z is the candidate whom the manipulators in M want to make winner in the R-UCM problem instance. Clearly this reduction takes polynomial amount of time. Now we show that, M is a coalition of possible manipulators iff z can be made a winner. The if part is as follows. Let ≻i, i ∈ M be the votes that make z win. We can assume that z is the most preferred candidate in all the preferences ≻i, i ∈ M . Now consider the preferences for the voters in M is follows. ≻′ i:= d1 ≻ d2 ≻ d3 ≻ w ≻i, i ∈ M The score of every candidate in C is not more than z. The score of z is −3c. The score of w is −3c − 2 and the scores of d1, d2, and d3 are less than −3c. Hence, M is a coalition of possible manipulators with the actual preferences ≻′ i:= d1 ≻ d2 ≻ d3 ≻ w ≻i, i ∈ M . i, i ∈ M . Consider the preferences ≻′ The only if part is as follows. Suppose M is a coalition of possible manipula- tors with actual preferences ≻′ i, i ∈ M , but restricted to the set C only. Call them ≻i, i ∈ M . We claim that ≻i, i ∈ M with the votes from V makes z win the election. If not then, there exists a candidate, say a ∈ C, whose score is strictly more than the score of z - this is so because the tie breaking rule is in favor of z. But this contradicts the fact that z wins the election when the voters in M vote ≻′ i, i ∈ M along with the votes from V ′. ⊓⊔ 4.3 Bucklin Voting Rule In this subsection, we design polynomial time algorithms for both the CPMW and the CPM problem for the Bucklin voting rule. Again, we begin by showing that if there are profiles witnessing manipulation, then there exist profiles that do so with some additional structure, which will subsequently be exploited by our algorithm. Lemma 4. Consider a preference profile (≻i)i∈V , where x is the winner with respect to the Bucklin voting rule. Suppose a subset of voters M ⊂ V form a coalition of possible manipulators. Let y be the actual winner. Then there exist preferences (≻′ i)i∈M ), and further: i)i∈M such that y is a Bucklin winner in ((≻i)i∈V\M, (≻′ 14 4. RESULTS 1. y immediately follows x in each ≻′ i. 2. The rank of x in each ≻′ i is in one of the following - first, b(y) − 1, b(y), b(y) + 1, where b(y) be the Bucklin score of y in ((≻i)i∈V\M, (≻′ i)i∈M ). Proof. From Definition 3, y's rank must be worse than x's rank in each ≻′ i. We now exchange the position of y with the candidate which immediately follows x in ≻′ i. This process does not decrease Bucklin score of any candidate except possibly y's, and x's score does not increase. Hence y will continue to win and thus ≻′ i satisfies the first condition. Now to begin with, we assume that ≻′ i satisfies the first condition. If the position of x in ≻′ i is b(y) − 1 or b(y), we do not change it. If x is above b(y) − 1 in ≻′ i, then move x and y at the first and second positions respectively. Similarly if x is below b(y) + 1 in ≻′ i, then move x and y at the b(y) + 1 and b(y) + 2 positions respectively. This process does not decrease score of any candidate except y because the Bucklin score of x is at least b(y). The transformation cannot increase the score y since its position has only been improved. Hence y continues to win and thus ≻′ ⊓⊔ i satisfies the second condition. Lemma 4 leads us to the following theorem. Theorem 6. The CPMW problem and the CPM problems for Bucklin voting rule are in P. Therefore, by Proposition 1, the CPMSW and the CPMS problems are in P when the maximum coalition size k = O(1). Proof. Proposition 1 says that it is enough to prove that the CPMW problem is in P. Let x be the current winner and y be the given actual winner. For any final Bucklin score b(y) of y, there are polynomially many possibilities for the positions of x and y in the profile of ≻i, i ∈ M , since Bucklin voting rule is anonymous. Once the positions of x and y is fixed, we try to fill the top b(y) positions of each ≻′ i - place a candidate in an empty position above b(y) in any ≻′ i if doing so does not make y lose the election. If we are able to successfully fill the top b(y) positions of all ≻′ i for all i ∈ M , then M is a coalition of possible manipulators. If the above process fails for all possible above mentioned positions of x and y and all possible guesses of b(y), then M is not a coalition of possible manipulators. Clearly the above algorithm runs in poly(m,n) time. The proof of correctness is as follows. If the algorithm outputs that M is a coalition of possible manipulators, then it actually has constructed ≻′ i for all i ∈ M with respect to which they form a coalition of possible manipulators. On the other hand, if they form a coalition of possible manipulators, then Lemma 4 ensures that our algorithm explores all the sufficient positions of x and y in ≻′ i for all i ∈ M . Now if M is a possible coalition of manipulators, then the corre- sponding positions for x and y have also been searched. Our greedy algorithm must find it since permuting the candidates except x and z which are ranked above b(y) in ≻′ i cannot stop y to win the election since the Bucklin score of ⊓⊔ other candidates except y is at least b(y). 15 4. RESULTS 4.4 STV Voting Rule Next, we prove that the CPMW and the CPM problems for STV rule is in NPC. To this end, we reduce from the Exact Cover by 3-Sets Problem (X3C), which is known to be in NPC [Garey and Johnson, 1979]. The X3C problem is as follows. Definition 9. (X3C Problem) Given a set S of cardinality n and m subsets S1, S2, . . . , Sm ⊂ S with Si = 3, ∀i = 1, . . . , m, does there exist an index set I ⊆ {1, . . . , m} with I = S 3 such that ∪i∈I Si = S. Theorem 7. The CPM problem for STV rule is in NPC. Proof sketch: It is enough to show the theorem for the case c = 1. Clearly the problem is in NP. To show NP hardness, we show a many-one reduction from the X3C problem to it. The reduction is analogous to the reduction given in [Bartholdi and Orlin, 1991]. Hence, we give a proof sketch only. Given an X3C instance, we construct an election as follows. The unspecified positions can be filled in any arbitrary way. The candidate set is as follows. C = {x, y} ∪ {a1, . . . , am} ∪ {a1, . . . , am} ∪ {b1, . . . , bm} ∪ {b1, . . . , bm} ∪ {d0, . . . , dn} ∪ {g1, . . . , gm} The votes are as follows. 3 votes for d0 ≻ x ≻ y ≻ . . . -- 12m votes for y ≻ x ≻ . . . -- 12m − 1 votes for x ≻ y ≻ . . . -- 10m + 2n -- 12m − 2 votes for di ≻ x ≻ y ≻ . . . , ∀i ∈ [n] -- 12m votes for gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 6m + 4i − 5 votes for bi ≻ bi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 2 votes for bi ≻ dj ≻ x ≻ y ≻ . . . , ∀i ∈ [m], ∀j ∈ Si -- 6m + 4i − 1 votes for bi ≻ bi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 2 votes for bi ≻ d0 ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 6m + 4i − 3 votes for ai ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 1 vote for ai ≻ bi ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 2 votes for ai ≻ ai ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 6m + 4i − 3 votes for ai ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 1 vote for ai ≻ bi ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] -- 2 votes for ai ≻ ai ≻ gi ≻ x ≻ y ≻ . . . , ∀i ∈ [m] The tie breaking rule is ≻t= · · · ≻ x. The vote of v is x ≻ · · · . We claim that v is a possible manipulator iff the X3C is a yes instance. Notice that, of the first 3m candidates to be eliminated, 2m of them are a1, . . . , am and a1, . . . , am. Also exactly one of bi and bi will be eliminated among the first 3m candidates to be eliminated because if one of bi, bi then the other's score exceeds 12m. We show that the winner is either x or y irrespective of the vote of one more candidate. 16 5. CONCLUSION Let J := {j : bj is eliminated before bj}. If J is an index of set cover then the winner is y. This can be seen as follows. Consider the situation after the first 3m eliminations. Let i ∈ Sj for some j ∈ J. Then bj has been eliminated and thus the score of di is at least 12m. Since J is an index of a set cover, every di's score is at least 12m. Notice that bj has been eliminated for all j /∈ J. Thus the revised score of d0 is at least 12m. After the first 3m eliminations, the remaining candidates are x, y, {di : i ∈ [n]}, {gi : i ∈ [m]}, {bj : j /∈ J}, {bj : j ∈ J}. All the remaining candidates except x has score at least 12m and x's score is 12m − 1. Hence x will be eliminated next which makes y's score at least 24m − 1. Next di's will get eliminated which will in turn make y's score (12n + 36)m − 1. At this point gi's score is at most 32m. Also all the remaining bi and bi's score is at most 32m. Since each of the remaining candidate's scores gets transferred to y once they are eliminated, y is the winner. Now we show that, if J is not an index of set cover then the winner is x. This can be seen as follows. If J > n 3 , then the number of bj that gets eliminated in the first 3m iterations is less than m − n 3 . This makes the score of d0 at most 12m − 2. Hence d0 gets eliminated before x and all its scores gets transferred to x. This makes the elimination of x impossible before y and makes x the winner of the election. If J ≤ n 3 and there exists an i ∈ S that is not covered by the corresponding set cover, then di gets eliminated before x with a score of 12m − 2 and its score gets transferred to x. This makes x win the election. Hence y can win iff X3C is a yes instance. Also notice that if y can win the election, then it can do so with the voter v voting a preference like · · · ≻ x ≻ y ≻ · · · . (cid:3) From the proof of the above theorem, we have the following corollary by specifying y as the actual winner for the CPMW problem. Corollary 2. The CPMW problem for STV rule is in NPC. 5 Conclusion In this work, we have initiated a promising research direction for detecting ma- nipulation in elections. We have proposed the notion of possible manipulation and explored several concrete computational problems, which we believe to be important in the context of voting theory. These problems involve identifying if a given set of voters are possible manipulators (with or without a specified candidate winner). We have also studied the search versions of these problems, where the goal is to simply detect the presence of possible manipulation with the maximum coalition size. We believe there is theoretical as well as practical interest in studying the proposed problems. We have provided algorithms and hardness results for many common voting rules. In this work, we considered elections with unweighted voters only. An im- mediate future research direction is to study the complexity of these problems in weighted elections. Further, verifying the number of false manipulators that 17 6. ACKNOWLEDGEMENT this model catches in a real or synthetic data set, where, we already have some knowledge about the manipulators, would be interesting. It is our conviction that both the problems that we have studied here have initiated an interesting research direction with significant promise and potential for future work. 6 Acknowledgement We acknowledge the anonymous reviewers of AAMAS 2014 for providing con- structive comments to improve the paper. 18 Bibliography Bartholdi, J. and Orlin, J. (1991). Single transferable vote resists strategic vot- ing. Social Choice and Welfare (SCW), 8(4):341 -- 354. Bartholdi, J., Tovey, C., and Trick, M. (1989). The computational difficulty of manipulating an election. Social Choice and Welfare (SCW), 6(3):227 -- 241. Betzler, N., Niedermeier, R., and Woeginger, G. J. (2011). Unweighted coali- tional manipulation under the borda rule is NP-hard. In IJCAI, volume 11, pages 55 -- 60. Conitzer, V. and Sandholm, T. (2006). Nonexistence of voting rules that are usu- ally hard to manipulate. In International Conference on Artificial Intelligence (AAAI), volume 6, pages 627 -- 634. Conitzer, V., Sandholm, T., and Lang, J. (2007). When are elections with few candidates hard to manipulate? Journal of the ACM (JACM), 54(3):14. Davies, J., Katsirelos, G., Narodytska, N., and Walsh, T. (2011). Complexity of and algorithms for borda manipulation. In Proceedings of the International Conference on Artificial Intelligence (AAAI), pages 657 -- 662. Dey, P., Misra, N., and Narahari, Y. (2015). Detecting possible manipulators in elections. In Proceeding of the 14th International Conference on Autonomous Systems and Multiagent Systems (AAMAS-15). Dey, P. and Narahari, Y. (2014). Asymptotic collusion-proofness of voting rules: the case of large number of candidates. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 1419 -- 1420. International Foundation for Autonomous Agents and Multiagent Systems. Dwork, C., Kumar, R., Naor, M., and Sivakumar, D. (2001). Rank aggregation methods for the web. In Proceedings of the 10th International Conference on World Wide Web (WWW), pages 613 -- 622. ACM. Elkind, E. and Erd´elyi, G. (2012). Manipulation under voting rule uncertainty. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 627 -- 634. International Foundation for Autonomous Agents and Multiagent Systems. Elkind, E. and Lipmaa, H. (2005). Hybrid voting protocols and hardness of manipulation. In Algorithms and Computation, pages 206 -- 215. Springer. Faliszewski, P., Hemaspaandra, E., and Hemaspaandra, L. A. (2009). How hard is bribery in elections? Journal of Artificial Intelligence Research (JAIR), 35(2):485. Faliszewski, P., Hemaspaandra, E., and Hemaspaandra, L. A. (2010). Using complexity to protect elections. Communications of the ACM, 53(11):74 -- 82. Faliszewski, P., Hemaspaandra, E., and Hemaspaandra, L. A. (2013). Weighted electoral control. In Proceedings of the 12th International Conference on Au- tonomous Agents and Multiagent Systems (AAMAS), pages 367 -- 374. Interna- tional Foundation for Autonomous Agents and Multiagent Systems. BIBLIOGRAPHY BIBLIOGRAPHY Faliszewski, P. and Procaccia, A. D. (2010). Ai's war on manipulation: Are we winning? AI Magazine, 31(4):53 -- 64. Faliszewski, P., Reisch, Y., Rothe, J., and Schend, L. (2014). Complexity of ma- nipulation, bribery, and campaign management in bucklin and fallback voting. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 1357 -- 1358. International Founda- tion for Autonomous Agents and Multiagent Systems. Friedgut, E., Kalai, G., and Nisan, N. (2008). Elections can be manipulated often. In IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 243 -- 249. IEEE. Gaertner, W. (2001). Domain Conditions in Social Choice Theory. Cambridge University Press. Garey, M. R. and Johnson, D. S. (1979). Computers and Intractability, volume 174. freeman New York. Gaspers, S., Kalinowski, T., Narodytska, N., and Walsh, T. (2013). Coali- tional manipulation for schulze's rule. In Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 431 -- 438. International Foundation for Autonomous Agents and Multiagent Systems. Gibbard, A. (1973). Manipulation of voting schemes: a general result. Econo- metrica: Journal of the Econometric Society, pages 587 -- 601. Isaksson, M., Kindler, G., and Mossel, E. (2012). The geometry of manipulation - a quantitative proof of the gibbard-satterthwaite theorem. Combinatorica, 32(2):221 -- 250. Mas-Collel, A., Whinston, M. D., and Green, J. (1995). Microeconomic theory. McGarvey, D. C. (1953). A theorem on the construction of voting paradoxes. Econometrica: Journal of the Econometric Society, pages 608 -- 610. Narodytska, N. and Walsh, T. (2013). Manipulating two stage voting rules. In Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 423 -- 430. International Foundation for Autonomous Agents and Multiagent Systems. Narodytska, N., Walsh, T., and Xia, L. (2011). Manipulation of nanson's and baldwin's rules. In Proceedings of the International Conference on Artificial Intelligence (AAAI), pages 713 -- 718. Obraztsova, S. and Elkind, E. (2012). Optimal manipulation of voting rules. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 619 -- 626. International Foundation for Autonomous Agents and Multiagent Systems. Obraztsova, S., Elkind, E., and Hazon, N. (2011). Ties matter: Complexity of voting manipulation revisited. In The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 71 -- 78. Inter- national Foundation for Autonomous Agents and Multiagent Systems. Pennock, D. M., Horvitz, E., and Giles, C. L. (2000). Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th International Conference on Artificial Intelligence (AAAI). 20 BIBLIOGRAPHY BIBLIOGRAPHY Procaccia, A. and Rosenschein, J. (2006). Junta distributions and the average- case complexity of manipulating elections. In Proceedings of the Fifth Interna- tional Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 497 -- 504. ACM. Procaccia, A. and Rosenschein, J. (2007). Average-case tractability of manipu- lation in voting via the fraction of manipulators. In Proceedings of the 6th In- ternational Conference on Autonomous Agents and Multiagent Systems (AA- MAS), volume 7. Satterthwaite, M. (1975). Strategy-proofness and arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare func- tions. Journal of Economic Theory (JET), 10(2):187 -- 217. Walsh, T. (2010). An empirical study of the manipulability of single trans- ferable voting. In Proceedings of the 19th European Conference on Artificial Intelligence (ECAI), pages 257 -- 262. Walsh, T. (2011). Is computational complexity a barrier to manipulation? Annals of Mathematics and Artificial Intelligence, 62(1-2):7 -- 26. Xia, L. (2012). Computing the margin of victory for various voting rules. In Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pages 982 -- 999. ACM. Xia, L. and Conitzer, V. (2008a). Determining possible and necessary winners under common voting rules given partial orders. In International Conference on Artificial Intelligence (AAAI), volume 8, pages 196 -- 201. Xia, L. and Conitzer, V. (2008b). Generalized scoring rules and the frequency of coalitional manipulability. In Proceedings of the 9th ACM conference on Electronic Commerce (EC), pages 109 -- 118. ACM. Xia, L. and Conitzer, V. (2008c). A sufficient condition for voting rules to In Proceedings of the 9th ACM conference on be frequently manipulable. Electronic Commerce (EC), pages 99 -- 108. ACM. Xia, L., Conitzer, V., and Procaccia, A. D. (2010). A scheduling approach to coalitional manipulation. In Proceedings of the 11th ACM conference on Electronic Commerce (EC), pages 275 -- 284. ACM. Xia, L., Zuckerman, M., Procaccia, A. D., Conitzer, V., and Rosenschein, J. S. (2009). Complexity of unweighted coalitional manipulation under some com- mon voting rules. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI), volume 9, pages 348 -- 353. Zuckerman, M., Lev, O., and Rosenschein, J. S. (2011). An algorithm for the coalitional manipulation problem under maximin. In The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 845 -- 852. International Foundation for Autonomous Agents and Multiagent Systems. 21
0801.0249
1
0801
2007-12-31T23:22:50
A mathematical formalism for agent-based modeling
[ "cs.MA", "cs.DM", "math.CO" ]
Many complex systems can be modeled as multiagent systems in which the constituent entities (agents) interact with each other. The global dynamics of such a system is determined by the nature of the local interactions among the agents. Since it is difficult to formally analyze complex multiagent systems, they are often studied through computer simulations. While computer simulations can be very useful, results obtained through simulations do not formally validate the observed behavior. Thus, there is a need for a mathematical framework which one can use to represent multiagent systems and formally establish their properties. This work contains a brief exposition of some known mathematical frameworks that can model multiagent systems. The focus is on one such framework, namely that of finite dynamical systems. Both, deterministic and stochastic versions of this framework are discussed. The paper contains a sampling of the mathematical results from the literature to show how finite dynamical systems can be used to carry out a rigorous study of the properties of multiagent systems and it is shown how the framework can also serve as a universal model for computation.
cs.MA
cs
A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING REINHARD LAUBENBACHER, ABDUL S. JARRAH, HENNING MORTVEIT, AND S. S. RAVI Abstract. Many complex systems can be modeled as multiagent systems in which the constituent entities (agents) interact with each other. The global dynamics of such a system is determined by the nature of the local interactions among the agents. Since it is difficult to formally analyze complex multiagent systems, they are often studied through computer simulations. While computer simulations can be very useful, results obtained through simulations do not formally validate the observed behavior. Thus, there is a need for a mathematical framework which one can use to represent multiagent systems and formally establish their properties. This work contains a brief exposition of some known mathematical frameworks that can model multiagent systems. The focus is on one such framework, namely that of finite dynamical systems. Both, deterministic and stochastic versions of this framework are discussed. The paper contains a sampling of the mathematical results from the literature to show how finite dynamical systems can be used to carry out a rigorous study of the properties of multiagent systems and it is shown how the framework can also serve as a universal model for computation. Contents Glossary 1. Definition of the sub ject and its importance 2. Introduction 2.1. Examples of Agent-Based Simulations 3. Existing mathematical frameworks 3.1. Cellular Automata 3.2. Hopfield Networks 3.3. Communicating Finite State Machines 4. Finite Dynamical Systems 4.1. Definitions, Background, and Examples 4.2. Stochastic Finite Dynamical Systems 4.3. Agent-based Simulations as Finite Dynamical Systems 5. Finite dynamical systems as theoretical and computational tools 5.1. A Computational View of Finite Dynamical Systems: Definitions 5.2. Configuration Reachability Problem for SDSs 5.3. Turing Machines: A Brief Overview 5.4. How SDSs Can Mimic Turing Machines 5.5. TRANSIMS related questions 6. Mathematical results on finite dynamical systems 6.1. Parallel update systems 6.2. Sequential update systems 6.3. The category of sequential dynamical systems 7. Future directions 8. Bibliography Primary Litreture Books and Reviews 1 2 2 3 4 6 6 7 7 8 8 10 11 12 12 12 13 13 14 14 15 16 18 19 19 19 23 2 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI Glossary Agent-based simulation. An agent-based simulation of a complex system is a computer model that consists of a collection of agents/variables that can take on a typically finite collection of states. The state of an agent at a given point in time is determined through a collection of rules that describe the agent’s interaction with other agents. These rules may be deterministic or stochastic. The agent’s state depends on the agent’s previous state and the state of a collection of other agents with whom it interacts. Mathematical framework. A mathematical framework for agent-based simulation consists of a collection of mathematical ob jects that are considered mathematical abstractions of agent-based simulations. This collection of ob jects should be general enough to capture the key features of most simulations, yet specific enough to allow the development of a mathematical theory with meaningful results and algorithms. Finite dynamical system. A finite dynamical system is a time-discrete dynamical system on a finite state set. That is, it is a mapping from a cartesian product of finitely many copies of a finite set to itself. This finite set is often considered to be a field. Dynamics is generated by iteration of the mapping. 1. Definition of the subject and its importance Agent-based simulations are generative or computational approaches used for analyzing “complex systems.” What is a “system?” Examples of systems include a collection of molecules in a container, the population in an urban area, and the brokers in a stock market. The entities or agents in these three systems would be molecules, individuals and stock brokers, respectively. The agents in such systems interact in the sense that molecules collide, individuals come into contact with other individuals and brokers trade shares. Such systems, often called multiagent systems, are not necessarily complex. The label “complex” is typically attached to a system if the number of agents is large, if the agent interactions are involved, or if there is a large degree of heterogeneity in agent character or their interactions. This is of course not an attempt to define a complex system. Currently there is no generally agreed upon definition of complex systems. It is not the goal of this article to provide such a definition – for our purposes it will be sufficient to think of a complex system as a collection of agents interacting in some manner that involves one or more of the complexity components just mentioned, that is, with a large number of agents, heterogeneity in agent character and interactions and possibly stochastic aspects to all these parts. The global properties of complex systems, such as their global dynamics, emerge from the totality of local interactions between individual agents over time. While these local interactions are well understood in many cases, little is known about the emerging global behavior. Thus, it is typically difficult to construct global mathematical models such as systems of ordinary or partial differential equations, whose properties one could then analyze. Agent-based simulations are one way to create computational models of complex systems that take their place. An agent-based simulation, sometimes also called an individual-based or interaction-based sim- ulation (which we prefer), of a complex system is in essence a computer program that realizes some (possibly approximate) model of the system to be studied, incorporating the agents and their rules of interaction. The simulation might be deterministic (i.e., the evolution of agent-states is governed by deterministic rules) or stochastic. The typical way in which such simulations are used is to initialize the computer program with a particular assignment of agent states and to run it for some time. The output is a temporal sequence of states for all agents, which is then used to draw conclusions about the complex system one is trying to understand. In other words, the computer A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 3 program is the model of the complex system, and by running the program repeatedly, one expects to obtain an understanding of the characteristics of the complex system. There are two main drawbacks to this approach. First, it is difficult to validate the model. Simulations for most systems involve quite complex software constructs that pose challenges to code validation. Second, there are essentially no rigorous tools available for an analysis of model properties and dynamics. There is also no widely applicable formalism for the comparison of models. For instance, if one agent-based simulation is a simplification of another, then one would like to be able to relate their dynamics in a rigorous fashion. We are currently lacking a mathematically rich formal framework that models agent-based simulations. This framework should have at its core a class of mathematical ob jects to which one can map agent-based simulations. The ob jects should have a sufficiently general mathematical structure to capture key features of agent-based simulations and, at the same time, should be rich enough to allow the derivation of substantial mathematical results. This chapter presents one such framework, namely the class of time-discrete dynamical systems over finite state sets. The building blocks of these systems consist of a collection of variables (mapping to agents), a dependency graph that captures the dependence relations of agents on other agents, a local update function for each agent that encapsulates the rules by which the state of each agent evolves over time, and an update discipline for the variables (e.g. parallel or sequential). We will show that this class of mathematical ob jects is appropriate for the representation of agent-based simulations and, therefore, complex systems, and is rich enough to pose and answer relevant mathematical questions. This class is sufficiently rich to be of mathematical interest in its own right and much work remains to be done in studying it. We also remark that many other frameworks such as probabilistic Boolean networks [80] fit inside the framework described here. 2. Introduction Computer simulations have become an integral part of today’s research and analysis methodolo- gies. The ever-increasing demands arising from the complexity and sheer size of the phenomena studied constantly push computational boundaries, challenge existing computational methodolo- gies, and motivate the development of new theories to improve our understanding of the potential and limitations of computer simulation. Interaction-based simulations are being used to simulate a variety of biological systems such as ecosystems and the immune system, social systems such as urban populations and markets, and infrastructure systems such as communication networks and power grids. To model or describe a given system, one typically has several choices in the construction and design of agent-based models and representations. When agents are chosen to be simple, the simulation may not capture the behavior of the real system. On the other hand, the use of highly sophisticated agents can quickly lead to complex behavior and dynamics. Also, use of sophisticated agents may lead to a system that scales poorly. That is, a linear increase in the number of agents in the system may require a non-linear (e.g., quadratic, cubic, or exponential) increase in the computational resources needed for the simulation. Two common methods, namely discrete event simulation and time-stepped simulation, are often used to implement agent-based models [1; 45; 67]. In the discrete event simulation method, each event that occurs in the system is assigned a time of occurrence. The collection of events is kept in increasing order of their occurrence times. (Note that an event occurring at a certain time may give rise to events which occur later.) When all the events that occur at a particular time instant have been carried out, the simulation clock is advanced to the next time instant in the order. Thus, the differences between successive values of the simulation clock may not be uniform. Discrete event simulation is typically used in contexts such as queuing systems [58]. In the time-stepped method of simulation, the simulation clock is always advanced by the same amount. For each value of the simulation clock, the states of the system components are computed using equations that 4 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI model the system. This method of simulation is commonly used for studying, e.g., fluid flows or chemical reactions. The choice of model (discrete event versus time-stepped) is typically guided by an analysis of the computational speed they can offer, which in turn depends on the nature of the system being modeled, see, e.g., [37]. Tool-kits for general purpose agent-based simulations include Swarm [29; 57] and Repast [68]. Such tool-kits allow one to specify more complex agents and interactions than would be possible using, e.g., ordinary differential equations models. In general, it is difficult to develop a software package that is capable of supporting the simulation of a wide variety of physical, biological, and social systems. Standard or classical approaches to modeling are often based on continuous techniques and frame- works such as ordinary differential equations (ODEs) and partial differential equations (PDEs). For example, there are PDE based models for studying traffic flow [38; 47; 85]. These can accurately model the emergence of traffic jams for simple road/intersection configurations through, for exam- ple, the formation of shocks. However, these models fail to scale to the size and the specifications required to accurately represent large urban areas. Even if they hypothetically were to scale to the required size, the answers they provide (e.g. car density on a road as a function of position and time) cannot answer questions pertaining to specific travelers or cars. Questions of this type can be naturally described and answered through agent-based models. An example of such a system is TRANSIMS (see Section 2.1.1), where an agent-based simulation scheme is implemented through a cellular automaton model. Another well-known example of the change in modeling paradigms from continuous to discrete is given by lattice gas automata [32] in the context of fluid dynamics. Stochastic elements are inherent in many systems, and this usually is reflected in the resulting models used to describe them. A stochastic framework is a natural approach in the modeling of, for example, noise over a channel in a simulation of telecommunication networks [8]. In an economic market or a game theoretic setting with competing players, a player may sometimes decide to provide incorrect information. The state of such a player may therefore be viewed and modeled by a random variable. A player may make certain probabilistic assumptions about other players’ environment. In biological systems, certain features and properties may only be known up to the level of probability distributions. It is only natural to incorporate this stochasticity into models of such systems. Since applications of stochastic discrete models are common, it is desirable to obtain a better understanding of these simulations both from an application point of view (reliability, validation) and from a mathematical point of view. However, an important disadvantage of agent-based models is that there are few mathematical tools available at this time for the analysis of their dynamics. 2.1. Examples of Agent-Based Simulations. In order to provide the reader with some concrete examples that can also be used later on to illustrate theoretical concepts we describe here three examples of agent-based descriptions of complex systems, ranging from traffic networks to the immune system and voting schemes. 2.1.1. TRANSIMS ( TRansportation ANalysis SIMulation System). TRANSIMS is a large-scale computer simulation of traffic on a road network [63; 66; 76]. The simulation works at the resolution level of individual travelers, and has been used to study large US metropolitan areas such as Portland,OR, Washington D.C. and Dallas/Fort Worth. A TRANSIMS-based analysis of an urban area requires (i) a population, (ii) a location-based activity plan for each individual for the duration of the analysis period and (iii) a network representation of all transportation pathways of the given area. The data required for (i) and (ii) are generated based on, e.g., extensive surveys and other information sources. The network representation is typically very close to a complete description of the real transportation network of the given urban area. TRANSIMS consists of two main modules: the router and the cellular automaton based micro- simulator. The router maps each activity plan for each individual (obtained typically from activity A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 5 surveys) into a travel route. The micro-simulator executes the travel routes and sends each indi- vidual through the transportation network so that its activity plan is carried out. This is done in such a way that all constraints imposed on individuals from traffic driving rules, road signals, fellow travelers, and public transportation schedules are respected. The time scale is typically 1 second. The micro-simulator is the part of TRANSIMS responsible for the detailed traffic dynamics. Its implementation is based on cel lular automata which are described in more detail in Section 3.1. Here, for simplicity, we focus on the situation where each individual travels by car. The road network representation is in terms of links (e.g. road segments) and nodes (e.g. intersections). The network description is turned into a cell-network description by discretizing each lane of every link into cells. A cell corresponds to a 7.5 meter lane segment, and can have up to four neighbor cells (front, back, left and right). The vehicle dynamics is specified as follows. Vehicles travel with discrete velocities 0, 1, 2, 3, 4 or 5 which are constant between time steps. Each update time step brings the simulation one time unit forward. If the time unit is one second then the maximum speed of vmax = 5 cells per time unit corresponds to an actual speed of 5 × 7.5 m/s = 37.5 m/s which is 135 kmh or approximately 83.9 mph. Ignoring intersection dynamics, the micro-simulator executes three functions for each vehicle in every update: (a) lane-changing, (b) acceleration and (c) movement. These functions can be implemented through four cellular automata, one each for lane change decision and execution, one for acceleration and one for movement. For instance, the acceleration automaton works as follows. A vehicle in TRANSIMS can increase its speed by at most 1 cell per second, but if the road ahead is blocked, the vehicle can come to a complete stop in the same time. The function that is applied to each cell that has a car in it uses the gap ahead and the maximal speed to determine if the car will increase or decrease its velocity. Additionally, a car may have its velocity decreased one unit as determined by a certain deceleration probability. The random deceleration is an important element of producing realistic traffic flow. A ma jor advantage of this representation is that it leads to very light-weight agents, a feature that is critical for achieving efficient scaling. 2.1.2. CImmSim. Next we discuss an interaction-based simulation that models certain aspects of the human immune system. Comprised of a large number of interacting cells whose motion is constrained by the body’s anatomy, the immune system lends itself very well to agent-based sim- ulation. In particular, these models can take into account three-dimensional anatomical variations as well as small-scale variability in cell distributions. For instance, while the number of T-cells in the human body is astronomical, the number of antigen-specific T-cells, for a specific antigen, can be quite small, thereby creating many spatial inhomogeneities. Also, little is known about the global structure of the system to be modeled. The first discrete model to incorporate a useful level of complexity was ImmSim [22; 23], devel- oped by Seiden and Celada as a stochastic cellular automaton. The system includes B-cells, T-cells, antigen presenting cells (APCs), antibodies, antigens, and antibody-antigen complexes. Receptors on cells are represented by bit strings, and antibodies use bit strings to represent their epitopes and peptides. Specificity and affinity are defined by using bit string similarity. The bit string approach was initially introduced in [31]. The model is implemented on a regular two-dimensional grid, which can be thought of as a slice of a lymph node, for instance. It has been used to study var- ious phenomena, including the optimal number of human leukocyte antigens in human beings [22], the autoimmunity and T-lymphocyte selection in the thymus [60], antibody selection and hyper- mutation [24], and the dependence of the selection and maturation of the immune response on the antigen-to-receptor’s affinity [15]. The computational limitations of the Seiden-Celada model have been overcome by a modified model, CimmSim [20], implemented on a parallel architecture. Its complexity is several orders of magnitude larger than that of its predecessor. It has been used to model hypersensitivity to chemotherapy [19] and the selection of escape mutants from immune 6 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI recognition during HIV infection [14]. In [21] the CimmSim framework was applied to the study of mechanisms that contribute to the persistence of infection with the Epstein-Barr virus. 2.1.3. A Voting Game. The following example describes a hypothetical voting scheme. The voting system is constructed from a collection of voters. For simplicity, it is assumed that only two candidates, represented by 0 and 1, contest in the election. There are N voters represented by the set {v1 , v2 , . . . , vN }. Each voter has a candidate preference or a state. We denote the state of voter vi by xi . Moreover, each voter knows the preferences or states of some of his or her friends (fellow voters). This friendship relation is captured by the dependency graph which we describe later in Section 4.1. Starting from an initial configuration of preferences, the voters cast their votes in some order. The candidate that receives the most votes is the winner. A number of rules can be formulated to decide how each voter chooses a candidate. We will provide examples of such rules later, and as will be seen, the outcome of the election is governed by the order in which the votes are cast as well as the structure of the dependency graph. 3. Existing mathematical frameworks The field of agent-based simulation currently places heavy emphasis on implementation and computation rather than on the derivation of formal results. Computation is no doubt a very useful way to discover potentially interesting behavior and phenomena. However, unless the simulation has been set up very carefully, its outcome does not formally validate or guarantee the observed phenomenon. It could simply be caused by an artifact of the system model, an implementation error, or some other uncertainty. A first step in a theory of agent-based simulation is the introduction of a formal framework that on the one hand is precise and computationally powerful, and, on the other hand, is natural in the sense that it can be used to effectively describe large classes of both deterministic and stochastic systems. Apart from providing a common basis and a language for describing the model using a sound formalism, such a framework has many advantages. At a first level, it helps to clarify the key structure in a system. Domain specific knowledge is crucial to deriving good models of complex systems, but domain specificity is often confounded by domain conventions and terminology that eventually obfuscate the real structure. A formal, context independent framework also makes it easier to take advantage of existing general theory and algorithms. Having a model formulated in such a framework also makes it easier to establish results. Additionally, expressing the model using a general framework is more likely to produce results that are widely applicable. This type of framework also supports implementation and validation. Modeling languages like UML [16] serve a similar purpose, but tend to focus solely on software implementation and validation issues, and very little on mathematical or computational analysis. 3.1. Cellular Automata. In this section we discuss several existing frameworks for describing agent-based simulations. Cellular automata (CA) were introduced by Ulam and von Neumann [84] as biologically motivated models of computation. Early research addressed questions about the computational power of these devices. Since then their properties have been studied in the context of dynamical systems [40], language theory [52], and ergodic theory [51] to mention just a few areas. Cellular automata were popularized by Conway [35] (Game of Life) and by Wolfram [55; 86; 88]. Cellular automata (both deterministic and stochastic) have been used as models for phenomena ranging from lattice gases [32] and flows in porous media [77] to traffic analysis [33; 64; 65]. A cellular automaton is typically defined over a regular grid. An example is a two-dimensional grid such as Z2 . Each grid point (i, j ) is referred to as a site or node. Each site has a state xi,j (t) which is often taken to be binary. Here t denotes the time step. Furthermore, there is a notion of a neighborhood for each site. The neighborhood N of a site is the collection of sites that can A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 7 influence the future state of the given site. Based on its current state xi,j (t) and the current states of the sites in its neighborhood N , a function fi,j is used to compute the next state xi,j (t + 1) of the site (i, j ). Specifically, we have (3.1) xi,j (t + 1) = fi,j ( ¯xi,j (t)) , where ¯xi,j (t) denotes the tuple consisting of all the states xi′ ,j ′ (t) with (i′ , j ′ ) ∈ N . The tuple consisting of the states of all the sites is the CA configuration and is denoted x(t) = (xi,j (t))i,j . Equation (3.1) is used to map the configuration x(t) to x(t + 1). The cellular automaton map or dynamical system, is the map Φ that sends x(t) to x(t + 1). A central part of CA research is to understand how configurations evolve under iteration of the map Φ and what types of dynamical behavior can be generated. A general introduction to CA can be found in [43]. 3.2. Hopfield Networks. Hopfield networks were proposed as a simple model of associative mem- ories [42]. A discrete Hopfield neural network consists of an undirected graph Y (V , E ). At any time t, each node vi ∈ V has a state xi (t) ∈ {+1, −1}. Further, each node vi ∈ V has an associated threshold τi ∈ R. Each edge {vi , vj } ∈ E has an associated weight wi,j ∈ R. For each node vi , the neighborhood Ni of vi includes vi and the set of nodes that are adjacent to vi in Y . Formally, Ni = {vi} ∪ {vj ∈ V : {vi , vj } ∈ E }. States of nodes are updated as follows. At time t, node vi computes the function fi defined by wi,j xj (t) fi (t) = sgn  −τi + Xvj ∈Ni  , where sgn is the map from R to {+1, −1}, defined by sgn(x) = (cid:26) 1, if x ≥ 0 and −1 otherwise. Now, the state of vi at time t + 1 is xi (t + 1) = fi (t). Many references on Hopfield networks (see for example [42; 78]) assume that the underlying undirected graph is complete; that is, there is an edge between every pair of nodes. In the definition presented above, the graph need not be complete. However, this does not cause any difficulties since the missing edges can be assigned weight 0. As a consequence, such edges will not play any role in determining the dynamics of the system. Both synchronous and asynchronous update models of Hopfield neural networks have been considered in the literature. For theoretical results concerning Hopfield networks see [69; 70] and the references cited therein. Reference [78] presents a number of applications of neural networks. In [54], a Hopfield model is used to study polarization in dynamic networks. 3.3. Communicating Finite State Machines. The model of communicating finite state ma- chines (CFSM) was proposed to analyze protocols used in computer networks. In some of the literature, this model is also referred to as “concurrent transition systems” [36]. In the CFSM model, each agent is a process executing on some node of a distributed computing system. Although there are minor differences among the various CFSM models proposed in the literature [17; 36], the basic set-up models each process as a finite state machine (FSM). Thus, each agent is in a certain state at any time instant t. For each pair of agents, there is a bidirectional channel through which they can communicate. The state of an agent at time t+1 is a function of the current state and the input (if any) on one or more of the channels. When an agent (FSM) undergoes a transition from one state to another, it may also choose to send a message to another agent or receive a message from an agent. In general, such systems can be synchronous or asynchronous. 8 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI As can be seen, CFSMs are a natural formalism for studying protocols used in computer networks. The CFSM model has been used extensively to prove properties (e.g. deadlock freedom, fairness) of a number of protocols used in practice (see [17; 36] and the references cited therein). Other frameworks include interacting particle systems [50], and Petri nets [59]. There is a vast literature on both, but space limitations prevent a discussion here. 4. Finite Dynamical Systems Another, quite general, modeling framework that has been proposed is that of finite dynamical systems, both synchronous and asynchronous. Here the proposed mathematical ob ject representing an agent-based simulation is a time-discrete dynamical system on a finite state set. The description of the systems is modeled after the key components of an agent-based simulation, namely agents, the dependency graph, local update functions, and an update order. This makes a mapping to agent- based simulations natural. In the remainder of this chapter we will show that finite dynamical systems satisfy our criteria for a good mathematical framework in that they are general enough to serve as a broad computing tool and mathematically rich enough to allow the derivation of formal results. 4.1. Definitions, Background, and Examples. Let x1 , . . . , xn be a collection of variables, which take values in a finite set X . (As will be seen, the variables represent the entities in the system being modeled and the elements of X represent their states.) Each variable xi has associated to it a “local update function” fi : X n −→ X , where “local” refers to the fact that fi takes inputs from the variables in the “neighborhood” of xi , in a sense to be made precise below. By abuse of notation we also let fi denote the function X n −→ X n which changes the i-th coordinate and leaves the other coordinates unchanged. This allows for the sequential composition of the local update functions. These functions assemble to a dynamical system Φ = (f1 , . . . , fn ) : X n −→ X n , with the dynamics generated by iteration of Φ. As an example, if X = {0, 1} with the standard Boolean operators AND and OR, then Φ is a Boolean network. The assembly of Φ from the local functions fi can be done in one of several ways. One can update each of the variables simultaneously, that is, Φ(x1 , . . . , xn ) = (f1 (x1 , . . . , xn ), . . . , fn(x1 , . . . , xn )) . In this case one obtains a paral lel dynamical system. Alternatively, one can choose to update the states of the variables according to some fixed update order, for example, a permutation or a word on the set {1, . . . , n}. That is, let π = (π1 , . . . , πt ) be a word using the alphabet {1, . . . , n}. The function (4.1) Φπ = fπt ◦ fπn−1 ◦ · · · ◦ fπ1 , is called a sequential dynamical system (SDS) and, as before, the dynamics of Φπ is generated by iteration. The case when π is a permutation on {1, . . . , n} has been studied extensively [9; 10; 11; 12]. It is clear that using a different permutation γ may result in a different dynamical system Φγ . Remark 4.1. Notice that for a fixed π , the function Φπ is a parallel dynamical system: once the update order π is chosen and the local update functions are composed according to π , that is, the function Φπ has been computed, then Φπ (x1 , . . . , xn ) = g(x1 , . . . , xn ) where g is a parallel update dynamical system. However, the maps gi are not local functions. The dynamics of Φ is usually represented as a directed graph on the vertex set X n , called the phase space of Φ. There is a directed edge from v ∈ X n to w ∈ X n if and only if Φ(v) = w. A second graph that is usually associated with a finite dynamical system is its dependency graph Y (V , E ). In general, this is a directed graph, and its vertex set is V = {1, . . . , n}. There is a A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 9 directed edge from i to j if and only if xi appears in the function fj . In many situations, the interaction relationship between pairs of variables is symmetric; that is, variable xi appears in fj if and only if xj appears in fi . In such cases, the dependency graph can be thought of as an undirected graph. We recall that the dependency graphs mentioned in the context of the voting game (Section 2.1.3) and Hopfield networks (Section 3.2) are undirected graphs. The dependency graph plays an important role in the study of finite dynamical systems and is sometimes listed explicitly as part of the specification of Φ. Example 4.2. Let X = {0, 1}. Suppose we have four variables and the local Boolean update functions are f1 = x1 + x2 + x3 + x4 , f2 = x1 + x2 , f3 = x1 + x3 , f4 = x1 + x4 , where “+” represents XOR, the exclusive OR function. The dynamics of the function Φ = (f1 , . . . , f4 ) : X 4 −→ X 4 is the directed graph on the left in Figure 1 while the dependency graph is on the right. 0 1 1 1 1 0 0 0 0 0 0 1 1 1 1 0 0 0 1 0 1 1 0 1 0 1 0 0 1 0 1 1 1 1 1 1 1 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 0 1 1 0 0 1 0 1 0 0 1 1 x1 x3 x2 x4 Figure 1. The phase space of the parallel system Φ is on the left and dependency graph of the Boolean function from Example 4.2 is on the right. Example 4.3. Consider the local functions in the Example 4.2 above and let π = (2, 1, 3, 4). Then Φπ = f4 ◦ f3 ◦ f1 ◦ f2 : X 4 −→ X 4 . The phase space of Φπ is the directed graph on the left in Figure 2, while the phase space of Φγ , where γ = id is on the right in Figure 2. 0 0 0 0 0 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 0 1 1 1 0 0 0 0 0 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 0 1 1 1 1 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0 1 1 1 0 1 1 0 1 1 0 1 1 1 0 0 0 1 1 0 1 1 1 1 0 1 0 0 0 1 0 1 1 1 0 0 1 1 0 1 0 1 1 0 0 1 1 1 1 Figure 2. The phase spaces from Example 4.3: Φπ (left) and Φid (right) Notice that the phase space of any function is a directed graph in which every vertex has out- degree one; this is a characteristic property of deterministic functions. Making use of Boolean arithmetic is a powerful tool in studying Boolean networks, which is not available in general. In order to have available an enhanced set of tools it is often natural to make an additional assumption regarding X , namely that it is a finite number system, a finite field [49]. This amounts to the assumption that there are “addition” and “multiplication” operations defined 10 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI on X that satisfy the same rules as ordinary addition and multiplication of numbers. Examples include Zp , the integers modulo a prime p. This assumption can be thought of as the discrete analog of imposing a coordinate system on an affine space. When the set X is a finite field, it is easy to show that for any local function g , there exists a polynomial h such that g(x1 , . . . , xn ) = h(x1 , . . . , xn ) for all (x1 , . . . , xn ) ∈ X n . To be precise, suppose X is a finite field with q elements. Then n Yi=1 g(x1 , . . . , xn ) = X(c1 ,...,cn )∈X n (1 − (xi − ci )q−1 ). This observation has many useful consequences, since polynomial functions have been studied extensively and many analytical tools are available. Notice that cellular automata and Boolean networks, both parallel and sequential, are special classes of polynomial dynamical systems. In fact, it is straightforward to see that g(c1 , . . . , cn ) (4.2) (4.3) x ∧ y = x · y , x ∨ y = x + y + xy and ¬x = x + 1. Therefore, the modeling framework of finite dynamical systems includes that of cellular automata, discussed earlier. Also, since a Hopfield network is a function X n −→ X n , which can be represented through its local constituent functions, it follows that Hopfield networks also are special cases of finite dynamical systems. 4.2. Stochastic Finite Dynamical Systems. The deterministic framework of finite dynamical systems can be made stochastic in several different ways, making one or more of the system’s defining data stochastic. For example, one could use one or both of the following criteria. Assume that each variable has a nonempty set of local functions assigned to it, together with a probability distribution on this set, and each time a variable is updated, one of these local functions is chosen at random to update its state. We call such systems probabilistic finite dynamical systems (PFDS), a generalization of probabilistic Boolean networks [81]. Fix a subset of permutations T ⊆ Sn together with a probability distribution. When it is time for the system to update its state, a permutation π ∈ T is chosen at random and the agents are updated sequentially using π . We call such systems stochastic finite dynamical systems (SFDS). Remark 4.4. By Remark 4.1, each system Φπ is a parallel system. Hence a SFDS is nothing but a set of parallel dynamical systems {Φπ : π ∈ T }, together with a probability distribution. When it is time for the system to update its state, a system Φπ is chosen at random and used for the next iteration. To describe the phase space of a stochastic finite dynamical system, a general method is as follows. Let Ω be a finite collection of systems Φ1 , . . . , Φt , where Φi : X n −→ X n for all i, and consider the probabilities p1 , . . . , pt which sum to 1. We obtain the stochastic phase space (4.4) ΓΩ = p1Γ1 + p2Γ2 + · · · + ptΓt , where Γi is the phase space of Φi . The associated probability space is F = (Ω, 2Ω , µ), where the probability measure µ is induced by the probabilities pi . It is clear that the stochastic phase space can be viewed as a Markov chain over the state space X n . The adjacency matrix of ΓΩ directly encodes the Markov transition matrix. This is of course not new, and has been done in, e.g.,[28 ; 81; 83]. But we emphasize the point that even though SFDS give rise to Markov chains our study of SFDS is greatly facilitated by the rich additional structure available in these systems. To understand the effect of structural components such as the topology of the dependency graph or the stochastic nature of the update, it is important to study them not as Markov chains but as SFDS. A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 11 Example 4.5. Consider Φπ and Φγ from Example 4.3 and let Γπ and Γγ be their phases spaces as 1 1 1 Γγ of the stochastic sequential Γπ + . The phase space shown in Figure 2. Let p1 = p2 = 2 2 2 dynamical system obtained from Φπ and Φγ (with equal probabilities) is presented in Figure 3. 0001 1101 1010 1110 1001 0010 0110 0101 0011 0000 0100 1000 1111 1011 1100 0111 Figure 3. The stochastic phase space for Example 4.5 induced by the two deter- ministic phase spaces of Φπ and Φγ from Figure 2. For simplicity the weights of the edges have been omitted. 4.3. Agent-based Simulations as Finite Dynamical Systems. In the following we describe the generic structure of the systems typically modeled and studied through agent-based simulations. The central notion is naturally that of an agent. Each agent carries a state that may encode its preferences, internal configuration, perception of its environment, and so on. In the case of TRANSIMS, for instance, the agents are the cells making up the road network. The cell state contains information about whether or not the cell is occupied by a vehicle as well as the velocity of the vehicle. One may assume that each cell takes on states from the same set of possible states, which may be chosen to support the structure of a finite field. The agents interact with each other, but typically an agent only interacts with a small subset of agents, its neighbors. Through such an interaction an agent may decide to change its state based on the states (or other aspects) of the agents with which it interacts. We will refer to the process where an agent modifies its state through interaction as an agent update. The precise way in which an agent modifies its state is governed by the nature of the particular agent. In TRANSIMS the neighbors of a cell are the adjacent road network cells. From this adjacency relation one obtains a dependency graph of the agents. The local update function for a given agent can be obtained from the rules governing traffic flow between cells. The updates of all the agents may be scheduled in different ways. Classical approaches include synchronous, asynchronous and event-driven schemes. The choice will depend on system properties or particular considerations about the simulation implementation. In the case of CImmSim, the situation is somewhat more complicated. Here the agents are also the spatial units of the system, each representing a small volume of lymph tissue. The total volume is represented as a 2-dimensional CA, in which every agent has 4 neighbors, so that the dependency graph is a regular 2-dimensional grid. The state of each agent is a collection of counts for the various immune cells and pathogens that are present in this particular agent (volume). Movement between cells is implemented as diffusion. Immune cells can interact with each other and with pathogens while they reside in the same volume. Thus, the local update function for a given cell of the simulation is made up of the two components of movement between cells and interactions within a cell. For instance, a B cell could interact with the Epstein-Barr virus in a given volume and transition from uninfected to infected by the next time step. Interactions as well as movement are stochastic, resulting in a stochastic finite dynamical system. The update order is parallel. Example 4.6 (The voting game (Section 2.1.3)). The following scenario is constructed to illustrate how implementation choices for the system components have a clear and direct bearing on the dynamics and simulation outcomes. 12 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI Let the voter dependency graph be the star graph on 5 vertices with center vertex a and sur- rounding vertices b, c, d and e. Furthermore, assume that everybody votes opportunistically using the ma jority rule: the vote cast by an individual is equal to the preference of the ma jority of his/her friends with the person’s own preference included. For simplicity, assume candidate 1 is preferred in the case of a tie. If the initial preference is xa = 1 and xb = xc = xd = xe = 0 then if voter a goes first he/she will vote for candidate 0 since that is the choice of the ma jority of the neighbor voters. However, if b and c go first they only know a’s preference. Voter b therefore casts his/her vote for candidate 1 as does c. Note that this is a tie situation with an equal number of preferences for candidate 1 (a) and for candidate 2 (b). If voter a goes next, then the situation has changed: the preference of b and c has already changed to 1. Consequently, voter a picks candidate 1. At the end of the day candidate 1 is the election winner, and the choice of update order has tipped the election! This example is of course constructed to illustrate our point. However, in real systems it can be much more difficult to detect the presence of such sensitivities and their implications. A solid mathematical framework can be very helpful in detecting such effects. 5. Finite dynamical systems as theoretical and computational tools If finite dynamical systems are to be useful as a modeling paradigm for agent-based simulations it is necessary that they can serve as a fairly universal model of computation. We discuss here how such dynamical systems can mimic Turing Machines (TMs), a standard universal model for computation. For a more thorough exposition, we refer the reader to the series of papers by Barrett et al. [2; 3; 4; 5; 6]. To make the discussion reasonably self-contained, we provide a brief and informal discussion of the TM model. Additional information on TMs can be found in any standard text on the theory of computation (e.g. [82]). 5.1. A Computational View of Finite Dynamical Systems: Definitions. In order to un- derstand the relationship of finite dynamical systems to TMs, it is important to view such systems from a computational stand point. Recall that a finite dynamical system Φ : X n −→ X n , where X is a finite set, has an underlying dependency graph Y (V , E ). From a computational point of view, the nodes of the dependency graph (the agents in the simulation) are thought of as devices that compute appropriate functions. For simplicity, we will assume in this section that the dependency graph is undirected, that is, all dependency relations are symmetric. At any time, the state value of each node vi ∈ V is from the specified domain X . The inputs to fi are the current state of vi and the states of the neighbors of vi as specified by Y . The output of fi , which is also a member of X , becomes the state of vi at the next time instant. The discussion in this section will focus on sequentially updated systems (SDS), but all results discussed apply to parallel systems as well. Each step of the computation carried out by an SDS can be thought as consisting of n “mini steps;” in each mini step, the value of the local transition function at a node is computed and the state of the node is changed to the computed value. Given an SDS Φ, a configuration C of Φ is a vector (c1 , c2 , . . . , cn ) ∈ X n . It can be seen that each computational step of an SDS causes a transition from one configuration to another. 5.2. Configuration Reachability Problem for SDSs. Based on the computational view, a number of different problems can be defined for SDSs (see for example, [4; 6; 7]). To illustrate how SDSs can model TM computations, we will focus on one such problem, namely the configuration reachability (CR) problem: Given an SDS Φ, an initial configuration C and another configuration C ′ , will Φ, starting from C , ever reach configuration C ′ ? The problem can also be expressed in terms of the phase space of Φ. Since configurations such as C and C ′ are represented by nodes in the phase space, the CR problem boils down to the question of whether there is a directed path in the phase space from C to C ′ . This abstract problem can be mapped to several problems in the simulation of multiagent systems. Consider for example the TRANSIMS context. Here, the initial A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 13 configuration C may represent the state of the system early in the day (when the traffic is very light) and C ′ may represent an “undesirable” state of the system (such as heavy traffic congestion). Similarly, in the context of modeling an infectious disease, C may represent the initial onset of the disease (when only a small number of people are infected) and C ′ may represent a situation where a large percentage of the population is infected. The purpose of studying computational problems such as CR is to determine whether one can efficiently predict the occurrence of certain events in the system from a description of the system. If computational analysis shows that the system can indeed reach undesirable configurations as it evolves, then one can try to identify steps needed to deal with such situations. 5.3. Turing Machines: A Brief Overview. A Turing machine (TM) is a simple and commonly used model for general purpose computational devices. Since our goal is to point out how SDSs can also serve as computational devices, we will present an informal overview of the TM model. Readers interested in a more formal description may consult [82]. A TM consists of a set Q of states, a one-way infinite input tape and a read/write head that can read and modify symbols on the input tape. The input tape is divided into cells and each cell contains a symbol from a special finite alphabet. An input consisting of n symbols is written on the leftmost n cells of the input tape. (The other cells are assumed to contain a special symbol called blank.) One of the states in Q, denoted by qs , is the designated start state. Q also includes two other special states, denoted by qa (the accepting state) and qr (the rejecting state). At any time, the machine is in one of the states in Q. The transition function for the TM specifies for each combination of the current state and the current symbol under the head, a new state, a new symbol for the current cell (which is under the head) and a movement (i.e., left or right by one cell) for the head. The machine starts in state qs with the head on the first cell of the input tape. Each step of the machine is carried out in accordance with the transition function. If the machine ever reaches either the accepting or the rejecting state, it halts with the corresponding decision; otherwise, the machine runs forever. A configuration of a TM consists of its current state, the current tape contents and the position of the head. Note that the transition function of a TM specifies how a new configuration is obtained from the current configuration. The above description is for the basic TM model (also called single tape TM model). For convenience in describing some computations, several variants of the above basic model have been proposed. For example, in a multi-tape TM, there are one or more work tapes in addition to the input tape. The work tapes can be used to store intermediate results. Each work tape has its own read/write head and the definitions of configuration and transition function can be suitably modified to accommodate work tapes. While such an enhancement to the basic TM model makes it easier to carry out certain computations, it does not add to the machine’s computational power. In other words, any computation that can be carried out using the enhanced model can also be carried out using the basic model. As in the case of dynamical systems, one can define a configuration reachability (CR) problem for TMs: Given a TM M , an initial configuration I M and another configuration CM , will the TM starting from IM ever reach CM ? We refer to the CR problem in the context of TMs as CR-TM. In fact, it is this problem for TMs that captures the essence of what can be effectively computed. In particular, by choosing the state component of CM to be one of the halting states (qa or qr ), the problem of determining whether a function is computable is transformed into an appropriate CR-TM problem. By imposing appropriate restrictions on the resources used by a TM (e.g. the number of steps, the number of cells on the work tapes), one obtains different versions of the CR-TM problem which characterize different computational complexity classes [82]. 5.4. How SDSs Can Mimic Turing Machines. The above discussion points out an important similarity between SDSs and TMs. Under both of these models, each computational step causes 14 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI a transition from one configuration to another. It is this similarity that allows one to construct a discrete dynamical system Φ that can simulate a TM. Typically, each step of a TM is simulated by a short sequence of successive iterations Φ. As part of the construction, one also identifies a suitable mapping between the configurations of the TM being simulated and those of the dynamical system. This is done in such a way that the answer to CR-TM problem is “yes” if and only if the answer to the CR problem for the dynamical system is also “yes.” To illustrate the basic ideas, we will informally sketch a construction from [4]. This construction produces an SDS Φ that simulates a restricted version of TMs; the restriction being that for any input containing n symbols, the number of work tape cells that the machine may use is bounded by a linear function of n. Such a TM is called a linear bounded automaton (LBA) [82]. Let M denote the given LBA and let n denote the length of the input to M . The domain X for the SDS Φ is chosen to be a finite set based on the allowed symbols in the input to the TM. The dependency graph is chosen to be a simple path on n nodes, where each node serves as a representative for a cell on the input tape. The initial and final configurations C and C ′ for Φ are constructed from the corresponding configurations of M . The local transition function for each node of the SDS is constructed from the given transition function for M in such a way that each step of M corresponds to exactly one step of Φ. Thus, there is a simple bijection between the sequence of configurations that M goes through during its computation and the sequence of states that Φ goes through as it evolves. Using this bijection, it is shown in [4] that the answer to the CR-TM problem is “yes” if and only if Φ reaches C ′ starting from C . Reference [4] also presents a number of sophisticated constructions where the resulting dynamical system is very simple; for example, it is shown that an LBA can be simulated by an SDS in which X is the Boolean field, the dependency graph is d-regular for some constant d and the local transition functions at all the nodes are identical. Such results point out that one does not need complicated dynamical systems to model TM computations. Barrett et al. [5] have also considered stochastic SDS (SSDS), where the local transition function at each node is stochastic. For each combination of inputs, a stochastic local transition function specifies a probability distribution over the domain of state values. It is shown in [5] that SSDSs can effectively simulate computations carried out by probabilistic TMs (i.e., TMs whose transition functions are stochastic). 5.5. TRANSIMS related questions. Section 2.1.1 gave an overview of some aspects of the TRANSIMS model. The micro-simulator module is specified as a functional composition of four cellular automata of the form ∆4 ◦ ∆3 ◦ ∆2 ◦ ∆1 . (We only described ∆3 which corresponds to velocity updates.) Such a formulation has several advantages. First, it has created an abstraction of the essence of the system in a precise mathematical way without burying it in contextual domain details. An immediate advantage of this specification is that it makes the whole implementation process more straightforward and transparent. While the local update functions for the cells are typically quite simple, for any realistic study of an urban area the problem size would typically require a sequential implementation, raising a number of issues that are best addressed within a mathematical framework like the one considered here. 6. Mathematical results on finite dynamical systems In this section we outline a collection of mathematical results about finite dynamical systems that is representative of the available knowledge. The ma jority of these results are about deterministic systems, as the theory of stochastic systems of this type is still in its infancy. We will first consider synchronously updated systems. Throughout this section, we make the assumption that the state set X carries the algebraic structure of a finite field. Accordingly, we use the notation k instead of X . It is a standard result that in this case the number q of elements in k has the form q = pt for some prime p and t ≥ 1. The A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 15 reader may keep the simplest case k = {0, 1} in mind, in which case we are considering Boolean networks. Recall Equation (4.2). That is, any function g : kn −→ k can be represented by a multivariate polynomial with coefficients in k . If we require that the exponent of each variable be less than q , then this representation is unique. In particular Equation (4.3) implies that every Boolean function can be represented uniquely as a polynomial function. 6.1. Parallel update systems. Certain classes of finite dynamical systems have been studied extensively, in particular cellular automata and Boolean networks. Many of these studies have been experimental in nature, however. Some more general mathematical results about cellular automata can be found in the papers of Wolfram and collaborators [87]. The results there focus primarily on one-dimensional Boolean cellular automata with a particular fixed initial state. Here we collect a sampling of more general results. We first consider linear and affine systems Φ = (f1 , . . . , fn ) : kn −→ kn That is, we consider systems for which the coordinate functions fi are linear, resp. affine, polyno- mials. (In the Boolean case this includes functions constructed from XOR and negation.) When each fi is a linear polynomial of the form fi (x1 , . . . , xn ) = ai1x1 + · · · + ainxn , the map Φ is nothing but a linear transformation on kn over k , and, by using the standard basis, Φ has the matrix representation x1 ... xn x1 ... xn , a11 ... an1 · · · a1n ... . . . · · · ann    =     Φ          where aij ∈ k for all i, j . Linear finite dynamical systems were first studied by Elspas [30]. His motivation came from studying feedback shift register networks and their applications to radar and communication sys- tems and automatic error correction circuits. For linear systems over finite fields of prime cardi- nality, that is, q is a prime number, Elspas showed that the exact number and length of each limit cycle can be determined from the elementary divisors of the matrix A. Recently, Hernandez [41] re-discovered Elspas’ results and generalized them to arbitrary finite fields. Furthermore, he showed that the structure of the tree of transients at each node of each limit cycle is the same, and can be completely determined from the nilpotent elementary divisors of the form xa . For affine Boolean networks (that is, finite dynamical systems over the Boolean field with two elements, whose local functions are linear polynomials which might have constant terms), a method to analyze their cycle length has been developed in [56]. After embedding the matrix of the transition function, which is of dimension n × (n + 1), into a square matrix of dimension n + 1, the problem is then reduced to the linear case. A fast algorithm based on [41] has been implemented in [44], using the symbolic computation package Macaulay2. It is not surprising that the phase space structure of Φ should depend on invariants of the matrix A = (aij ). The rational canonical form of A is a block-diagonal matrix and one can recover the structure of the phase space of A from that of the blocks in the rational form of A. Each block represents either an invertible or a nilpotent linear transformation. Consider an invertible block B . If µ(x) is the minimal polynomial of B , then there exists s such that µ(x) divides xs − 1. Hence B s − I = 0 which implies that B sv = v. That is, every state vector v in the phase space of B is in a cycle whose length is a divisor of s. Definition 6.1. For any polynomial λ(x) in k [x], the order of λ(x) is the least integer s such that λ(x) divides xs − 1. 16 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI The cycle structure of the phase space of Φ can be completely determined from the orders of the irreducible factors of the minimal polynomial of Φ. The computation of these orders involves in particular the factorization of numbers of the form q r − 1, which makes the computation of the order of a polynomial potentially quite costly. The nilpotent blocks in the decomposition of A determine the tree structure at the nodes of the limit cycles. It turns out that all trees at all periodic nodes are identical. This generalizes a result in [55] for additive cellular automata over the field with two elements. While the fact that the structure of the phase space of a linear system can be determined from the invariants associated with its matrix may not be unexpected, it is a beautiful example of how the right mathematical viewpoint provides powerful tools to completely solve the problem of relating the structure of the local functions to the resulting (or emerging) dynamics. Linear and affine systems have been studied extensively in several different contexts and from several different points of view, in particular the case of cellular automata. For instance, additive cellular automata over more general rings as state sets have been studied, e.g., in [25]. Further results on additive CAs can also be found there. One important focus in [25] is on the problem of finding CAs with limit cycles of maximal length for the purpose of constructing pseudo random number generators. Unfortunately, the situation is more complicated for nonlinear systems. For the special class of Boolean synchronous systems whose local update functions consist of monomials, there is a polynomial time algorithm that determines whether a given monomial system has only fixed points as periodic points [27]. This question was motivated by applications to the modeling of biochemical networks. The criterion is given in terms of invariants of the dependency graph Y . For a strongly connected directed graph Y (i.e., there is a directed path between any pair of vertices), its loop number is the greatest common divisor of all directed loops at a particular vertex. (This number is independent of the vertex chosen.) Theorem 6.2 ([27]). A Boolean monomial system has only fixed points as periodic points if and only if the loop number of every strongly connected component of its dependency graph is equal to 1. In [26] it is shown that the problem for general finite fields can be reduced to that of a Boolean system and a linear system over rings of the form Z/prZ, p prime. Boolean monomial systems have been studied before in the cellular automaton context [13]. 6.2. Sequential update systems. The update order in a sequential dynamical system has been studied using combinatorial and algebraic techniques. A natural question to ask here is how the system depends on the update schedule. In [9; 10; 61; 72] this was answered on several levels for the special case where the update schedule is a permutation. We describe these results in some detail. Results about the more general case of update orders described by words on the indices of the local update functions can be found in [34]. Given local update functions fi : kn −→ k and permutation update orders σ, π , a natural question is when the two resulting SDS Φσ and Φπ are identical and, more generally, how many different systems one obtains by varying the update order over all permutations. Both questions can be answered in great generality. The answer involves invariants of two graphs, namely the acyclic orientations of the dependency graph Y of the local update functions and the update graph of Y . The update graph U (Y ) of Y is the graph whose vertex set consists of all permutations of the vertex set of Y [72]. There is an (undirected) edge between two permutations σ = (σ1 , . . . , σn ) and τ = (τ1 , . . . , τn ) if they differ by a transposition of two adjacent entries σi and σi+1 such that there is no edge in Y between σi and σi+1 . The update graph encodes the fact that one can commute two local update functions fi and fj without affecting the end result Φ if i and j are not connected by an edge in Y . That is, · · · fi ◦ fj · · · = · · · fj ◦ fi · · · if and only if i and j are not connected by an edge in Y . A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 17 All permutations belonging to the same connected component in U (Y ) give identical SDS maps. The number of (connected) components in U (Y ) is therefore an upper bound for the number of functionally inequivalent SDS that can be generated by just changing the update order. This can also be characterized in terms of acyclic orientations of the graph Y : each component in the update graph induces a unique acyclic orientation of the graph Y . Moreover, we have the following result: Proposition 6.3 ([72]). There is a bijection FY : SY / ∼Y −→ Acyc(Y ) , where SY / ∼Y denotes the set of connected components of U (Y ) and Acyc(Y ) denotes the set of acyclic orientations of Y . This upper bound on the number of functionally different systems has been shown in [72] to be sharp for Boolean systems, in the sense that for a given Y one construct this number of different systems, using appropriate combinations of NOR functions. For two permutations σ and τ it is easy to determine if they give identical SDS maps: one can just compare their induced acyclic orientations. The number of acyclic orientations of the graph Y tells how many functionally different SDS maps one can obtain for a fixed graph and fixed vertex functions. The work of Cartier and Foata [18] on partially commutative monoids studies a similar question, but their work is not concerned with finite dynamical systems. Note that permutation update orders have been studied sporadically in the context of cellular automata on circle graphs [71] but not in a systematic way, typically using the order (1, 2, . . . , n) or the even-odd/odd-even orders. As a side note, we remark that this work also confirms our findings that switching from a parallel update order to a sequential order turns the complex behavior found in Wolfram’s “class III and IV” automata into much more regular or mundane dynamics, see e.g. [79]. The work on functional equivalence was extended to dynamical equivalence (topological conju- gation) in [10; 61]. The automorphism group of the graph Y can be made to act on the components of the update graph U (Y ) and therefore also on the acyclic orientations of Y . All permutations contained in components of an orbit under Aut(Y ) give rise to dynamically equivalent sequential dynamical systems, that is, to isomorphic phase spaces. However, here one needs some more tech- nical assumptions, i.e., the local functions must be symmetric and induced, see [11]. This of course also leads to a bound for the number of dynamically inequivalent systems that can be generated by varying the update order alone. Again, this was first done for permutation update orders. The theory was extended to words over the vertex set of Y in [34; 75]. The structure of the graph Y influences the dynamics of the system. As an example, graph invariants such as the independent sets of Y turn out to be in a bijective correspondence with the invariant set of sequential systems over the Boolean field k that have nort : k t → k2 given by nort (x1 , . . . , xt ) = (1 + x1 ) · · · (1 + xt) as local functions [73]. This can be extended to other classes such as those with order independent invariant sets as in [39]. We have already seen how the automorphisms of a graph give rise to equivalence [61]. Also, if the graph Y has non-trivial covering maps we can derive simplified or reduced (in an appropriate sense) versions of the original SDS over the image graphs of Y , see e.g. [62; 74]. Parallel and sequential dynamical systems differ when it comes to invertibility. Whereas it is generally computationally intractable to determine if a CA over Zd is invertible for d ≥ 2 [46], it is straightforward to determine this for a sequential dynamical system [61]. For example, it turns out that the only invertible Boolean sequential dynamical systems with symmetric local functions are the ones where the local functions are either the parity function or the logical complement of the parity function [10]. Some classes of sequential dynamical systems such as the ones induced by the nor-function have desirable stability properties [39]. These systems have minimal invariant sets (i.e. periodic states) 18 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI that do not depend on the update order. Additionally, these invariant sets are stable with respect to configuration perturbations. If a state c is perturbed to a state c′ that is not periodic this state will evolve to a periodic state c′′ in one step; that is, the system will quickly return to the invariant set. However, the states c and c′′ may not necessarily be in the same periodic orbit. 6.3. The category of sequential dynamical systems. As a general principle, in order to study a given class of mathematical ob jects it is useful to study transformations between them. In order to provide a good basis for a mathematical analysis the ob jects and transformations together should form a category, that is, the class of transformations between two ob jects should satisfy certain reasonable properties (see, e.g., [53]). Several proposed definitions of a transformation of SDS have been published, notably in [48] and [74]. One possible interpretation of a transformation of SDS from the point of view of agent-based simulation is that the transformation represents the approximation of one simulation by another or the embedding/pro jection of one simulation into/onto another. These concepts have obvious utility when considering different simulations of the same complex system. One can take different points of view in defining a transformation of SDS. One approach is to require that a transformation is compatible with the defining structural elements of an SDS, that is, with the dependency graph, the local update functions, and the update schedule. If this is done properly, then one should expect to be able to prove that the resulting transformation induces a transformation at the level of phase spaces. That is, transformations between SDS should preserve the local and global dynamic behavior. This implies that transformations between SDS lead to transformations between the associated global update functions. Since the point of view of SDS is that global dynamics emerges from system properties that are defined locally, the notion of SDS transformation should focus on the local structure. This is the point of view taken in [48]. The definition given there is rather technical and the details are beyond the scope of this article. The basic idea is as follows. Let Φπ = fπ(n) ◦ · · · ◦ fπ(1) and Φσ = gσ(m) ◦ · · · ◦ gσ(1) with the dependency graphs Yπ and Yγ , respectively. A transformation F : Φπ −→ Φσ is determined by a graph mapping ϕ : Yπ −→ Yγ (reverse direction); a family of maps kφ(v) −→ kv , v ∈ Yπ ; an order preserving map σ 7−→ π of update schedules. These maps are required to satisfy the property that they “locally” assemble to a coherent trans- formation. Using this definition of transformation, it is shown [48, Theorem 2.6] that the class of SDS forms a category. One of the requirements, for instance, is that the composition of two transformations is again a transformation. Furthermore, it is shown [48, Theorem 3.2] that a trans- formation of SDS induces a map of directed graphs on the phase spaces of the two systems. That is, a transformation of the local structural elements of SDS induces a transformation of global dynamics. One of the results proven in [48] is that every SDS can be decomposed uniquely into a direct product (in the categorical sense) of indecomposable SDS. Another possible point of view is that a transformation F : (Φπ : kn → kn ) −→ (Φγ : km → km ) is a function F : kn −→ km such that F ◦ Φπ = Φγ ◦ F , without requiring specific structural properties. This is the approach in [74]. This definition also results in a category, and a collection of mathematical results. Whatever definition chosen, much work remains to be done in studying these categories and their properties. A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 19 7. Future directions Agent-based computer simulation is an important method for modeling many complex systems, whose global dynamics emerges from the interaction of many local entities. Sometimes this is the only feasible approach, especially when available information is not enough to construct global dynamic models. The size of many realistic systems, however, leads to computer models that are themselves highly complex, even if they are constructed from simple software entities. As a result it becomes challenging to carry out verification, validation, and analysis of the models, since these consist in essence of complex computer programs. This chapter argues that the appropriate approach is to provide a formal mathematical foundation by introducing a class of mathematical ob jects to which one can map agent-based simulations. These ob jects should capture the key features of an agent-based simulation and should be mathematically rich enough to allow the derivation of general results and techniques. The mathematical setting of dynamical systems is a natural choice for this purpose. The class of finite dynamical systems over a state set X which carries the structure of a finite field satisfies all these criteria. Parallel, sequential, and stochastic versions of these are rich enough to serve as the mathematical basis for models of a broad range of complex systems. While finite dynamical systems have been studied extensively from an experimental point of view, their math- ematical theory should be considered to be in its infancy, providing a fruitful area of research at the interface of mathematics, computer science, and complex systems theory. 8. Bibliography Primary Litreture [3] [6] [4] [1] R. L. Bagrodia, Paral lel languages for discrete-event simulation models, IEEE Computa- tional Science and Engineering, 5 (1998), pp. 27–38. [2] C. L. Barrett, H. B. Hunt III, M. V. Marathe, S. S. Ravi, D. J. Rosenkrantz, and R. E. Stearns, On some special classes of sequential dynamical systems., Annals of Combinatorics, 7 (2003), pp. 381–408. , Reachability problems for sequential dynamical systems with threshold functions., Theor. Comput. Sci., 295 (2003), pp. 41–64. , Complexity of reachability problems for finite discrete sequential dynamical systems., J. Computer and System Sciences, 72 (2006), pp. 1317–1345. [5] C. L. Barrett, H. B. Hunt III, M. V. Marathe, S. S. Ravi, D. J. Rosenkrantz, R. E. Stearns, and M. Thakur, Computational aspects of analyzing social network dynamics., in Proc. International Joint Conference on Artificial Intellligence (IJCAI 2007), 2007, pp. 2268– 2273. , Predecessor existence problems for finite discrete dynamical systems, 2007. To appear in Theoretical Computer Science. [7] C. L. Barrett, H. B. Hunt III, M. V. Marathe, S. S. Ravi, D. J. Rosenkrantz, R. E. Stearns, and P. Tosic, Garden of eden and fixed point configurations in sequential dynamical systems, in Proc. International Conference on Combinatorics, Computation and Geometry (DM-CCG’2001), 2001, pp. 95–110. [8] C. L. Barrett, M. V. Marathe, J. P. Smith, and S. S. Ravi, A mobility and traffic generation framework for modeling and simulating ad hoc communication networks, in SAC’02 Madrid, Spain, ACM, 2002, pp. 122–126. [9] C. L. Barrett, H. S. Mortveit, and C. M. Reidys, Elements of a theory of simulation II: Sequential dynamical systems, Appl. Math. and Comput., 107 (2000), pp. 121–136. , Elements of a theory of simulation III: Equivalence of SDS, Appl. Math. and Comput., 122 (2001), pp. 325–340. [10] 20 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI [11] , Elements of a theory of computer simulation. IV. sequential dynamical systems : fixed points, invertibility and equivalence, Appl. Math. Comput., 134 (2003), pp. 153–171. [12] C. L. Barrett and C. M. Reidys, Elements of a theory of simulation I: Sequential CA over random graphs, Appl. Math. and Comput., 98 (1999), pp. 241–259. [13] R. Bartlett and M. Garzon, Monomial cel lular automata, Complex Systems, 7 (1993), pp. 367–388. [14] M. Bernaschi and F. Castiglione, Selection of escape mutants from immune recognition during hiv infection, Immunology and Cell Biology, 80 (2002), pp. 307–313. [15] M. Bernaschi, S. Succi, and F. Castiglione, Large-scale cel lular automata simulations of the immune system response, Phys. Rev. E, 61 (2000). [16] G. Booch, J. Rumbaugh, and I. Jacobson, Unified Modeling Language User Guide, Addison-Wesley Professional, 2nd ed., 2005. [17] D. Brand and P. Zafiropulo, On communicating finite-state machines, J. ACM, 30 (1983), pp. 323–342. [18] P. Cartier and D. Foata, Problemes combinatoires de commutation et re´arrangements, vol. 85 of Lecture Notes in Mathematics, Springer Verlag, 1969. [19] F. Castiglione and Z. Agur, Analyzing hypersensitivity to chemotherapy in a cel lular automata model of the immune system, in Cancer modeling and simulation, L. Preziosi, ed., Chapman and Hall/CRC Press, London, 2003. [20] F. Castiglione, M. Bernaschi, and S. Succi, Simulating the Immune Response on a Distributed Paral lel Computer, International Journal of Modern Physics C, 8 (1997), pp. 527– 545. [21] F. Castiglione, K. Duca, A. Jarrah, R. Laubenbacher, D. Hochberg, and D. Thorley-Lawson, Simulating Epstein-Barr virus infection with C-ImmSim, Bioinfor- matics, 23 (2007), pp. 1371–1377. [22] F. Celada and P. Seiden, A computer model of cel lular interactions in the immune syste, Immunology Today, 13 (1992), pp. 56–62. , A model for simulating cognate recognition and response in the immune system, J Theor Biol, 158 (1992), pp. 235–270. , Affinity maturation and hypermutation in a simulation of the humoral immune response, Eur J Immunol, 26 (1996), pp. 1350–1358. [25] P. P. Chaudhuri, Additive Cel lular Automata. Theory and Applications, vol. 1, IEEE Com- puter Society Press, 1997. [26] O. Col´on-Reyes, A. Jarrah, R. Laubenbacher, and B. Sturmfels, Monomial dynam- ical systems over finite fields, Complex Systems, 16 (2006), pp. 333–342. [27] O. Col´on-Reyes, R. Laubenbacher, and B. Pareigis, Boolean monomial dynamical systems, Annals of Combinatorics, 8 (2004), pp. 425–439. [28] D. Dawson, Synchronous and asynchronous reversible markov systems, Canad. Math. Bull., 17 (1974), pp. 633–649. [29] W. Ebeling and F. Schweitzer, Swarms of particle agents with harmonic interactions, Theory in Biosciences, 120-3/4 (2001), pp. 207–224. [30] B. Elspas, The theory of autonomous linear sequential networks, IRE Transaction on Circuit Theory, (1959), pp. 45–60. [31] J. Farmer, N. Packard, and A. Perelson, The immune system, adaptation, and machine learning, Phys. D, 2 (1986), pp. 187–204. [32] U. Frish, B. Hasslacher, and P. Y., Lattice-gas automata for the Navier-Stokes equations, Physical Review Letters, 56 (1986), pp. 1505–1508. [33] H. Fuk´s, Probabilistic cel lular automata with conserved quantities, Nonlinearity, 17 (2004), pp. 159–173. [23] [24] A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 21 [34] L. D. Garcia, A. S. Jarrah, and R. Laubenbacher, Sequential dynamical systems over words, Appl. Math. Comput., 174 (2006), pp. 500–510. [35] M. Gardner, The fantastic combinations of John Conway’s new solitaire game ”life”, Scien- tific American, 223 (1970), pp. 120–123. [36] M. Gouda and C. Chang, Proving liveness for networks of communicating finite-state ma- chines, ACM Transactions on Programming Languages and Systems, 8 (1986), pp. 154–182. [37] Y. Guo, W. Gong, and D. Towsley, Time-stepped hybrid simulation (tshs) for large scale networks, in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, 2000, pp. 441–450. [38] A. Gupta and V. Katiyar, Analyses of shock waves and jams in traffic flow, Journal of Physics A, 38 (2005), pp. 4069–4083. [39] A. A. Hansson, H. S. Mortveit, and C. M. Reidys, On asynchronous cel lular automata, Advances in Complex Systems, (2005). submitted. [40] G. Hedlund, Endomorphisms and automorphisms of the shift dynamical system, Math. Syst. Theory, 3 (1969), pp. 320– 375. [41] A. Hern´andez-Toledo, Linear finite dynamical systems, Communications in Algebra, 33 (2005), pp. 2977–2989. [42] J. Hopfield, Neural networks and physical systems with emergent col lective computational properties, Proc. National Academy of Sciences of the USA, 79 (1982), pp. 2554–2588. [43] A. Ilichinsky, Cel lular Automata: A Discrete Universe, World Scientific Publishing Com- pany, July 2001. [44] A. Jarrah, R. Laubenbacher, M. Stillman, and P. Vera-Licona, An efficient algo- rithm for the phase space structure of linear dynamical systems over finite fields. Submitted, 2007. [45] D. R. Jefferson, Virtual time, ACM Transactions on Programming Languages and Systems, 7 (1985), pp. 404–425. [46] J. Kari, Theory of cel lular automata: A survey, Theoretical Computer Science, 334 (2005), pp. 3–33. [47] B. L. Keyfitz, Hold that light! modeling of traffic flow by differential equations., Stud. Math. Libr., 26 (2004), pp. 127–153. [48] R. Laubenbacher and B. Pareigis, Decomposition and simulation of sequential dynamical systems, Adv. Appl. Math., 30 (2003), pp. 655–678. [49] R. Lidl and H. Niederreiter, Finite Fields, Cambridge University Press, New York, 1997. [50] T. M. Liggett, Interacting particle systems, Classics in Mathematics, Springer-Verlag, Berlin, 2005. Reprint of the 1985 original. [51] D. A. Lind, Applications of ergodic theory and sofic systems to cel lular automata, Physica D, 10D (1984), pp. 36–44. [52] K. Lindgren, C. Moore, and M. Nordahl, Complexity of two-dimensional patterns, Jour- nal of Statistical Physics, 91 (1998), pp. 909–951. [53] S. Mac Lane, Category Theory for the Working Mathematician, no. 5 in GTM, Springer Verlag, 2nd ed., 1998. [54] M. W. Macy, J. A. Kitts, and A. Flache, Dynamic social network nodeling and analysis, The National Academies Press, 2003, ch. Polarization in Dynamic Networks: A Hopfield Model of Emergent Structure, pp. 162–173. [55] O. Martin, A. Odlyzko, and S. Wolfram, Algebraic properties of cel lular automata, Commun. Math. Phys., 93 (1984), pp. 219–258. [56] D. Milligan and M. Wilson, The behavior of affine boolean sequential networks, Connection Science, 5 (1993), pp. 153–167. [57] N. Minar, R. Burkhart, C. Langton, and A. Manor, The swarm simulation sys- tem: A toolkit for building multi-agent simulations, Santa Fe Institute preprint series, (1996). 22 R. LAUBENBACHER, A. S. JARRAH, H. MORTVEIT, AND S. S. RAVI [62] [74] http://www.santafe.edu/sfi/publications/96wplist.html. [58] J. Misra, Distributed discrete-event simulation, ACM Computing Surveys, 18 (1986), pp. 39– 65. [59] T. Moncion, G. Hutzler, and P. Amar, Verification of biochemical agent-based mod- els using petri nets, in International Symposium on Agent Based Modeling and Simulation, ABModSim’06, T. Robert, ed., Austrian Society for Cybernetics Studies, 2006, pp. 695–700. [60] D. Morpurgo, R. Serentha, P. Seiden, and F. Celada, Model ling thymic functions in a cel lular automaton, International Immunology, 7 (1995), pp. 505–516. [61] H. S. Mortveit and C. M. Reidys, Discrete, sequential dynamical systems, Discrete Math- ematics, 226 (2001), pp. 281–295. , Reduction of discrete dynamical systems over graphs, Advances in Complex Systems, 7 (2004), pp. 1–20. [63] K. Nagel, M. Rickert, and C. L. Barrett, Large-scale traffic simulation, Lecture notes in computer science, 1215 (1997), pp. 380–402. [64] K. Nagel and M. Schreckenberg, A cel lular automaton model for freeway traffic, Journal de physique I, 2 (1992), pp. 2221–2229. [65] K. Nagel, M. Schreckenberg, A. Schadschneider, and N. Ito, Discrete stochastic models for traffic flow, Physical Review E, 51 (1995), pp. 2939–2949. [66] K. Nagel and P. Wagner, Traffic Flow: Approaches to Model ling and Control, John Wiley & Sons, 2006. [67] R. E. Nance, A history of discrete event simulation programming languages, ACM SIGPLAN Notices, 28 (1993), pp. 149–175. [68] M. J. North, N. T. Collier, and J. R. Vos, Experiences creating three implementations of the repast agent modeling toolkit., ACM Trans. Modeling and Computer Simulation, 16 (2006), pp. 1–25. [69] P. Orponen, Computational complexity of neural networks: A survey, Nordic Journal of Computing, 1 (1994), pp. 94–110. , The computational power of discrete hopfield networks with hidden units, Neural Com- putation, 8 (1996), pp. 403–415. [71] J. K. Park, K. Steiglitz, and W. P. Thruston, Soliton-like behavior in automata, Phys- ica D, 19D (1986), pp. 423–432. [72] C. Reidys, Acyclic Orientations of Random Graphs, Advances in Applied Mathematics, 21 (1998), pp. 181–192. [73] C. M. Reidys, On acyclic orientations and sequential dynamical systems, Adv. Appl. Math., 27 (2001), pp. 790–804. , On Certain Morphisms of Sequential Dynamical Systems, Discrete Mathematics, 296 (2005), pp. 245–257. , Sequential dynamical systems over words, Annals of Combinatorics, 10 (2006). [75] [76] M. Rickert, K. Nagel, M. Schreckenberg, and A. Latour, Two lane traffic simula- tions using cel lular automata, Physica A, 231 (1996), pp. 534–550. [77] D. H. Rothman, Cel lular-automaton fluids: A model for flow in porous media, Geophysics, 53 (1988), pp. 509–518. [78] S. Russell and P. Norwig, Artificial Intel ligence: A Modern Approach, Prentice-Hall, 2003. [79] B. Schonfisch and A. de Roos, Synchronous and asynchronous updating in cel lular au- tomata, BioSystems, 51 (1999), pp. 123–143. [80] I. Shmulevich, E. R. Dougherty, S. Kim, and W. Zhang, Probabilistic boolean net- works: A rule-based uncertainty model for gene regulatory networks, Bioinformatics, 18 (2002), pp. 261–274. [81] I. Shmulevich, E. R. Dougherty, and W. Zhang, From boolean to probabilistic boolean networks as models of genetic regulatory networks, Proceedings of the IEEE, 90 (2002), [70] A MATHEMATICAL FORMALISM FOR AGENT-BASED MODELING 23 pp. 1778–1792. [82] M. Sipser, Introduction to the Theory of Computation, PWS Publishing Co., 1997. [83] L. Vasershtein, Markov processes over denumerable products of spaces describing large sys- tem of automata, Problemy Peredachi Informatsii, 5 (1969), pp. 64–72. [84] J. von Neumann, Theory of Self-Reproducing Automata, University of Illinois Press, 1966. Edited and completed by Arthur W. Burks. [85] G. Whitham, Linear and Nonlinear Waves, Pure and Applied Mathematics: A Wiley- Interscience Series of Texts, Monographs and Tracts, Wiley-Interscience, reprint edition ed., 1999. [86] S. Wolfram, Statistical mechanics of cel lular automata, Rev. Mod. Phys., 55 (1983), pp. 601– 644. [87] [88] , Theory and Applications of Cel lular Automata, vol. 1 of Advanced Series on Complex Systems, World Scientific Publishing Company, 1986. , A New Kind of Science, Wolfram Media, 2002. Books and Reviews [1] Hopcroft, J. E., R. Motwani, and J. D. Ullman (2000). Automata Theory, Languages and Computation. Reading: Addison Wesley. [2] Kozen, D. C. (1997). Automata and Computability. New York: Springer-Verlag. [3] Wooldridge, M. (2002). Introduction to Multiagent Systems. Chichester, UK: John Wiley & Sons. Virginia Bioinformatics InstituteVirginia Polytechnic Institute and State University E-mail address, Reinhard Laubenbacher: [email protected] E-mail address, Abdul S. Jarrah: [email protected] E-mail address, Henning Mortveit: [email protected] Department of Computer Science, University at Albany–State University of New York E-mail address, S. S. Ravi: [email protected]
1909.02475
2
1909
2019-09-11T14:12:40
Lower bound performances for average consensus in open multi-agent systems (extended version)
[ "cs.MA", "math.DS" ]
We derive fundamental limitations on the performances of intrinsic averaging algorithms in open multi-agent systems, which are systems subject to random arrivals and departures of agents. Each agent holds a value, and their goal is to estimate the average of the values of the agents presently in the system. We provide a lower bound on the expected Mean Square Error for any estimation algorithm, assuming that the number of agents remains constant and that communications are random and pairwise. Our derivation is based on the expected error obtained with an optimal algorithm under conditions more favorable than those the actual problem allows, and relies on an analysis of the constraints on the information spreading mechanisms in the system, and relaxations of these.
cs.MA
cs
Lower bound performances for average consensus in open multi-agent systems (extended version) Charles Monnoyer de Galland and Julien M. Hendrickx 9 1 0 2 p e S 1 1 ] A M . s c [ 2 v 5 7 4 2 0 . 9 0 9 1 : v i X r a Abstract -- We derive fundamental limitations on the perfor- mances of intrinsic averaging algorithms in open multi-agent systems, which are systems subject to random arrivals and departures of agents. Each agent holds a value, and their goal is to estimate the average of the values of the agents presently in the system. We provide a lower bound on the expected Mean Square Error for any estimation algorithm, assuming that the number of agents remains constant and that communications are random and pairwise. Our derivation is based on the expected error obtained with an optimal algorithm under conditions more favorable than those the actual problem allows, and relies on an analysis of the constraints on the information spreading mechanisms in the system, and relaxations of these. I. INTRODUCTION Multi-agent systems show great benefits for modeling and solving problems in various domains including sensor net- works [1], [2], vehicle coordination [3], or social phenomena [4], [5]. Among the most cited properties of multi-agent systems are their flexibility, their scalability, or their robust- ness. Yet, most results around multi-agent systems stand for asymptotic properties under the convenient assumption that their composition remains unchanged. The increasing size of the systems challenges this assumption as it implies slower processes and higher probabilities of arrivals and departures, making those non-negligible. It is also challenged by the chaotic nature of some systems, where communications can be difficult, or happen at a time-scale highly comparable to that of the arrivals and departures: vehicles can for instance share a stretch of road before heading to different destinations in collaborative multi-vehicles systems. All those reasons bring up the emergence of the study of Open Multi-Agent Systems. Results about closed systems do not easily extend to open ones: repeated arrivals and departures imply important differences in the design and analysis of such systems, and result in several challenges, see e.g. [6], [7]. First, with the frequent arrivals and departures of agents, the size of an open system changes with time, making the analysis of its state challenging. Moreover, incessant perturbations impact the state, but also in some cases the objective pursued by the agents of the system: algorithms then have to adapt to that variable objective, making their design challenging, and the usual convergence cannot be achieved anymore. ICTEAM institute, UCLouvain (Belgium). J.H. is also with the CISE, Boston University (USA). This work was supported by "Communaut´e franc¸aise de Belgique - Actions de Recherche Concert´ees". C.M. is a FRIA fellow (F.R.S.-FNRS), and J.H. holds a WBI.World excellence fellowship. Email adresses: [email protected], [email protected]. A. State of the art There is little theoretical analysis of open multi-agent systems, as most multi-agent results rely on the assumption that systems are closed. However, some results considered arrivals and departures, such as simulation-based analyses of social phenomena performed in [8]. Also, it has been shown in [6] that systems subject to gossip interactions in open features can be analyzed through size-independent descriptors, whose evolution described by a dynamical sys- tem is shown to asymptotically converge to some steady states. Moreover, algorithm design has been explored for MAX-consensus problems with arrivals and departures in [7] through additional variables, and where performance was measured by the probability for the estimate to eventually converge if the system closes. Similarly, THOMAS architec- ture was designed to maintain connectivity into P2P networks [9]. Openness was also considered in applications such as VTL for autonomous cars to deal with cross-sections [10]. Nevertheless, up to now, efficiently studying performances of algorithms and analyzing open systems remains a chal- lenge in general. As agents cannot instantaneously react to perturbations, obtaining an exact result is often out of range. Hence, the goal should be to remain near a time- varying objective, and usual convergence is no more relevant to be studied as it cannot be achieved. A step towards understanding open systems is the derivation of fundamental performance limitations: lower bounds on the performances that are possible to achieve. Through those limitations, one can obtain some quality criterion for algorithm design in open systems, but also get a better understanding of the possible bottlenecks that could arise. B. Contribution We establish fundamental performance limitations in open multi-agent systems for intrinsic averaging consensus prob- lems (i.e. estimating the average of all intern values owned by agents present in the system at that time), where information is exchanged between agents through random pairwise com- munications. In this analysis, we focus on systems of fixed size: we assume that each departure of an agent is instanta- neously followed by an arrival, so that only replacements occur, and the system size remains constant, see Section II for a formal definition. The approach used for deriving the fundamental limitations is detailed in Section III, and consists in evaluating the performances of an algorithm that is provably optimal under favorable settings where agents have access to more resources than decentralized problems typically allow. These performances depend on some compli- cated distribution related to information propagation. Bounds on this distribution were obtained by considering relaxed conditions for the information exchange, namely the Ping model in Section IV and the Infection model in Section V, to properly define the performance limitations. Since consensus problems are commonly a building block for various multi-agent complex applications (such as de- centralized optimization [11] or several control applications [3]), we expect the techniques we use for deriving those limitations to be extendable to more advanced tasks on open multi-agent systems. II. PROBLEM STATEMENT A. System description 2 We consider a set of N agents, labelled from 1 to N. Each agent i ∈ {1 . . .N} holds an i.i.d. intrinsic value xi(t) ∈ R ran- domly selected from a distribution which we assume without loss of generality to be zero mean and of variance Ex2 i = σ 2. This value remains constant except at a replacement, which we model as the complete erasure of the agent's memory and the attribution of a new value xi(t) drawn from the same distribution. Those replacements happen according to a Poisson clock defined by an individual replacement rate λr, so that on average Nλr replacements happen in the whole system per unit of time. Agents interact via pairwise communications: every two agents interact with each other at random times determined by a Poisson clock with rate λc. There are thus on average N(N−1) λc communications taking place in the system per unit of time. Agents are deterministic and have unlimited memory and computation power and there is no restriction on the size or nature of the messages they can exchange. They have a unique identifier that they can use and they have access to a common universal time. The way we model replacements as a memory erasure also means agents know the correspondence between the agents having left and those having replaced them since they share the same label. We assume moreover that they know the number of agents the parameters λr, λc, and the distribution of the xi N, (although we will see that the results would be the same if they knew only the expected value of xi, assumed here to be 0). Agents have thus access to significantly more information than in many works on multi-agent systems, but our lower bounds on the algorithm performance will of course also apply to these more usual situations, since our setting allows implementing any algorithm that could be implemented under more restrictive conditions. B. Objective In intrinsic averaging, agents try to estimate the average of the intern values of the agents present in the system at that time, denoted ¯x(t). For that purpose, every agent i maintains its own estimate yi(t) of that average based on its knowledge about the system, and updates it in continuous time. Under ideal conditions, one would expect that estimate to become yi(t) = ¯x(t) = 1 j=1 x j(t). N ∑N This is not achievable in open systems because of the variable objective and the delays to transmit information in the system, leading to the absence of usual convergence. We thus need a quantitative measure of the performance of an algorithm solving this problem in open systems, and choose the classical Mean Square Error (MSE) of the estimation of all the agents at time t, presented in equation (1). j=1( ¯x(t)− y j(t))2 C(t) := 1 (1) In this analysis, we focus on the steady state-error: we assume the system has been running since −∞, so that the effect of initial conditions has disappeared, and E [C(t)] can be considered independent of the time (one can verify that our processes remain well defined). We thus derive fundamental performance limitations for all algorithms that can be implemented in our setting as a (time-invariant) lower bound on (2). E [C(t)] = E(cid:2)( ¯x(t)− yi(t))2(cid:3) N ∑N (2) C. Preliminary notions Before stating our first result, we need to introduce certain notions related to the information available to an agent when computing its estimate, and to the age of its information. We first formalize in the next definition all the information about events and values x j to which an agent i could possibly access, and thus influence its estimate yi(t). Definition 1: At its arrival at time t, an agent i whose value is set to xi owns a knowledge set ωi(t) such that ωi(t+) = {i,xi,t}. If agents i and j interact at time t, then ωi(t+) = ω j(t+) = ωi(t−) ∪ ω j(t−) ∪ {i - j; t,xi(t),x j(t)}. The last expression of the union defining an interaction denotes that i, j have interacted at time t and confirms their values at that time.1 In other words, the knowledge sets after interaction consist of the union of the knowledge sets, to which is added the information about the interaction and confirmation of the values. Standard results in distributed computation show that any estimate yi(t) that an agent can compute in our settings can actually be computed based only on ωi(t) and the time t. Observe that ωi(t) may contain various values x j(t(cid:48)) for different t(cid:48) < t. However, we will see later that only the most recent known values about the other agents are needed to build the estimate yi(t). Definition 2: The most recent value known by the agent is denoted x(i) j at time t i about j (t) := max{s : x j(s) ∈ ωi(t)} is the time at which that most t(i) recent value was first obtained. We denote the age of that information by T (i) j (t) := t − t(i) j (t) = x j j (t). (cid:0)t(i) j (t)(cid:1), where By convention, if no value x j lies in ωi(t), we set x j to 0 and the corresponding age to +∞. Moreover, the estimate of an agent about itself is always correct, and the corresponding age of the information is 0. In steady state, and due to the symmetry between the j the distribution of T (i) j (t) is independent of i, agents, 1This confirmation is included for simplicity, but is actually redundant, as the values at that time could be obtained from ωi(t−) and ω j(t−). and t. Hence, all agents share a common cdf and pdf for that variable, respectively denoted F(s) and f (s). Moreover, with a small abuse of language, we say that another pdf f ∗(s) bounds f (s) when the corresponding cdf F∗(s) satisfies F∗(s) ≥ F(s) ∀s, which is always satisfied for a random variable T∗ ≤st T , in the usual stochastic order [12]. III. BOUND IN TERMS OF THE INFORMATION SPREADING MECHANISM We present in Theorem 1 a general lower bound on (2) depending on the way information spreads in the system. To properly define a bound, we will thus need to find relaxations of that information spreading to instantiate the expression. Theorem 1: The performances of any algorithm in the setting defined in Section II are bounded from below as E [C(t)] ≥ N − 1 N2 σ 2dt where f ∗(t) bounds f (t) as defined in Section II-C. 0 f ∗(t) 1− e−2λrt(cid:17) (cid:16) (cid:90) ∞ (3) The bound derived in the above theorem is obtained by studying an optimal algorithm in the setting of Section II (Section III-A). It relies on the decomposition of the contri- butions of all the agents for the estimation of the average to obtain the MSE for some knowledge (Sections III-B to III- D), and then on the derivation of a steady state through the analysis of the way information spreads in the system (Sections III-E and III-F). A. Optimal algorithm definition We first build an algorithm that is optimal for solving intrinsic averaging based on a knowledge set. Proposition 1: In the setting described in Section II, the d j=1 following estimate is optimal in the sense of criterion (2). N ∑N E [x j(t)ωi(t)] yi(t) = E [ ¯x(t)ωi(t)] = 1 rithm (4) is optimal since it minimizes the MSE: (4) Proof: Conditional to the knowledge set ωi(t), algo- dyi(t) Hence, since any other algorithm only depends on ωi(t) and t, the result of any of them y∗ E(cid:2)( ¯x(t)− yi(t))2ωi(t)(cid:3) = 2yi(t)− 2E [ ¯x(t)ωi(t)] = 0. i (t))2ωi(t)(cid:3) ≥ E(cid:2)( ¯x(t)− yi(t))2ωi(t)(cid:3) . E(cid:2)( ¯x(t)− y∗ i (t))2ωi(t)(cid:3)(cid:3) ≥ E(cid:2)E(cid:2)( ¯x(t)− yi(t))2ωi(t)(cid:3)(cid:3) . E(cid:2)E(cid:2)( ¯x(t)− y∗ Considering the expected value on all ωi(t), it follows: i (t) is such that (cid:105)(cid:105) Since the algorithm (4) is optimal in the sense of criterion (2), its performance E [C(t)] = E(cid:104)E(cid:104) ( ¯x(t)− E [ ¯x(t)ωi(t)])2ωi(t) (5) provides a lower bound on the performance of all algorithms that can be deployed in our settings. B. Individual contribution We show in the following proposition that expression (5) conveniently reduces to the analysis of a single agent. Proposition 2: The criterion (2) for the algorithm (4) conditional to the knowledge set ωi(t) reduces to ( ¯x(t)− yi(t))2ωi(t) = 1 N2 ∑N j=1 (x j(t)− x j(t))2ωi(t) (6) E(cid:104) E(cid:104) (cid:105) (cid:105) where x j(t) := E [x j(t)ωi(t)] (we lighten the notation by dropping the dependence of x(i) j (t) on i). Proof: With the optimal algorithm (4), one has yi(t) = 1 E [x j(t)ωi(t)] (cid:20)(cid:16) It follows that the error given ωi(t) is written N ∑N (cid:105) j=1 ( ¯x(t)− yi(t))2ωi(t) = E(cid:104) (cid:0)x j(t)− x j(t)(cid:1)(cid:17)2(cid:12)(cid:12)(cid:12)(cid:12)ωi(t) (cid:21) . E 1 N2 ∑N j=1 The absence of correlation between the agents values xi(t) finally allows to nullify the crossed-product terms of the squared sum, to obtain the final expression. C. Single agent estimate We can then explicitly write an expression for the estimate of a single agent x j(t). Proposition 3: There holds, j x j(t − T (i) j ). x j(t) = E [x j(t)ωi(t)] = e−λrT (i) (7) Hence, the estimate x j(t) only depends on the most recent information about the agent j (note that the time-dependence of T (i) j (t) is removed to lighten the notations). Proof: The most recent information we know about j is given by Definition 2, and we have no information about whether it was replaced since then. Hence, denoting R the event that j has been replaced, and ¯R that it has not, x j(t) = E [x j(t) ¯R]· P( ¯R) + E [x j(t)R]· (1− P( ¯R)) . By definition, E [x j(t)R] = 0. Then, from Poisson properties: (cid:16) (cid:17) x j(t) = 0 + x(i) j (t) e −λr t−t(i) j (t) and the conclusion follows from the definition of the age of the most recent information. The result above also stands when an agent estimates its own value or that of an agent for which it has no information, leading respectively to x(i) D. Individual error i (t) = xi(t) and x(i) j (t) = 0. For concision matters, we denote j (t) := (x j(t)− x j(t))2 C(i) (8) We can then write the MSE of the estimation of a single agent by injecting (7) into (8). E(cid:104) Proposition 4: The MSE when estimating a single agent for algorithm (4) conditional to the knowledge set ωi(t) is (9) and is thus entirely characterized by the age of the most recent information about it. (x j(t)− x j(t))2ωi(t) 1− e−2λrT (i) (cid:17) (cid:16) (cid:105) σ 2 = j Proof: Denoting R the event of at least one replacement and by ¯R the event of no replace- of the agent j during T (i) j ment, we can develop (8) with a case-by-case analysis: E(cid:104) (cid:105) j (t)ωi(t) C(i) = E(cid:104) j (t) ¯R C(i) We develop each term to obtain the final result: j (t)R C(i) (cid:105)· P(R) +E(cid:104) (cid:16) (cid:105) (cid:105) (cid:16) j (t)R C(i) j (t) ¯R C(i) = = E(cid:104) E(cid:104) j 1 + e−2λrT (i) 1− e−λrT (i) j (cid:105)· P( ¯R). (cid:17) (cid:17)2 σ 2 σ 2 P(R) = 1− e−λrT (i) P( ¯R) = e−λrT (i) j j This last result allows to write the following: 1− e−2λrT (i) j N2 ∑N j=1 E [C(t)ωi(t)] = 1 E. Global expected value (cid:16) (cid:17) σ 2. (10) 0 (cid:90) ∞ 1− e−2λrt(cid:17) (cid:16) We have developed an expression for the error in terms of the age of the most recent information about the other agents in (10). We can now obtain an expression for criterion (2) by computing the expected value of that result. N − 1 N2 Proposition 5: The MSE defined in (2) is given by E [ ¯x(t)− yi(t)]2 = σ 2 dt, (11) where we remind that Exi = 0 and Ex2 i = σ 2. It is thus entirely characterized by the distribution of the age of an information, and knowing f (t) leads to a proper bound. f (t) Proof: By definition, the global MSE is Using the result (10), it becomes E E(cid:2)( ¯x(t)− yi(t))2(cid:3) = E(cid:2)E(cid:2)( ¯x(t)− yi(t))2ωi(t)(cid:3)(cid:3) . (cid:19)(cid:21) (cid:20)(cid:18) E(cid:2)( ¯x(t)− yi(t))2(cid:3) = 1 N2 ∑N (cid:19)(cid:21) 1− e−2λrt(cid:17) (cid:16) (cid:90) ∞ follow f (t) from Section II-C, Finally, since all T (i) j 1− e−2λrT (i) 1− e−2λrT (i) (cid:20)(cid:18) f (t) dt, j=1 E σ 2. = j j 0 and the conclusion is then direct, where we remind that T (i) i = 0 by definition (cfr Section II-C). F. Relaxation of the communication process The previous result is actually that of Theorem 1 where the pdf is exactly f (s). Since this pdf reveals to be hard to f ∗(s) compute, we show in the next proposition that a pdf bounding f (s) as defined in Section II-C leads to a proper lower bound on (11), which concludes the development of Theorem 1. In the next then present two possible relaxations of the information spreading mechanism that will both lead to an appropriate f ∗(s) to instantiate the bound. 0 F(cid:48)(t) · err(t)dt where F(t) is a cdf, and where err(t) is a positive non- decreasing function, then for any other cdf F∗(t) ≥ F(t) ∀t, (12) Proposition 6: Given some value E =(cid:82) ∞ two Sections, we will (cid:90) ∞ E∗ = Proof: By defining F∗ = F + ∆ with ∆ ≥ 0, one has (F∗)(cid:48)(t)· err(t)dt ≤ E (cid:90) ∞ 0 E∗ = E − ∆· err(cid:48)(t)dt thanks to cdf properties. Using then the positivity of ∆ and err(cid:48)(t), the conclusion is direct. 0 IV. STRONG ASSUMPTION: PING MODEL A. Assumption description The first relaxation we consider relies on a strong simpli- fication of the communication mechanism. We assume that each time it communicates, an agent acquires all the infor- mation about all the agents presently in the system, and never forgets it, even at replacements. We refer to this assumption as the Ping model, in reference to the ping software used j (t) = x j (cid:0)t(i) j (t)(cid:1) where t(i) to test the reachability of machines in a network. The most recent value known by the agent i about j at time t is then given by x(i) j (t) is the time of the very last communication in which agent i was involved, and the age of that information T (i) j (t) is the time spent since then. Proposition 7: In steady state, ∀i (cid:54)= j, the age of the most j,Ping(t) follows (13) recent information about j held by i, noted T (i) f Ping(s) = (N − 1)λce−(N−1)λcs, which bounds f (s) as defined in Section II-C. j,Ping(t) = t − t(i) Proof: The random variable T (i) j,Ping(t) defines the time spent since the last communication involving the agent i, and thus follows by definition of the communications a Poisson process of rate (N − 1)λc. Its cdf is then given by = 1− e−(N−1)λcs. FPing(s) = P j,Ping(t) ≤ s T (i) (cid:104) (cid:105) The pdf is then obtained with f Ping(s) = dFPing(s) . ds T (i) j,Ping(t) is actually the minimal value that can take T (i) j (t). Hence T (i) j,Ping(t) ≤st T (i) j (t), and f Ping(s) bounds f (s). B. Results Theorem 2: The performances of any algorithm in the setting defined in Section II are bounded from below as (cid:32) (cid:33) E [C(t)] ≥ N − 1 N2 (cid:90) ∞ 1 1 + N−1 2 λc λr σ 2 (14) f Ping(t), the Proof: Applying Theorem 1 with the pdf (N − 1)λce−(N−1)λcs(cid:16) bound is given by performing the integration E [C(t)] ≥ N−1 N2 A few algebraic operations lead to the conclusion. 1− e−2λrs(cid:17) 0 σ 2ds. Fig. 1: Bound derived with the Ping model (14) in terms of the rate ratio between pairwise communications and replacements. Each curve stands for a different number of agents N, with a unit variance σ 2 = 1. Several observations on the evolution of the error in terms of the ratio of the rates λc/λr and N arise from Fig. 1. When communications are rather rare (λc/λr → 0), the error tends to N−1 N2 σ 2, i.e. the error that an agent would obtain only considering itself in the estimation. As the communications become more frequent, the second factor of (14) makes the bound decrease, to ultimately bring it to 0 as λc/λr → +∞, which is the error to which we converge in a close system. Observe that ¯λc = (N − 1)λc is the communication rate for one agent. Hence, the bound is actually separated into two factors: N−1 N2 σ 2 and the second one that only depends on ¯λc/λr which characterizes the expected number of inter- actions involving one agent before it is replaced. V. WEAKER ASSUMPTION: INFECTION MODEL A. Assumption description The random variable T (i) j (t) denotes the age of the most j available to i at time t, i.e. the recent information about time since this information was emitted by j. Since the distribution of T (i) j (t) is independent of the time t, its cdf F(s) corresponds to the probability that an information x j(τ) (with 0 ≤ τ ≤ s) is available to i at time s. This probability is lower than what it would be if the agents were never replaced (as information is erased with replacements). Hence we use this latter replacement-free situation as a relaxation to obtain a bound on the cdf. One can verify that when agents are never replaced, the information propagation follows a simple infection process: j is infected at time 0, and agents get infected as soon as they communicate with an infected agent. The probability of i having that information about j at time s is then equal to the probability of i being infected at time s, denoted by P[T (i) j,In f is the time of its first infection. Based on this, one can prove that the cdf of T (i) j,In f bounds F(s) as defined in Section II-C. j,In f (t) ≤ s] where T (i) Proposition 8: In steady state, the pdf of T (i) f In f (s), bounds f (s) as defined in Section II-C. j,In f (t), noted j (t). Proof: Considering one realization of communications, there exists a sequence of events where T (i) j (t) is such that it did not suffer replacements. Since that sequence always also exists with the Infection model, T (i) B. Result j,In f (t) ≤st T (i) Proposition 9: In steady state, ∀i (cid:54)= j, the age of the most recent information agent i has about agent j with the Infection model, denoted T (i) FIn f (s) = ∑N k−1 N−1 Pk(s) where Pk(s) is defined by an ODE system: Pk(s) = (k− 1)(N − k + 1)λcPk−1(s)− k(N − k)λcPk(s) (16) such that P1(0) = 1 and Pk(cid:54)=1(0) = 0. j,In f (t), follows the cdf Proof: Let I(s) be the set containing the labels of its size, and denote time s, NI(s) the infected agents at Pk(s) = P[NI(s) = k]. Then, one has FIn f (s) = P[i ∈ I(s)] = ∑N k=1 Pk(s)· P[i ∈ I(s)NI(s) = k]. From the symmetry between the agents, and since they (15) k=1 are all interchangeable, one has P[i ∈ I(s)NI(s) = k] = k−1 N−1 . Finally, the ODE system defining Pk(s) is a standard result from continuous time Markov chains theory. Theorem 3: The performances of any algorithm in the (cid:0)1− wT A(2λrI − A)−1e1 (cid:1)σ 2 setting defined in Section II are bounded from below as E [C(t)] ≥ N−1 N2 (17) where A is the bidiagonal matrix defining the ODE system (16) from Proposition 9 i.e., Aii = − i(N − i)λc and Ai+1,i = i(N − i)λc, and wT = (cid:2)0 P(s) = AP(s) with P(s) =(cid:2)P1(s) P2(s) with λr (cid:54)= 0. Proof: Equation (16) defines 1 N−1 a whose solution is given by 2 N−1 . . . 1(cid:3), . . . PN(s)(cid:3)T system , linear P(s) = eAsP(0) with P(0) = e1. It follows from (15) that the cdf and pdf are given by FIn f (s) = wT eAse1 and f In f (s) = wT AeAse1. 0 0 0 ds = dse1. f In f (s) (cid:90) ∞ e(A−2λrI)sds. (cid:16) eAse−2λrs(cid:17) Injecting that result in the integral from Theorem 1, which Since λr (cid:54)= 0, then (A− 2λrI) is invertible and has strictly (cid:90) ∞ (cid:90) ∞ Since A and −2λrI commute, the integral reduces to we will see is well defined, one has ds = 1− wT A (cid:90) ∞ e(A−2λrI)s(cid:105)∞ 1− e−2λrs(cid:17) (cid:16) (cid:16) eAse−2λrIs(cid:17) (cid:90) ∞ e(A−2λrI)sds = (A−2λrI)−1(cid:104) (cid:16) 1− e−2λrs(cid:17) (cid:90) ∞ (cid:32) Corollary 1: The expression below is equivalent to (17). Hence, the integral from Theorem 1 is given by and the conclusion is direct from Theorem 1. ds = 1− wT A(2λrI − A)−1e1, negative eigenvalues, leading to = (2λrI−A)−1. f In f (s) 0 0 0 0 (cid:16) (cid:17)(cid:33) E [C(t)] ≥ N − 1 N2 (cid:32) h(N,L) = N ∑ k=2 k− 1 N − 1 k−1 ∏ j=1 1− 1 1 + N−1 2 h N, λc λr λc λr j(N − j)L 2 + ( j + 1)(N − j− 1)L σ 2 (cid:33) (18) (19) with the Corollary 1 presents an algebraic expression for from Theorem 1, and is proven in Ap- bound (17) that pendix A. Detailed empirical explorations suggest h(N,L) ≤ L 2kL 2+2kL . Using results on bounds in numerical integration, we can then find a compact bound on that expression, and derive the following empirical ex- (cid:32) pression for bounding E [C(t)] from below. 2 ∑N−2 (cid:33)(cid:32) (cid:32) 1 + (N − 2) λc 2 + L (cid:33)(cid:33) k=1 1 + 1 2 log 1 + λc λr λr σ 2 (20) N − 1 N2 1 1 + N−1 2 λc λr C. Discussion Fig. 2 compares the bounds derived with the Ping and Infection models, and the expression (20) based on the Infection bound, in logarithmic scale. The first observation is the improvement of both bounds from the Infection model, which relies on a weaker relaxation, in comparison with the Ping model. That improvement is even more apparent when the rate ratio λc/λr increases, since the impact of the corresponding factor gets more important. In particular, the expression (20) is actually exactly that of the bound from the Ping model multiplied by a logarithmic factor that scales to logN when λc/λr is large. This could relate to the fact that information propagates in one hop in the Ping model, whereas it needs time with the Infection model. Observe also in Fig. 2 that the bound follows two distinct regimes: when λc/λr is very small, it has a very low impact We focused on the analysis of the performances of intrinsic averaging algorithms for open systems of constant size, for which we derived fundamental performance limitations as lower bounds on the Mean Square Error of estimation in steady state. This was done by studying the performances of an algorithm optimal in a context more favorable to the agents than what is usually assumed in multi-agent systems, and relied then on the relaxation of the information spreading mechanism in the system. Two of such relaxations were studied, leading to a conservative but readable bound, and to a tighter but more complex bound. Possible extensions include the study of more complicated problems (e.g. decentralized optimization [11]), more struc- tured constraints on the inter-agent communications, and the consideration of variable-size systems. More fundamentally, our bounds purely rely on limitations on the information propagation, and are valid even if the agents have some strong knowledge on the system and use identifiers or heterogeneous algorithms. Stronger lower bounds can be ob- tained under more restrictive assumptions, e.g. by improving the Infection model from Section V with healing. Yet, it would be interesting to investigate what factors significantly impact the bound: in particular, an anonymous algorithm was already shown in Section V-C to exhibit performances not too different from our bound, questioning the impact of anonymity of the agents. REFERENCES [1] J. Predd, S. Kulkarni, and H. V. Poor, "Distributed learning in wireless sensor networks," Signal Processing Magazine, IEEE, vol. 23, pp. 56 -- 69, 07 2006. [2] R. Olfati-Saber and N. F. Sandell, "Distributed tracking in sensor networks with limited sensing range," pp. 3157 -- 3162, 07 2008. [3] Y. Cao, W. Yu, W. Ren, and G. Chen, "An overview of recent progress in the study of distributed multi-agent coordination," IEEE Transactions on Industrial Informatics, vol. 9, 07 2012. [4] V. Blondel, J. M. Hendrickx, and J. Tsitsiklis, "Continuous-time average-preserving opinion dynamics with opinion-dependent com- munications," SIAM Journal on Control and Optimization, vol. 48, 07 2009. [5] R. Hegselmann and U. Krause, "Opinion dynamics and bounded confidence models, analysis and simulation," Journal of Artificial Societies and Social Simulation, vol. 5, 07 2002. [6] J. M. Hendrickx and S. Martin, "Open multi-agent systems: Gossiping with deterministic arrivals and departures," in Proceedings of the 56th IEEE CDC, pp. 1094 -- 1101, 09 2016. [7] M. Abdelrahim, J. M. Hendrickx, and W. M. Heemels, "Max- consensus in open multi-agent systems with gossip interactions," in Proceedings of the 56th IEEE CDC, pp. 4753 -- 4758, 12 2017. [8] P. Sen and B. K. Chakrabarti, Sociophysics: an introduction. Oxford University Press, 2013. [9] A. Giret, V. Julin, M. Rebollo, E. Argente, C. Carrascosa, and V. Botti, "An open architecture for service-oriented virtual organizations," pp. 118 -- 132, 09 2010. [10] O. K. Tonguz, "Red light, green lightno light: Tomorrow's commu- nicative cars could take turns at intersections," IEEE Spectrum, vol. 55, pp. 24 -- 29, Oct 2018. [11] J. C. Duchi, A. Agarwal, and M. J. Wainwright, "Dual averaging for distributed optimization: Convergence analysis and network scaling," IEEE Transactions on Automatic Control, vol. 57, 05 2010. [12] A. Muller and D. Stoyan, Comparison methods for stochastic models and risks. Chichester ; New York, NY : Wiley, 2002. [13] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE/ACM Trans. Netw., vol. 14, pp. 2508 -- 2530, June 2006. Fig. 2: Bounds derived with the Ping model (dashed), the Infection model (plain), and the expression (20) (dotted) in terms of the rate ratio λc/λr, for different numbers of agents N, and with a unit variance σ 2 = 1. Fig. 3: Performances comparison for solving an intrinsic consensus problem with 10 agents between the bound from the Infection model (plain) and a simulation using a simple Gossip algorithm (dotted), both in logarithmic scale. The simulations are performed with 10000 iterations of the simulation over 200 events, which is empirically shown to be enough for the system to be considered in steady state in that setting. yi(t−)+y j(t−) on the bound, which stays around N−1 N2 σ 2; whereas after some threshold, the bound decays according to 1/(λc/λr). Finally, we have compared our bound with the results of the simplest version of average gossip [13]: agents take their own value xi as initial estimate yi(t), and whenever two agents i, j communicate, their estimates become . 2 yi(t+) = y j(t+) = (21) This algorithm computes the average in closed system. Observe that it is consistent with our setting presented in Section II, and that we did not make any adaptation to the open character. Fig. 3 compares the performances of the algorithm (21) with the bound from the Infection model (17). It is interesting to notice that even though there is a gap between the curves, the behavior of the error in terms of λc/λr is well captured by the bound, especially when that ratio gets large enough. Interestingly, the algorithm relies on only one variable, and does not make use of identifiers nor of any other information provided to the agents as described in Section II, while our bound is valid for algorithms potentially using this information. Hence one could wonder about the precise impact of that information and the efficiency gains it allows. VI. CONCLUSIONS We considered in this paper the possibility of arrivals and departures of agents in the study of multi-agent systems, and highlighted several challenges arising from this property. In particular, it prevents algorithms to converge for many problems, making their analysis challenging. APPENDIX A. Proof of Corollary 1 (cid:32) We prove in this Section that the expression (17) is equivalent to the following algebraic expression with 1− 1 1 + N−1 2 E [C(t)] ≥ N − 1 (cid:32) N2 h(N,L) = N ∑ k=2 k− 1 N − 1 k−1 ∏ j=1 (cid:16) (cid:17)(cid:33) h N, λc λr λc λr j(N − j)L σ 2 (cid:33) 2 + ( j + 1)(N − j− 1)L . Then, since P−1e1 = P−1 wT Q−1P−12λre1 = 11 e1 and P−1 11 = 2λr+(N−1)λc 2λr From the definition of Q−1 and thus of ak, one has then wT A(2λrI − A)−1e1 = . Algebraic manipulations of this result within equation (17) 2λr+(N−1)λc ∑N k=1 2λr from Theorem 3 allow to conclude. 1 , 2λr+(N−1)λc wT Q−1e1. (cid:16) k−1 N−1 ∏k−1 j=0 a j (cid:17) of bidiagonal matrices. We will use the following standard result on the inverse Lemma 1: The inverse A−1 of a bidiagonal matrix with a unit diagonal  1 −a1 ... 0 0 A =  0 0 ... 0 1 . . . 0 0 ... ... . . . −aN−1 1 0 1 ... 0 i−1 ∏ k= j is lower triangular matrix with unit diagonal and A−1 i, j = ak (∀i > j) We also need the following technical lemma. Lemma 2: For all matrix A, and ∀β ∈ R such that (β I − A)−1 is well defined, there holds A(β I − A)−1 = (β I − A)−1β − I Proof: Let A := A− β I, then A(β I − A)−1 = −( A + β I) A−1 = −I − β A−1. (22) The conclusion follows that − A−1 = (β I − A)−1. We start from the result of Theorem 3: (cid:0)1− wT A(2λrI − A)−1e1 (cid:1)σ 2. E [C(t)] ≥ N−1 N2 Since (2λrI − A) is bidiagonal and invertible when λr (cid:54)= 0, one writes (2λrI − A) = PQ with • P a diagonal matrix with Pii = i(N − i)λc + 2λr; • Q a bidiagonal matrix of unit diagonal with −i(N−i)λc Qi+1,i = 2λr+(i+1)(N−i−1)λc From this definition, one has . (2λr − A)−1 = Q−1P−1 , and where Q−1 is obtained using where P−1 Lemma 1 with ii = 1 2λr+i(N−i)λc ak = k(N−k)λc 2λr+(k+1)(N−k−1)λc . From Lemma 2 and the previous result, there holds wT A(2λrI − A)−1e1 = wT [Q−1P−12λr − I]e1 with wT Ie1 = wT e1 = 0.
1705.10259
1
1705
2017-05-29T15:34:27
Distributed Communication-aware Motion Planning for Multi-agent Systems from STL and SpaTeL Specifications
[ "cs.MA", "cs.LO", "cs.RO", "eess.SY" ]
In future intelligent transportation systems, networked vehicles coordinate with each other to achieve safe operations based on an assumption that communications among vehicles and infrastructure are reliable. Traditional methods usually deal with the design of control systems and communication networks in a separated manner. However, control and communication systems are tightly coupled as the motions of vehicles will affect the overall communication quality. Hence, we are motivated to study the co-design of both control and communication systems. In particular, we propose a control theoretical framework for distributed motion planning for multi-agent systems which satisfies complex and high-level spatial and temporal specifications while accounting for communication quality at the same time. Towards this end, desired motion specifications and communication performances are formulated as signal temporal logic (STL) and spatial-temporal logic (SpaTeL) formulas, respectively. The specifications are encoded as constraints on system and environment state variables of mixed integer linear programs (MILP), and upon which control strategies satisfying both STL and SpaTeL specifications are generated for each agent by employing a distributed model predictive control (MPC) framework. Effectiveness of the proposed framework is validated by a simulation of distributed communication-aware motion planning for multi-agent systems.
cs.MA
cs
Distributed Communication-aware Motion Planning for Multi-agent Systems from STL and SpaTeL Specifications Zhiyu Liu, Bo Wu, Jin Dai, and Hai Lin 7 1 0 2 y a M 9 2 ] A M . s c [ 1 v 9 5 2 0 1 . 5 0 7 1 : v i X r a Abstract -- In future intelligent transportation systems, net- worked vehicles coordinate with each other to achieve safe operations based on an assumption that communications among vehicles and infrastructure are reliable. Traditional methods usually deal with the design of control systems and communi- cation networks in a separated manner. However, control and communication systems are tightly coupled as the motions of vehicles will affect the overall communication quality. Hence, we are motivated to study the co-design of both control and communication systems. In particular, we propose a control the- oretical framework for distributed motion planning for multi- agent systems which satisfies complex and high-level spatial and temporal specifications while accounting for communication quality at the same time. Towards this end, desired motion specifications and communication performances are formulated as signal logic (SpaTeL) formulas, respectively. The specifications are encoded as constraints on system and environment state variables of mixed integer linear programs (MILP), and upon which control strategies satisfying both STL and SpaTeL specifications are generated for each agent by employing a distributed model predictive control (MPC) framework. Effectiveness of the pro- posed framework is validated by a simulation of distributed communication-aware motion planning for multi-agent systems. logic (STL) and spatial-temporal temporal I. INTRODUCTION Multi-agent systems like intelligent transportation systems and smart cities have emerged as a hot research topic in the interdisciplinary study of control theory, robotics and computer science due to their wide applications in both academic and industrial domains. Being one of the funda- mental research problems in this context, motion planning and control of multi-agent systems has drawn a consider- able amount of research interest in recent years. Motion and control strategies are developed for various global/local coordination purposes, see e.g. [1] and the references therein. Recent theoretical and technological developments have enhanced the application of formal methods to address complex and high-level motion planning objectives. Formal languages, such as linear temporal logic (LTL) and compu- tation tree logic (CTL) [2], provide a concise formalism for specifying and verifying desired logic behavior of dynamical systems [3]. To pursue satisfaction of temporal specifica- tions, a vast majority of research efforts has been devoted to abstraction-based approaches (see e.g. [4] -- [6] and the references therein), where the temporal logic formula spec- ification is translated into an automata representation whose This work was supported by the National Science Foundation (NSF-CNS- 1239222 and NSF- EECS-1253488) Z. Liu, B. Wu, J. Dai, and H. Lin are with the Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA (e- mail: [email protected]; [email protected]; [email protected]; [email protected]). accepting runs correspond to satisfaction of the formula, while the environment of the system is also abstracted into a finite transition diagram. Based on these abstractions, algo- rithms are derived for verification and synthesis of discrete controllers that drive the system to satisfy the specification. Despite their success in the correct-by-construction design of controllers, abstraction-based approaches suffer from the "state explosion" issues as both the synthesis and abstraction algorithms scale at least exponentially with the dimension of the discretized configuration space [3], rendering such approaches impractical for large-scale multi-agent systems. Furthermore, LTL and/or CTL specifications require only the order of events that should be executed by the system, whereas temporal distance between them is often neglected. Many attempts have been made to multi-agent systems to ease the computational burden while obeying temporal logic specifications. On the one hand, approaches that do not require abstractions are proposed, such as sampling- based approach [7] and mixed integer linear programming techniques [8] -- [10]. On the other hand, model predictive control (MPC) schemes are introduced to reduce the formal synthesis problem into a series of smaller optimization prob- lems of a shorter horizon. Wongpiromsarn et al. [11] utilized MPC to accomplish motion planning for LTL specifications, whereas Tumova and Dimarogonas [12] applied MPC for coordination of multi-agent systems. Kuwata and How [13] integrated MILP formalism with MPC techniques to pursue distributed trajectory optimization; nevertheless, satisfaction of more complex specifications were not studied. It is worth pointing out that aforementioned results as- sumed perfect inter-agent communication, which turned out to be oversimplified in practice, since communication quality of service (QoS) is crucial in maintaining multi-agent coordi- nation. In intelligent transportation systems, communications among vehicles and infrastructure are not always reliable. To pursue the co-optimization of motion and communica- tion, Grancharova et al. [14] proposed a trajectory planning scheme for agents subject to communication capacity con- straints by applying distributed MPC. The same approach is utilized in [15] for motion planning of multi-agent systems under radio communication constraints while agents are treated as relay nodes where communication channels are modeled as disk model which assumes communication is off beyond a certain threshold. Yan and Mostofi [16] modeled the communication channel between a robot and a base station as a Gaussian process with fading and shadowing effects; however, the optimization was performed only with respect to the robot's motion velocity, transmission rate and stop time, while the robot was assumed to travel along a pre-defined trajectory. Nevertheless, communication models presented in the previous work are either too complicated for multi-agent systems or oversimplified in practice. Motivated by the aforementioned concerns, we focus on construction of local controller for multi-agent systems such that certain motion requirements are fulfilled in the presence of communication capacity constraints in this paper. Given multiple agents moving in a shared environment with com- munication base stations, our design objective is to drive each agent to satisfy its own motion specifications, while unsafe zone, collision and poor communication QoS are avoided. Towards this end, we use signal temporal logic (STL) [17], [18] formulas to describe local motion and safety require- ments for each agent, and spatial-temporal logic (SpaTel) [19] formulas to represent global safety and communication QoS requirements, based on which an MILP formalism is established to solve not only the joint motion-communication co-optimization problem, but synthesizes collision-avoiding motion controllers as well. Note that different from our previ- ous work [20], we present a distributed synthesis framework by employing MPC such that appropriate controllers can be synthesized locally. The rest of this paper is organized as follows. In Section II, we briefly introduce necessary preliminaries of STL and SpaTel. We then formally present the communication-aware motion planning problem from STL-SpaTel specifications in Section III. In Section IV, we propose the MILP encoding schemes for STL and SpaTel specifications. Based on these MILP constraints, we exploit a distributed MPC strategy in Section V to synthesize local controllers for each agent. Sim- ulation examples are presented in Section VI for validating our proposed framework. Section VII concludes the paper. II. PRELIMINARIES A. Agent Models The multi-agent system under consideration in this pa- per consists of P agents with unique identities P = {1, 2, . . . , P} which perform their missions in a shared 2- D environment. For each i ∈ P, the agent dynamics is dominated by the linear dynamics of the following form xi(t) = Axi(t) + Bui(t), (1) i where xi ∈ R4 is the state of agent i with xi = [pT i ]T , vT where pi, vi ∈ R2 are the position and velocity of the agent, respectively; ui = [ui,1 ui,2]T ∈ U ⊆ R2 is the local admissible control inputs, and xi(0) = xi,0 ∈ R4 is the initial state. (A, B) is a controllable pair with proper dimensions. The environment X is given by a large convex polygonal subset of the 2-D Euclidean space R2. Let Xobs ⊆ X be the regions in the environment occupied by polygon obstacles. Xf ree = X \ Xobs denotes the obstacle-free working space for the multi-agent system. To run the distributed communication-aware motion plan- ning in an online manner, we borrow the idea from [21] and assume that the agent dynamics (1) admits a discrete-time approximation of the following form, given an appropriate sampling time ∆t > 0: xi(tk+1) = Adxi(tk) + Bdui(tk), (2) where k ∈ N is the sampling index and ∆t is selected such that (Ad, Bd) is controllable. The sampling is uniformly performed, i.e., for each k > 0, tk+1 − tk = ∆t and we use [a, b] as an abbreviation for the set {a, a + 1, . . . , b}. Given xi,k ∈ R2 and uH i ∈ U ω, i ∈ P, a (state) run i = xi,kxi,k+1xi,k+2 . . . xi,k+H−1 generated by agent i's xH dynamics (2) with control input uH is a finite sequence ob- tained from agent i's state trajectory, where xi,k = xi(tk) ∈ i R4 is the state of the system at time index t, and for each k ∈ N, there exists a control input ui,k = ui(tk) ∈ U such that xi(tk+1) = Adxi(tk) + Bdui(tk). Under MPC framework with planning horizon H (cf. Section III), given a local state xi,k and a sequence of local control inputs uH i = ui,kui,k+1ui,k+2 . . . ui,k+H−1, the resulting horizon-H run of agent i, xi(xi,k, uH i ) = xi,kxi,k+1xi,k+2 . . . xi,k+H−1 is unique. B. Communication Typically, agents within the team may be assigned with different roles and responsibilities, and inter-agent commu- nication is required to ensure proper coordination between them for safety and efficient mission execution. Furthermore, reliable communication is also needed between the agents and base stations to collect the sensed environment data and let base stations provide global information for agents, which is essential for distributed algorithms. Therefore in this paper we explicitly consider communication as an optimization objective. As shown in Fig. 1, we assume the environment is a gridded square world. There are four base stations, one at the center of each quadrant. To reduce the interference and increase the number of agents that can be served, similar to cellular communication, each base station is equipped with four 90◦ sector antenna systems to fully cover each quadrant. The quality of service (QoS) of inter-agent communication and between the individual agent and the base station is assumed to be subject to the path loss and the shadowing effect [22] due to the mountains. Fig. 1: The gridded environment C. Signal Temporal Logic We consider STL formulas which are defined recursively as follows. cursively as: Definition 1 (STL Syntax): STL formulas are defined re- ϕ ::= Trueπµ¬πµϕ ∧ ψϕ ∨ ψ2[a,b]ψϕ (cid:116)[a,b] ψ where πµ is an atomic predicate Rn → {0, 1} whose truth value is determined by the sign of a function µ : Rn → R, i.e., πµ is true if and only if µ(x) > 0; and ψ is an STL formula. The "eventually" operator 3 can also be defined here by setting 3[a,b]ϕ = True (cid:116)[a,b] ϕ. The semantics of STL with respect to a discrete-time signal x are introduced as follows, where (x, tk) = ϕ denotes for which signal values and at what time index the formula ϕ holds true. Definition 2 (STL Semantics): The validity of an STL for- time tk is defined to signal x at mula ϕ with respect inductively as follows: (x, tk) = ψ; 1) (x, tk) = µ, if and only if µ(xk) > 0; 2) (x, tk) = ¬µ, if and only if ¬((x, tk) = µ); 3) (x, tk) = ϕ ∧ ψ, if and only if (x, tk) = ϕ and 4) (x, tk) = ϕ∨ψ, if and only if (x, tk) = ϕ or (x, tk) = ψ; 5) (x, tk) = 2[a,b]ϕ, if and only if ∀tk(cid:48) ∈ [tk + a, tk + b], (x, tk(cid:48)) = ϕ; 6) (x, tk) = ϕ(cid:116)[a,b] ψ, if and only if ∃tk(cid:48) ∈ [tk +a, tk +b] such that (x, tk(cid:48)) = ψ and ∀tk(cid:48)(cid:48) ∈ [tk, tk(cid:48)], (x, tk(cid:48)(cid:48) ) = ϕ. A signal x = x0x1x2 . . . satisfies ϕ, denoted by x = ϕ, if (x, t0) = ϕ. Intuitively, x = 2[a,b]ϕ if ϕ holds at every time step between a and b, x = ϕ (cid:116)[a,b] ψ if ϕ holds at every time step before ψ holds, and ψ holds at some time step between a and b, and x = 3[a,b]ϕ if ϕ holds at some time step between a and b. An STL formula ϕ is bounded-time if it contains no unbounded operators. The bound of ϕ can be interpreted as the horizon of future predicted signals x that is needed to calculate the satisfaction of ϕ. D. Spatial Temporal Logic SpaTeL is defined by the combination of STL and Tree Spatial Superposition Logic (TSSL) where STL is respon- sible for describing the temporal properties and TSSL is related to spatial properties [23]. Prior to define the syntax and semantics of SpaTeL, we first introduce quad transition systems (QTS) with a quad tree data structure to model spatial characteristics. A QTS [23] is defined through a quad tree structure by dividing environment into four quadrants recursively. It is defined as a tuple Q(t) = (V,E, v0, Vf , µ,L, l), where V is the set of nodes vi. E ⊂ V × V is the set of directed transitions. v2 is a child of v1 if (v1, v2) ∈ E. v0 is the root of the tree (the only node which is not a child of another node). Vf is the set of leaves (nodes without children). µ : 6 4 3 2 2 3 4 6 4 4 4 3 3 4 4 4 3 4 4 3 0 0 4 3 2 3 2 2 0 2 3 2 2 3 0 1 0 3 3 2 3 4 0 2 3 4 4 3 3 6 4 3 3 4 6 3 2 3 3 2 2 3 3 2 Fig. 2: Matrix C for the environment v0 NW NE SW SE v1 v2 v3 v4 NW NE SW SE v5 v6 v7 v8 NW NE SW SE vf vf vf vf Fig. 3: Partial QTS for Matrix C V×R≥0 → R+ is the valuation function assigning each node a real positive number. L is a finite set of labels. l : E → L is the labeling function which maps each edge to a label. A labeled path of a QTS is defined as a function which maps a node to a set of infinite sequences of nodes: λB :=(cid:8)(v0, v1, v2, . . . , ¯vf )(vi, vi+1) ∈ E, l(vi, vi+1) ∈ B(cid:9) , (cid:8)0, . . . , T(cid:9) → Q. (3) where B ⊆ L; ¯vf denotes infinite repetitions of leaf node vf ; i ∈ N≥0. A trace corresponding to a trajectory traveling in the divided environment is defined as a function q : Fig. 2 and Fig. 3 show an example of formulating QTS. Let matrix C ∈ R2D×2D be the representation of the environment in Fig. 1 divided by 2D × 2D grids and elements in it represent a valuation function µ for corresponding area, where D ∈ N+ is the resolution of the matrix (or the depth of the tree), which is 3 in this case. A QTS can be constructed from C by choosing it as the root node v0 then dividing C into four 2D−1 × 2D−1 sub-matrices. Each of them is a child of v0 and the directed transitions are stored in E with directional labels from the set L =(cid:8)N W, N E, SE, SW(cid:9). One can expand each child with the same method applied on the root node until we have 2D × 2D leaf nodes. Valuation function µ can be defined for each leaf nodes by using the elements in C and for other nodes by the mean of the valuations of its children recursively: µ(v) = 1 4 µ(vc),∀v ∈ V \ Vf , (4) (cid:88) (v,vc)∈E Based on the definition of QTS, the syntax and semantics of TSSL are well defined in [24]. With STL and TSSL, one can define SpaTeL as follow [23]. Definition 3 (SpaTeL Syntax): The spatial formulas are defined recursively as: ψ ::=Truem ∼ d¬ψψ1 ∧ ψ2∃B (cid:13) ψ∀B (cid:13) ψ ∃Bψ1Ukψ2∀Bψ1Ukψ2 where ∼∈(cid:8)≥,≤(cid:9), d ∈ [0, b], b ∈ R+, k ∈ N+, B ⊆ L with B (cid:54)= ∅, and m ∈ µ. Uk and (cid:13) are until and next operators respectively. The syntax of SpaTeL formulas are defined as follow: φ ::= ψ¬φφ1 ∧ φ22[a,b]φφ1 (cid:116)[a,b] φ2. As we noticed, SpaTeL is a combination of STL and TSSL by replacing the STL predicates with TSSL formulas. Definition 4 (SpaTeL Semantics): The validity of an Spa- TeL formula φ with a trace q at time tk is defined inductively as follows: 1) (q, tk) = ψ, if and only if (q, v0, tk) = ψ; 2) (q, tk) = ¬φ, if and only if ¬((q, tk) = φ); 3) (q, tk) = φ1 ∧ φ2, if and only if (q, tk) = φ1 and (q, tk) = φ2; 4) (q, tk) = 2[a,b]φ, if and only if ∀tk(cid:48) ∈ [tk + a, tk + b], (q, tk(cid:48)) = φ; 5) (q, tk) = φ1 (cid:116)[a,b] φ2, if and only if ∃tk(cid:48) ∈ [tk + a, tk + b] such that (q, tk(cid:48)) = φ2 and ∀tk(cid:48)(cid:48) ∈ [tk, tk(cid:48)], (q, tk(cid:48)(cid:48) ) = φ1; where ψ is a TSSL formula. E. Distributed MPC Instead of solving optimization problems for the whole time horizon Tf , MPC solves problems within a finite horizon H < Tf starting from current states and provides a finite control inputs uH k . Only the first control input will be implemented and agents' states will be sampled again. Then the new optimization problem will be computed based on the new states within the finite horizon H. MPC has a better performance comparing to other methods in terms of handling model uncertainty and external disturbance [25]. It also reduces the size of problem by only considering H steps ahead. For distributed MPC, each agent has its own MPC based optimization problem which only considers its own neighbor [13] and therefore makes it much smaller than the centralized problem. By applying distributed MPC, one can deal with larger scale cases [26]. III. PROBLEM STATEMENT A. STL Motion Planning Specifications We now proceed to the communication-aware motion planning problems for multi-agent systems. Let us consider a team of P agents conducting motion behavior in the shared environment X , each of which is governed by the discretized dynamics (2). We assign a goal region Xi,goal for agent i, i ∈ P that is characterized by a polytope [3] in Xf ree, i.e., there exist M ≥ 3 and ai,j ∈ R2, bi,j ∈ R, j = 1, 2, . . . , Mi such that Xi,goal = {p ∈ R2aT i,jp + bi,j ≤ 0, j = 1, 2, . . . , Mi}. (5) In other words, Xi,goal = {x ∈ XaT i,j[I2 O2]x+bi,j ≤ 0, j = 1, 2, . . . , Mi}. (6) where I2, O2 ∈ R2×2 denote the 2-dimensional identity and zero matrices, respectively. We assume that all agents share a synchronized clock. The terminal time of multi-agent motion is upper-bounded by tf = Tf ∆t with Tf ∈ N+, and the planning horizon is then given by [0, Tf ]. Accomplishment of individually-assigned specifications is of practical importance, for instance search and rescue missions or coverage tasks are often specified to mobile robots individually. In this paper, local motion planning tasks for agent i are summarized as the following STL formula: for i ∈ P, require: ϕi = ϕi,p ∧ ϕi,s, where 1) the motion performance property (cid:0)aT i,j[I2 O2]xi + bi,j ≤ 0(cid:1) Mi(cid:94) j=1 ϕi,p = 3[0,Tf ] (7) (8) (9) requires that agent i enter the goal region within Tf time steps; 2) the safety property (cid:94) [(pi,1 − pj,1 ≥ d1) ϕi,s = 2[0,Tf ] j∈Ni,j(cid:54)=i ∧ (pi,2 − pj,2 ≥ d2)] ensures that agent i shall never encounter obstacle re- gions. Here d1 and d2 are pre-defined safety distances between two agents in the two dimensions. Ni ⊆ P denotes the set for agent i's neighbor which will be described in Section V. B. SpaTeL Specifications of Communication and Safety The shared environment X is divided into 2D × 2D same sized grids such that the environment can be represented by a quad tree, where D is the depth of the tree. Without loss of generality, we also assume that the obstacle region Xobs, like the mountains in Fig. 1, is a rectangular subset of X which is also represented by grids. Fig. 2 and Fig. 3 illustrate such setup with corresponding QTS, where D = 3. The number in each grid is the valuation function for each leaf node. We use SpaTeL specifications to specify obstacles avoidance, optimal communication with base stations and preventing traffic congestion. To this regard, we assign each leaf node with a number listed in Fig.2 representing the maximum amount of agents where each grid can have at the same time. For the obstacles represented with red grids, the number of agents allowed in it is zero. We place four communication base stations shown in Fig. 1 located at the center of v1 to v4. Considering the path loss and the shadowing effect in wireless communication, we assume grids that are far away from base stations and are blocked by obstacles will suffer poor communication quality leading to the maximum amount of agents in those grids are relatively small. The grids with number 6 are the initial and terminal locations for all agents which have a higher capacity for accommodating agents. To specify the spatial temporal specifications mentioned (10) (11) above, we formulate the SpaTeL formula as bellow: φ = 2[0,Tf ](ψ1) ∧ 2[0,Tf ](ψ2 ∧ ψ3 ∧ ψ4 ∧ ψ5) where ψi are TSSL formulas: ψ1 =∀SW (cid:13) ∀N E (cid:13) ∀(cid:8)N W, N E, SW(cid:9) (cid:13) (µ = 0)∧ ψ1 specifies the safety property of avoiding obstacles. ψ2 =∀N W (cid:13) ∀N W (cid:13) ∀N W (cid:13) (µ ≤ 6)∧ ∀SE (cid:13) ∀N W (cid:13) ∀N W (cid:13) (µ = 0)∧ ∀N E (cid:13) ∀SW (cid:13) ∀(cid:8)N W, N E(cid:9) (cid:13) (µ = 0) ∀N W (cid:13) ∀N W (cid:13) ∀(cid:8)N E, SW, SE(cid:9) (cid:13) (µ ≤ 4)∧ ∀N W (cid:13) ∀N E (cid:13) ∀(cid:8)N W, SE(cid:9) (cid:13) (µ ≤ 3)∧ ∀N W (cid:13) ∀SW (cid:13) ∀(cid:8)N W, SE(cid:9) (cid:13) (µ ≤ 3)∧ ∀N W (cid:13) ∀SE (cid:13) ∀(cid:8)N E, SE(cid:9) (cid:13) (µ ≤ 2)∧ ∀N W (cid:13) ∀SW (cid:13) ∀N E (cid:13) (µ ≤ 4)∧ ∀N W (cid:13) ∀SW (cid:13) ∀SW (cid:13) (µ ≤ 2)∧ ∀N W (cid:13) ∀SE (cid:13) ∀N W (cid:13) (µ ≤ 4)∧ ∀N W (cid:13) ∀N E (cid:13) ∀SW (cid:13) (µ ≤ 4)∧ ∀N W (cid:13) ∀N E (cid:13) ∀N E (cid:13) (µ ≤ 2)∧ ∀N W (cid:13) ∀SE (cid:13) ∀SW (cid:13) (µ ≤ 3) (12) ψ2 specifies the desired pattern in terms of communication quality and avoiding traffic congestion for the upper left quadrant. ψ3 to ψ5 specify the rest of environment following the same procedure. Comparing SpaTeL formulas (10) and STL formulas (7), it is worth pointing out that STL formulas define the require- ment for each agent while SpaTeL formulas define global specifications for all agents. By using both STL and SpaTeL formulas in our design, we are able to consider both local and global properties in a decentralized method. C. MPC based Co-optimization Problem We wish to achieve a co-optimization for motion planning and communication QoS. To this regard, the cost function Ji,1 in the following linear quadratic form represents the energy consumption for agent i. k(cid:48)+H−1(cid:88) k=k(cid:48) k(cid:48)+H−1(cid:88) k=k(cid:48) di,k Ji,1 = (qTxi,tk + rTui,tk) + h(k(cid:48)) (13) where H is the planning horizon, q and r are non-negative weighting vectors and . denotes the element-wise absolute value. Second term is time penalty multiplying goal penalty such that each agent can move towards its goal. We define goal penalty as di,k = pT i,goal and time penalty as h(k) = λk2, where pi,goal ∈ R2 denotes the geometric center of goal region Xi,goal for agent i and λ is a user defined parameter. i,k − pT As for communication QoS, we consider both base station- to-agent and agent-to-agent scenarios. For inter-agent com- munication, we assume in each planning period, for agent i, agents within its neighbor are static where the commu- nication channel among them are affected by path loss. For agent j ∈ Ni, one can defines a matrix C(cid:48) j similar to C which defines its communication QoS pattern in the environment. Using similar idea from our previous work [20], the communication cost is formulated as follow. k(cid:48)+H−1(cid:88) 2D(cid:88) 2D(cid:88) Ni(cid:88) n=1 m=1 k=k(cid:48) Ji,2 = (Cm,n + j,m,n)(Om,n,tk − 1) C(cid:48) (14) where C is defined in Fig.2 representing communication quality with base stations. Ot is a binary matrix for capturing the occupancy of the grids where Om,n,t is zero if and only if the agent is in m-th row and n-th column. j∈Ni Given the aforementioned preliminaries and cost func- tions, we formally formulate the distributed communication- aware motion planning from STL-SpaTeL specifications as below: Problem 1: Given a multi-agent system with P agents whose dynamic behaviors are determined by (2) with initial states xi,0, a planning horizon H, a local STL formula ϕi in (7) and a global formula φ in (10), we find local control inputs ui(tk) for all agents such that the following cost function is optimized: i )) = αJi,1 + (1 − α)Ji,2 uH min i ,i∈P Ji(xi(xi,0, uH s.t. ∀i ∈ P, (15) i ) = ϕi, xi(tk+1) = Adxi(tk) + Bdui(tk), xi(xi,k, uH (q, tk) = φ, ui ∈ U = [−umax, umax] × [−umax, umax], vi < vmax, ui mivi ≤ umax mivmax ωi = where α ∈ [0, 1] is a user defined parameter. IV. MILP ENCODING OF COMMUNICATION-AWARE MOTION PLANNING A. MILP Encoding of Agent Dynamics In this section, we replace tk with t and denote xit and uit as the state and control inputs of agent i at time step t. To encode the motion planning cost (13) as linear programming, we employ Manhattan distance for di,k and introduce slack vectors αit, βit, γit and additional constraints [27] such that Ji,1 can be transformed to linear cost function. k(cid:48)+H−1(cid:88) t=k(cid:48) Ji,1 = (qT αit + rT βit) + h(k(cid:48)) k(cid:48)+H−1(cid:88) 2(cid:88) t=k(cid:48) k=1 γitk (16) s.t. ∀t ∈ [k(cid:48), k(cid:48)+H − 1],∀j ∈ [1, 4],∀k ∈ [1, 2] xitj ≤ αitj,−xitj ≤ αitj uitk ≤ βitk,−uitk ≤ βitk and and xitk − pi,goal,k ≤ γitk,−xitk + pi,goal,k ≤ γitk and xi(t + 1) = Adxi(t) + Bdui(t) (17) To transfer the nonlinear velocity constraints, we use the method in [8] by introducing an arbitrary number L of linear constraints leading to the 2-D velocities approximated by a regular L-sided polygon. ∀l ∈ [1, L], i ∈ [1, P ], t ∈ [k(cid:48), k(cid:48) + H − 1] ) ≤ vmax ) + vit2cos( vit1sin( 2πl L 2πl L (18) B. Boolean Encoding of STL Constraints For the MILP encoding of STL specifications in (7), we denote two Boolean variables zϕi,p whose value depends on the satisfaction of ϕi,p and ϕi,s respectively [18], [20]. Then the satisfaction of ϕi at time step t can be represented by Boolean variable zϕi t which is determined by zϕi,p and zϕi,s and zϕi,s as follow. t t t t t = zϕi,p zϕi t ∧ zϕi,s t with ∀i ∈ P : t ≤ zϕi,p zϕi t ≥ zϕi,p zϕi t ≤ zϕi,s , zϕi t − 1 t + zϕi,s t t (19) (20) where zϕi,p ing specifications are satisfied. and zϕi,s t t are one if and only if their correspond- C. Boolean Encoding of SpaTeL Constraints Similar to encoding STL as MILP, we use the method in [19] to encode SpaTeL formulas (10) as MILP recursively. We denote SpaTeL formulas φ1 = 2[0,Tf ](ψ1) and φ2 = 2[0,Tf ](ψ2∧ψ3∧ψ4∧ψ5). We define three Boolean variables zφ v,t, zφ1 v,t whose truth values correspond to the satisfaction of φ, φ1 and φ2 respectively and are determined by the following constraints. v,t and zφ2 with v,k v,t, zφ v,k, zφ2 ∀i ∈ P,∀k ∈ [t, Tf ] : v,t ≤ zφ2 v,t ≤ zφ1 zφ v,t, zφ v,t ≤ zψ2−5 v,t ≤ zψ1 Tf(cid:88) zφ1 v,t ≥ v,k − Tf + t, zφ2 zφ1 zψ1 v,k ≥ 5(cid:88) v,k ≤ zψ3 v,k ≤ zψ2 v,k, zψ2−5 zψ2−5 v,k − 3 zψ2−5 zψj k=t v,t + zφ2 v,t − 1 v,t ≥ zφ1 Tf(cid:88) v,k − Tf + t zψ2−5 v,k ≤ zψ4 v,k, zψ2−5 v,k, zψ2−5 v,t ≥ k=t v,k ≤ zψ5 v,k j=2 (22) v,k, i ∈ [1, . . . , 5] represent the where Boolean variables zψi satisfaction of TSSL formulas ψ1 to ψ5. We assume the sampling period ∆t for the discretized system is 1. V. DISTRIBUTED MODEL PREDICTIVE CONTROL SYNTHESIS We wish to construct a distributed and online framework for the communication-aware motion planning. Towards this end, we employ MPC as the basic framework such that the sub-problem for each agent can be solved online and the system is robust enough to deal with model uncertainty and external disturbance. Another strategy we employed for achieving distributed and online manner is only considering its neighbor for each agent during planning so that the size of each sub-problem will reduce significantly for the size of the formulated MILP problem in previous section depends on the number of agents directly. We assume that global information like time, synchronization, states of each agent are available for each agent through communication base stations. The algorithm is summarized in Algorithm 1. Since it is reasonable to omit the agents that are far away, we define the neighbor of each agent by choosing the agents whose distance to the agent are shorter than a certain threshold. We assign each agent a unique priority in each planning period randomly. Agents can only plan after all the agents in its neighbor with higher priority have planned. Fig. 4 illustrates our idea. Agents connected with edges are considered in the same neighbor. For the agent with priority 2, it plans first in each period since it has the highest priority in its neighbor and the agent with priority 4 will plan right after it. In each planning period, agents formulate their own optimization problem in (15) encoded as MILP and run commercial MILP solver to find the control inputs within the planning horizon. After all agents planned, they implement the first step of the control inputs and move into next period. The algorithm stops when all agents reach their goals or it reaches the time limit. zφ v,t = zφ1 v,t ∧ zφ2 Tf(cid:94) v,t Tf(cid:94) zψ2−5 v,t = v,k v,k ∧ zψ5 v,k ∧ zψ4 k=t v,k zψ1 v,k, zφ2 v,k ∧ zψ3 zφ1 v,t = k=t zψ2−5 v,k = zψ2 VI. SIMULATION RESULTS (21) To justify our distributed co-optimization strategy, we implemented our MPC based framework with MATLAB. The encoded MILP problem was modeled by AMPL, an are marked as black rectangular. Communication quality is considered in this case. Due to the shadowing effect caused by obstacles, the communication quality is the worst in the space between two obstacles. Fig. 2 shows the communica- tion quality pattern in terms of base stations and obstacles. The outputs of the simulation are agents' states and control inputs at all steps. Algorithm 1 Distributed Communication-aware Motion Planning with MPC Input: Intial states and goal positions of each agent Output: Return states and control inputs of each agent Initialization while AgentSet (cid:54)= ∅ or t ≤ Tf do Randomly set a unique priority for each agent AgentSet for Agent i, at time t do j , j ∈ P Update the list of all agents' states xH inputs uH if Agent j, j ∈ P is close enough to agent i then Add agent j into agent i's neighbour Ni j and control in end Wait until all agents in Ni with higher priority than i planned, then for t ∈ [t, t + H] do Minimize the cost function Ji in (15) subjecting to corresponding constraints and uH i to the whole end Broadcast the results of xH i group end Implement the first step of control inputs uH i Global time t = t + 1 if Any agent i ∈ P reaches its target then Remove it from AgentSet end end Fig. 5: Distributed Communication-aware Motion Planning 3 8 5 1 2 6 7 4 Fig. 4: Neighbor algebraic modeling language for large scale mathematical programming [28], and solved by Gurobi, a commercial solver for MILP [29]. Fig. 1 illustrates our basic setup. Fig. 5 shows the simu- lation result of the MPC based distributed co-optimization. Fig. 6 demonstrates agents distribution at different time steps. Twelve agents with initial states and target positions marked as red cross are given. The agent dynamics ruled by (2) is given by setting matrices Ad and Bd as: 1 0 0 1 0 0 0 0  , Bd = 0.5 0 1 0 1 0 1 0 0 1 0 1  . 0 0.5 0 1 Ad = (23) We choose H = 5, L = 8, ∆t = 1, Tf = 50, λ = 0.005, d1 = d2 = 1, α = 0.5. The working space is set as a 160m × 160m square which is represented by QTS with D = 3 shown in yellow grids. Four communication base stations are marked as red stars in the graph. Obstacles Fig. 6: Agents distribution As we can see from the result, using the proposed distributed co-optimization strategy, all agents are able to satisfy the specifications. Several agents avoid the poor communication quality area to reach their goals, compared to Fig. 7 without considering communication. The simulation was run on a PC with Intel core i7- 4710MQ 2.50 GHz processor and 8GB RAM. The algorithm was run distributively among agents. Each agent can solve its own MILP problem around 0.1 second. VII. CONCLUSION As an extension of our previous work [20], we develop a distributed MPC based algorithm for communication-aware [3] M. Kloetzer and C. Belta, "A fully automated framework for control of linear systems from temporal logic specifications," IEEE Transactions on Automatic Control, vol. 53, no. 1, pp. 287 -- 297, 2008. [10] E. M. Wolff, U. Topcu, and R. M. Murray, "Optimization-based trajectory generation with linear temporal logic specifications," in 2014 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2014, pp. 5319 -- 5325. [11] T. Wongpiromsarn, U. Topcu, and R. M. Murray, "Receding horizon temporal logic planning," IEEE Transactions on Automatic Control, vol. 57, no. 11, pp. 2817 -- 2830, 2012. [12] J. Tumova and D. V. Dimarogonas, "Multi-agent planning under local ltl specifications and event-based synchronization," Automatica, vol. 70, pp. 239 -- 248, 2016. [13] Y. Kuwata and J. P. How, "Cooperative distributed robust trajectory optimization using receding horizon milp," IEEE Transactions on Control Systems Technology, vol. 19, no. 2, pp. 423 -- 431, 2011. [14] A. Grancharova, E. I. Grøtli, D.-T. Ho, and T. A. Johansen, "Uavs trajectory planning by distributed mpc under radio communication path loss constraints," Journal of Intelligent & Robotic Systems, vol. 79, no. 1, pp. 115 -- 134, 2015. [15] E. I. Grøtli and T. A. Johansen, "Path planning for uavs under com- munication constraints using splat! and milp," Journal of Intelligent & Robotic Systems, vol. 65, no. 1-4, pp. 265 -- 282, 2012. [16] Y. Yan and Y. Mostofi, "Co-optimization of communication and motion planning of a robotic operation under resource constraints and in fading environments," IEEE Transactions on Wireless Communica- tions, vol. 12, no. 4, pp. 1562 -- 1572, 2013. [17] O. Maler and D. Nickovic, "Monitoring temporal properties of contin- uous signals," in Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems. Springer, 2004, pp. 152 -- 166. logic specifications," in Proceedings of [18] V. Raman, A. Donz´e, M. Maasoumy, R. M. Murray, A. Sangiovanni- Vincentelli, and S. A. Seshia, "Model predictive control with signal the 53rd IEEE temporal Conference on Decision and Control (CDC). IEEE, 2014, pp. 81 -- 87. [19] I. Haghighi, S. Sadraddini, and C. Belta, "Robotic swarm control from spatio-temporal specifications," in Decision and Control (CDC), 2016 IEEE 55th Conference on. IEEE, 2016, pp. 5708 -- 5713. [20] Z. Liu, J. Dai, B. Wu, and H. Lin, "Communication-aware motion planning for multi-agent systems from signal temporal logic specifi- cations," in American Control Conference (ACC), Proceedings of the 2017. [21] V. Raman, A. Donz´e, D. Sadigh, R. M. Murray, and S. A. Seshia, "Reactive synthesis from signal logic specifications," in Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC). ACM, 2015, pp. 239 -- 248. temporal [22] A. F. Molisch, Wireless communications. vol. 34. John Wiley & Sons, 2012, [23] I. Haghighi, A. Jones, Z. Kong, E. Bartocci, R. Gros, and C. Belta, "Spatel: a novel spatial-temporal logic and its applications to net- worked systems," in Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control. ACM, 2015, pp. 189 -- 198. [24] E. Bartocci, E. A. Gol, I. Haghighi, and C. Belta, "A formal methods approach to pattern recognition and synthesis in reaction diffusion networks," IEEE Transactions on Control of Network Systems, 2016. [25] D. Q. Mayne, J. B. Rawlings, C. V. Rao, and P. O. Scokaert, "Constrained model predictive control: Stability and optimality," Au- tomatica, vol. 36, no. 6, pp. 789 -- 814, 2000. [26] Y. Kuwata, A. Richards, T. Schouwenaars, and J. P. How, "Distributed robust receding horizon control for multivehicle guidance," IEEE Transactions on Control Systems Technology, vol. 15, no. 4, pp. 627 -- 641, 2007. [27] M. Athans and P. L. Falb, Optimal control: an introduction to the theory and its applications. Courier Corporation, 2013. [28] R. Fourer, D. Gay, and B. Kernighan, Ampl. Boyd & Fraser Danvers, MA, 1993, vol. 117. [29] Z. Gu, E. Rothberg, and R. Bixby, "Gurobi optimizer reference manual," URL: http://www. gurobi. com, vol. 2, pp. 1 -- 3, 2012. Fig. 7: Distributed Motion Planning motion planning. By using STL-SpaTeL formulas to specify motion planning and communication requirements and en- coding them into MILP under distributed MPC, the proposed algorithm is able to find online control inputs for each agent distributively such that desired specifications and patterns can be satisfied and hence demonstrates the ability of dealing with large scale systems. The algorithm is validated by a co-optimization simulation for multi-agent system. REFERENCES [1] Y. Cao, W. Yu, W. Ren, and G. Chen, "An overview of recent progress in the study of distributed multi-agent coordination," IEEE Transactions on Industrial informatics, vol. 9, no. 1, pp. 427 -- 438, 2013. [2] C. Baier, J.-P. Katoen, and K. G. Larsen, Principles of model checking. Boston: MIT Press, 2008. [4] C. Belta, A. Bicchi, M. Egerstedt, E. Frazzoli, E. Klavins, and G. J. Pappas, "Symbolic planning and control of robot motion [grand challenges of robotics]," IEEE Robotics & Automation Magazine, vol. 14, no. 1, pp. 61 -- 70, 2007. [5] M. Kloetzer and C. Belta, "Automatic deployment of distributed teams of robots from temporal logic motion specifications," IEEE Transactions on Robotics, vol. 26, no. 1, pp. 48 -- 61, 2010. [6] G. E. Fainekos, A. Girard, H. Kress-Gazit, and G. J. Pappas, "Temporal logic motion planning for dynamic robots," Automatica, vol. 45, no. 2, pp. 343 -- 352, 2009. [7] S. Karaman and E. Frazzoli, "Sampling-based motion planning with deterministic µ-calculus specifications," in Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC 2009. Proceedings of the 48th IEEE Conference on. IEEE, 2009, pp. 2222 -- 2229. [8] A. Richards and J. P. How, "Aircraft trajectory planning with collision avoidance using mixed integer linear programming," in Proceedings of the 2002 American Control Conference, vol. 3. IEEE, 2002, pp. 1936 -- 1941. [9] S. Karaman and E. Frazzoli, "Linear temporal logic vehicle routing with applications to multi-uav mission planning," International Jour- nal of Robust and Nonlinear Control, vol. 21, no. 12, pp. 1372 -- 1395, 2011.
1505.07257
1
1505
2015-05-27T10:33:31
A First Step Towards Dynamic Hybrid Traffic Modeling
[ "cs.MA" ]
Hybrid traffic modeling and simulation provide an important way to represent and evaluate large-scale traffic networks at different levels of details. The first level, called "microscopic" allows the description of individual vehicles and their interactions as well as the study of driver's individual behavior. The second, based on the analogy with fluidic dynamic, is the "macroscopic" one and provides an efficient way to represent traffic flow behavior in large traffic infrastructures, using three aggregated variables: traffic density, mean speed and traffic volume. An intermediate level called "mesoscopic" considers a group of vehicles sharing common properties such as a same origin and destination. The work conducted in this paper presents a first step allowing simulation of wide area traffic network on the basis of dynamic hybrid modeling, where the representation associated to a network section can change at runtime. The proposed approach is implemented in a simulation platform, called Jam-free.
cs.MA
cs
A FIRST STEP TOWARDS DYNAMIC HYBRID TRAFFIC MODELING Najia Bouha(cid:63)(cid:63) , Gildas Morvan(cid:63), Hassane Abouaıssa(cid:63), Yoann Kubera(cid:63) (cid:63) Univ. Lille Nord France, 59000 Lille, France, U-Artois, LGI2A (EA 3926), Technoparc Futura, 62400 B´ethune, France Email: (hassane.abouaissa, gildas.morvan, yoann.kubera)@univ-artois.fr (cid:63)(cid:63) Universit´e Ibn Zohr, Facult´e des Sciences, Agadir, Morocco, Email: [email protected] 5 1 0 2 y a M 7 2 ] A M . s c [ 1 v 7 5 2 7 0 . 5 0 5 1 : v i X r a KEYWORDS Agent-based modeling; Multi-level modeling; Intelligent transportation systems; Simulation; Traffic flow ABSTRACT Hybrid traffic modeling and simulation provide an important way to represent and evaluate large-scale traffic networks at different levels of details. The first level, called "microscopic" allows the description of individual vehicles and their inter- actions as well as the study of driver's individual behavior. The second, based on the analogy with fluidic dynamic, is the "macroscopic" one and provides an efficient way to represent traffic flow behavior in large traffic infrastructures, using three aggregated variables: traffic density, mean speed and traffic volume. An intermediate level called "mesoscopic" considers a group of vehicles sharing common properties such as a same origin and destination. The work conducted in this paper presents a first step allowing simulation of wide area traffic network on the basis of dynamic hybrid modeling, where the representation associated to a network section can change at runtime. The proposed approach is implemented in a simulation platform, called JAM-FREE. INTRODUCTION Severe congestion is a daily problem which leads to a con- tinuously growth of direct and indirect cost. Traffic congestion which can be recurrent typical to rush hours or non recurrent due to accidents, works, . . . represents a major preoccupation of many transportation institutions and practitioners, calls for an efficient and intelligent dynamic management. Accordingly, several works were undertaken to study the traffic phenomena, to implement effective strategies for an optimal use of the existing infrastructure and to minimize the congestion effects as well as a high quality of service. Nevertheless, the im- plementation of traffic measurement and control algorithms calls for a deep understanding of the traffic phenomena. In this context, traffic flow modeling and simulation play an important role and constitute efficient tools to perform tasks such as traffic prediction and monitoring, traffic control and forecasting, the repercussion of the construction of new parts on infrastructure onto the global behavior of the traffic flow, . . . According to the defined objective, several models have been developed and can be classified into microscopic, mesoscopic and macroscopic models. However, to simulate large-scale road networks, it can be interesting to integrate different representations in the same framework which leads to the so-called "hybrid modeling" as shown on fig. 1. Note that the concept of hybrid modeling has different meanings according to the studied domain. Here, hybrid modeling means the coupling of different models. In this paper, the first step is devoted to the integration of microscopic and macroscopic models into a single framework. The concept of hybrid modeling has been developed by several authors. Hence, some existing hybrid micro-macro traffic models are shown in Table I. simulated entities control strategies macro flow of vehicles ramp metering meso group of vehicles variable-message panels micro vehicle vehicle instrumentation Fig. 1. Hybrid traffic simulation and control approach The models presented in Table I share the same limitation: connections between levels are fixed a priori and cannot be changed at runtime. Therefore, to be able to observe some emerging phenomena such as congestion formation or to find the exact location of a jam in a large macro section, a dynamic hybrid modeling approach is needed. The work presented in this paper is devoted to overcome these shortcomings and proposes the first step towards the development and implementation of dynamic hybrid models. Such a new approach provides an efficient way to change the model Magne et al. (2000) Poschinger et al. (2002) Bourrel and Lesort (2003) Mammar and Haj-Salem (2006) Espi´e et al. (2006) El hmam (2006) Joueiai et al. (2013) micro model SITRA-B+ IDM optimal velocity ARCHISM generic ABM IDM macro model SIMRES Payne LWR ARZ SSMT LWR LWR, ARZ, Payne STATIC MICRO-MACRO TRAFFIC FLOW MODELS PROPOSED IN THE TABLE I LITERATURE level of representation dynamically. As a result of these devel- opment, a platform called JAM-FREE has been implemented. In the following sections, we identify the main issues related to dynamic hybrid traffic modeling and then propose some generic solutions to them. Then, the JAM-FREE simulator is presented, as well as some simulation results. Finally, we conclude and suggest some research perspectives. DYNAMIC HYBRID TRAFFIC MODELING: MOTIVATIONS AND EXISTING SOLUTIONS Motivations Traffic simulation is generally used to: 1) simulate the road traffic flow on very large and complex infrastructures including both city and highways while 2) being able to test the effects of different traffic signs, for example, or traffic assignment and dynamic routing strategies. It provides also a simple way to evaluate the impact of dynamic traffic control (ramp-metering, dynamic speed limit, . . . ) on the whole behavior of the traffic, 3) assess their precise influence on the traffic flow and 4) understand how and why traffic perturbations leading to appearance of congestions do occur. The first goal is easily achieved using macroscopic simula- tion models at the expense of the fourth goal. Conversely, the fourth goal is easily carried-out using microscopic simulation models at the expense of the first goal. To deal with this paradox, and benefit from both approaches, a dynamic hybrid model can be used. The advantages of this hybrid approach include the ability: • To obtain both quantitative and qualitative information about the road traffic, using respectively macroscopic and microscopic representations in the same simulation using the clusters principle. • to switch between these different levels of representation locally depending: -- on the simulation needs; for instance understanding the source of a traffic congestion, -- on the computation constraints; for instance manag- ing the CPU load, • to experiment both macroscopic and microscopic dy- namic routing strategies, i.e. road load balancing strate- gies, and others dynamic trafic control. Use cases examples In order to assess the relevance of our approach for dynamic hybrid simulation, use cases demonstrating the limits of the existing solutions depicted in Table I are presented in this section. Reduce the CPU load during peak hours: The hybrid model can change the traffic representation of a portion of the road network dynamically. This feature can be used to switch from a microscopic representation to a macroscopic one, when the CPU is overused in order to reduce its load. Such situations include cases where the number of simulated vehicles becomes too high to be managed satisfyingly by the CPU (for instance during peak hours). This case is illustrated in figure 2. Balance the CPU load between clusters: The hybrid model can change the traffic representation of a portion of the road network dynamically. This feature can be used to switch from: • a microscopic representation to a macroscopic one when the CPU is overused in order to reduce its load, • inversely (from macroscopic to microscopic), in order to detect the reason for the occurrence of traffic congestion. These features can be used jointly to balance the CPU load between two clusters. Such situations include cases where a traffic jam (or con- gestion) appears in a cluster using a macroscopic model and where the number of simulated vehicles in another cluster is significantly reduced (for instance during off-peak hours). Such situations also include cases where a traffic jam appears in a cluster using a microscopic model and where the number of simulated vehicles in another cluster is significantly reduced (for instance during fluidic period of the flow) as illustrated in figure 3. Find out the reason of the occurence of the traffic jam: Fig- ure 4 shows an example of the occurence of traffic congestions. It demonstrates the relevance of dynamic hybrid simulations to switch between two levels of representation in order to find out the causes of the appearance of these phenomena. Follow moving macroscopic phenomena: The static division of the road network into clusters that can be found in most of the existing approaches causes precision losses. Indeed, a traffic flow simulator has to be able to reproduce macroscopic phenomena such as shockwaves, capacity drop, . . . Yet, the static decomposition found in static hybrid models will cause eventually a loss of quantitative information. To avoid this issue, a dynamic hybrid model gives the ability to move, resize, split and merge the clusters of the road network (see figure 5). Limits of the existing solutions To the best of our knowledge, the only other work describ- ing a dynamic hybrid model is Sewall et al. (2011). However, authors focus on the visualization of data rather than accurate simulation of traffic flow: zooming in a part of the network triggers a micro representation on this area. Thus, there is no bi-directional information exchange between the micro and macro representations. Fig. 2. Illustration of the use case "Reduce the CPU load during peak hours". Fig. 3. Illustration of the use case "Balance the CPU load between clusters". Fig. 4. Illustration of the use case "Find out the reason of a traffic jam". Fig. 5. Dynamic hybrid model of a shockwave phenomenon. DYNAMIC HYBRID TRAFFIC MODELING: ISSUES AND PROPOSED SOLUTIONS Main issues First, we identify the main issues to address in order to simulate dynamic hybrid traffic models accurately. 1) How can the simulated network be structured to switch between different models at runtime? 2) How to switch between different models (particularly from macro to micro)? 3) How the temporalities of the different interacting models can be managed to avoid bias? In the next section, we present possible generic solutions to these issues. Proposed solutions Dynamic decomposition of the network into autonomous clusters: The network can be dynamically decomposed into autonomous clusters. Each cluster operates autonomously and simulates the traffic flow using a model of its own. However, cutting the road network is not arbitrary, to avoid incoherent situation like having an area of a few square meters. To ensure the integrity of the simulation, a minimum cut is deducted from sensors: the entry and exit points of a cluster are necessarily sensors. Thus, the road network can be viewed as a directed graph of interconnected sensors. Each arc of the graph represents a path joining two sensors directly, without going through an intermediate sensor. A cluster is then characterized by input and output sensors and eventually sensors situated inside the cluster. The mini- mum cutting of the road network is then defined by: • a cluster representing the outside of the simulated net- work, • clusters representing minimal subsets in the road network; a cluster is minimal if there is no sensor inside the cluster. Clusters of a simulation are necessarily disjoint combination of minimum contiguous clusters. An example of minimal cutting is depicted in figure 6. Each cluster transmits mean speed and flow information from its bounding sensors to the upstream and downstream clusters. In the case of a macro cluster, this information is integrated using flow conservation and prediction formulas to compute the flow at next time. In the case of a micro cluster, it consists in changing the frequency of generation of vehicles and their speed based on data from the sensors, and measuring the number of vehicles passing the sensors and their speed, for a given time interval to deduct the sensor data. Aggregation and disaggregation of traffic variables: When running the simulation, an agent manages the decomposition of the cluster network. This agent encapsulates rules, determining whether the model used in a cluster must be changed (for example from micro to macro) and determining whether the area of a cluster must be enlarged or reduced according to the needs of the simulation (see the previous section). Switching from micro to macro is straightforward: the mean speed and flow inside the cluster can be directly computed from sensors. On the other hand, switching from macro to micro requires to perform a local warm-up so the speed, density and flow of vehicles can be accurate. Formal multi-level agent-based meta-model: Regular multi- agent based simulation meta-models lack the structure to manage such hybrid approaches: their representation of the agents, the environment and the temporal dynamics of the system is designed to support a single viewpoint. Multi-level agent-based modeling is an interesting approach to simulate such systems. Indeed it offers a large range of techniques to dynamically adapt the level of detail of simulations, couple heterogenous models or detect and reify emergent phenom- ena (Gaud et al., 2008; Gil-Quijano et al., 2012; Picault and Mathieu, 2011). Many meta-models and simulation engines dedicated to multi-level agent-based modeling have been proposed in the literature. See e.g. Morvan (2013) for a complete review. Man- aging multiple viewpoints on the same phenomenon induces the use of heterogeneous time models, thus raising issues related to time and consistency. However, simulation bias can be controlled by rules that constraint perceptions, influence production and reaction computation, according to causality and coherence principles (Morvan et al., 2011). To deal with this issue, we developed a generic approach called SIMILAR to design simulations (see Morvan and Kubera (2014) for more detailed information about the main principles of SIMILAR). Indeed, this approach relies on a multi-level, influence-reaction and agent-based knowledge representation, more fitting to multiple viewpoints (Ferber and Muller, 1996; Michel, 2007; Soyez et al., 2013). THE JAM-FREE SIMULATOR Architecture JAM-FREE is based on a multi-level architecture (see e.g., figure 7): • the infrastructure level models the components of the road network; the naming and identification of road network components follow the S´etra (Service d'´etudes sur les transports, les routes et leurs am'enagements, is a French technical service of the Minist`ere de l' ´Ecologie, du D´eveloppement Durable et de l' ´Energie dedicated to transportation issues) specification (S´etra, 2010). • the control level is the core of the dynamic hybrid approach: it manages the dynamic decomposition of the network into clusters. • the simulation dependent levels model the traffic dynamic using a dedicated representation; by default, three traffic levels are considered: microscopic, macroscopic and data- driven (i.e., using real data). Models used in JAM-FREE Road network structure: We consider that the road network can be divided dynamically into subsets called clusters. The traffic is simulated on each cluster using various heterogeneous models depending on the situation: either a microscopic model or a macroscopic model. For computation time efficiency Fig. 6. Minimal cutting of a network • Highway extraction node Microscopic level models: The behavior of a vehicle can be seen as the sum of three different parts: • A navigation behavior when the current lane of the vehicle does not lead to the desired destination of the vehicle. This behavior consists in changing the lane of the vehicle until the current lane of the vehicle leads to the desired destination. • An overtaking behavior when the vehicle either wants to increase its speed by changing its lane, or when the vehicle has to swerve because a faster vehicle is tailing it. • A behavior when no lane change is required (acceleration model). Fig. 7. Multi-level architecture of JAM-FREE reasons, we choose not to model the road network at a physical level. Indeed, such a model requires the vehicles to interpret a large continuous zone of asphalt with blank lines as separated lanes. Such computations are unnecessary complex, since in our use case (France) rational drivers usually never drive over the blank lines separating the lanes if they are not overtaking. To keep the model simple, the road network is only modeled at a semantic level. The road network is modeled as a set of interconnected roads. Each road contains a set of lanes (usually from 1 to 5). Roads also contain vertical signs (e.g. stop sign, speed limit sign) that are bond either to all the lanes or to specific lanes (e.g. extraction lane in the highway, slow vehicles lane). In our model, we support a specific subset of the french vertical signs. The connection points of the roads are called nodes. We distinguish different types of nodes: • Crossroads nodes • Roundabout nodes • Highway insertion node JAM-FREE implements the highly used Intelligent-Driver Model (IDM) to model the acceleration behavior of vehi- cles (Kesting et al., 2010). IDM is a microscopic traffic flow model, i.e., each vehicle- driver combination constitutes an active "particle" in the sim- ulation. Such models characterize the traffic state at any given time by the positions and speeds of all simulated vehicles. In case of multi-lane traffic, the lane index complements the state description. More specifically, IDM is a car-following model. In such models, the decision of any driver to accelerate or to brake depends only on his or her own speed, and on the position and speed of the "leading vehicle" immediately ahead. The model structure of IDM can be described as follows: • the influencing factors (model input) are the own speed v, the bumper-to-bumper gap s to the leading vehicle, and the relative speed (speed difference) of the two vehicles (positive when approaching), • the model output is the acceleration chosen by the driver for this situation, • the model parameters describe the driving style, i.e., whether the simulated driver drives slow or fast, careful or reckless. Lane changes takes place, if: • the potential new target lane is more attractive, i.e., the "incentive criterion" is satisfied, • and the change can be performed safely, i.e., the "safety criterion" is satisfied. JAM-FREE implements the lane changing model MOBIL (Kest- ing et al., 2007). Chosen acceleration and lane changing models are presented in detail in the JAM-FREE documentation. Macroscopic level model: Any macroscopic traffic flow model can be used in JAM-FREE since it defines generic connectors to convert micro/macro representations. By default, a generic implementation of the METANET model is pro- vided (Messner and Papageorgiou, 1990). METANET is based on a second order macroscopic model and uses the following traffic flow equations: ρi(k + 1) = ρi(k) + [qi−1(k)− qi(k)] Ts Li (1) where, ρi, defines the traffic density in (veh/km/lane). Li, k and Ts represent, the segment length (km), the simulation step and its duration, respectively. qi in (vehicles/h) defines the traffic flow in the segment i: qi = ρivi (2) The speed vi in (km/h) represents the velocity of vehicles in segment i at time kTs. vi = Ve (ρi) (3) where Ve (ρi) is the static speed-density characteristic called a fundamental diagram. The momentum equation is obtained by introducing two small constant parameters in (3). Such equation reads: (cid:124) (cid:125) Ts τ [Ve(ρi)− vi(k)] vi(k)[vi−1(k)− vi+1(k)] vi(k + 1) = Tsη Li (cid:123)(cid:122) (cid:125) convection relaxation (cid:123)(cid:122) (cid:124) − Tsν τLi + (cid:124) (cid:123)(cid:122) ρi+1(k)− ρi(k) ρi(k) + κ (cid:125) anticipation (4) The first term of equation (4) represents relaxation to the equilibrium. This is the most dominant term in the equation since the other terms manifest their effects only when there are (occasional) fluctuations in the traffic speed and density upstream or downstream. This relaxation term describes the fact that the drivers adjust their speeds to the equilibrium speed-density characteristic Ve (ρi) according to the reaction time τ. The second term, represents the convection, i.e., the influence of the upstream traffic mean speed. The third term, called "anticipation", translates the effect of drivers reacting to downstream traffic density variations. Drivers tend to decelerate if the downstream density is higher and accelerate if it is lower. ν, κ are a model parameters. Traffic generation: In our model, each input point is a special connector that will generate traffic on the road it is attached to. Note that such a connector has to be created and put on each lane where the traffic appears. The creation of vehicles is managed by a traffic input point agent. Various implementation of this agent currently exist: • "Flow-mass traffic input point" agents, generating the traffic flow using a flow-mass parameter • "Scripted traffic input point" agents, generating the traffic flow using user-defined events. The created vehicles and the creation dates are manually specified by the users. A first experimentation To validate the models implemented in JAM-FREE, as well as the flow (dis)aggregation algorithms, we performed a first hybrid simulation using real data from of the A25 highway in France. We simulate a 4780m portion of the highway, de- composed into 11 clusters (see fig. 8). The clusters containing insertion or extraction lanes are simulated with a microscopic model, the others with a macroscopic model. Fig. 8. Description of the simulated network The obtained results permit to validate the performance of JAM-FREE as well as its microscopic and macroscopic models. We cannot present in this paper for an evident question of space. The figure 9 shows some simulation results in cluster R8 (i.e., after (dis)aggregation processes), using typical model parameter values (i.e., without specific calibration). them all CONCLUSION AND PERSPECTIVES In this paper a first step towards the implementation of a dynamic hybrid model was proposed. The main objectives of this step were to identify use-cases, propose generic solutions to the dynamic hybrid simulation problem and study the core aspects of the multi-level simulation approach. These ideas have then been implemented in a simulator called JAM-FREE. The first experiments using real data allow us to validate several issues addressed in the paper and the implemented models. Further works will focus on the introduction of several 0.8 0.7 0.6 0.5 0.4 0.3 0.2 32 30 28 26 24 real simulated 2000 4000 6000 8000 (a) density (vehicle/m) real simulated 2000 4000 time (s) (b) speed (m/s) 6000 8000 Fig. 9. Simulation results in cluster R8 traffic models allowing to the practitioners multiple choices in function of their simulation objective and the validation of the identified use-cases. Moreover, a more accurate macro/micro switching algorithm is being developed using a sophisticated continuous warm-up process. In addition, some control strate- gies will be added to JAM-FREE in order to evaluate their impact on the global behavior of the networks. REFERENCES Bourrel, E. and Lesort, J. (2003), Mixing micro and macro representations of traffic flow: a hybrid model based on the LWR theory, 82th Annual Meeting of the Transportation Research Board . El hmam, M. (2006), Contribution `a la mod´elisation et `a la simulation hybride du flux de trafic, PhD thesis, Universit´e d'Artois. Espi´e, S., Gattuso, D. and Galante, F. (2006), Hybrid traffic model coupling macro- and behavioral microsimulation, 85th Annual Meeting of Transportation Research Board. Ferber, J. and Muller, J.-P. (1996), Influences and reaction: a model of situated multiagent systems, 2nd International Conference on Multi-agent systems (ICMAS'96), pp. 72 -- 79. Gaud, N., Galland, S., Gechter, F., Hilaire, V. and Koukam, A. (2008), Holonic multilevel simulation of complex sys- tems : Application to real-time pedestrians simulation in virtual urban environment, Simulation Modelling Practice and Theory 16, 1659 -- 1676. Gil-Quijano, J., Louail, T. and Hutzler, G. (2012), From biological to urban cells: Lessons from three multilevel agent-based models, Principles and Practice of Multi-Agent Systems, Vol. 7057 of LNCS, Springer, pp. 620 -- 635. Joueiai, M., van Lint, H. and Hoogendoorn, S. (2013), Generic solutions for consistency problems in multi-scale traffic flow models - analysis and preliminary results, 16th Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), pp. 310 -- 315. Kesting, A., Treiber, M. and Helbing, D. (2007), General lane- changing model MOBIL for car-following models, Trans- portation Research Record: Journal of the Transportation Research Board 1999(1), 86 -- 94. Kesting, A., Treiber, M. and Helbing, D. (2010), Enhanced intelligent driver model to access the impact of driving strategies on traffic capacity, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineer- ing Sciences 368(1928), 4585 -- 4605. Magne, L., Rabut, S. and Gabard, J. (2000), Towards an hybrid macro-micro traffic flow simulation model, Proceedings of the INFORMS Salt Lake City String 2000 Conference . Mammar, S.and Lebacque, J. and Haj-Salem, H. (2006), Hybrid model based on second-order traffic model, 85th Annual Meeting of the Transportation Research Board. Messner, A. and Papageorgiou, M. (1990), Metanet: A macro- scopic simulation program for motorway networks, Traffic Engineering & Control 31(8-9), 466 -- 470. Michel, F. (2007), The IRM4S model: the influence/reaction principle for multiagent based simulation, Proc. of 6th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1 -- 3. Morvan, G. (2013), Multi-level agent-based modeling - a literature survey, CoRR abs/1205.0561. Morvan, G. and Kubera, Y. (2014), SIMILAR documentation. http://www.lgi2a.univ-artois.fr/∼morvan/similar.html. Morvan, G., Veremme, A. and Dupont, D. (2011), IRM4MLS: the influence reaction model for multi-level simulation, Multi-Agent-Based Simulation XI, Vol. 6532 of LNCS, Springer, pp. 16 -- 27. Picault, S. and Mathieu, P. (2011), An interaction-oriented model for multi-scale simulation, Proc of the 22nd Int. Joint Conf. on Artificial Intelligence, AAAI Press, pp. 332 -- 337. Poschinger, A., Kates, R. and Keller, H. (2002), Coupling of concurrent macroscopic and microscopic traffic flow models using hybrid stochastic and deterministic disaggregation, Transportation and Traffic Theory for the 21st century . S´etra (2010), Identification et localisation sur le reseau routier national, Technical report, S´etra, 110 rue de Paris 77171 Sourdun - France. http://dtrf.setra.fr/pdf/pj/Dtrf/0005/Dtrf- 0005792/DT5792.pdf Sewall, J., Wilkie, D. and Lin, M. C. (2011), Interactive hybrid simulation of large-scale traffic, ACM Transaction on Graphics (Proceedings of SIGGRAPH Asia) 30(6). Soyez, J.-B., Morvan, G., Dupont, D. and Merzouki, R. (2013), A methodology to engineer and validate dynamic multi- level multi-agent based simulations, Multi-Agent-Based Simulation XIII, Vol. 7838 of LNCS, Springer, pp. 130 -- 142.
1003.1810
1
1003
2010-03-09T07:20:49
Reconfigurable Parallel Data Flow Architecture
[ "cs.MA" ]
This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provide an attractive alternative to the current set of disjoint approaches that are currently applied to this problem domain. The ability of methodology to implement data flow type processing with different models is presented in this paper.
cs.MA
cs
Reconfigurable Parallel Data Flow Architecture Hamid Reza Naji International Center for Science and High Technology & Environmental Sciences implementing hardware agents for data/control flow type environments in four models: two models that describe deterministic hardware agents in fine and coarse grain modes; one model of hardware agents handling both control flow and data flow; and one intelligent, non- deterministic model that hints at some of the more advanced possibilities of hardware agent use. Section 4 presents implementation and results. The results of implementing dataflow operations with hardware agents show the high processing speed of input tokens and producing results in compare to software agents implementation. Section 5 provides conclusions. II. Reconfigurable Hardware Agents The current state of Field Programmable Gate Array (FPGA) technology and other reconfigurable hardware [13] makes it possible for hardware implementations to enjoy much of the flexibility that was formally only associated with software. Unlike conventional fixed hardware systems, reconfigurable hardware has the potential to be configured in a manner that matches the structure of the application. In some cases, this can be done statically before execution begins where the structure of the hardware will remain unchanged as the system operates. In other cases it is possible to re- configure the hardware dynamically as the systems is operating to allow it to adapt to changes in the environment or the state of the system itself. In other words, the design of the hardware may actually change in response to the demands placed upon the system throughout the scope of the application. The system could be a hybrid of both low-level hardware based agents and higher-level software implementations of agents which cooperate to achieve the desired results. Implementation of agent techniques in re-configurable hardware[11,12] allows for creation of high-speed systems that can exploit a much finer grained parallelism than is possible with distributed software based systems. It is assumed that an embedded system will be created that utilizes adaptable (reconfigurable) hardware which can be created using FPGA, System on a Chip (SOC)[14], or custom technology. In such an architecture, the functionality of the reconfigurable hardware is controlled by placing design information directly into the configuration memory. In this way, the external environment has the capability to either change the hardware’s functionality dynamically or at the time that the application is created by introducing agents into the appropriate area of configuration memory that controls Abstract- This paper presents a reconfigurable parallel data flow architecture. This architecture uses the concepts of multi-agent paradigm in reconfigurable hardware systems. The utilization of this new paradigm has the potential to greatly increase the flexibility, efficiency, expandability of data flow systems and to provide an attractive alternative to the current set of disjoint approaches that are currently applied to this problem domain. The ability of methodology to implement data flow type processing with different models is presented in this paper. Key Words: Dataflow, Reconfigurable Systems, Multi- agents I. Introduction The focus of this paper is to illustrate how multi-agent concept can be employed within today's reconfigurable hardware design environments for data flow processing. We call these new agents that run inside reconfigurable logic “Hardware Agents [10],” as opposed to the more traditional software agents that normally reside in computer program memory (RAM) and execute using commercially available microprocessors. Such design environments often utilize hardware description languages such as VHDL to capture the design and use synthesis tools to translate this high level description of the system into a low level bit stream that can be used to program the reconfigurable devices. We will utilize and adapt a reduced form of the Belief, Desire and Intention (BDI) architecture [9] for our agents. In this architecture, the term, beliefs, represent the set of working assumptions that the agent has about itself and the environment in which it functions. This forms informational state of a BDI agent -- where such information may be incomplete and inaccurate but often can be modified in a local manner by the agent as a byproduct of the agent's interactions with other agents and the environment. The term, desires, represent the high- level set of objectives and goals that the agent is trying to achieve. The agent’s desires must be realistic and must not conflict with each other. Intentions represent the deliberative state of the BDI agent. It is here that the detailed sequences of actions, called plans, made to the environment and other cooperating agents through actuators are maintained. Section 2 introduces the basic concepts associated with the hardware multi-agent paradigm and reconfigurable computing environment. In section 3, paper illustrates the . (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 244http://sites.google.com/site/ijcsis/ ISSN 1947-5500 the interconnectivity of and functionality the this architecture, reconfigurable hardware. the In reconfigurable to support partial is assumed logic reconfiguration in that it is assumed that segments of its logic can be changed without affecting other segments (for example the Xilinx Virtex-II architecture supports powerful new configuration modes, including partial reconfiguration. Partial reconfiguration can be performed with and without shutting down the device)[13]. Interaction with the external environment is supported by I/O connections made directly to the reconfigurable logic. This allows high speed sensor and actuator operations to be controlled directly by the reconfigurable logic without processor intervention. Figure 1 illustrates a generic dynamically adaptable embedded system environments that support the hardware agent model that is proposed in this paper. In Figure 1 an embedded processor/controller the to is connected reconfigurable hardware in a manner that allows it to alter the configuration memory associated with one or more segments of the partially reconfigurable logic. In this model it is the responsibility of the embedded processor to initiate the configuration of each segment of the reconfigurable hardware by transferring configuration data from processor-controlled memory spaces to the configuration memory using memory mapped or DMA type operations. It should also be noted the that configuration memories are shown as if they were spatially separated from the logic elements that they control but this is usually not the case. In general configuration memory the throughout is dispersed reconfigurable hardware. Figure 1. A Processor-Controlled Dynamically Reconfigurable Embedded System Environment The processing time of a hardware agent can be one or two orders of magnitude greater than an equivalent software agent due to the speed of hardware compared to the speed of microprocessor-based software. This speed could be especially desirable in a real-time system and real-time processing requiring high-speed signal conditioning. In special cases, if the beliefs and the inputs to the agent are expressed as Boolean values, then the function that maps the current set of beliefs and the input data to a new set of beliefs can be implemented as . combinatorial logic. The speed of this implementation would be much faster than performing the comparable operation in software. Likewise, if desires and intentions are both expressed as Boolean values, the function that maps desires into intentions can also be implemented in combinatorial logic; again, at very high speed. III. Design of Multi Hardware Agent Systems to Implement Data Flow Operations The ability of hardware agents to implement data flow type synchronization with different models is presented in this section. This type of synchronization is often employed when to hardware creating modern communicate between asynchronous hardware elements. In a data flow operation, the execution of each operation is driven by the data that is available to that operation. The behavior of data flow operations can be shown by data the data represent flow graphs(DFG) which dependencies between a number of operations. A data flow graph is made up of operators (actors) connected by arcs that convey data. An operator has input and output arcs that carry tokens bearing values to and from the actor. When tokens are present on each input arc and there are no tokens on any output arc, actors are enabled (fired). This means removing one token from each input arc, applying the specified operation to the values associated with those tokens, and placing tokens labeled with the result value on the output arcs. We will present four models to show the ability of hardware agents to implement data flow operations in different scenarios. A. Deterministic Fine Grain Hardware Agents Consider using the dataflow graph shown in figure 2 to 1O . In this dataflow graph there are four find the output 4I ) and 5 nodes(operations). 2I , inputs( 1I , 3I , 1I 2I 4I 3I 5I 6I 2op 4op 1op 3op 5op 1O Figure 2. A sample dataflow graph If we use a multi-agent system to perform this operation, we can implement each of the nodes (operations) with a single agent if we define them at a fine grain level. In this example we use five different agents and each of them runs one single operation as is shown in Figure 3. The agents act in parallel on isolated operations, get information (data) from the environment, and send the results back to the environment. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 245http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Agent4 4op 2I 3I 4I 5I 6I Agent3 3op 1I According to Figure 4, Agent1,Agent2,and Agent3 sends intermediate results through their TR_Agent port and Agent4 and Agent5 receive this information through Agent1 Agent2 2op their RS_Agent port. Agent1, Agent2, Agent3 can use 1op their Request and Acknowledge signals to interact with the environment (send a request which means the agent is free and ready to receive new tokens, and send an acknowledge which means the agent has received the input tokens). Agent5 Agent5, after processing the final operation, sends the result through its Output port to the environment and 1O informs the environment by setting its done signal. As we mentioned before, the most important advantage of Figure 3. A multi-agent system to implement the data hardware agents for implementing data flow operations is flow operations of Figure 2 the the high speed for processing data inputs and By implementing this data flow graph with hardware producing the outputs. Thus, the speed of information agents we benefit from the speed of the specialized flow can be several times the speed of the flow of hardware in processing the input tokens and producing information when the same flow graph is implemented in the results. Five hardware agents cooperate together to software. form a multi-agent architecture for this data flow graph. Using the reconfigurability of hardware agents we can As Figure 4 shows, in this structure, Agent1, Agent2, and reconfigure the agents in the same multi-agent system to Agent3 receive the input tokens from the enviroment, implement a different data flow graph. For example, process them and send the results to Agent4 and Agent5. different data flow graphs can be implemented using the Finally Agent5 sends the overall result to the same multi-agent system of Figure 4 as we will see later. environment. A signal from the environment activates this In this model agents are small, simple and easy to multi-agent system and when each agent completes the implement for simple operations, but to implement a operation on its input tokens it will set its done signal and complex system we need many agents and a lot of send the value of that result to the agent in the next level. communication between agents with high latency. So, It will inform that agent by sending its done signal to the deterministic fine grain hardware agents system is strobe signal of its successive agent. In this model, suitable for simple deterministic systems. hardware agents use done and strobe signals for handshaking. Multi Hardware Agent System 1I 2I t t n n e e m m n n o o r r i i v v n n Sel Done (1) E E Str (1) m m Str (2) o o r r f f HW Agent5 t t u u p p n RS (1) Out (1) n I I RS (2) 5I 6I activate multi-agent system Figure 4. Multi hardware agent system of figure3 Sel Done (1) Str (1) Req (1) Str (2) Ack (1) Ack (2) HW Agent4 RS (1) TR (1) RS (2) Sel Done(1) Str(1) Req(1) Ack(1) HW Agent1 In (1) TR(1) In (2) Sel Done(1) Str(1) Req(1) Ack(1) HW Agent2 In (1) TR(1) In (2) Sel Done(1) Str(1) Req(1) Ack(1) HW Agent3 In (1) TR(1) In (2) O u t p u t t o E n v i r o n m e n t 1O 5op 3I 4I . (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 246http://sites.google.com/site/ijcsis/ ISSN 1947-5500 B. Deterministic Fine/Coarse Grain Hardware Agents To show the power gained by reconfiguring hardware agents and also to demonstrate how hardware agents can provide support for both fine grain and coarse grain abstractions[15], we implement the data flow graph of Figure 5 using the same multi-agent system of Figure 3. 1I 2I 4I 3I 5I 6I 7I 8I 1op 9I 2op 3op 4op 5op Agent2 Agent3 Agent4 6op Agent1 7op 9op Agent5 8op 11op 10op 3O 2O Figure 5. A sample fine grain/coarse grain dataflow graph As we see in Figure 5, Agent1 and Agent5 are coarse grained agents, with several data flow operations implemented in the same agent,while Agent3, Agent4, and Agent5 are fine grained agents, with only a single data flow operation implemented per agent. They act in parallel in those operations which are not dependent on the other operations, and also cooperate together to find the outputs. The major reason for combining some operations in a single agent is to reduce the hardware interface and the amount of inter-agent communication. This is analogous to the grain packing problem associated with traditional parallel processing problems[16]. We can implement the data flow graph of Figure 5 using the same multi hardware agent system of Figure 4, just agents are reconfigured. In this model with combination of fine and coarse grain agents a trade of between the agent simplicity and communication time depending to the complexity of system can be provided. So, a combination of fine grain and coarse grain hardware agents is suitable for systems consisting both simple and complex deterministic operations. C. Control /Data Flow Hardware Agents This model demonstrates how control flow as well as data flow can be implemented using hardware agents.We consider the following graph (Figure 6) which contains both control flow and data flow. In this system, according to the events in the environment, the control part will . 1op & 3op 6I choose the time that the data flow operations 4op should be activated. 2op & or Events 2I 5I 1I Sensor Agent1 Condition (threshold) 3I 4I 2op 1op 3op 4op Agent2 Agent3 Actuator Fig. 6. A sample dataflow graph We use a multi-agent system with three agents to implement this control and dataflow graph, as shown in Figure 6. In this system, Agent1 is used to implement control flow while Agent2 and Agent3 are used to implement data flow part. The implementation of this control/data flow graph is with a multi hardware agent system similar to the system shown in Figure 4 but with three hardware agents. In this model agents can run both data processing and control on the processing in the same multi-agent system at the same time. So, control/data flow hardware agents provides more independent powerful multi-agent systems. D. Non-Deterministic Hardware Agents This model demonstrates how hardware agents can be used in a non-deterministic and intelligent manner. We consider the control and data flow graph shown in Figure 7 that consists of three hardware agents. Agent1 is non- deterministic and intelligent. It receives input information, and saves its current state in memory. Its new state is a combination of the old state, what it has learned from the environment, and what it has calculated itself. In this system, according to the events in the environment, Agent1 will choose to activate Agent2 or Agent3, separately or in tandem, or will choose not to activate them at all. If Agent1 doesn’t receive any information within a certain period of time it will timeout and take appropriate action relative to the environment, according to its current state. We can define the learning and (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 247http://sites.google.com/site/ijcsis/ ISSN 1947-5500 decision making capability of Agent1 by the following function description: Function HW-Agent (percept) returns action Static: memory ; the agent’s memory memory ← update-mem(memory, percept) ;Learning by perception from environment action ← take-decision(memory) ;Decision-making by its knowledge memory ← update-mem(memory, action) ;Learning by last action return action According to this function a hardware agent can learn and update its memory using its current knowledge and percepts (set of perceptions or inputs) from the environment, its current state and calculations based both on state and environmental input. The agent makes decisions using its total knowledge, environmental, state, and current calculations on both environmental and state. As we see in Figure 7, the possible actions (plans) of this multi-agent system, which its non- illustrate determinism are: 1op → 3op → action Plan1: by cooperation of Agent1 & Agent2 2op → 3op → action Plan2: by cooperation of Agent1 & Agent3 3op → action memory → Plan3: agent 1 3op ) by Agent1(its knowledge & running memory → action Plan4: agent 1 by Agent1(its knowlwdge) With such a non-deterministic structure, the fault tolerant capability of hardware agents can be easily demonstrated. Suppose Agent1 has a timer, which times out after an input token is not received for a period of time. In this case, a value based on previous state or previous outputs can be presented as the output of the system. The implementation of this data flow graph is with a multi hardware agent system similar to the system implemented for Figure 6 but with three reconfigured hardware agents. With considering some situations which are not predefined or cannot predicted mainly in real-time systems then having agents with non-deterministic behavior in the multi-agent system will be useful. So non- deterministic hardware agents provide multi-agent systems with the high capability of responding to the non- deterministic real-time situations. . Events 3I sensor percept 1I 2I Agent1 Agent2 Agent3 Memory actuator 2op 3op 1op Actions Figure 7. A sample non-deterministic dataflow graph IV. Implementation and results Suppose that we are using dataflow operations of Figure 2, multi-agent system of Figure 3 and multi hardware agents of Figure 4 for a data fusion system as 1s and 2s are the sensory inputs to shown in Figure 8. the system. 2s 1s 1s correlation 2s 1s closeness 2s average Agent1 Agent2 Agent3 confidence Agent4 Agent5 Figure 8. Data flow operations of Figure 3 for data fusion In the first level of fusion process, Hardware Agent1 computes the correlation between sensors 1s and 2s by i ba , ( ) using pairs of observation of these sensors using i equation 1. fusion k k k ∑∑∑ b baN a − i i i i 1 1 1 k k k k ∑∑ ∑∑ 2 2 a b aN bN [ [ ( ]) ( 2/12 − − i i i i 1 1 1 1 (1) ]) 2/12 Correlation = (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 248http://sites.google.com/site/ijcsis/ ISSN 1947-5500 ) (3) γ)). ban ,( (2) Thus Correlation=1 means correlation, perfect Correlation= inverse correlation, and -1 indicates Correlation=0 indicates no correlation between the data. In this application it is assumed that inverse correlation is unlikely so that we can use the square of the Correlation, (Correlation)2 to obtain a metric that can be used by advanced stages of the fusion process. Another metric that is computed by Hardware Agent2 is the closeness between two sensors which is defined by equation 2. Closeness Coefficient: Sensor abs Sensor ( − 1 b a −=γ threshold Clossness _ Sensor are the sensors’ values and Sensor and Here, b a Closeness_threshold is the maximum difference between two sensors. If two sensors have the same value then 1=γ , otherwise γ is less than one. Hardware Agent3 is calculating the average of sensors' value (a simple fusion method). Hardware Agent4 determines the confidence factor between two sensors which is defined by equation 3. Factor Min Confidence ba Correlatio ),( ( . = Finally Hardware Agent5 determines the fusion value using the outputs of Agent3 and Agent4. The code for this model of multi-hardware agent data flow fusion system is written using VHDL. In this model the hardware agents set their initial belief set with the first value of the sensors and thresholds for the correlation and closeness of the sensors’ data. They will update their belief set with a new value of its sensor (interaction with the environment) and interaction with the other agents (the main agent will change the correlation and closeness threshold if there is not a high enough degree of confidence of the fusion result). There are several intentions (plans) for this multi-hardware agent system to reach its desire and we assigned each plan to a separate agent to use the collaboration of agents for achieving the global goal or desire which is fusion. The first plan is to determine the correlation between the sensors’ data, the second plan is to find the closeness of the sensors’ data, the third plan is computing the average of sensors' data, and the forth plan is to find the confidence of system. The desire of this multi hardware agent system is to find the fusion value. The similar multi software agent system implemented for this model has beliefs, intentions (plans), and desires exactly the same as the hardware agents. It should be noted that if the software agents were implemented in Aglets [17] or a similar software agent framework, that the use of Java and other overhead would make the software agent slower than the version of the software agent that was implemented in C++. This means that our software agents implemented in C++ are more efficient than most traditional software agent implementations. . This would imply that the speed comparison between hardware and software agents that follows is a more strict speed comparison for hardware agents. The run time of the BDI software agents implemented for this fusion system on a 2.6 GHZ Pentium is 2 us. The run time and speedup of the hardware agent implemented for this fusion system as compared to the equivalent software agent for 8 bit,16 bit, and 32 bit agents for several types of FPGA are shown in Table 1 – Table 3. In 8 and 16 bit modes agents are implemented on Xilinx Virtex II-2v40fg256 and Xilinx- VirtexII-2v10000ff1517 and in 32 bit mode agents are implemented on Xilinx Virtex II-2v500fg456 and Xilinx Virtex II-2v10000ff517. In each table, the first type of FPGA is the minimum size of the FPGA for each agent and the second type is a common large size FPGA. As the results of these tables show, hardware agents are much faster than the similar software agents for the same application. For example, according to the results of Table 1 and Table 3 the speed of an eight bit hardware agent is 80 times and a thirty two bit hardware agent is 19 times that of a similar software fusion agent, using a Xilinx-Virtex 2v10000ff1517. Of course if the software is, for instance, coded and optimized directly in assembler (a software abstraction level similar than the hardware abstraction level managed by FPGAs synthesis tools), all the software layers present in a general purpose computer such as operating systems procedures removed, and the FPGA re/configuration time is taken into account, then the speed up should be a little bit lower. Table 1. 8 bits Hardware Agents 8 bits FPGA Agent speedup run time 26ns 77 25 ns 80 Xilinx- VirtexII 2v40fg256 Xilinx- VirtexII 2v10000ff1517 Table 2. 16 bits Hardware Agents 16 bits FPGA Agent speedup run time 64 ns 31 Xilinx- VirtexII 2v80fg256 Xilinx- VirtexII 2v10000ff1517 Table 3. 32 bits Hardware Agents 51 ns 39 FPGA Agent Xilinx- VirtexII 2v500fg456 Xilinx- VirtexII 2v10000ff1517 32 bits speedup run time 113 ns 17 106 ns 19 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 249http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Table 4 – Table 6 show the number of logic gates used in each device for the implementation and utilization of hardware agents. Device selection varies according to the policy of the design (distributed or concentrated) and the size and the number of agents that we need to build our hardware agent system. For example according to the results of Table 4 and Table 6 we can implement up to 18 eight bit hardware agents and up to 4 thirty two bit hardware agents similar to the data flow operation system of Figure 6 in each Xilinx-Virtex 2v10000ff1517. Table 4. Device Utilization (8 bits HW Agents) Xilinx- VirtexII Resource FPGA 2v10000ff1517 Utilization 21.00 % 4.43 % 4.41 % 2.00 % Used 225 5314 2658 192 Ios Function Generators CLB Slices DFFs or Latches Table 5. Device Utilization (16 bits HW Agents) Xilinx- VirtexII Resource FPGA 2v10000ff1517 Utilization Used 113 10.54 % 2048 1.70 % 1.70 % 1024 160 1.66 % Ios Function Generators CLB Slices DFFs or Latches Table 6. Device Utilization (32 bits HW Agents) Resource FPGA Xilinx- VirtexII 2v10000ff1517 Utilization Used 5.32 % 57 939 0.78 % 0.77 % 471 1.54 % 148 Ios Function Generators CLB Slices DFFs or Latches V. Conclusion In this paper, a general architectural framework for implementing agents in reconfigurable hardware has been presented. Hardware implementations have always been known to be faster than software implementations, but at the cost of great loss in flexibility. The use of reconfigurable hardware added flexibility to hardware, while still retaining most of the speed of hardware. Now the use of hardware agents can greatly expanded this flexibility of reconfigurable hardware. In the future, such improvements to reconfigurable hardware such as faster programming independently and more times, reconfigurable sections in the reconfigurable hardware will make hardware agents even more flexible while . coming even closer to retaining the speed that makes hardware-based implementations desirable. The hardware agents developed for data flow application display many of the features associated with more traditional agents implemented in software. The results of hardware agents implementation in this paper show that the speed of hardware agents can be over an order of magnitude greater than an equivalent software agent the implementation. The parallel nature of reconfigurable hardware would cause this speedup to be than one agent were increased further if more implemented in the reconfigurable hardware. It is believed that the use of hardware agents may prove useful in a number of application domains, where speed, flexibility, and evolutionary design goals are important issues. References [1] Walter B, Zarnekow R. Intelligent Software Agents, Springer-Verlag, Berlin Heidelberg, New York, NY, 1998. [2] Jennings N, Wooldrige M. Agent Technology, Springer-Verlag, New York, NY, 1998. [3] Jennings N, Wooldridge M. Intelligent Agents: Theory and Practice, The Knowledge Engineering Review, 1995; 10(2):115-152. [4 Brooks R. Intelligence Without Reason, Massachusetts Institute of Technology, Artificial Intelligence Laboratory, A.I. Memo, 1991. [5] Ambrosio J, Darr T. Hierarchical Concurrent Engineering in a Multi-agent Framework, Concurrent Engineering Research and Application Journal, 1996;4:47-57. [6] Weiss G. Multiagent Systems-A Modern Approach to Distributed Artificial intelligence, Cambridge: MIT Press 1999. [7] Flores-Mendez R. Towards a Standardization of Multi-agent System Frameworks, ACM Crossroads Special Issue on Intelligence Agents, 1999;5(4):18-24. [8] Jennings N, Sycara K, Wooldridge M. A Roadmap of Agent Research and Development, Autonomous Agents and Multi-Agent Systems Journal, Kluwer Publishers, 1998;1(1):7-38. [9] Rao A. BDI Agents: From Theory to Practice, ICMAS ’95 First International Conference on Multi-agent System, 1995. [10] Naji H. R., Wells B. E., Aborizka M., Hardware Agents, Proceedings of the ISCA 11th International Conference on Intelligent Systems on Emerging Technologies (ICIS-2002), Boston, MA, 2002. [11] Naji H. R., Implementing data flow operations with multi hardware agent systems, Proceedings of the IEEE 2003 Southeastern Symposium on System Theory, Morgantown, WV, March 2003. [12] Naji H. R., Wells B.E., Etzkorn L., Creating an Adaptive Embedded System by Applying Multi-agent (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 250http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Techniques to Reconfigurable Hardware, Future Generation Computer Systems, 2004, (20) 1055-1081. [13] Guccione S. Reconfigurable Computing at Xilinx, Proceedings of Euromicro Symposium on Digital Systems Design, 2001. [14] Becker J, Pionteck T, Glesner M. Adaptive Systems- on-chip: Architectures, Technologies and Applications, 14th Symposium on Integrated Circuits and Systems Design, 2001. [15] Srinivasan V, Govindarajan S, Vemuri R. Fine- Grained and Coarse-grained behavioral partitioning with effective utilization of memory and design space exploratin for multi-FPGA architecture, IEEE Transactions on very large scale integration (VLSI) systems, 2001. [16] Kruatrachue B, Lewis T. Grain Size Determination for Parallel Processing, IEEE trans. On Software, 1998;5(1):23-32. [17] G. Karjoth, D.B. Lange, A security Model for Aglets, Internet Comput, IEEE,1997;1(4):68-77. Hamid Reza Naji is an assistant professor in the International Center for Science and High Technology & Environmental Sciences in Kerman, Iran. His research interests include embedded, reconfigurable, and multiagent systems, networks, and security. Naji has a PhD in computer engineering from the University of Alabama in Huntsville, USA. He is a professional member of the IEEE. Contact him at [email protected] . (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 251http://sites.google.com/site/ijcsis/ ISSN 1947-5500
cs/0602056
1
0602
2006-02-15T14:46:05
Building Scenarios for Environmental Management and Planning: An IT-Based Approach
[ "cs.MA" ]
Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of different languages whose semantics can hardly allow inter-domain transfers. A useful support for planning is the building up of durable IT based interactive platforms, where it is possible to modify initial positions toward a semantic convergence. The present paper shows an area-based application of these tools, for the integrated distance-management of different forms of knowledge expressed by selected stakeholders about environmental planning issues, in order to build alternative development scenarios. Keywords: Environmental planning, Scenario building, Multi-source knowledge, IT-based
cs.MA
cs
BUILDING SCENARIOS FOR ENVIRONMENTAL MANAGEMENT AND PLANNING: AN IT-BASED APPROACH1 by Dino Borri and Domenico Camarda2 Dipartimento di Architettura e Urbanistica, Politecnico di Bari, Italy. Abstract Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of different languages whose semantics can hardly allow inter-domain transfers. A useful support for planning is the building up of durable IT-based interactive platforms, where it is possible to modify initial positions toward a semantic convergence. The present paper shows an area-based application of these tools, for the integrated distance- management of different forms of knowledge expressed by selected stakeholders about environmental planning issues, in order to build alternative development scenarios. Keywords: Environmental planning, Scenario building, Multi-source knowledge, IT-based participation 1. Introduction Contemporary spatial planning tries to face the emerging social-environmental crisis by using more sophisticated and participated policies and forms of knowledge, that can be collected through friendly technologies to facilitate interactions. 1 The paper is the result of a common work carried out by the two authors jointly: nonetheless, chapters 1 and 3 have been written by D.Borri, whereas chapter 2 has been written by D.Camarda. 2 Proofs and reprints should be sent to Domenico Camarda, Dipartimento di Architettura e Urbanistica, Politecnico di Bari, Via Orabona n.4, 70125 – Bari (Italy). Email: [email protected]. 1 New government arenas and new forums are opened, in which bottom-up adversary movements tend to be replaced by new institutional configurations of governance, including third parties between state and market, variably organized and associated. Typical interactions, “discourses” of this new type of planning –called either strategic or interactive, communicative, collaborative- call for committed and complex organizations, durable and able to give listening and symbolic answers, more than practical ones. There is the need for learning organizations, new “communities of practice”, new understanding of interaction and linguistic mediation, new –also technologic- abilities of recording knowledge and wills, both expert (concentrated) and common (diffused), new abilities of mediation, negotiation, bargain and field agreement. The important social-environmental objectives of contemporary spatial planning are helped by technological innovation. Noticeable aspects are the growing diffusion of geographical information systems, their increasingly intelligent and interoperable configurations, architectures and functions more and more hybrid, the diffusion of interactive knowledge-acquisition procedures in multi-agent and remote-interaction systems, the return of interest for the procedures of decision and value appraisal-attribution in new and more complex uncertain and multi-agent contexts. In this situation, it is important to develop GISs increasingly dealing with both quantitative and qualitative information, to work upon intelligent systems for monitoring, recognition, classification, decision and management, and to develop organizations and knowledge in complex and often remote interaction networks. Yet, it is important to reflect on the adequacy of technologies to compete with social-environmental problems, that could even be burdened with difficulties to access knowledge and procedures developed in specialized environments, with technologies not sufficiently tested yet. There are some unresolved questions about the collection of knowledge. It is increasingly assumed that “communities of discourse” and “communities of practice” build the space of planning. But the organization of discourse, its rules, opportunities, evolutions, the plurality of discourse agents are still all points to be explored. The same can be said about the communities of practice, whereas 2 today practices in cities are innovated by increasing symbolic transactions and the dematerialization of technologies. Which tools can be set up to make formal/informal knowledge explicit? The production of new forms of knowledge both at individual levels (single groups, organizations, individuals, communities) and at the level of comprehensive, changing, dynamic organizations still represents a barely known field. Learning-skilled organizations represent the contexts in which processes of production of new knowledge are drawn out, knowledge in use is recorded or external knowledge is acquired. What is then the role of planners in those production processes: activating or exploring “communities of practice and discourse”, mediating or settling down differences, facilitating or surveying processes? Some opportunities are offered to the creation of virtual spaces of interaction by new technologies, that allow the large diffusion of spaces for knowledge interaction, transfer and production. However, there are questions that still remain problematic, such as the ones connected with the forms of representation of knowledge, the methods of exploration, the methods of creating possible syntheses, the forms of interaction. Is such a deep penetration into communities really effective, in the processes of explicitation, collection and production of knowledge for planning? Virtual spaces still need to be studied with reference to the mechanisms of cognitive interaction activated/activable in multiple environments, with the aim of identifying the transitions among the different levels of the same environment and among different environments -considering such transitions as processes modifying environments themselves and involved relationships, with reference to cognitive and organizational dimensions. Remarkable problems still remain, such as cognitive scales and hierarchies, and the need to navigate among abstraction levels [20]. They are general problems in intelligent environments but even specific problems in intelligent spatial environments [17], essential for the management of complexity in spatial reasoning [1]. In such virtual spaces it is necessary to support processes of 3 knowledge acquisition, recording, use and transfer with reference to cognitive contexts that are fragmented, conflicting, incomplete, changing and not uniform. How to represent different types of knowledge in a form that does not alter the mutual mechanisms of relationship which characterize the different forms of interaction? Few agents are more easily referable to coordinate and cooperative behaviours, but they are little representative of complex environments where coordination and cooperation are unstable conditions, that can be achieved through a flow of “critical states”. How to choose the number of possible intelligent agents to be set up in order to support interactions and the preservation/creation of relationships? What are the roles to be assigned to such agents? It is still unclear what kinds of cognitive developments do take place in collaborative multi-agent planning environments, and what are their structures and dynamics. An important discussion is currently focusing on the real cognitive transformations taking place in multi-agent environments in front of the extreme organizational, procedural and linguistic complexity of such pluri-logic procedures as compared to the traditional mono-logic ones. This literary question appears to be even more remarkable and perhaps more explorable in planning environments, representing organized institutional environments for spatial transformations. In it, the potentials of multi-agency are conditioned by the forms of power distribution, of deliberative practices, of the strong orientation to solution. In some cases, a useful support for planning is represented by the building up of a shared evaluative and interpretative platform, where the interaction is long lasting, and is commonly defined by scientific literature as a ‘double ring’. Within this interaction, it is possible to modify and fine-tune initial positions, in order to allow the convergence toward a unique strategic approach. In complex regional contexts, and for particularly delicate issues, the ‘ring’ needs to embrace a number of very skilled and rare knowledge sources, represented by scholars scattered around the world and greatly distant from one another. In such difficult cases, the possibility to reach the 4 desired semantic convergence can be enhanced by using IT-based tools, networks, and dedicated software. The work presented in this paper is an area-based application of IT-based tools, made up by using MeetingWorks©, a groupware tool for electronic brainstorming and idea organization, originally designed to facilitating corporate decision making. After this introduction, the first chapter describes the activity of scenario building in the Mediterranean context and its suitability to be aided by the particular IT tool, used for the management of the different forms of knowledge. The chapter also deals with the architecture of the system and the process flow, showing some critical points, both positive and negative, of carrying out a computer-aided participatory session, especially when compared to a traditional face-to-face session. The last chapter draws out some final comments, pointing in particular to some interesting perspectives of IT-based multiple-knowledge management in decision making processes. 2. IT and environmental policies 2.1. Building future scenarios Under a project financed by the European Union, oriented to building sustainable development scenarios in the Mediterranean region, some experiences have been carried out since 1999. A Concerted Action of the EU INCO-DC Commission (Dg XII), the project aims at enabling policies for sustainable development in the Mediterranean region, particularly focused on soil and water. The first activity was concentrated on the Tunis case, and its topic was the interplay between agriculture and urbanization; the activity in Izmir dealt with coastal zone management; the third activity in Rabat dealt with globalization vs. local resources, under the prespective of the emerging Euro-Med free trade zone (see the official website http://www.iamb.it/incosusw for details). The scenario-building approach first used in Izmir, Turkey (2001), then being amended and fine-tuned in the case of Rabat, Morocco (2002), is based on a variant to the strategic choice approach by Friend and Hickling [7], as developed by the recent evolution of futures studies. 5 In general, the whole set of future studies methodologies is really multifarious, ranging during its long history from quantitative to qualitative and hybrid methods. Quantitative methods, classically linked to the Delphi iterative method of obtaining shared convergence on issues, do have peculiar military origins. Rigid forecasts and rational predictions were major aims, and their outcomes ended up being particularly appealing also to private entrepreneural management [23]. Because of the increasing awareness of the importance of multiple knowledge in planning processes, together with a larger acquaintance with the underlying presence of uncertainty, then methods tended to evolve towards softer and more hybrid methodologies. Scenario-building approaches begun to combine expert and local-based forms of knowledge, either complementing them with Delphi or moving toward structured but more qualitative knowledge interaction processes [22]. One of the most advanced results has been a pronounced openness to problem-structuring, more than problem-solving approaches. Hence, a higher stress on participatory arenas, both in knowledge sharing and knowledge enhancing interactions, particularly aiming at turning planning and decisionmaking procedures into democratic processes [13]. Participatory arenas have been frequently indicated as essential in the building up of shared future scenarios, with their consensus-enhancing character. In some particular contexts, where problems and expectations are remarkable, scenarios can be gathered through the so-called future workshops [12]. The Mediterranean context, with its complexity and current criticality, proved to be particularly suitable to such methodology, and in fact that was the methodology selected by the project steering group. The future workshop methodology is outlined in Table 1. It was selected among other scenario- building methodologies after analyzing the particular implementation context under several points of view. As a result, several reasons were fundamental for the final decision on its utilization, ranging from a strong commitment to action, to a significant involvement of non-experts in 6 designing futures, an enhancement of participants’ creativity while building shared visions, a strong orientation to interactive learning, and a useful process flexibility [14]. During the Critique phase, stakeholders are asked to describe major structural changes occurred in the area in the past and major problems of the present situation. As Ziegler points out, this involves a basic hypothesis at the very beginning, i.e., that a broad discontent with the current situation does exist, that creates an intense aspiration toward a development change [24]. In fact, contrasting dissatisfactions and desires are supposed to boost the realization of significant future visions. As operational tool, a modified version of Delphi method is applied in order to acquire a common knowledge base on structural changes and current problems for the subsequent phases3. In the subsequent Imagination phase, the process is carried out in the form of computer-mediated brainstorming session, with the effort to let stakeholders get rid of the current urgencies and to project themselves to the distant future4. Traditionally, this phase is carried out as an oral brainstorming session, helped by notes taken throughout the interaction: computer-mediated interactions should then replace informal contacts and notes with a written exchange of ideas. Although consensus on few visions is a desirable goal, computing should not reduce the richness of images and discourses, in order to prevent limitations on future strategies: Delphi method is then at times replaced or hybridized by more argumentative tools [21]. The Implementation phase is devoted to the transformation of visions into operational strategies. In this phase, participants are solicited first to reflect on possible actions aimed at implementing their future visions, then to single out policies and related resources in order to enforce those actions. As a result, complex strategies are built up, whose aim is to provide implementation alternatives that should support public decisionmaking for the given time span. Although not so creative as the fantasy phase, but rather routinary and structurable, this phase is relationally complex and nested and hard to be tackled by computerized interactions. The whole 7 architecture of the process does then show several elements of complexity and hybridation, with particular concentration in the fantasy and implementation phases. 2.2. Scenario building in the Mediterranean Throughout the INCOSUSW project, future workshops have been set up either as a vis-à-vis, computer-free session or as a computer-aided session, with mixed but encouraging results [14]. In the case of scenario building in Izmir, two parallel sessions were developed in the same time: a vis-à-vis session and a computer-aided session. The two sessions were intended as different methods to implement a similar approach in building scenarios, where stakeholders were involved, coming from institutional boards, NGOs and University. The reasons of exploring the possibility to use a computer program in some phases of the scenario- building activity in Izmir were several. Above all, a major reason was a better manageability of the preliminary Delphi tour for the identification of problematic areas in local coastal zone issues. It was thought that at least some routinary stages, such as the setting up and the exchange of questionnaires among stakeholders, could be accelerated and could facilitate the convergence of outcomes. After a research on software tools available in the market, useful to assist decisionmaking, to build questionnaires and/or to manage multi-stakeholder meetings, it was decided to choose MeetingWorks©, by meetingworks.com. A LAN-based system, MeetingWorks© provides a Chauffeur station for use by the meeting facilitator or an assistant to create a meeting agenda and to run the meeting. Participants have access to Participant stations, where they can enter their ideas, votes, comments and other inputs, all anonymously. The software was conceived as a tool for executive, staff or personnel meetings within firms or societies, where the main aim is to ease the achievement of agreement on projects and issues. In the case of scenario building, instead, the major aim is to enhance the interaction and the share of knowledge from different sources, namely 3 In the case of Rabat, the last twenty years were the time span analyzed. 8 stakeholders, so finally easing the drawing out of alternative community scenarios, development strategies and policies [21]. This difference is important in understanding the pros and cons, as well as the real potential of the tool. In the last case-study of Rabat, an attempt was made to set up a computer-based interaction throughout the whole process. An initial purpose was to start the interactive session basing on a framework of scenarios previously built up by 'expert' stakeholders. They were to be arranged on the basis of data available from local, regional and national government, as well as from knowledge obtained from scientific and other sources. For each group of experts (Public associations, Scholars and academicians, NGOs), the process leading to scenarios can be summarized and divided into 7 main stages (Figure 1): 1) Reflecting on the concerns raised by an upcoming globalization in local economy, society, environment, as well as on issues and problems generated from that (Critique); 2) Generation of desired visions concerning the consequences of globalization, after forgetting the constraints of the present reality (Fantasy); 3) Identification of obstacles and limits to the implementation of visions; 4) Definition of possible actions aimed at overcoming obstacles and achieving the desired visions; 5) Definition of resources to be mobilized in order to implement actions; 6) Aggregation of outcomes into two or three alternative scenarios. 7) Grouping homologous scenarios drawn out by groups, in order to have three or four scenarios at the end of the process. After the completion of the above sequence, scenarios were supposed to be evaluated by a more numerous and assorted group of stakeholders, both experts and non-experts, in order to assess the validity of assumptions, plausibility of development and interpretation of the local context. As a matter of facts, time, organizational and communication constraints among Countries made it impossible to gather the three expert groups: even 'non-expert' (common) stakeholders were 4 In Rabat, the time horizon of scenarios was the year 2030. 9 difficult to be found in sound number. As a result the three parallel processes were unified and carried out by a single group of assorted stakeholders from institutional, academic and NGO sectors together. With reference to figure 1, the actual process architecture can be referred to the 'Group 1' column only, the last stage being the sixth one. 2.3. The interaction process architecture: limits and potentials The Rabat workshop is still under way, so it seems insignificant to discuss deeply the whole experience thoroughly, and to critically compare outcomes with previous case-studies, at this stage5. Nonetheless, an overall description of the system architecture for the defining process of scenarios is useful, in order to explore particularly the relational aspects of multi-source knowledge interactions, as supported by computer technology. The description will be carried out with reference to the routine for the first stage (the critique phase, fig.2), under both technical and substantial point of views. The routine pattern is basically similar for each stage, except for some significant adaptations, due to the different themes dealt with. This induces a problem of imperfect repeatability of routines that is addressed with ad-hoc approaches, described thereafter. 2.3.1. The basic routine. The routine flow is made up of 7 consecutive steps, plus some collateral steps (3a to 6a) aiming at monitoring qualitatively some characters of the learning process, both single and collective. The first step is used to write down the concerns over globalization as well as over productive and urban changes as intended by each stakeholder. Lists are prepared singularly and then merged by the software: interactions are anonymous, but participants' responses may be traced back by an ex-post analysis. In Rabat, stakeholders' interaction has been remarkable in this step: it confirms that free and anonymous computer-based interactions allow a more democratic expression of ideas [21], so enhancing responses (63 out of 11 participants). On the other side, this may induce the 10 unmanageability of outcomes, in that it increases the repetition of similar issues, that voice-based interactions might instead filter and prevent. Therefore, a second step is just needed for the elimination of redundancies, contradictions, inconsistencies among responses, and for the grouping of similar issues under the same heading, in order to have a manageable list for the next steps. In a traditional session this step is typically carried out by means of a general discussion, coordinated by a facilitator and heuristically simplified by informal human interactions. The software does not allow an effective simplification and, therefore, a compromise is currently being carried out, by means of an ex-post simplification of the list, manually grouped and made consistent by the facilitator and his staff. By making this, biases and distortions are not avoided, and the hexogenous synthesis may even create substantial divergences from original ideas. However, this solution seems preferable to the traditional voice discussion because of its better manageability in terms of time and suitability, particularly as regards possible remote, internet-based sessions. In the actual Rabat case, the ex-post grouping was operated by complying with a strict safeguard of the complexity and variety of ideas, so inducing a reduced list of 40 items, with only a 30% reduction rate. Step 3 is aimed at further reducing the list, but basing on more substantial criteria, able to involve the knowledge-based and experiential values of each single stakeholder. As a matter of facts, they are asked to rate (0-5) the list of issues in terms of importance. Basically, this is the first evaluative step of an iteration, where different rating methods are suggested for each step (steps 4, 5a, 6a, 7), aiming both at singling out the top issues and at controlling the consistency of evaluations. The final purpose is to obtain a manageable list of issues based on a shared consensus, as a result of a mutual learning and awareness-enhancing process, not of a merely reductionist procedure. The produced list is not important per se, but in that it involves a learning and knowledge-sharing process, that can be a useful support for the subsequent generation of scenarios [13]. Interestingly, in the Rabat case step 3 did not produce a useful consensus on indicating the most important issues: in fact, three 5 A proper official INCOSUSW report is being prepared on the Rabat workshop, and a further comparative paper will 11 quarters of all concerns top ranked 4.5 to 3. Admittedly, it is often remarked that pure numbers are not able to properly qualify judgement values, and that such kinds of methodologies are therefore intrinsically erroneous [23]. However, recalling the overall process-oriented aim, this first evaluative step may arguably enhance mutual knowledge exchange and awareness on issues, and this should produce useful effects with subsequent iterations. A further evaluative step is then step 4, where stakeholders are asked to scroll the list resulted from the preceding step and to choose the 10 most important issues according to their own views, ranking them (1-10). In the Rabat experience, the agreement on a reduced list proved to be difficult, and only 5 out of 40 items where eliminated from the list by the interactive evaluation. As a matter of facts, classical Delphi literature report a formal impossibility of reaching convergence on ideas at an early stage, and the Rabat occurrence confirmed such position [22] [23]. This induces the need of further iterating the evaluation but, in order to overcome associated time constraints, the possibility of disregarding some low ranking issues is envisioned by the process flow. The dropping-off of the least ranked issues is located in step 5. This phase of selection is manually carried out by the facilitator's staff as a hard cut-off of the top items, basing on the top average rankings. Of course, this operation produces the elimination of ideas that a proper Delphi iteration would instead, probably, enhanced. Being manual and undisclosed, it may jeopardize the original representativeness of issues, especially if least issues remain numerous or there is a high disagreement on them. This last case did occur in the Rabat session, where the 17 selected issues out of 40 were not really founded on a substantial agreement of expressed ideas. This risky operation was then made possible only by the experimental nature of the project, but it can be said that normally such manual simplification may well involve only few low-ranking agreed-upon issues. In step 6, the iterative process started in step 4 is carried on. In fact, after the first ranking, participants are asked to interact and comment with one another by using an embedded tool of the be forthcoming, following previous ones [2] [14]. 12 computer program: the 'chat'. This unstructured interaction allows a certain relaxation in communication schemes, so emulating a voice discussion that is able to enhance the exchange –not necessarily the production- of ideas. It typically safeguards the democratic expression of ideas, since no precedence is given to fluent catalizing leaders but the random rapidity in digitizing. Further, the classical criticality implicitly included in any discussion, i.e., the difficulty in taking memory of all issues and the richness of their complex grey shades, is easily overcome by means of the chat log, a detailed record of all exchanges. In the Rabat case, the chat tool, intrinsically less structured than other evaluative tools, was enthusiastically accepted by participants, who found themselves more comfortable in exchanging informal comments and ideas. However, outcomes were not significantly effective in enhancing the final consensus in that case, so confirming that when disagreement is high the evaluating cycle should be probably reiterated again and again [15]. In that case a foreseeable risk is casting an excessive time burden over the process flow, and then predetermined time constraints may be useful when using the 'chat' tool, although they may raise doubts of mortifying creativity. After chatting, if the disagreement on the outcoming list of concerns is low or fairly non-existent, then the last ranked list is the final one of the whole critique phase, and the process can move to the next phase of the scenario-building activity. On the contrary, if the desired convergence of outcomes is not reached at the end of step 6, then an iteration is started up in step 7, carried out as Delphi tours, in order to reach a possible convergence on a consistent list of items at the very end of the stage. Here a question of time is strongly persistent, and in fact, in the Rabat case, at the end of the secondly iterated step 4, the realization of a further disagreement on the reduction of issues suggested to give up with further attempts and to proceed to subsequent stages with the whole list of 17 resulted issues (concerns). The above main routine is aimed at structuring the proper scenario-building process throughout all the constituting stages of the future workshop. However, a frequently upcoming critique over the communicative approach behind the process is that not the relevance but rather the argumentative 13 ability of each issue can enhance the achievement of the desired convergence [6]. It is clear that such a critique is able to challenge the whole conceptual framework of building scenarios basing on the mutual exchange and enhancement of single knowledge levels of participants. Should it be possible to have an evidence of actual increases of stakeholders' knowledge levels, then the effectiveness of scenario-building approaches could seem less questionable. In order to try to explore such possibility, some collateral steps are then carried out together with the mainstream of the main routine. In particular, where iterative cycles are set up, the ratings of each stakeholder are taken out after each evaluation step, as ex-post by-products of resulting data (steps 3a and 4a). The longer the iteration, the larger the time series on which to carry out the behavioural analysis. In order to have a more complete set of behavioural data during the whole process, other evaluative steps, less structured than proper rating and ranking steps, are complemented with analyzing tools. In particular, steps 5a and 6a are again aimed at looking into stakeholders’ behaviours, even if sympathetically and qualitatively. In these steps, participants are invited to reflect on the impact of the interaction process on their informational level, and to self-rank the level of knowledge gained from the interaction. However, as a whole, these delicate steps are not yet completely defined at present, and the way how to carry out them effectively is still being explored. As a matter of facts, in the case of Rabat both steps 3a to 6a were not performed at all, because of contingent problems, particularly technical and time. 2.3.2. Notes on ad-hoc approaches in subsequent stages. Basically, the above description reveals the intrinsic impossibility of carrying out a perfectly integrated process, fully automated and properly routinary. When moving from the first stage (critique phase) to subsequent phases (fantasy and implementation), the issues that characterize each phase change substantially, since aims themselves are different from one phase to another. The 14 process is therefore sensibly different from the basic one, with the need of amendments and deviations that induce a substantial hybridization of the whole system architecture. Far from being useless burdens, such ad-hoc approaches aim at increasing the interaction effectiveness, in that they enhance the possibility of letting mutual knowledge exchanges cope with the increased complexity of issues at hand. A typical case is the generation of visions connected with future images of a desired future, dealt with in the fantasy phase. In that phase, creativity needs to be largely enhanced, even to the possible detriment of the optimal manageability of process routines. In fact, experience shows the difficulty of letting people freely express their desires if communication tools act as practical limitation and obstacles of the present reality, so threatening the whole scope of work [14]. In some cases, for example, the imagination phase is carried out by relying almost completely on brainstorming and discussion phases, rather than on Delphi tours. Admittedly, even if computer-aided, discussions are in this case difficult to be recorded properly, and only final agreements and collective outcomes become usable data for subsequent phases, so loosing memory for more detailed information. However, generated images and future visions often prove to be more effective and representative, and more useful to hinge subsequent strategic scenarios on. Particularly complex contexts seem to suggest such a more hybrid approach, unlike communities with more standard and regular everyday problems6. In the implementation phase, creativity is substantially less crucial than the previous one, and therefore routinary steps may be more adherently performed. However, since the generation of 'obstacles' toward the realization of future visions is followed by the generation of related 'policies' and then 'resources' aimed at overcoming such obstacles, a possible 'combinatorial explosion' may easily make issues unmanageable by the process flow [14]. Possible further simplification and hybridations may then be needed in order to properly manage the process, to the possible detriment of scenarios richness and representativeness. The final outcomes of the Rabat future workshop will soon provide useful feedback in these fields. 15 2.4. Significant overall features Some positive and negative aspects can be drawn out about the use of such software tools in running computer-aided sessions of scenario-building activity. First, the use of an ad-hoc computer software was helpful in framing scenarios with robust and credible issues: the anonymous interaction among stakeholders enhanced the free democratic expression of opinions, themes and concerns, particularly important in some Developing Countries. Secondly, the computer program could ease the real-time setting up of structured scenario alternatives: the main result of accelerated interactions and feedbacks was then to have a resulting data set easy to be read and managed for future policy actions. A third important feature of a computer-mediated session, when compared to a vis-à-vis session, is that stakeholders can interact without (or at least with a tiny) filter of a human facilitator. This is more likely to happen in a remote interaction, when stakeholders are far from one another, and they are in touch only by means of the computerized session. In this light, MeetingWorks allows the setting up a web-based remote session, either in the same time or in different times, interacting on the basis of an ad-hoc agenda published on an Internet webpage. A last point is the possibility to check, at least in a qualitative way, what level of knowledge can be raised by the whole iterative process. In fact, the above-mentioned increasing criticism is particularly hard to be challenged, also because in traditional vis-à-vis interactions an evaluation of the level of knowledge, reached either by single participants or by the entire group, is in fact difficult to be verified and likely to be influenced by the interaction itself. As a matter of fact, a computer-based interaction is instead mainly mediated by a software tool, then more likely to minimize biases and mutual influences of stakeholders. Therefore, steps of collective evaluation or self-assessment of the level of knowledge acquired can be more likely to be properly effective. 6 In the Rabat case, an hybridation of voice discussions with chat interactions is being explored. 16 The above aspects constitute the potential of the use of computer-mediated interactions: however, there are several important critical aspects that need to be addressed, as well. A first negative point to be underlined is represented by the mediation offered by the computer itself: a cold and non-stimulating medium that is hardly able to make up for warm, informal, sympathetic interactions among humans, as often claimed [3][21]. This occurrence determined several negative by-products, especially after the first intriguing impact: monotony and tedium in replying, scarce involvement, low attention. Shortened stages and discussion intervals can be an answer to such shortcomings, but they are not always applicable in the case of long scenario- building activities, especially if carried out remotely. A second important negative feature of the software is related to a character that typically automated routines lack, when compared to manual, traditional face-to-face interaction: the control of process flows. In fact, whereas in a traditional interaction among stakeholders issues come out during a continuous process, attended and controlled by the attention of facilitators and stakeholders, in an automated routine processes are often invisible, and there is the risk of hiding steps and generating false heuristics. However, this shortcoming cannot be easily challenged within a software conceived for specific and often undisclosed company processes, such as MeetingWorks. A possible hybridation with human control, or with some other complementary software could be a possible solution that is currently being explored. A further point is linked to the need of having manageable lists during the process, by eliminating redundancies and grouping similar issues under the same heading. As mentioned before, the software does not allow an effective simplification, and facilitators need to make a selection of issue categories prior to the session (in the Izmir case, these issue areas were five: Political/institutional, Physical/environmental, Social-cultural, Economic and Others -a free field for uncategorizable issues), which is a compromise between a free identification issue areas –leading to a combinatorial explosion- and a stricter classification of ideas. The result is a sequence of several different steps in the process, where all single issues typically need to be individually addressed to each 17 predetermined category. In this case, the high fragmentation of the sequence into micro-steps mutually complementary enhances the complexity of a reduction activity, so involving a long routinary process, able to cause disorientation and loss of attention and interest on stakeholders. Results typically show in the end a high presence of redundant and inconsistent responses, probably stemming from such induced loss of concentration. In this concern, an automated or semi-automated routine, based on genetic algorithms, would be useful, if properly devised [8][11]. In particular, in a first stage, the recognition of issue areas could be derived basing on the analysis of recurrences of concepts by means of GA-funded procedure of text-analysis software tools. In a second stage, the assignments of statements and issues to issue areas could be realized by analyzing the consistency with a representative criteria for each issue. As happening in all classical GA applications, the GA-based routine should then continue until each condition is met, for each statement and toward the completion of each area. 2.5. Outcomes and remarks After some experiences carried with IT-based scenario building, particularly in Developing Countries, some interesting results can be pointed out. First result is that, although not univocally effective in all situations, the computer allowed the carrying out of rapid and remote sessions (especially Delphi) hard to be developed alternatively. Secondly, the bunch of resulted datasets is given in real time, which is a remarkable outcome mainly because –above all- it saves time for the next hard decisionmaking and policymaking processes. Moreover, apart from consolidated results, there are some suggestions that come out particularly in the case-study of Rabat, even if they cannot be claimed as proper results, since the process is not complete. Among a number of intriguing but fuzzy suggestions, one needs to be mentioned in terms of stakeholders’ learning behaviour. In fact, a quick survey of the partial report of the process seems to show that evaluation criteria slightly changed during the various evaluative session. In particular, while mainly 18 financial/economic criteria were used by the group in the very first evaluative step, collective interactions seem to have determined a progressive shift toward social and environmental criteria. Such kind of result, especially if confirmed by the behavioural process of single participants (still under way), can reveal the importance of multi-discipline group interactions in modifying and perhaps socializing the knowledge level of stakeholders participating in the group. Instead of a simple juxtaposition of different languages, peculiar of the cognitive domains that produced them, the interaction may have allowed a certain level of inter-domain transfers, which would be a very interesting perspective in terms of the underlying knowledge-learning process. Of course, such intriguing results are still vaguely supported at present, and need to be argued and confirmed by further stages of the session and by further analyses and research. As a whole, the experience carried out seems to suggest new perspectives in the quest for building multi-actor, multi-discipline knowledge bases, oriented to policy scenarios. Especially the obstacle represented by distance seems now to be tackled by web-based computerized interactions. This occurrence is extremely significant, meaning that in times of globalization, getting multi-discipline knowledge from scattered stakeholders within structured frameworks is not utopian, and its management by local decision makers is not utopian but possible and useful for local communities. 3. Final comments and research perspectives Sustainable planning is currently looking for an equilibrium of interests between the dimensions of “self” and “hethero”. Varieties, differences and tones are indispensable ingredients for the coexistence and the development of lives in the society and the environment. If the “reductio ad unum” induced by globalization is a threat for localisms and biodiversities, globalization involves also the space for new entities: institutions, concepts, information flows, etc. These entities, by introducing new meanings and potentials from different environments, tend to make and keep them crucial for the existence, by making the link between local and global 19 inextricable (an apparent paradox: the search for the “local” derives from the increasing reinforcement of the “global”). “Self” and “hethero” show also more implications in terms of planning, if we look at plans as micro-anticipations and micro-simulations of knowledge-in-practice within evolutionary systems. As planners, we face complex systems, whose values are changing, adaptive and self-organizing. We must structure and solve problems created by those systems. In fact, both in human (individuals, groups, organizations, economies, etc.) and environmental domains, they are dynamic systems involving the cooperation and/or the conflict among multiple agents with multiple cultures. On the other side, structures and organizations of such problems and systems are created by our dynamic representations and “beliefs”. In problem setting and in problem solving a sort of self- organization is involved, due to learning cycles and to the adaptation of the problem through information sharing, conflict mediation and negotiation, reframing. The role of awareness becomes central. Awareness represents the ability of self-organizing answers, operating through rational/emotional and moral cognition including subjective and qualitative experiences. Awareness means experimenting the “singularity” and thinking of “hethero” as stemming from “self”, assuming the raising out of “one from two” and of “two from one”. This is a rather mysterious dialectic, even if materialism explains it through the emerging proprieties of neural system. In the recent mystic vision of problem-making and decision-making, “singularity” is associated with love, and “separateness” with fear. Possibilities of conflict resolution derive from spiritual “singularity” and depend on the ability of different agents to assume their own diversity as different manifestation of “self”. Once again, learning processes become crucial, since actors learn their competitors’ movements and act consequently. In such environments there is an equilibrium that is able to self-confirm itself, more than what Nash equilibrium does [18]: i.e., a situation giving also a practical knowledge to individuals/elements facing each other, rather than a mere conceptual and theoretical support to decision. 20 However, new internet- or intranet-based forms of negotiation still put questions of problem structuring (or pre-structuring), representativeness of actors, comprehension of texts-languages and different cultures, showing the irreducible harshness of every knowledge-in-practice transaction in multi-agent and multi-actor contexts. Information and communication technologies have impacts on organizational-operational decisions, often giving a decisional environment which is familiar to the more traditional game theory and conflict analysis but requires dynamic approaches careful to non-equilibrium. The development of information and communication technologies and information sciences gives new opportunities to negotiations through forums of “knowledge” and “interests”. Negotiations become increasingly multi-cultural and extended in space and time and such expansion creates in turn inter-cultural and intra-cultural contexts in which negotiations take place. When do practical and successful (fair) negotiations take place in the social-environmental domain planners belong to? How is it possible to adopt integrated negotiation or problem-solving approach (perhaps in a win-win process) to negotiation rather than distributive (win/loose) negotiation? How to build different and compatible objectives? Simple answers do not exist, out of general, somehow moral principles, oriented to putting true cooperation and mutual comprehension at the basis of negotiation. Current literature outlines that inter-cultural negotiations are difficult and a positive development depends on the knowledge of each party about else’s culture, on the way how each negotiator perceives else’s behaviour, on implicit objectives emphasized by each culture. The need to avoid the “Babele effect” and the failure (linguistic confusion producing paralysis) caused by generalized incomprehension is still remarkable. During negotiations, cultural differences (global environments) create difficulties not only in understanding words but also in interpreting actions, in giving shape and substance to the given problem and in the selection of the style of negotiation. According to Faure [5], globalization has brought people closer and supports the management of conflicts through negotiation rather than through the destruction of opponents. As regards 21 negotiation and the role of local/global agents, negotiations have some key elements such as actors, games and strategies (organizations): outcomes (pre- and post-negotiation activities) and in general cultural aspects are crucial. The model of collective decision by Condorcet is different [4]: “the performance of a group in reaching a correct judgement basing on a majority rule will be superior to individual performances, provided that some conditions are respected”. Such conditions need to be explored, and they are generally the following: the probability of a correct decision depends on the technical experience of group voters; voters share a common aim; voters are statistically independent. Also in Condorcet’s model the definition of “correctness” is very complex. In real life it is preferable to replace the concept of correctness with the concept of “expected choice”, that is the choice of voters from an infinitely large population within a polling procedure. This is a change that guarantees that decisions are built through a correct process (socially appropriate) and inclusive, which makes use of pertinent data and information. In fact, the process of group consensus represents paths-toward-truth in contexts of incomplete and partial knowledge of discourse-dependent situations. The integration of multiple-source knowledge as a multiple-objective optimization problem is challenged by large spaces of research and by the difficulty of finding optimal solutions. Moreover, such integration needs to face the continuous risk of redundancy, subsuming and contradiction. It is generally guaranteed by the confidence placed in shaping/solving problems in intelligent environments more than in individual knowledge. Recent developments of artificial intelligence oriented to integrating knowledge from multiple sources include the use of knowledge systems, cognitive dictionaries, datasets, data dictionaries. In them, every knowledge set is provided with a knowledge dictionary, recording characters and classes of every knowledge share: moreover, even this scheme requires datasets and dictionaries itself. Although intriguing, proposed methods for knowledge integration seem to be less important: for example, genetic algorithms are proposed for the selection of the “optimal” set of rules on the 22 basis of a performance evaluation [9][10]. However, there is no agreement on the integration of different dictionaries regulating the interaction of multiple cognitive sources. Approaches discussed above operate by using processing technologies of natural language whose aim is to translate the representation of a source into a final representation that can be integrated in other operational systems. These translations require knowledge structuring through levels of conventional linguistic description. Today, the use of multiple cognitive sources in planning requires peculiar technological organizations making use, in turn, of tools for processing knowledge avoiding easy validations of models and outcomes. Today’s research perspectives in the field of IT-based scenario management and planning are actually oriented to these fronts. References [1] A.Barbanente, D.Borri, G.Concilio, S.Macchi, E.Scandurra, Dealing with Environmental Conflicts in Evaluation: Cognitive Complexity and Scale Problems, in: N.Litchfield et al., Eds. (1998) [2] [3] A.Barbanente, M.Puglisi, C.Tedesco, 2002 K.M.Carley, Communication Technologies and their Effect on Cultural Homogeneity, Consensus, and the Diffusion of New Ideas, Sociological Perspectives 38, No. 4 (1995). [4] M.J.Condorcet, Sketch for a Historical Picture of the Progress of the Human Mind (Hyperion Pr, Winnipeg, 1989). [5] J.C.Faure, Development Co-Operation Report 2000: Efforts and Policies of the Members of the Development Assistance Committee (OECD, Paris, 2001) [6] [7] J.Forester, Planning in the Face of Power, (Berkeley University Press, Berkeley, 1989) J.Friend, A. Hickling, Planning under Pressure : The Strategic Choice Approach (Butterworth-Heinemann, Oxford, 1997) 23 [8] F.Herrera, E.Herrera-Viedma, Linguistic Decision Analysis: Steps for Solving Decision Problems under Linguistic Information, Fuzzy Sets and Systems 115, (2000). [9] F.Herrera, E.López, C.Mendaña, M.A.Rodríguez, Solving an Assignment-Selection Problem with Verbal Information and Using Genetic Algorithms, European Journal of Operational Research 119 (1999). [10] J.H.Holland, Adaptation in Natural and Artificial Systems (Univ. Michigan Press, Ann Arbor, 1975) [11] H.Ishibuchi, T.Murata, I.B.Türkşen, Single-Objective and Two-Objective Genetic Algorithms for Selecting Linguistic Rules for Pattern Classification Problems”, Fuzzy Sets and Systems 89 (1997). [12] R.Jungk, N.Mullert, Future Workshop: How to Create Desirable Futures (Institute for Social Inventions, London, 1996). [13] A.Khakee, “Participatory Scenarios for Sustainable Development”, Foresight 1, No 3, pp. 229-240 (1999). [14] A.Khakee, A.Barbanente, DCamarda, M.Puglisi, “With or without? Comparative study of preparing participatory scenarios using computer-aided and traditional brainstorming”, Journal of Future Research 9 (2002). [15] H.A.Linstone, “The Delphi Technique”, in J.Fowles, Ed., Handbook of Futures Research (Greenwood, Westport, 1978), pp. 273-300. [16] N.Litchfield, et alii, Eds., Evaluation in Planning (Kluver, Dordrecht, 1998) [17] P.A.Longley, M.F.Goodchild, D.J.Maguire, D.V.Rhind, Geographical Information Systems: Principles, Techniques, Management, and Applications (Guilford, New York, 1999). [18] J.Nash, Equilibrium Points in n-Person Games, Proceedings, National Academy of Science (1950). [19] Puglisi 2002 Harmattan [20] E.D.Sacerdoti, A Structure for Plans and Behavior (American Elsevier, New York, 1977). 24 [21] J.A.A.Sillince, M.H.Saeedi, Computer-Mediated Communication; Problems and Potentials of Argumentation Structures, Decision Support Systems 26, No. 4 (1999). [22] J.A.M. Van Dijk, “Delphi questionnaires versus individual and group interviews”, Technological Forecasting and Social Change, No. 37 (1990). [23] A. Woudenberg, “An evaluation of Delphi”, Technological Forecasting and Social Charge, No. 40 (1991). [24] W. Ziegler, “Envisioning the future”, Futures, June, pp. 516-527 (1991). 25 Table 1. The future workshop methodology [19]. PHASE 1. Preparation 2. Critique 3. Fantasy 4. Implementation Future Workshops CONTENTS The issue to be analysed is decided and the structure and environment of sessions are prepared. Clarification, on the issue selected, of dissatisfactions and negative experiences of the present situation. Free idea generation (as an answer to the problems) and of desires, dreams, fantasies, opinions concerning the future. The participants are asked to forget practical limitation and obstacles of the present reality. Going back to the present reality, to its power structures and to its real limits to analyse the actual feasibility of the previous phase solutions and ideas. Obstacles and limits to the plan implementation identification and definition of possible ways to overcome them. EXPECTED RESULTS Summary of contributions. Problematic areas for the following discussion definition. Indication of a collection of ideas and choice of some solutions and planning guide lines.. Creation of strategic lines to be followed in order to fulfil the traced goals. Action plan and implementation proposal drawing. 26 Figure 1. The whole process architecture Group 1 Group 2 Group 3 1. Critique phase 1. Critique phase 1. Critique phase 2. Fantasy phase 2. Fantasy phase 2. Fantasy phase 3. Identification of obstacles 3. Identification of obstacles 3. Identification of obstacles 4. Identif.of actions 5. Identif.of resources 4. Identif.of actions 5. Identif.of resources 4. Identif.of actions 5. Identif.of resources 6. Aggregation into scenarios 6. Aggregation into scenarios 6. Aggregation into scenarios 7. Grouping similar scenarios Alternative scenario 1 Alternative scenario 2 Alternative scenario 3 Fig. 2: Critique phase Step 1 - Listing concerns over globalization list 1 list 2 list 3 list 4 list 5 list 6 list ... list n Generated list of concerns Step 2 - Grouping similar and/or redundant issues under synthetic headings Step 3 – Rating grouped issues rate rate 1 2 rate 3 rate 4 rate 5 rate 6 rate rate ... n Rated list Step 3a -Extracting list with single ratings Step 4 – Selecting and ranking top 10 issues in the list rank rank rank rank rank rank rank rank 1 2 3 4 5 6 ... n Ranked list Step 5 - Dropping off the least ranked issues Step 6 - Free discussion on the outcomes of the ranking (on-line ‘chat’) Step 4a -Extracting list with single ratings Step 5a -Self-ranking level of acq. knowledge Step 6a -Self-ranking level of acq. knowledge Is there agreement about the ranked list? YES Final shared list of concerns over globalization NO Step 7 - Resume Delphi Tour
1603.01787
1
1603
2016-03-06T04:17:56
Approaches to Modeling Insurgency
[ "cs.MA", "cs.CY", "cs.SI" ]
This paper begins with an introduction to qualitative theories and models of insurgency, quantitative measures of insurgency, influence diagrams, system dynamics models of insurgency, agent based molding of insurgency, human-in-the-loop wargaming of insurgency, and statistical models of insurgency. The paper then presents a detailed case study of an agent-based model that focuses on the Troubles in Northern Ireland starting in 1968. The model is agent-based and uses a modeling tool called Simulation of Cultural Identities for Prediction of Reactions (SCIPR). The objective in this modeling effort was to predict trends in the degree of population's support to parties in this conflict. The case studies describes in detail the agents, their actions, model initialization and simulation process, and the results of the simulation compared to actual historical results of elections.
cs.MA
cs
Approaches to Modeling Insurgency Alexander Kott, Bruce Skarin Introduction More writings about insurgency appeared in the last few years than in the preceding hundred years (Kilcullen 2008). The explosion of interest in the subject has much to do with international interventions: insurgency is the single most difficult and frightening challenge that an intervention-military or non- military-may face. For the purposes of this paper, we define insurgency as an organized movement that uses armed violence to overthrow a country's government while often hiding within the civilian population and using civilians to perform combat support functions. The use of civilian population differentiates insurgency from the regular warfare where such an exploitation of civilians would constitute a war crime. Similarly, a rebellion where anti-government forces do not disguise themselves as civilians and fight as a regular, identifiable military is different from insurgency. The significant involvement of civilian population also distinguishes insurgency from a purely terrorist movement, which relies primarily on a tight network of professional terrorists. Although our definition, like any other (e.g., US DoD, 2007), leaves room for gray areas, it serves to emphasize the key feature of insurgency-its reliance upon, and exploitation of civilian population. Because the literature on modeling, simulation, and analysis of regular warfare is vast and readily available, and because insurgencies are often associated with interventions, in this paper we limit our discussion to insurgencies. Insurgency forces may include a combination of the following:  an ideology-based movement that fights to overthrow the current form of the country's government and to establish a different regime;  a personality-based movement driven to install its leader as the ruler of the country;  a religious movement that wishes to defend its religious freedoms or to establish a religion- based regime in the country;  an ethnic minority demanding greater rights or independence;  a regional movement demanding secession or a greater share of the country's resources;  an ethnic majority fighting against the rule of an ethnic minority or a colonial power. Counterinsurgency forces also take a variety of forms:  a democratic state that enjoys the support of a majority of the population;  a dictatorship that relies on coercion to maintain its rule;  a colonial government that represents a foreign power;  a state that receives a limited support of a foreign power but is independent in its actions and could conceivably survive on its own;  a state largely reliant on resources and support of a foreign power. Regardless of the forces on the insurgent and counterinsurgent sides, importance and effectiveness of insurgencies have grown since the Second World War, for numerous reasons. These include the reluctance of Western or Western-supported governments to apply the brutal methods common in prior centuries; the effectiveness, low cost and ease of use of modern small arms like the Kalashnikov rifle (Singer ,2006); the easy availability of arms from a range of state and non-state supporters through channels of modern commerce (Anderson, 2007). An international intervention can be a response to an insurgency, either in support of the insurgent side, e.g., African Union peacekeeping in Darfur since 2004 (Lynch, 2007), or in support of the counterinsurgents (e.g., the US support to the Colombian government fighting the FARC insurgents [Marcella, 2003]). On the other hand, an international intervention is often a cause of an insurgency, or a major factor in changing the insurgency's intensity or character. Thus, a change in insurgency can be both a cause and an effect of an intervention. For example, a diplomatic intervention may induce a third party to discontinue its support to an insurgency; or compel a counterinsurgency-fighting government to conciliate with insurgents. An international famine aid or economic development assistance may reduce populations' grievances and its support to insurgents; but it may also increase the resources available to insurgents through protection racket (Baker, 2009). Similarly, an international informational campaign that condemns an oppressive government may fan the flames of insurgency against the government; yet a campaign in support of a government may convince a part of the population that the government is an illegitimate foreign puppet. Finally, a military or law-enforcement intervention is likely to cause popular resentment at foreign meddling, or drive a segment of population to insurgency by depriving them of their prior privileges and wealth. In turn, insurgency affects other phenomena (Kott and Citrenbaum, 2010). Economic development suffers, and illicit economy flourishes. Political dynamics shifts toward the competing positions on the issue of how to fight or to accommodate the insurgency. Information channels become key tools-and casualties-of insurgents and counterinsurgents. Crime and corruption multiply as all sides may resort to bribes, death threats, protection racket, drug revenue, ransom and extortions. Ethnic, social and religious divisions are exploited and magnified in an insurgency. Qualitative Theories and Models Theorists and practitioners of insurgency and counterinsurgency have outlined a number of key factors that affect the strengths of insurgency. Lenin (Osanka, 1962) stressed the importance of economic and social discontent of masses as a precondition to successful insurgency, as well as presence of a well- organized core of revolutionaries able to mobilize and guide the insurgency. Lawrence (1920, 1935) emphasized the need for an insurgent base inaccessible to the counterinsurgents forces, with protective terrain, adequate supplies of munitions, and at least passively supportive population-a safe haven where insurgents can hide and regroup. He also noted that insurgents benefit when counterinsurgent force relies on a vulnerable technology, such as a railroad. Galula (1964) wrote about the critical role of civilian population who tends to be largely neutral in the conflict and shifts its support to insurgents or counterinsurgents depending on perceived benefits and outcomes of such a support. The population's support also depends on the actions, such as assistance or violent reprisals, taken by either side toward the population. Malayan insurgency (Nagl, 2002) offered the evidence that insurgency loses its strengths when population is physically separated and protected against the insurgents; when counterinsurgents offer economic benefits, security from violence, and political conciliation to the population. In addition, counterinsurgents benefit when they are able to attract a large fraction of population by exploiting ethnic and other differences. Indigenous counterinsurgent forces are more effective than foreign counterinsurgency forces in gaining population's loyalty. Leites and Wolf (1970) point out that insurgency declines when deprived of resource inflows (such as munitions, supplies, and finances) and when its organizational structure and competency are disrupted by counterinsurgents. Respect and fear of government and its forces are important to dissuade population from supporting insurgents (Peters, 2006). War-weariness and anti-war sentiments among the counterinsurgent population and government may encourage and strengthen the insurgency (Iyengar and Monten, 2008; Anderson, 2007). Amnesty, financial rewards and offers of government and military positions can induce insurgents to switch sides (Kahl, 2007). While the aforementioned factors are the most common drivers of insurgency, many other phenomena are important in specific situations. For example, a large pool of displaced persons or refugees can become a highly productive recruiting ground for insurgents as well as an opportunity to skim the foreign food aid (Cuny and Hill, 1999). Large-scale international economic aid programs can become the primary financing mechanism for an insurgency, through protection racket (Baker, 2009). In an attempt to integrate a range of theoretical findings and practical observations, the US military produced a counterinsurgency manual (US Army, 2006), which is in part a comprehensive qualitative model of insurgency. The widely-cited manual identifies multiple factors that encourage and discourage insurgency, stresses that application of force can be a major factor in increasing population's resentment of counterinsurgency, and highlights population's security, good governance and essential services as key factors that diminish the population support to insurgency. Unfortunately, empirical support to qualitative theories of insurgency tends to be anecdotal rather than scientifically rigorous. The work by Iyengar and Monten (2008) is a relatively uncommon example of a model-based, quantitative examination of a qualitative theory. These authors test the argument that anti-war sentiments in the USA emboldens the anti-US insurgents in Iraq and influences them to increase the rate of attacks on the US forces. Iyengar and Monten construct a theoretical model that relates the behavior of Iraq insurgents, specifically the rate of attacks on US forces and on Iraqi Government forces, to their perception of anti-war sentiments in the US. In this model, insurgents are rational, strategic actors who attempt to optimize the distribution of their attacks over time in such a manner that the insurgents preserve their resources while maximizing the anti-war opinions in the US. The authors compute the differences in predictions of the model for different areas of Iraq-some with greater access to information about the US public opinions than others-and compare these estimates with the reported insurgent attacks. They find that in periods immediately after the US media reports a spike in anti-war sentiments, the level of insurgent attacks increases. Also unfortunately, interpretation and application of qualitative models to practical decision-making is an imprecise art. When in 2007-2007 the US decision-makers pondered whether to increase or to decrease the number of US troops of Iraq-the so-called Surge decision (Woodward, 2008)-the qualitative theory was hardly in question. Most likely, all participants in the debate agreed that increasing the number of US troops fighting the Iraqi insurgency may improve the security for a fraction of the Iraqi population; it may also increase the population's anger at foreign occupation; it may also give the Iraqi government additional time to strengthen its political and military posture; or, it may also lull the government into complacent reliance on the US protection. However, the decision-makers and consultants disagreed strongly on the relative quantitative magnitudes of these potential qualitative effects, and on the resulting balance. The overwhelming majority of the US senior military leaders believed that on the balance the Surge- rapid temporary injection of additional US troops into the counterinsurgency efforts-would be counter- productive because it would merely encourage the Iraqi government to continue its complacent dependency on the US (Woodward, 2008; pp.224-281). A small group of civilian theoreticians and retired generals believed otherwise and urged President George W. Bush to accept the Surge plan. In the event, President Bush decided to execute the Surge, and a major reduction of insurgency followed a few months later, in the middle of 2008. Opinions still differ on whether the Surge worked as its proponents expected, or whether other, unrelated mechanisms caused the reduction in insurgency (Woodward 2008; pp.380-384; Pierson 2008). Qualitative models are insufficient to answer such questions; they require quantitative models with the corresponding quantitative metrics, variables, and relationships. Quantitative Measures of Insurgency To construct quantitative model of a complex phenomenon, such as insurgency, one needs ways to measure attributes and dynamics pertaining to that phenomenon. Formulating meaningful metrics of insurgency, however, is a significant challenge. Insurgencies are largely about human perceptions, which are contextual. For example, public opinion about the quality of current situation in a country is highly dependent on past historical experiences and availability of alternatives. Thus, interpretation of a metric's magnitude or event its trend is dependent on other, often intangible variables (Campbell et al, 2009). Most commonly used metrics of insurgency measure level of violence, e.g., the number of insurgent attacks per month; quality of government institutions, e.g., public opinion polls regarding the level of corruption; and strengths of security forces, e.g., the number of counterinsurgent troops and their degree of readiness. For example, Brookings Institution offers comprehensive datasets of metrics (O'Hanlon and Campbell; Campbell and Shapiro) for insurgencies in Iraq (since March 2003) and Afghansistan (since October 2001). These datasets include several dozens of metrics such as fatalities and counterinsurgent troops, number of insurgent attacks of different types, strength of counterinsurgent troops, strengths of anti-insurgent militia, unemployment, electricity generation, inflation, GDP, and public opinion polls. Others begin to explore more comprehensive processes of measuring insurgency, with a special focus on the insurgency's less-tangible aspects like population attitudes and perceptions. For example, the MPICE program (Dziedzic, 2008) has developed a broad-ranging recommendation for gathering a variety of in- depth metrics with computer tools. These would include semi-automated analysis of a country's media content to gauge popular and elite impressions of insurgency-related issues; creation of a panel of experts to assess issues of interest (e.g. the capacity of law enforcement agencies to perform essential functions); and specially constructed public opinion surveys. There is no shortage of complaints about metrics being potentially meaningless and even misleading. For example, Clancy and Crosett (2007) describe history of several insurgencies and find that metrics used in those insurgencies were highly misleading. Still, critics of metrics agree that analysts and decision-makers must look for insightful metrics, and for better means to interpret their meaning. Quantitative models can help do exactly that. Influence Diagrams Also called the causal loop diagram, influence diagram occupies the middle ground between a qualitative model and a quantitative model. Like a qualitative model, an influence diagram describes key aspects of insurgency phenomena and the influences between them. In addition, however, an influence diagram offers features that make it a stepping-stone toward a quantitative model: the diagram names specific quantitative variables, identifies dependent variables for each variable, and specifies whether an increase in a variable causes an increase or decrease in its dependent variable. Figure 1. Key variables and their relations for the insurgency of Anglo-Irish War 1916-1923 In Figure 1, the influence diagram shows key variables and their relations that describe the insurgency of Anglo-Irish War (also known as the Irish War of Independence) of 1916-1923 (Anderson, 2007). Let us begin with the variable called Number of Insurgents, which reflects the number of active anti-British insurgents operating in Ireland. An increase in Number of Insurgents leads to increase in Insurgent Attacks-note that the two variables are connected with an arrow and marked with the plus sign (increase leads to increase). The growing Number of Attacks in turn leads to an increase in British Public War-Weariness (again, the plus sign indicates that increase leads to an increase) and prompts the British forces in Ireland to energize their British Security Measures, which leads to greater Irish Population Resentment and also to more arrests that deplete the Number of Insurgents. Note the last arrow (from British Security Measures to Number of insurgents) is marked with a minus sign, because here increase leads to decrease. And so on. The diagram points to potentially very complex non-linear dynamics of insurgency. Even in this simple model, the number of Insurgent Attacks, for example, affects the Number of Insurgents in five different ways-there are five distinct paths from Insurgent Attacks to Number of Insurgents. The benefits of constructing such a diagram include the following:  The modeler or analyst elucidates and formalizes her thinking about the insurgency phenomena;  Specific variables and their relations are identified and documented;  Qualitative nature (e.g., increase in A leads to decrease in B) of the variable dependencies are determined and documented;  Complex feedback loops and side effects become clearly visible;  Subject matter experts and other analysts and modelers can review and confirm or question the visual representation of the model. Ideally, the modeler derives the influence diagram directly from relevant qualitative theories. For example, Pierson faithfully followed a single qualitative model--the Counterinsurgency Manual (US Army, 2006)--to build an influence diagram of Iraq insurgency (started in 2003), with a large number of variables and influence lines (Pierson, 2008). Choucri et al (2006) formulate their influence diagram of insurgency while rigorously documenting social science theoretical literature in support of each of their model's influences. For example, instead of merely asserting as self-evident the influence "More Insurgents Lead to More Regime Opponents," they cite literature that supports existence of such an influence. They also attempt to justify the validity of variables they introduce into their model. For example, they introduce a variable called State Resiliency and justify it by comparing the State Resiliency to the determinants of civil war of Hegre et al (2001). System Dynamics Models of Insurgency The modeler may continue to develop the model of Fig. 1 by specifying equations that relate each variable to the variables that influence it, e.g., the equation that computes the Number of Insurgents as a function of British Security Measures and of Irish Population Resentment. The resulting system of equations (typically a system of coupled non-linear differential equations) can be solved, for example, by numerical simulation. The solution will shows how each variable evolves over time. System Dynamics (Sterman, 2001) is a technique that simplifies specifying and solving such systems of equations. A variable is represented as a "stock" of goods. Inflows and outflows represent temporal changes to the variable. A "valve" that opens and closes as a function of other variables controls the rate of a flow. Figure 2. A fragment of a System Dynamics model Fig. 2 depicts a fragment of a System Dynamics model that elaborates the influence diagram of Fig. 1. Here, the Number of Insurgents is a stock, or a level of liquid in a reservoir. The incoming pipe carries the flow of new recruits; the valve opens wider when the Irish Population Resentment is greater. One outgoing pipe represents the depletion of Number of Insurgents due to arrests. The valve opening on that pipe depends on the British Security Measures. The second outgoing pipe represents the number of insurgents lost in action, and the valve is controlled by the number of Insurgent Attacks. The modeler must specify an equation for each valve. A computerized System Dynamic tool such as (isee systems, 2009) helps to specify the model and then solves it automatically. System Dynamics is arguably the most popular technique of insurgency modeling. For example, Fig. 1 is partially adapted from Anderson (2007) who constructed a system dynamics model of the Anglo-Irish War, possibly the first modern urban insurgency. Anderson used only a few causal loops-closed paths through a set of variables. One loop represents the insurgency suppression and creation: coercive acts of British forces increase interference in civil life, which increases population resentment, which increases number of insurgents and their anti-British attacks, which leads to increase in British coercive acts. Another critical loop reflects the impact of British war weariness: as insurgent violence increases, British public's war-weariness increases, leading to the public pressure to remove British troops from Ireland. If Anderson (2007) exemplifies a high-level model capturing overall dynamics of the entire insurgency, the work of Grynkewich and Reifel (2006) is an example of a detailed model of a particular sub-feature of insurgency. They model the financial operations and organizational behavior of the Salafist Group for Preaching and Combat (known by its French initials, GSPC). The model relates intensity of insurgent combat operations, expenses to support the operations, and influence of combat operations on population's willingness to support insurgents financially. The key stock in this model is the pool of finances available to GSPC; key inflows include extortion from population, voluntary donations, smuggling operations, kidnappings and ransoms. Outflows include organizational overhead and operational costs. Authors use limited published data and educated guesses to derive values of equation parameters such as the fraction of population willing to donate to insurgents and the amount of donations. The authors report that the model's simulations agree qualitatively with the available information regarding the GSPC's operations and finances. While few would claim that a system dynamics model of insurgency provides a reliable prediction of an insurgency's future evolution, there are other significant benefits in constructing and simulating such a model:  The model helps analysts and decision-makers see un-anticipated side effects, particularly those due to feedback loops;  The modelers and analysts document systematically a formal model that includes a rich, integrated set of factors, processes, and quantitative dependencies;  The simulation of the model illustrates the complexity of the nonlinear temporal dynamics of the insurgency system;  Sensitivity analysis aids analysts and decision-makers in forming insights and intuition toward formulation of intervention plans and policies. Agent Based Modeling of Insurgency Let us return to Fig. 1. Even in this simple diagram, we see several distinct actors, each with its own set of goals, actions, culture, resources, and relations: insurgent organization, general Irish public, British forces in Ireland, British public and British government. We may conclude that this set of actors (agents) is too simplistic: after all, Irish insurgents included various movements with different tactics and leadership, the British public included pro-war and anti-war segments, and the British government included parties with different views on the Irish question, and so on. If we wish to model the dynamic relations and mutual influences of all these agents, we should add multiple variables associated with each of the agents, and influence lines between the additional variables. The model becomes unwieldy. An alternative is to use the agent-based modeling paradigm. An agent-based model consists of agents – software representations of individuals or groups of individuals. Groups can be represented at different scales of abstraction: organizations, segments of populations, ethnic or religious groups, social classes, political parties, or movements, even whole countries. A model may also include elements of the agents' environment. For example, we may want to represent significant geographic areas where the insurgency unfolded: Dublin, Southern Ireland, Northern Ireland, etc. An agent has attributes, e.g., an insurgent organization may be characterized by the number of members, amount of munitions, funds available, level of combat training, political objectives, and organizational competency. An agent has relations to other agents, e.g., an insurgent group may be an ally of another insurgent group. An agent has means by which to make decisions about the actions it will take. Computationally, agents can be implemented, for example, as objects. In that case, an agent has methods by which it makes decision, i.e., choices among available actions. Such a method may include rules or decision-making algorithms, stochastic or deterministic. An agent has a set of actions it can take, e.g., bombing the barracks of counterinsurgent forces, moving itself to another county, or adopting a more positive attitude toward a rival insurgent group. When executed, an action affects attributes and relations of this and other agents. For example, a bombing attack by an insurgent group reduces the strength and tolerance level of counterinsurgent agent, reduces the amount of explosives available to the insurgent group, and increases its morale and reputation for effectiveness. To construct a complete model, the modeler identifies the appropriate set of agents (possibly starting with an influence diagram like Fig. 1), assigns attributes and relations for agents, and codes the methods for agent decision-making and for action impacts. Prior to executing the simulation of the model, the modeler also assigns initial values (i.e., the values at the start of the simulation) of the attributes and relations. The simulation of the model usually proceeds in time-steps. A time-step for modeling insurgency is often a month or a week. At the beginning of the simulation, at week-1, each agent uses its decision-making method to select one or more actions. Then each agent executes the selected actions and each action modifies values of appropriate attributes. This completes the first time-step, and the process repeats for the next time-step, week-2, and so on. Because attributes and relations of agents change with time, in each time-step agents may select different actions (or no action). The simulation ends when agents reach the last time-step. Usually, the analyst who uses the model specifies the number of time-steps. For example, if the analyst studies the potential insurgency effects of an intervention campaign that is to last five years, she may specify 60 time-steps, with each step corresponding to a month of time. At the end of the simulation, the analyst reviews the history of the simulated agents: changes in their attributes and relations over time. For example, an analyst may observe that an agent representing an insurgent group rapidly increases its strength between months 1 and 15, then begins to lose support of local population between months 15 and 20, rapidly depletes its strengths between months 20 and 23, and finally merges with another insurgent group at month 27. Depending on the tool or model used, an agent may have a memory; it may accumulate experiences, learn new rules, and change its beliefs. For example, the CORES system (Kowalchuck et al, 2004) models an agent's belief in its own actions. When an action does not succeed, the agent's belief in the worth of the action diminishes. Thus, a counterinsurgency agent may gradually come to conclude that harsh retributions are not effective. Nexus (Duong, 2007) agent-modeling tool pays even greater attention to the cognitive nature of its agents. A Nexus agent has a degree of historical consciousness; it assigns and reassigns blame for past actions of agents, changes beliefs in trustworthiness of other agents, judges their ideology and looks for friendship with its enemy's enemy. Nexus played a major role in a large-scale, real-world study by a US government agency, in a situation that involved potential international intervention and insurgency. Senturion's agents possess a complex decision-making mechanism that comprises a set of algorithms drawn from game theory, decision theory, spatial bargaining, and microeconomics. Together, they model how agents interact in a political process. This tool has produced multiple real-world predictions of insurgency-driven situations, such as those in Iraq, Palestinian Territories, and Darfur in 2004-2009 (Abdollahian, 2005; Sentia, 2008). Other Modeling Methods and Tools Broad overviews of tools relevant to insurgency modeling are found in (Hartley, 2008; Benedict and Simmons, 2007). Virtually all tools able to generate an anticipatory estimate of an intervention's impact on insurgency fall into one of the two categories we already discussed: system dynamics modeling or agent-based modeling. However, one finds a few exceptions that fall into two other categories: human- driven wargaming and statistical correlations. Human-in-the-Loop Wargaming PSOM model (Parkman, 2005) is an example of a wargaming-based approach-a computerized, time- stepped war-game where human players decide the actions and moves of insurgent and counterinsurgent forces. In PSOM, the geographic area of operations (the wargame board) is divided into 50 km squares. Each square has attributes such as its degree of urbanization, nature of terrain, population density, quality of infrastructure, cultural values, population's perception of security and support to the government. Human players operate the insurgency and counterinsurgency forces. At the beginning of the wargame, the players allocate their respective force units to selected squares of the wargame board. Players assign particular missions to these force units: enforce, stabilize, disrupt, and others. During each time- step, the computer determines the outcome of each force unit's mission based on the current condition in the square, and on actions and strengths of the opponents' forces in the square. The outcome then leads to changes in the square's attributes values. For example, if the counterinsurgent force unit deems successful in its security-enhancement mission, the value of the security attribute in the square increases. Then the game proceeds to the next time-step, and so on. One can notice here a certain similarity to the agent-based modeling, except that in PSOM the human players select the agents' actions (missions and moves), while in the agent-based paradigm agents make decisions without human intervention. Statistical Correlations Application of statistical techniques to historical data on insurgencies yields valuable correlations. Some regularity in data is noticeable even without a formal analysis. For example, (Quinlivan, 1997) offers a compelling visual correlation between an intervention's success and the number of security personnel (military plus police) deployed per thousand of the country's inhabitants. Historically, successful suppression of an insurgency requires about ten or more security personnel per thousand of population. Elbadawi and Sambanis (2000) offer a rigorous quantitative analysis of factors affecting the duration of civil wars (including insurgencies). They find that an external intervention tend to prolong a conflict. They also find a strong U-shaped correlation between the duration of an ethnically based conflict and the ethic fractionalization index. Conflict lasts longer in countries with two or few large ethnic groups than in those with many small groups or a single dominant group. Initialization, Calibration and Validation An insurgency model requires initial values of variables and values of constant parameters or coefficients in equations or rules. The modeler also needs a validation process that shows an acceptable degree of agreement between the model's outputs and data or trends observed in the real insurgency. Often, modelers have to make educated guesses based on very limited data. E.g., Grynkewich and Reifel (2006) are compelled to use a single newspaper quote of an unnamed "Hezbollah operative" to assign a cost to an insurgent operation. When no insurgency-specific data are available, modelers resort to the use of data from domains partially similar to insurgency. For example, Robbins (2005) presents a system dynamics model for reconstruction and stabilization. The model includes an insurgency sub-module that accounts for such factors as ethnic fractionalization, effect of unemployment and urbanization. Lacking insurgency-related data, Robbins uses correlations obtained from studies of crime dynamics. Others derive quantitative parameters using rather sophisticated models, extensive collection of real- world data and comprehensive statistical analysis. For example, Iyengar and Monten use such formidable arsenal of tools to quantify the degree of influence that the apparent lack of resolve among the US public has on the intensity of insurgent attacks. In many cases, the modeler obtains a model's parameters by calibration, i.e., by changing the values until the model's outputs match the available data. For example, Leweling and Sieber (2006) calibrate their model of human resources of an insurgent organization against data derived from publically available news reports, such as numbers of insurgents arrested. They adjust both the structure and parameters of the model in order to obtain satisfactory agreement between the model's output and the data. Although hardly the best practice, some modelers consider calibration identical with validation. The modeler calibrates the parameters of his model, shows a reasonable agreement between the model's output and the available real-world data, and then declares the model valid. Ideally, he should calibrate with one set of data and validate with respect to another set data. Often, unfortunately, only one set of data is available. For example, Anderson (2007) validates his system dynamics model by comparing the model's results with the data describing the Anglo-Irish War of 1916-23. He uses this particular civil war for validation purposes because it is the first modern urban insurgency, and because it is a rare case of a well- documented insurgency. The model was able to replicate approximately the dynamic behavior of the Anglo-Irish War, suggesting a degree of model's validity. Anderson lists numerous parameters and values of these parameters without explaining how he obtained the values. One has to presume that he calibrated the values in a way that maximized the agreement between the model results and the real- world data. Case Study: Conflict in Northern Ireland, 1966-1998 The Republic of Ireland occupies about 80% of the island of Ireland. The remaining northeastern area of the island, the Northern Ireland, is a part of the United Kingdom. Between 1966 and 1997, the Northern Ireland experienced an armed conflict known as the Troubles (Tonge, 2006). Several irregular combatant groups rooted in Irish Catholic population, notably the Provisional Irish Republican Army (Provisional IRA) and the Official Irish Republican Army (Official IRA), fought for reunification of the Northern Ireland with the Republic of Ireland. Their opponents, irregular combatant groups of Protestant origins such as the Ulster Volunteer Force (UVF) and Ulster Defense Association (UDA), fought to maintain the Northern Ireland as a part of the United Kingdom. All irregular combatant groups were in conflict with the government of the United Kingdom and its armed forces. Because the irregular combatants disguised themselves as civilians and relied on widespread popular support, the conflict is best characterized as an insurgency. Political parties in the Northern Ireland were strongly polarized along the lines of ethno-religious affiliation. Pro-British Protestant parties included the Ulster Unionist Party (UUP) and the Democratic Unionist Party (DUP). Supporters of these parties were more likely to sympathize with the UVF and UDA combatants. Irish Catholic population tended to support such parties as Social Democratic and Labor Party (SDLP) and Sinn Fein. The last one is often described as the political arm of IRA, and Sinn Fein's supporters were likely to assist IRA combatants (Silke, 1999). Let us review in detail a model (Grier et al, 2008) that focuses on the Troubles in Northern Ireland starting in 1968. The model is agent-based and uses a modeling tool called Simulation of Cultural Identities for Prediction of Reactions (SCIPR). Our objective in this modeling effort is to predict trends in the degree of population's support to parties in this conflict. In effect, we ask the following question: if we were to have a model like this in 1969, could we predict trends in population's sympathies to political movements like DUP and Sinn Fein. Arguably, insurgents on both sides draw their strength from population segments that identify with extremes of the political spectrum. If we can predict trends in extreme political opinions, we are better prepared to anticipate changes in the strength of insurgency. Another important question is how much data we need to construct and simulate such a model. Models that require less data are less expensive to construct, and easier to understand. In this case study, we use a rather simple model that requires little data. We find, encouragingly, that the simple model with a modest amount of readily available data produces potentially useful predictions of trends. Agents Using SCIPR, we construct about 5000 agents that represent the entire population of Northern Ireland. Each agent represents a group of approximately 300 individuals with approximately similar identities, residing near the same locale. An agent has several attributes including the district of residence (one of the 26 districts),   ethno-religious affiliation (Catholic or Protestant),  a number between 0.0 and 1.0 representing the agent's opinion on the issue of Northern Ireland affiliation (0.0 means Northern Ireland must remain British, 1.0 means Northern Ireland must unite with the Republic of Ireland), and the political party that the agent supports.  An agent has social links to an average of ten other agents, of which 90% are of the same religion. These networks are fixed and are formed under the assumption that individuals in Northern Ireland have around ten people that they are in regular contact with to discuss political issues, and that they are generally of a similar identity. Using these links, an agent can communicate its political opinion to other agents. There is no particular theoretical basis for using 5,000 agents, and not 500 or 50,000, but for simulations of less than 1,000 agents we find the statistical variance of the generated agent population from the input distributions is significant. With simulations greater than 5,000 there is no significant difference in either the initialization or outcome. Therefore, the number 5,000 is merely a modeling assumption, and it seems to work for our purposes in this model. Note what we do not attempt to model: we do not model political movements explicitly, nor political leaders, nor other influential countries like the Eire or the United States, nor the rest of the Great Britain. Neither do we represent explicitly the insurgency groups, counterinsurgency forces, economics, and many other potentially significant factors. Agent Actions An agent can perform several actions:     communicate its current political opinion to another agent through an existing link we mentioned earlier, change its political opinion on the question of Northern Ireland affiliation in response to receiving an opinion from another agent, change its political opinion on the question of Northern Ireland affiliation in response to the news of a latest sectarian killing, and change its party affiliation. Figure 3. A model of an agent's change of its political opinion. An agent changes its political opinion in the manner depicted in Fig. 3. An agent's opinion is characterized by the opinion number, e.g., 0.5, and the opinion's confidence bounds, e.g., (0.25; 0.75). When the agent receives an opinion, .e.g., 0.7, from another agent within his social network (i.e., connected by an existing link), the receiver modifies its opinion partially, in the direction of the sender's opinion. When the sender's opinion is outside the receiver's confidence bounds, the receiver ignores the sender's opinion. This model, and the opinion scaling equations, follows largely (Friedkin, 1999; Hegselman and Krause 2002). An agent also changes its political opinion in response to events, in this case, the latest episode of sectarian killings. Responses to the event are specified by identities as a distribution of reactions to an opinion. After the occurrence of an event, agents within the region of the event sample a value from the distribution of reactions for their identities. This value is then used to scale the maximum opinion change parameter and added to an agent's current opinion. This new opinion is then evaluated using the same bounded confidence procedure described above. In this model, when for example a Catholic is killed, agents of the same religion increase the strength of their opinion in favor of the united Ireland. An agent switches to support of another party when the agent finds its opinion more closely aligned with those of the members of another party than with the members of the agent's current party. For the sake of clarity and brevity, we omit a few other relevant details, such as an agent's change of opinion in response to a sectarian murder. Model Initialization We initialize our model to resemble the Northern Ireland of 1968 by assigning each agent the values of its attributes. We pick the values stochastically but our distributions are such that the total numbers of Protestant and Catholic agents, as well as fractions of supporters of each party in each county correspond to the demographic and voting data of 1968 (Fig. 4). Figure 4. Demographic and voting categories. We also create a social network of agents: we assign a link to a randomly chosen pair of agents in such a manner that each agent has on average about 10 links, with about 45% of the links connecting to agents within its immediate vicinity, 30% to other agents residing in the same district, and the rest---to agents in other locales of Northern Ireland. We also ensure that about 90% of the links are between agents of the same religion. These parameters-10, 45%, and 30%--are merely modeling assumptions, without a substantive empirical basis. A more rigorous modeling effort should consider obtaining empirical data to support and improve these assumptions. We also initialize a table of sectarian killings: for each day, how many (if any) Catholics and Protestants perish in inter-communal violence. Our model does not predict such data; they have to come from a separate source. Now we have the initial attributes of agents and their links fully defined; the model is ready for simulation. Northern Ireland Population by ProvinceProtestant CatholicUnionist BlockNationalist BlockModerateStrongly ForStrongly OpposedOpinion toward a united IrelandOther Nationalists SDLP Sinn Fein DUP UUP Other UnionistOtherAPNIMale Female Simulation Process The simulation algorithm begins its process on the first day of the year 1969, in simulated time. The algorithm randomly picks a number of pair of linked agents. In each pair, the algorithm randomly designates one of the agents to be the sender and another as the receiver of the political opinion. The number of pairs selected on each day is such that the every agent, on average, acts as a sender approximately every three days. This parameter-three days-is merely a modeling assumption; a more rigorous model should test the empirical validity of this assumption. When selected by the algorithm, the sender communicates its current political opinion to the receiver. The receiver then either ignores the received opinion, or shifts its own opinion partially toward the sender's opinion as we discussed above. The simulation algorithm also notifies each agent of sectarian killings that occurred on that day. Agents adjust their political opinions correspondingly. The simulation algorithm then performs the same process on the next day of the simulated time, and so on. At the end of each year, each agent re-evaluates the alignment of its political opinion with the members of political parties. Depending on the alignment, the agent changes its party support. The algorithm stops at the end of the year 2005, as instructed by the modeler, and outputs the results. Results of the Simulation Fig . 5 and 6 compare the historical results of elections and polls in Northern Ireland with the results of our simulation. Figure 5. Historical results of elections. Historical Elections0%20%40%60%80%100%19691973197419751979198119831985198719891993199619971999200120042005DUPUUPOther U.APNIOther NonOtherOther N.SDLPSF Figure 6. Simulated results of elections. On the one hand, there is a notable similarity in general trends. For example, the simulated growth trends in the levels of support for Sin Fein post-1981 and for UUP in years 1973-1993 are broadly consistent with actual historical data. The relatively constant levels of simulated support for DUP and SDL are also comparable to real history. On the other hand, the simulation clearly arrives to a steady state after1994 and seems unable to project any further changes. In our experience, this is a general limitation of the Bound Confident model which tends to converge to an artificial steady state after a period of simulation. The simulation also strongly overestimates the support to moderate parties, those between UUP and SDLP. Still, it is encouraging to see that an admittedly simple model shows the ability to predict trends in population's sympathies nearly 15 years forward! It is even more remarkable considering that the modelers used very small amount of readily available information: elections results and basic demographics. Simulated Elections0%20%40%60%80%100%19691973197419751979198119831985198719891993199619971999200120042005DUPUUPOther U.APNIOther NonOtherOther N.SDLPSF As of this writing, extended models of this type, e.g., (Kott and Corpac, 2007; Kott et al, 2007; Kott et al, 2010) are used to study practical problems of modern insurgencies. Practical Tips  Insurgencies are diverse, and no ready-made model will represent all features of the particular insurgency and situation that interest your customer (here, customer is the organization that wishes to use the results of your analysis for applied decision-making). When selecting a model for your analysis, look for one that allows you to make major extensions and modifications.  A number of simple yet insightful models of insurgency have been published by academic researchers such as the Center for Contemporary Conflict of the Naval Postgraduate School (http://www.nps.edu/Academics/centers/ccc/). Consider using one of such models as an initial baseline, then experiment and gradually extend it for your purposes.  The ability to trace the chain of influences in analyzing results of a simulation is critically important. System Dynamics models tend to be better in this respect.  A modeler with little experience in insurgency modeling will find System Dynamics models easier to construct, to understand, and to debug.  Many insurgencies, and many strategies for managing insurgencies, cannot be properly modeled without representing multiple players-individuals and groups-in the insurgency. In such cases, an agent-based model is most appropriate.  Always model international actors' influences on insurgents and counterinsurgents. Few insurgencies ever unfold without a major impact by one or more international participant.  Before constructing a model, ask your analysis's customer about the actions her organization considers taking with respect to the insurgency, or within an insurgency-plagued region. Make sure your model is capable of representing those actions and their effects.  For every action your customer plans to take, include modeling of undesirable side-effects. Thus, if the analysis' customer plans to provide food aid to refugees, include in your model a possible diversion of food by insurgents.  In selecting variables and attributes for your model, give preference to most tangible and measurable ones. Include the metrics that your customer expects to use or to affect. Also, consider including historical or current data available to you for calibration and validation.  Allocate adequate time and resources to review and improve your model with Subject Matter Experts (SMEs). Produce model's visualizations specifically designed for easy comprehension by SMEs.  Insurgencies are emotional topics, and SMEs tend to hold strong, passionate opinions. Collaborate with several SMEs and welcome widely divergent views. Try to find SMEs who had experiences on both sides of an insurgency.  Early in the modeling project, work with insurgency SMEs to create a set of test cases. Ask several SMEs, independently, to produce their estimates of probable evolution of the insurgency in each case. Expect to receive widely divergent estimates. Resources Conflict Analysis Resource Center http://www.cerac.org.co/datasets.htm Pointers to multiple depositories of datasets related to armed conflicts, inlcuding insurgencies Ethnicity, Insurgency and Civil War Project http://www.stanford.edu/group/ethnic/publicdata/publicdata.html data relating ethnic fractionalization and insurgency The American Political Science Association, Task Force on Political Violence and Terrorism http://www.apsanet.org/content_29436.cfm Pointers to multiple depositories of datasets related to political violence, inlcuding insurgencies David C. Gompert and John Gordon IV, "War by Other means," RAND Publication 2008 http://www.rand.org/pubs/monographs/MG595.2/ Appendices A and B provide data and analysis of outcomes and correlations for 89 insurgencies, and data on counterinsurgency capabilities of world states and organizations Political Instability Task Force http://globalpolicy.gmu.edu/pitf/pitfdata.htm http://globalpolicy.gmu.edu/pitf/pitfpset.htm Multiple datasets related to internal wars, including insurgencies Minorities at Risk Data http://www.cidcm.umd.edu/mar/data.asp Datasets characterizing multiple minorities, their conditions and potential risks, including potential or ongoing insurgency Genocide and Politicide project http://globalpolicy.gmu.edu/genocide/ Data describing cases of genocide, many related to insurgencies War and Health website http://warandhealth.com/civilian-victims-in-an-asymmetrical-conflict-data/ Civilian victims in an asymmetrical conflict http://www.systemicpeace.org/inscr/inscr.htm Armed Conflict and Intervention (ACI) Datasets http://www.systemicpeace.org/ multiple datasets on state instability and conflict Correlates of War Project (COW) http://www.umich.edu/~cowproj/dataset.html Wolrd Bank Datasets http://econ.worldbank.org/WBSITE/EXTERNAL/EXTDEC/EXTRESEARCH/EXTPROGRAMS/EXTCONFLICT/0, ,contentMDK:20336174~menuPK:637270~pagePK:64168182~piPK:64168060~theSitePK:477960,00.html Data on civil wars post-WWII Center for Computational Analysis of Social and Organizational Systems (CASOS) at Carnegie Mellon University. URL: http://www.casos.cs.cmu.edu/computational_tools/tools.html Listings and/ or repositories of software tools and libraries International Network for Social Network Analysis (INSNA). URL: http://www.insna.org/software/index.html Listings and/ or repositories of software tools and libraries Network Workbench (NWB) Tool https://nwb.slis.indiana.edu/community/?n=Main.NWBTool network analysis, modeling, and visualization toolkit References Andrew Silke, Rebel's dilemma: The changing relationship between the IRA, Sinn Féin and paramilitary vigilantism in Northern Ireland, Terrorism and Political Violence, Volume 11, Issue 1, 1999, Pages 55 – 93 Jonathan Tonge, Northern Ireland, Polity 2006 Rainer Hegselmann, Ulrich Krause, OPINION DYNAMICS AND BOUNDED CONFIDENCE MODELS, ANALYSIS, AND SIMULATION, Journal of Artifical Societies and Social Simulation (JASSS) vol.5, no. 3, 2002 http://jasss.soc.surrey.ac.uk/5/3/2.html Friedkin, N. E. (1999). Choice Shift and Group Polarization. American Sociological Review, 64(6), 856-875. Elbadawi, I. and Sambanis, N., "External Interventions and the Duration of Civil Wars," Working Paper 2433, The World Bank, September 2000 D. DUONG, R. MARLING, L. MURPHY, J. JOHNSON, M. OTTENBERG, B SHELDON, S STEPHENS, "NEXUS: AN INTELLIGENT AGENT MODEL OF SUPPORT BETWEEN SOCIAL GROUPS," in Proceedings of the Agent 2007 Conference on Complex Interaction and Social Emergence, Evanston, Illinois, November 15-17, 2007, pp.241-246 isee systems, Stella Software Website, 2009, http://www.iseesystems.com/softwares/Education/StellaSoftware.aspx MICHAEL DZIEDZIC, BARBARA SOTIRIN, JOHN AGOGLIA, MEASURING PROGRESS IN CONFLICT ENVIRONMENTS (MPICE), Report ADA488249, US Army of Corps of Engineers, 2008 Gabriel Marcella, THE UNITED STATES AND COLOMBIA:THE JOURNEY FROM AMBIGUITY TO STRATEGIC CLARITY, Strategic Studies Institute of the U.S. Army War College, May 2003, http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB10.pdf P. W. Singer, Children at War, University of California Press, 2006, p. 46 Parkman, J., (2005). Peace Support Operations Study. McLean, Virginia, MORS Workshop on Agent- Based Models and Othyer Analytical Tools in Support of Stability Operations. Hartley 2008 http://www.mors.org/meetings/es_2008/pres/hartley_dime.pdf John Benedict, L. Dean Simmons, Enterprise-Wide Opportunities for, Advancing Irregular Warfare Analyses, 13 December 2007 Brief at MORS Workshop Collier, P., Hoeffler, A. and Söderbom, M. 2001. "On the Duration of Civil War." Policy Working Paper 2861, World Bank, Washington DC. Mark Abdollahian, Michael Baranick, Brian Efird, and Jacek Kugler, A Predictive Political Simulation Model, Center for Technology and National Security Policy, National Defense University, 2005 http://www.ndu.edu/ctnsp/Def_Tech/DTP%2032%20Senturion.pdf Sentia Group, Implications of a U.S. Drawdown in Iraq, July 2008, Report, Sentia Group, Inc., http://www.sentiagroup.com/pdf/SentiaInsightMonthly-USDrawdownInIraq-July2008.pdf Sterman, John D. (2001). "System dynamics modeling: Tools for learning in a complex world". California management review 43 (1): 8–25. Jason Campbell, Michael O'Hanlon, Jeremy Shapiro, Assessing Counterinsurgency and Stabilization Missions, POLICY PAPER Number 14, May 2009, The Brookings Institution Washington, D.C. JAMES CLANCY and CHUCK CROSSETT, Measuring Effectiveness in IrregularWarfare, Parameters, Summer 2007, pp.88-100 Jason H. Campbell and Jeremy Shapiro, Afghanistan Index: Tracking Variables of Reconstruction and Security in Post-9/11 Afghanistan, a website, http://www.brookings.edu/about/programs/foreign- policy/afghanistan-index Michael E. O'Hanlon, Jason H. Campbell, Iraq Index: Tracking Variables of Reconstruction & Security in Post-Saddam Iraq, a website, http://www.brookings.edu/iraqindex F. C. Cuny and R. B. Hill, "Famine, Conflict and Response: a Basic Guide," Kumarian Press, West Hartford, Connecticut, 1999 Nagl, John A. Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam. Chicago: University of Chicago Press, 2002. Lawrence, T. E. "Evolution of a Revolt." Army Quarterly and Defense Journal. Tavistock, United Kingdom (October 1920). Accessed via Command and General Staff College, US Army, Ft Leavenworth KS, at http://cgsc.leavenworth.army.mil/carl/resources/csi/ Lawrence/lawrence.asp on 23 April 2008. Lawrence, T. E. Seven Pillars of Wisdom: A Triumph. Oxford: Alden Press, 1935. Leites, Nathan and Wolf, Charles. Rebellion and Authority: An Analytical Essay on Insurgent Conflict. Arlington: RAND Corporation, 1970 (R-462-ARPA). Long, Austin. On "Other War" Lessons from Five Decades of RAND Counterinsurgency Research. Arlington: RAND Corporation, 2006. Galula, David. Counterinsurgency Warfare: Theory and Practice. Westport, CT: Praeger, 1964. Peters, Ralph. "The hearts-and-minds myth - Sorry, but winning means killing." Armed Forces Journal (September 2006). Accessed via News Bank, Inc. - Armed Services and Government News at http://infoweb.newsbank.com/iw-search/we/InfoWeb on 7 March 2008. Pierson, Brett M. "OSD/Joint Special Session: Irregular Warfare Activities in OSD and the Joint Staff," Proceedings of the 76th Annual Military Operations Research Society Symposium. Alexandria, VA: MORS, 2008. Edward G. Anderson Jr, A Proof-of-Concept Model for Evaluating Insurgency Management Policies Using the System Dynamics Methodology Strategic Insights, Volume VI, Issue 5 (August 2007) Baker, A., "How the Taliban Thrives," Time, vol.174, no.9, September 7, 2009, pp.46-53 Choucri, N., C. Electris, D. Goldsmith, D. Mistree, S. Madnick, J. Morrison, M. Siegel, & M. Sweitzer- Hamilton. 2006. "Understanding & Modeling State Stability: Exploiting System Dynamics." Proc. of 2006 Institute of Electrical and Electronics Engineers Aerospace Conference. Big Sky, MT: IEEE, 2006. US Army, Counterinsurgency Field Manual FM-3-24, Paladin Press, 2006 Hegre, H., T. Ellingsen, S. Gates, N. Gleditsch, "Toward a Democratic Civil Peace? Democracy, Political Change, and Civil War, 1816-1992," American Political Science Review, Vol. 95, Issue 1, March, 2001: 33- 48. Available online: http://www.worldbank.org/research/conflict/papers/CivilPeace2.pdf Iyengar, R., & Monten, J. (2008). Is there an" emboldenment" effect? Evidence from the insurgency in Iraq (No. w13839). National Bureau of Economic Research. JAMES T. QUINLIVAN, Force Requirements in Stability Operations, From Parameters, Winter 1995, pp. 59-69. Alex Grynkewich, USAF and Chris Reifel, USAF, Modeling Jihad: A System Dynamics Model of the Salafist Group for Preaching and Combat Financial Subsystem, Strategic Insights, Volume V, Issue 8 (November 2006) Tara A. Leweling, USAF and Otto Sieber, USN, Calibrating a Field-level, Systems Dynamics Model of Terrorism's Human Capital Subsystem: GSPC as Case Study, Strategic Insights, Volume V, Issue 8 (November 2006) Michael Kowalchuck, Siddhartha Singh and Kathleen M. Carley, CORES – Complex Organizational Reasoning System, Report CMU-ISRI-04-131, Carnegie Mellon University, School of Computer Science, September 2004 Robbins, M. (2005). Investigating the Complexities of Nationbuilding: A Sub-National Regional Perspective. Master Thesis, AIR FORCE INSTITUTE OF TECHNOLOGY, Wright-Patterson Air Force Base, Ohio US Department of Defense (12 July 2007) (PDF), Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms, JP 1-02, http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf retrieved 2007-11-21 Hegselmann, R., & Krause, U. (2002). Opinion Dynamics and Bounded Confidence Models, Analysis, and Simulation. Journal of Artificial Societies and Social Simulation, 5(3). Friedkin, N. E. (1999). Choice Shift and Group Polarization. American Sociological Review, 64(6), 856- 875. CAIN Web Service (May, 2006). Political party support in Northern Ireland, 1969 to the present. http://cain.ulst.ac.uk/issues/politics/election/electsum.htm Grier, R. A., Skarin, B., Lubyansky, A., & Wolpert, L. (2008). SCIPR: A computational model to simulate cultural identities for predicting reactions to events. Proceedings of the Second International Conference on Computational Cultural Dynamics Kott, A., & Corpac, P. S. (2007). COMPOEX technology to assist leaders in planning and executing campaigns in complex operational environments. 12th International Command and Control Research and Technology Symposium, 2007 Kott, A., Hansberger, J., Waltz, E., & Corpac, P. (2010). Whole-of-Government Planning and Wargaming of Complex International Operations: Experimental Evaluation of Methods and Tools. International Journal of Command and Control, The International C2 Journal, Vol 4, No 3, March 2010 Kott, A., Hawley, L., Brown, G., Citrenbaum, G., & Corpac, P. S. (2007). Next State Planning: A" Whole of Government" Approach for Planning and Executing Operational Campaigns. 12th International Command and Control Research and Technology Symposium, 2007 Kott, A., & Citrenbaum, G. (Eds.). (2010). Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer Science & Business Media.
1903.05561
1
1903
2019-02-26T01:41:40
Learning Multi-agent Communication under Limited-bandwidth Restriction for Internet Packet Routing
[ "cs.MA", "cs.LG" ]
Communication is an important factor for the big multi-agent world to stay organized and productive. Recently, the AI community has applied the Deep Reinforcement Learning (DRL) to learn the communication strategy and the control policy for multiple agents. However, when implementing the communication for real-world multi-agent applications, there is a more practical limited-bandwidth restriction, which has been largely ignored by the existing DRL-based methods. Specifically, agents trained by most previous methods keep sending messages incessantly in every control cycle; due to emitting too many messages, these methods are unsuitable to be applied to the real-world systems that have a limited bandwidth to transmit the messages. To handle this problem, we propose a gating mechanism to adaptively prune unprofitable messages. Results show that the gating mechanism can prune more than 80% messages with little damage to the performance. Moreover, our method outperforms several state-of-the-art DRL-based and rule-based methods by a large margin in both the real-world packet routing tasks and four benchmark tasks.
cs.MA
cs
Learning Multi-agent Communication under Limited-bandwidth Restriction for Internet Packet Routing Hangyu Mao 1 , Zhibo Gong 2 , Zhengchao Zhang 1 , Zhen Xiao 1 and Yan Ni 1,3 1 Peking University 2 Huawei Technologies Co., Ltd. {hy.mao, zhengchaozhang, xiaozhen, yanni}@pku.edu.cn, [email protected] 3 Microsoft 9 1 0 2 b e F 6 2 ] A M . s c [ 1 v 1 6 5 5 0 . 3 0 9 1 : v i X r a Abstract Communication is an important factor for the big multi-agent world to stay organized and produc- tive. Recently, the AI community has applied the Deep Reinforcement Learning (DRL) to learn the communication strategy and the control policy for multiple agents. However, when implementing the communication for real-world multi-agent applica- tions, there is a more practical limited-bandwidth restriction, which has been largely ignored by the existing DRL-based methods. Specifically, agents trained by most previous methods keep sending messages incessantly in every control cycle; due to emitting too many messages, these methods are un- suitable to be applied to the real-world systems that have a limited bandwidth to transmit the messages. To handle this problem, we propose a gating mech- anism to adaptively prune unprofitable messages. Results show that the gating mechanism can prune more than 80% messages with little damage to the performance. Moreover, our method outperforms several state-of-the-art DRL-based and rule-based methods by a large margin in both the real-world packet routing tasks and four benchmark tasks. 1 Introduction Communication is an essential human intelligence, while Re- inforcement Learning (RL) and especially the Deep Neural Network (DNN) based Reinforcement Learning (DRL) are emergent techniques that can achieve artificial intelligence. Recently, inspired by the communication among humans, DRL-based methods have been successfully applied to learn the communication among multiple intelligent agents. However, it remains an open question to apply these meth- ods to the real-world multi-agent systems, because real-world applications usually impose many constraints on communica- tion, such as the bandwidth limitation for transmitting mes- sages, the random delay of messages, and even the protection of private messages. Only by resolving these constraints can we develop practical communication strategy. In this paper, we focus on resolving the limited-bandwidth restriction in multi-agent communication. We then try to ap- ply our method to the real-world packet routing systems, be- cause packet routing is not only a representative task with the above property, but also one of the most essential and critical tasks on the Internet. Formally, we define the limited-bandwidth restriction as follows: the bandwidth (or more generally, the resource) for transmitting the communication messages is limited, there- fore the agents should generate as few messages as possible on the premise of maintaining the performance. We are interested in the limited-bandwidth restriction due to two reasons. On the one hand, it is ubiquitous in real sys- tems. For example, in the packet routing systems, the link has a limited transmission capacity; in the Internet of Things, the sensor has a limited battery capacity. Once we figure out a principled method to address this problem, many fields can benefit from this work. On the other hand, this problem has been largely ignored by the existing DRL-based methods. There is a great need to devote attention to this problem. We take two steps to address this problem. Firstly, we ag- gregate the merits of the existing methods to form a basic model named Actor-Critic with Message Learning (ACML). However, the proposed ACML is still not practical because it does not change the communication pattern of the existing methods. That is to say, ACML keeps sending messages in- cessantly in every control cycle, regardless whether the mes- sage is beneficial enough for the whole agent team. Secondly, we extend ACML with a Gating mechanism to design a more flexible and practical GACML model. The gating mechanism is trained based on a novel auxiliary task, which tries to open the gate to encourage communication when the message is beneficial enough to the whole agent team, and close the gate to discourage communication otherwise. As a result, after the gating mechanism is trained well, it can prune unprofitable messages adaptively to control the message quantity around a desired threshold. Consequently, GACML is applicable to real-world systems with limited-bandwidth restriction. We evaluate our method in the real-world packet routing and benchmark tasks. It outperforms several state-of-the-art DRL-based and rule-based methods by a large margin. Fur- thermore, the proposed gating mechanism can prune more than 80% messages with little damage to the performance. 2 Background DEC-POMDP. We consider a partially observable cooper- ative multi-agent setting that can be formulated as DEC- POMDP [Bernstein et al., 2002]. It is formally defined as a tuple (cid:104)N, S, (cid:126)A, T, R, (cid:126)O, Z, γ(cid:105), where N is the number of agents; S is the set of state s; (cid:126)A = [A1, ..., AN ] represents the set of joint action (cid:126)a, and Ai is the set of local action ai that agent i can take; T (s(cid:48)s, (cid:126)a) : S × (cid:126)A × S → [0, 1] rep- resents the state transition function; R : S × (cid:126)A × S → R is the reward function shared by all agents; (cid:126)O = [O1, ..., ON ] is the set of joint observation (cid:126)o controlled by the observation function Z : S × (cid:126)A → (cid:126)O; γ ∈ [0, 1] is the discount factor. In a given state s, agent i can only observe an observation oi ∈ s, and each agent takes an action ai based on its own ob- servation oi, resulting in a new state s(cid:48) and a shared reward r. The agents try to learn a policy πi(aioi) : Oi × Ai → [0, 1] that can maximize E[G] where G is the discount return de- t=0 γtrt, and H is the time horizon. In prac- tice, we map the observation history rather than the current observation to an action (namely, oi represents the observa- tion history of agent i in the rest of the paper). fined as G =(cid:80)H Reinforcement Learning (RL). RL [Sutton and Barto, 1998] is generally used to solve special DEC-POMDP prob- lems where N = 1. In practice, we usually define the Q-value function as Qπ(s, a) = Eπ[GS = s, A = a], then the opti- mal policy can be derived by π∗ = arg maxπ Qπ(s, a). Deterministic Policy Gradient (DPG) [Silver et al., 2014] is a special actor-critic algorithm where the actor adopts a de- terministic policy µθ : S → A and the action space A is con- tinuous. Deep DPG (DDPG) [Lillicrap et al., 2015] applies DNN µθ(s) and Q(s, a; w) to approximate the actor and the critic, respectively. DDPG is an off-policy method. It adopts target network and experience replay to stabilize training and to improve data efficiency. Specifically, the critic's parame- ters w and the actor's parameters θ are updated based on: L(w) = E(s,a,r,s(cid:48))∼D[δ2] δ = r + γQ(s(cid:48), a(cid:48); w−)a(cid:48)=µθ− (s(cid:48)) − Q(s, a; w) (1) (2) (3) ∇θJ(θ) = Es∼D[∇θµθ(s) ∗ ∇aQ(s, a; w)a=µθ(s)] where D is the replay buffer containing recent experience tu- ples (s, a, r, s(cid:48)); Q(s, a; w−) and µθ−(s) are the target net- works whose parameters w− and θ− are periodically updated by copying w and θ. A merit of actor-critic algorithms is that the critic is only used during training, while only the actor is needed during execution. Due to this merit, we only need to prune messages among the actors in our GACML. 3 Related Work Traditional Communication Model. The communication models have been widely studied in the RL community, e.g., MTDP-COM [Pynadath and Tambe, 2002] and DEC- POMDP-COM [Goldman and Zilberstein, 2004]. However, traditional methods usually either predefine the communica- tion message [Wu et al., 2011] or optimize the communi- cation message for a predefined control policy [Roth et al., 2005], which are inapplicable to the real-world multi-agent systems. Previous studies also try to address the limited- bandwidth restriction by pruning the messages [Roth et al., 2005; Becker et al., 2009; Wu et al., 2011]. A general method is the Value of Communication (VoC) [Becker et al., 2009]. VoC measures the difference between the expected values of communicating and remaining silent. Communication is a better choice when VoC is larger than zero. Nevertheless, calculating VoC requires the knowledge of the environment, which is not easy to get since multi-agent systems are usually too complex. In contrast, we focus on model-free learning. Deep Communication Model. Recently, combining DNN with RL, DRL-based communication models have been ex- plored in model-free setting, such as CommNet [Sukhbaatar et al., 2016], DIAL [Foerster et al., 2016], BiCNet [Peng et al., 2017], AMP [Peng et al., 2018] and [Mao et al., 2017; Mordatch and Abbeel, 2018; Mao et al., 2018]. They adopt a DNN with hard-coded structure to represent the policy, and the policy takes as input the messages from all agents to gen- erate a single control action. Thus, the agents have to keep sending messages incessantly in every control cycle, without alternatives to reduce the message quantity. Due to emitting too many messages, they are inflexible to be applied to multi- agent systems with the limited-bandwidth restriction. Methods for addressing the limited-bandwidth restriction can be roughly divided into two types. The simple type does not generate messages at all. For example, MADDPG [Lowe et al., 2017] and COMA [Foerster et al., 2017] adopt an inde- pendent DNN to generate the policy for each individual agent. Because the policy is independent of other agents' informa- tion, these methods can generate control action without any communication. Therefore, they are applicable in tasks with strict limit-bandwidth restriction. However, as the policies do not exchange messages, these methods suffer from the par- tially observable problem. Obviously, it is impossible to fig- ure out the best control policies based on partial information. The principled type applies special mechanisms to adap- tively decide whether to send the messages (equivalently, whether to prune the messages), so the message quantity can be controlled to some extent. Our GACML is an instance of such method, and the most relevant studies include ATOC [Jiang and Lu, 2018], MADDPG-M [Kilinc and Montana, 2019], SchedNet [Kim et al., 2019] and IC3Net [Singh et al., 2019]. Both ATOC and IC3Net learn a binary action to specify whether the agent wants to communicate with others, which is similar to our gating mechanism. However, ATOC and IC3Net are only suitable for homogeneous agents due to their DNN structures, while our GACML is a general model for both homogeneous and heterogeneous agents. More im- portantly, both ATOC and IC3Net cannot control how many messages will be pruned, while GACML has this ability be- cause we introduce a special threshold for that purpose in our method. MADDPG-M adopts a two-level policy to learn whether the agent's private observation is sufficiently infor- mative to be shared with others. However, MADDPG-M is only applicable to 2D tasks where the distance between the agents and their target agents is measurable and available. SchedNet generates a weight w for each agent, and the top M agents in terms of their weights w will communicate with each other. However, it is not easy to apply a hard-coded pa- rameter M to real-world multi-agent systems. Summary. Most of the existing RL-based communication models are inflexible to be applied in the real-world multi- agent systems with limited-bandwidth restriction. A few pos- sible DRL-based methods seem to be still preliminary, while our GACML is the first formal method that can control the message quantity to a desired threshold, as far as we know. 4 The Proposed Method 4.1 ACML The key variables used in this section are as follows. ai is the local action of agent i. (cid:126)a−i is the joint action of other agents except for agent i. (cid:126)a is the joint action of all agents, i.e., (cid:126)a = (cid:104)ai, (cid:126)a−i(cid:105). The observation history (cid:126)o, oi, (cid:126)o−i, and the policy µθi are denoted similarly. s(cid:48) is the next state after s, and (cid:126)o(cid:48), o(cid:48) The Design. ACML is motivated by combining the mer- its of the existing DRL-based communication methods men- tioned in Section 3. As can be seen from Figure 1, ACML adopts the following designs. −i are denoted similarly. −i, (cid:126)a(cid:48), a(cid:48) i, (cid:126)a(cid:48) i, (cid:126)o(cid:48) (1) Each agent is made up of an ActorNet and a Message- GeneratorNet. This design represents the policy and the mes- sage with two separated network branches. Another choice is to take the hidden layer of policy network as the message. We notice that most previous methods adopt the former, which usually outperforms the latter. (2) All agents share the same CriticNet and MessageCo- ordinatorNet, which are placed in a coordinator (i.e., a spe- cially designed agent). The shared MessageCoordinatorNet is similar to many previous methods such as the CommNet, AMP and ATOC, while the shared CriticNet is similar to the well-known MADDPG and COMA. Although each separate design is common, aggregating them together properly is novel. For example, MADDPG and COMA do not adopt the MessageGeneratorNet and Mes- sageCoordinatorNet, making them suffer from the partially observable problem during execution; while AMP and ATOC do not adopt the shared CriticNet, making them suffer from the non-stationary problem [Hernandez et al., 2017] during training. ACML is fully observable and training stationary. ACML works as follows during execution 1. (1) mi = MessageGeneratorNet(oi), i.e., agent i generates the local message mi based on its own observation oi. (2) All agents send their mi to the coordinator. (3) M1, .., MN = MessageCoordinatorNet(m1, .., mN ), i.e., the coordinator extracts the global message Mi for each agent i based on all local messages mi. (4) The coordinator sends Mi back to agent i. (5) ai = ActorNet(oi, Mi), i.e., agent i generates action ai based on its local observation oi and the global message Mi, which encodes all (cid:104)o1, .., oN(cid:105) for full observability. The Training. As described above, the agents generate ai based on oi and Mi to interact with the environment, and the environment will feed a shared reward r back to the agents. −i(cid:105) are Then, the experience tuples (cid:104)oi, (cid:126)o−i, ai, (cid:126)a−i, r, o(cid:48) used to train ACML. Specifically, as the agents exchange messages with each other, the actor and the shared critic can be represented as µθi(oi, Mi) and Q((cid:126)o, (cid:126)a; w), respectively. i, (cid:126)o(cid:48) 1Please note that the CriticNet is only used during training, while other components are needed during execution. Figure 1: The proposed ACML. For clarity, we show this model using a two-agent example. All components are made up of DNN. h is the hidden layer of the DNN; mi is the local message; Mi is the global message. The red arrows imply the message sending process. θ − i We can extend Equation (1 -- 3) to multi-agent formulations shown in Equation (4 -- 6), where the parameters w, w−, θi and θ− i have similar meaning to these of single-agent setting. i) − Q((cid:126)o, (cid:126)a; w) (4) (o(cid:48) (5) δ = r + γQ((cid:126)o(cid:48), (cid:126)a(cid:48); w−)a(cid:48) i,(cid:126)o(cid:48) L(w) = E(oi,(cid:126)o−i,ai,(cid:126)a−i,ri,o(cid:48) i=µ −i)∼D[δ2] ∇θiJ(θi) = E(oi,(cid:126)o−i)∼D[ ∇θiµθi(oi, Mi) ∗ ∇aiQ((cid:126)o, (cid:126)a; w)ai=µθi (oi) ] (6) Since all components in ACML are implemented by DNN, ACML is end-to-end differentiable, and the communication message and the control policy can be optimized jointly using back propagation (BP) based on the above equations. 4.2 GACML Motivation. As can be seen from the execution process, ACML takes as input the communication messages from all agents to generate a single control action. Thus, the agents have to keep sending messages incessantly in every control cycle, regardless whether the messages are beneficial enough to the performance of the agent team. This is also a common problem of most deep communication models as mentioned in Section 3. As a result of too many messages, these meth- ods are inflexible to be applied to the real-world multi-agent systems with limited-bandwidth restriction. GACML is motivated by handling this problem through pruning unprofitable messages in a principled manner. The Design. We propose a gating mechanism to adaptively prune unprofitable messages among ActorNets, such that the agents can maintain the performance while pruning as many messages as possible to resolve the bandwidth constraints. As shown in Figure 2, except for the original components, each agent is equipped with an additional GatingNet. Specif- ically, GACML works as follows. (1) The agent generates a local message mi as well as a probability score p ∈ (0, 1) based on its own observation oi. hhhhhhh𝑜2𝑜1𝑎2𝑎1𝑀1𝑀2𝑚1𝑚1𝑚2𝑚2𝑀1𝑀2𝑎1𝑜1𝑎2𝑜2hQActorNetCriticNetMessageGeneratorNetMessageCoordinatorNetActorNet controlling how many messages should be pruned. setting, the label of this auxiliary task can be formulated as In this Y (o) = I(Q(o, aC) − Q(o, aI ) > T ) (7) where I is the indicator function. Then we can train p by minimizing the following loss function: Lθop (o) = −Eo[Y (o) log p(o; θop) +(1 − Y (o)) log(1 − p(o; θop))] (8) where θop are the parameters between the observation o and the probability p as shown in Figure 2. The insight of the above loss function is that if ∆Q(o) = Q(o, aC)−Q(o, aI ) is really larger than T (i.e., aC can obtain at least T Q-values more than aI, and the corresponding label is Y (o) = 1), the network should try to generate a probabil- ity p(o; θop) that is larger than Tp = 0.5 to encourage com- munication. In other word, GACML only prunes messages that contribute less Q-values than the threshold T . Therefore, after the gating mechanism is trained well, it can prune un- profitable messages adaptively to control the message quan- tity around a desired threshold specified by T . Consequently, GACML needs much fewer messages to achieve a desirable performance. It is our key contribution that makes GACML a novel and principled method. The Key Implementation. The above training method re- lies on correct labels of the auxiliary task. It means that we should provide suitable Q(o, aC), Q(o, aI ) and T as indi- cated by Equation (7). For the Q-values, we firstly set g = 1 (i.e., without message pruning) to train other components except for the GatingNet based on Equation (4 -- 6). After the model is trained well, we can get approximately correct ActorNet and CriticNet. After- wards, for a specific observation o, the ActorNet can generate aC and aI when we set g = 1 and g = 0, respectively; then the CriticNet can estimate an approximately correct Q-value Q(o, aC) and Q(o, aI ). For the threshold T , we propose two methods to set a fixed T and a dynamic T , respectively. To calculate a fixed T , we firstly sort the ∆Q(o) of the latest K observations o encoun- tered during training, resulting in a list of ∆Q(o), which is called L∆Q(o). Then, we set T by splitting L∆Q(o) in terms of the index. For example, if we want to prune Tm% messages, we set T = L∆Q(o)[K × Tm%]. We do not split L∆Q(o) in terms of the value, since ∆Q(o) usually has a non-uniform distribution. The advantage of a fixed T is that the actual number of the pruned messages is ensured to be close to the desired Tm%. Besides, this method is friendly to a large K. For the dynamic T , we adopt the exponential moving aver- age technique 3 to set T : t ) − Q(ot, aI t )) Tt = (1 − β)Tt−1 + β(Q(ot, aC (9) where β is a coefficient for discounting older T . We test some β in [0.6, 0.9], and they all work well. The advantage of a dynamic T is that Y (o) becomes an adaptive training label even for the same observation o. This is very important for the dynamically changing environments, because T and Y (o) can quickly adapt to these environments. Figure 2: The actor part of the proposed GACML. For clarity, we only show one agent's structure, and we do not show the critic part because it is the same as that of ACML. following process is the same as that of ACML. (2) A gate value g ∈ {0, 1} is generated by a threshold function Tp = 0.5. That is to say, if p ≤ Tp, we set g = 0, otherwise, we set g = 1. (3) The agent sends mi (cid:12) g to the coordinator, and the In the above process, if g = 0, mi(cid:12) g will be a zero vector, and the agent has no need to send mi to the coordinator. Ac- cordingly, the coordinator does not send the global message Mi back to the agent, because we replace Mi with a zero vector to "tell" our GACML model that the message Mi is pruned indeed. We call this design zero padding. Please note that zero padding is a crucial design for prun- ing a lot of messages. Suppose that we have pruned many messages, the time span of two valid messages would be rel- atively large. If we simply adopt the message caching method [Dowling and Haridi, 2008] to replace M t i gen- erated a long time ago (i.e., t − t is relatively large), M t i can hardly approximate M t i anymore. In contrast, the zero padding will always "tell" GACML a correct signal: the mes- sages have been really pruned. Using another GatingNet to decide whether to prune Mi will be evaluated in the future. i with M t The Training Method with a Novel Auxiliary Task. In order to make the above design work, a suitable probability p must be trained for each observation o 2, otherwise GACML may degenerate to ACML (in the extreme case where p is always larger than Tp). However, as the threshold function Tp is non-differentiable, it makes the end-to-end BP method inapplicable. We also tried the approximate gradient [Hubara et al., 2016], the sparse regularization [Makhzani and Frey, 2015] and several other methods without success. Finally, we decided to embrace the auxiliary task technique [Jaderberg et al., 2016] to provide training signal for p di- rectly. Recall that we want to prune the messages on the premise of maintaining the performance. For RL, the per- formance could be measured by the Q-value, so we design the following auxiliary task. Let p indicate the probability of that ∆Q(o) = Q(o, aC)− Q(o, aI ) is larger than T , where aC is the action generated based on communication, aI is the action generated indepen- dently (i.e., without communication), and T is a threshold 2We remove the subscript i to represent that the following de- scription is suitable for all agents. 3https://en.wikipedia.org/wiki/Moving average#Exponential moving average hhhh𝑜1𝑎1𝑀1𝑀2𝑚1𝑚1𝑚2𝑀1ActorNet𝒑𝒈{0, 1}(0, 1)𝑻𝒑= 0.5𝜽𝒐𝒑GatingNetMessageCoordinatorNet 5 Experiments 5.1 The Experimental Settings Due to limited space, we only show the evaluation on real- world packet routing systems. Four benchmark tasks such as traffic control and predator prey are shown in the appendix. Baseline. We adopt Independent Actor-Critic (IND-AC) [Peng et al., 2017], MADDPG [Lowe et al., 2017] and AMP [Peng et al., 2018] for comparison. These methods can be regarded as the ablation models of ACML. In IND-AC, the agent learns its own actor-critic network independently with- out communication. We can know the effect of communica- tion by comparing with IND-AC. MADDPG adopts central- ized critics to share information among multiple agents, while the actors are independent. In AMP, only the actors exchange messages, while the critics are independent. In contrast, both actors and critics in ACML can exchange messages. Methods like ATOC are not compared, since they are unsuitable for the routing tasks due to the reasons analyzed in Section 3. Parameter. The probability p in GACML is a hidden layer with 1 neuron, and the activation function is Sigmoid. The first hidden layer of our model has 64 neurons, while other hidden layers have 32 neurons, and the activation function is Relu. Learning rates of actor, critic and target networks are 0.001, 0.01 and 0.001, respectively. Replay buffer size, batch size and discount factor are 106, 128 and 0.95, respectively. 5.2 The Packet Routing System Environment Description. In the information era, packet routing is a very fundamental and critical task on the Internet. We evaluate our methods on three routing tasks. As shown in Figure 3, the small topology and the moderate topology are the most classical topologies in the Internet Traffic Engineer- ing community [Kandula et al., 2005]; the large topology is based on the real needs of our industrial collaborator, and it is more complex than the real-world Abilene Network 4 in terms of the numbers of routers, links and paths. In each topology, there are several edge routers. Each edge router has an aggregated flow that should be transmitted to other edge routers through available paths. For example, in Figure 3(a), B is set to transmit flow to D, and the available paths are BEF D and BD. Each path is made up of several links, and each link has a link utilization, which equals to the ratio of the current flow on this link to the maximum flow transmission capacity of this link. The necessity of cooperation among routers is as follows: one link can be used to transmit the flow from more than one router, so the routers must not split too much or too little flow on the same link at the same time; otherwise this link will be either overloaded or underloaded. Note that there is a strict limited-bandwidth restriction in these tasks, because the capacity of the network is limited. Problem Definition. The routers are controlled by our al- gorithm, and they try to learn a good flow splitting policy to minimize the Maximum Link Utilization in the whole network (MLU). The intuition behind this goal is that high link utiliza- tion is bad for dealing with bursty flow. The observation in- cludes the latest ten steps' flow demands, the latest ten steps' 4A backbone net https://en.wikipedia.org/wiki/Abilene Network (a) The small topology. (b) The moderate topology. (c) The large topology. Figure 3: The packet routing environments. link utilizations and their average, and the latest action taken by the router. The action is a flow splitting ratio on each avail- able path (e.g., in Figure 3(b), B will generate an action like [a%, b%, 1 − a% − b%] for paths [B12G, BG, B34G]). The reward is set as 1 − M LU to minimize MLU. Besides MLU, we also care about the convergence ratio of all experiments. 5.3 The Experimental Results Results without Message Pruning. In this experiment, we use synthetic flow to evaluate different methods on the small and moderate topologies. The flow has a shape of A sin(wx+ ϕ) + b with different settings of A, w, ϕ, b. (a) The MLU. (b) The convergence ratio. Figure 4: The average results of 30 independent experiments. A smaller MLU is better. A larger convergence ratio is better. Figure 4(a) shows the MLU of 30 independent experi- ments. In the small topology, all DRL-based methods (i.e., excluding the rule-based WCMP and TeXCP) have a simi- lar performance. The reason is that this topology is rather simple, and all DRL-based methods can find the near-optimal control policies easily after they have been trained, regard- less whether the methods adopt communication. Thus, the more advanced methods, such as MADDPG and ACML, do not have enough space to further improve IND-AC. In the moderate topology, the performances of IND-AC, AMP and MADDPG drop severely, while ACML keeps the performance and achieves much smaller MLU. This is be- CDBEFAPaths:ACAEFCBEFDBDABCDEFGHIJ12345678Paths:AFA12FB12GBGB34GC34HCHC56HD56IDID78IE78JEJPaths:A16CA146CA147CA246CA247CA257CA147DA247DA257DA258DB246CB247CB257CB357CB247DB257DB258DB357DB358DB38DABCD167854320.650.70.750.80.850.90.951moderate topologysmall topology00.20.40.60.81moderate topologysmall topology cause other models suffer from either the partially observable problem or the non-stationary problem, making them ineffec- tive in complex environment. In contrast, ACML can address these problems as analyzed before, resulting in stronger abil- ity to deal with complex tasks. Furthermore, compared with the rule-based TeXCP 5 [Kan- dula et al., 2005] and WCMP 6, the DRL-based models achieve much smaller MLU in both topologies. The reason lies in that the DRL-based methods can take the actions' fu- ture effect into consideration, which is in favor of accom- plishing the routing task, whereas the rule-based methods can only consider the current effect of the actions. Even worse, WCMP gets a MLU larger than 1.0 in the moderate topology, and the simulation system crashed. Figure 4(b) shows the convergence ratio. As can be seen, ACML achieves the largest convergence ratio in both topolo- gies. Furthermore, when the evaluation turns to the moderate topology, the decrease of convergence ratio of ACML is much smaller than that of other methods. It means that our ACML is more stable than other DRL-based methods during training. Overall, the above results demonstrate ACML with general applicability, scalability and stability. GACML using real flow trajectory and the large topology. Message Pruning Evaluation. In this experiment, we test The results for adopting a fixed threshold T = L∆Q(o)[K× Tm%] are shown in Table 1. We draw the following conclu- sions. (1) For a predefined threshold Tm%, the actual num- ber of the pruned messages is close to Tm%. It means that GACML can control the message to our desired quantity. (2) GACML can prune a large number of messages (e.g., more than 82%) with little damage to the performance (e.g., less than 7%). It implies that the pruned messages are usually not beneficial enough to the performance. (3) When we pruned all messages (i.e., the last row of Table 1), the reward has a large decrease. Compared with the second to the last row of Table 1, it indicates that the remaining 1.5% messages are very important for keeping the performance, and GACML has learnt to share these important messages with all agents. The results for adopting a dynamic threshold T are shown in Figure 5. As can be seen, GACML performs much better than the state-of-the-art MADDPG. In addition, GACML can keep the performance close to ACML while pruning quite a lot of messages (in this case, 74.3%). To conclude, the above results demonstrate that the pro- posed gating mechanism can prune unnecessary messages on the premise of maintaining the performance indeed, and that our GACML is very suitable for the real-world routing sys- tems with limited-bandwidth restriction. Message Pruning Analysis. In this experiment, we ana- lyze GACML using synthetic flow and the small topology. We adopt this setting because the results are easy to under- stand. For example, as shown in Figure 6(a), when the total flow in the network is decreasing during timestep 100 to 300, GACML adapts to this situation more quickly than MAD- DPG, and it obtains similar rewards as ACML after dozens of steps. Besides, since we use A sin(wx + ϕ) + b to generate 5We slightly modify it for the testing environment. 6https://en.wikipedia.org/wiki/Equal-cost multi-path routing Tm% # of Pruned Message Reward Decrease 80% 6.84% 90% 8.05% 95% 11.30% 98% 15.98% 99% 14.86% 100% 61.52% 82.13% 87.68% 93.39% 99.14% 98.53% 100.00% Table 1: The pruned message and the reward decrease in terms of ACML for a fixed (i.e., a predefined) pruning threshold Tm%. Figure 5: The testing rewards. For GACML, we set β = 0.8. (a) The average rewards. (b) The gate values of 2 tests. Figure 6: The testing results of 30 message pruning experiments based on the small topology and synthetic flow. GACML gets 8.2% fewer rewards than ACML, while the message decrease is 56.3%. It also outperforms MADDPG. Please zoom in for better view. synthetic flow, the reward curves shown in Figure 6(a) and the gate value curves shown in Figure 6(b) are similar to the shape of sin(x). We also notice that the bursty flow usually generates a gate value g = 1. The results imply that GACML has learnt a subtle communication strategy. 6 Conclusion This paper presents a method to jointly learn the communica- tion strategy and the control policy for multiple cooperative agents. In contrast to most previous methods, we focus on ad- dressing the limited-bandwidth restriction that exists in many real-world applications. Specifically, we firstly aggregate the merits of the existing methods to form a new method that out- performs several state-of-the-art DRL-based and rule-based methods. Then, we propose a gating mechanism with several crucial designs that can prune quite a lot of unprofitable mes- sages with little damage to the performance. Consequently, our method is applicable to the real-world packet routing sys- tems with limited bandwidth. As far as we know, it is the first formal method to achieve this in a novel and principled way, and it is the key contribution of this work. 0.150.20.250.30.350.40.450.505001000150020002500300035004000450050005500mean average rewardtimestepACMLMADDPGGACML00.10.20.30.40.50.60.7020406080100120140160180200220240260280300320340360380400420440460480500520540560580600mean average rewardtimestepACMLMADDPGGACML01020406080100120140160180200220240260280300320340360380400420440460480500520540560580600620gate valuerouter Arouter Btimestep01020406080100120140160180200220240260280300320340360380400420440460480500520540560580600620gate valuerouter Arouter Btimestep References [Becker et al., 2009] Raphen Becker, Alan Carlin, Victor Lesser, and Shlomo Zilberstein. Analyzing myopic ap- proaches for multi-agent communication. Computational Intelligence, 25(1):31 -- 50, 2009. [Bernstein et al., 2002] Daniel S Bernstein, Robert Givan, Neil Immerman, and Shlomo Zilberstein. The complexity of decentralized control of mdp. Mathematics of opera- tions research, 27(4):819 -- 840, 2002. [Dowling and Haridi, 2008] Jim Dowling and Seif Haridi. Decentralized reinforcement learning for the online opti- mization of distributed systems. In Reinforcement Learn- ing. InTech, 2008. [Foerster et al., 2016] Jakob Foerster, Ioannis Alexandros Assael, Nando de Freitas, and Shimon Whiteson. Learn- ing to communicate with deep multi-agent reinforcement learning. In Advances in Neural Information Processing Systems, pages 2137 -- 2145, 2016. [Foerster et al., 2017] Jakob Foerster, Gregory Farquhar, Triantafyllos Afouras, Nantas Nardelli, and Shimon Whiteson. Counterfactual multi-agent policy gradients. arXiv preprint arXiv:1705.08926, 2017. [Goldman and Zilberstein, 2004] Claudia V Goldman and Shlomo Zilberstein. Decentralized control of cooperative systems: Categorization and complexity analysis. Journal of Artificial Intelligence Research, 22:143 -- 174, 2004. [Hernandez et al., 2017] Pablo Hernandez, Michael Kaisers, Tim Baarslag, and Enrique Munoz de Cote. A survey of learning in multiagent environments: Dealing with non- stationarity. arXiv preprint arXiv:1707.09183, 2017. [Hubara et al., 2016] Itay Hubara, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Bina- rized neural networks. In Advances in neural information processing systems, pages 4107 -- 4115, 2016. [Jaderberg et al., 2016] Max Jaderberg, Volodymyr Mnih, Wojciech Marian Czarnecki, Tom Schaul, Joel Z Leibo, David Silver, and Koray Kavukcuoglu. Reinforcement learning with unsupervised auxiliary tasks. arXiv preprint arXiv:1611.05397, 2016. [Jiang and Lu, 2018] Jiechuan Jiang and Zongqing Lu. Learning attentional communication for multi-agent coop- eration. arXiv preprint arXiv:1805.07733, 2018. [Kandula et al., 2005] Srikanth Kandula, Dina Katabi, Bruce Davie, and Anna Charny. Walking the tightrope: Respon- In ACM SIGCOMM sive yet stable traffic engineering. Computer Communication Review, volume 35, pages 253 -- 264. ACM, 2005. [Kilinc and Montana, 2019] Ozsel Kilinc and Giovanni Montana. Multi-agent deep reinforcement learning with extremely noisy observations. In International Conference on Learning Representations, 2019. [Kim et al., 2019] Daewoo Kim, Sangwoo Moon, David Hostallero, Wan Ju Kang, Taeyoung Lee, Kyunghwan Son, and Yung Yi. Learning to schedule communication in multi-agent reinforcement learning. In International Con- ference on Learning Representations, 2019. [Lillicrap et al., 2015] Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, Continuous con- David Silver, and Daan Wierstra. arXiv preprint trol with deep reinforcement learning. arXiv:1509.02971, 2015. [Lowe et al., 2017] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor Mordatch. Multi- agent actor-critic for mixed cooperative-competitive envi- ronments. In Advances in Neural Information Processing Systems, pages 6379 -- 6390, 2017. [Makhzani and Frey, 2015] Alireza Makhzani and Brendan J Frey. Winner-take-all autoencoders. In Advances in Neural Information Processing Systems, pages 2791 -- 2799, 2015. [Mao et al., 2017] Hangyu Mao, Zhibo Gong, Yan Ni, and Zhen Xiao. Accnet: Actor-coordinator-critic net for "learning-to-communicate" with deep multi-agent rein- arXiv preprint arXiv:1706.03235, forcement learning. 2017. [Mao et al., 2018] Hangyu Mao, Zhengchao Zhang, Zhen Xiao, and Zhibo Gong. Modelling the dynamic joint pol- icy of teammates with attention multi-agent ddpg. arXiv preprint arXiv:1811.07029, 2018. [Mordatch and Abbeel, 2018] Igor Mordatch and Pieter Abbeel. Emergence of grounded compositional language in multi-agent populations. In Thirty-Second AAAI Con- ference on Artificial Intelligence, 2018. [Peng et al., 2017] Peng Peng, Quan Yuan, Ying Wen, Yaodong Yang, Zhenkun Tang, Haitao Long, and Jun Wang. Multiagent bidirectionally-coordinated nets for learning to play starcraft combat games. arXiv preprint arXiv:1703.10069, 2017. [Peng et al., 2018] Zhaoqing Peng, Libo Zhang, and Tiejian Luo. Learning to communicate via supervised attentional In Proceedings of the 31st Inter- message processing. national Conference on Computer Animation and Social Agents, pages 11 -- 16. ACM, 2018. [Pynadath and Tambe, 2002] David V Pynadath and Milind Tambe. The communicative multiagent team decision problem: Analyzing teamwork theories and models. Jour- nal of artificial intelligence research, 16:389 -- 423, 2002. [Roth et al., 2005] Maayan Roth, Reid Simmons, and joint beliefs for Manuela Veloso. In Proceed- execution-time communication decisions. ings of the fourth international joint conference on Au- tonomous agents and multiagent systems, pages 786 -- 793. ACM, 2005. Reasoning about [Silver et al., 2014] David Silver, Guy Lever, Nicolas Heess, Thomas Degris, Daan Wierstra, and Martin Riedmiller. Deterministic policy gradient algorithms. In ICML, 2014. [Singh et al., 2019] Amanpreet Singh, Tushar Jain, and Sainbayar Sukhbaatar. Individualized controlled continu- ous communication model for multiagent cooperative and competitive tasks. In International Conference on Learn- ing Representations, 2019. [Sukhbaatar et al., 2016] Sainbayar Sukhbaatar, Rob Fergus, et al. Learning multiagent communication with backprop- In Advances in Neural Information Processing agation. Systems, pages 2244 -- 2252, 2016. [Sutton and Barto, 1998] Richard S Sutton and Andrew G Introduction to reinforcement learning, volume Barto. 135. MIT press Cambridge, 1998. [Wu et al., 2011] Feng Wu, Shlomo Zilberstein, and Xi- aoping Chen. Online planning for multi-agent systems Artificial Intelligence, with bounded communication. 175(2):487 -- 511, 2011.
1801.02693
1
1801
2018-01-08T21:21:05
Stable Marriage with Multi-Modal Preferences
[ "cs.MA", "cs.DS" ]
We introduce a generalized version of the famous Stable Marriage problem, now based on multi-modal preference lists. The central twist herein is to allow each agent to rank its potentially matching counterparts based on more than one "evaluation mode" (e.g., more than one criterion); thus, each agent is equipped with multiple preference lists, each ranking the counterparts in a possibly different way. We introduce and study three natural concepts of stability, investigate their mutual relations and focus on computational complexity aspects with respect to computing stable matchings in these new scenarios. Mostly encountering computational hardness (NP-hardness), we can also spot few islands of tractability and make a surprising connection to the \textsc{Graph Isomorphism} problem.
cs.MA
cs
Stable Marriage with Multi-Modal Preferences∗ Jiehua Chen† Ben-Gurion University of the Negev Beer-Sheva, Israel Rolf Niedermeier TU Berlin Berlin, Germany Piotr Skowron‡ TU Berlin Berlin, Germany Abstract We introduce a generalized version of the famous STABLE MARRIAGE problem, now based on multi- modal preference lists. The central twist herein is to allow each agent to rank its potentially matching counterparts based on more than one "evaluation mode" (e.g., more than one criterion); thus, each agent is equipped with multiple preference lists, each ranking the counterparts in a possibly different way. We introduce and study three natural concepts of stability, investigate their mutual relations and focus on computational complexity aspects with respect to computing stable matchings in these new scenarios. Mostly encountering computational hardness (NP-hardness), we can also spot few islands of tractability and make a surprising connection to the GRAPH ISOMORPHISM problem. Keywords: Stable matching, concepts of stability, multi-layer (graph) models, NP-hardness, parameter- ized complexity analysis, exact algorithms. 1 Introduction Information about the same "phenomenon" can come from different, possibly "contradicting", sources. For instance, when evaluating candidates for an open position, data concerning experience and so far achieved successes of the candidates may give different candidate rankings than data concerning their formal qualifi- cations and degrees. In other words, one has to deal with a multi-modal data scenario. Clearly, in maximally objective and rationality-driven decision making, it makes sense to take into account several information resources in order to achieve best possible results. In this work we systematically apply this point of view to the STABLE MARRIAGE problem [25]; a key observation here is that several natural and well-motivated "multi-modal variants" of STABLE MARRIAGE need to be studied. We investigate the complexity of com- puting matchings that are stable according to the considered definitions. In the classic (conservative) STABLE MARRIAGE problem [25], we are given two disjoint sets U and W of n agents each, where each of the agents has a strict preference list that ranks every member of the other set. The goal is to find a bijection (which we call a matching) between U and W without any blocking pair which can endanger the stability of the matching. A pair of agents is blocking a matching if they are not matched to each other but rank each other higher than their respective partners in the matching. ∗Work started when all authors were with TU Berlin. †Supported by the People Programme (Marie Curie Actions) of the European Union's Seventh Framework Programme (FP7/2007-2013) under REA grant agreement number 631163.11, and by the Israel Science Foundation (grant number 551145/14). ‡Supported by a postdoctoral fellowship of the Alexander von Humboldt Foundation, Bonn, Germany. 1 Gale and Shapley [25] introduced the STABLE MARRIAGE problem in the fields of Economics and Computer Science in the 1960s. One of their central results was that every STABLE MARRIAGE instance with 2n agents admits a stable matching, which can be found by their algorithm in O(n2) time. Since then STABLE MARRIAGE has been intensively studied in Economics, Computer Science, and Social and Political Science [1, 27, 29, 30, 35, 37, 39]. Practical applications of STABLE MARRIAGE (and its variants) include partnership issues in various real-world scenarios, matching graduating medical students (so-called residents) with hospitals, students with schools, and organ donors with patients [27, 35, 39], and the design of content delivery systems [36] and other distributed markets [45]. The original model of STABLE MARRIAGE assumes, roughly speaking, that there is a (subjective) cri- terion and that each agent has a single preference list depending on this criterion. In typically complex real-world scenarios, however, there are usually multiple aspects one takes into account when making a de- cision. For instance, if we consider the classical partnership scenario, then there could be different criteria such as working hours, family background, physical appearance, health, hobbies, etc. In other words, we face a much more complex multi-modal scenario. Accordingly, the agents may have multiple preference lists, each defined by a different criterion; we call each of these criteria a layer. For an illustration, let us consider the following stable marriage example with two sets of two agents each, denoted as u1, u2, w1, and w2, and three layers of preferences, denoted as P1, P2, and P3. w1 w2 u1 w2 w1 u2 w1 w2 u1 w1 w2 u2 w2 w1 u1 w2 w1 u2 P1: w1 u1 u2 w2 u1 u2 P2: w1 u1 u2 w2 u1 u2 P3: w1 u2 u1 w2 u1 u2 In the above diagram the preferences are depicted right above (respectively, right below) the corresponding agents; preferences are represented through vertical lists where more preferred agents are put above the less preferred ones. For example, in the first layer, all agents from the same set have the same preference list, i.e. both u1 and u2 rank w1 higher than w2 while both w1 and w2 rank u1 higher than u2. Similarly, in the second layer, both u1 and u2 rank w2 higher than w1 while both w1 and w2 rank u1 higher than u2. In the last layer, the preference lists of two agents from the same set are reverse to each other. For instance, u1 ranks w1 higher than w2, which is opposite to u2. In terms of the classic stable marriage problem, we will have three independent instances, one for each layer. The corresponding stable matching(s) for each instance are depicted through the edges between the agents. For instance, the first layer admits exactly one stable matching, which matches u1 with w1, and u2 with w2. Yet, if we want to take all these layers jointly into account, then we need to extend the traditional concept of stability. With multiple preference lists for each agent, there are many natural ways to extend the original stability concept. We propose three naturally emerging concepts of stability. Assume each agent has ℓ (possibly different) preferences lists. All three concepts are defined for a certain threshold α with 1 ≤ α ≤ ℓ, which quantifies "the strength" of stability. In the following, we briefly describe our three concepts and defer the formal definitions to Section 2. - The first one, called α-layer global stability, extends the original stability concept in a straightforward way. It assumes that the matched pairs agree on a set S of α layers where no unmatched pair is blocking the matching in any layer from S. In our introductory example, the matching M1 = {{u1, w1}, {u2, w2}} is stable in the first and the last layer, and thus it is a 2-layer globally stable matching. 2 - The second one, called α-layer pair stability, changes the "blocking ability" of the unmatched pairs. It forbids an unmatched pair to block more than ℓ − α layers. In other words, each pair of matched agents needs to be stable in some α layers, but the choice of these layers can be different for different pairs. Considering again our running example, we can verify that the 2-layer globally stable matching M1 is also 2-layer pair stable as each unmatched pair is blocking at most one layer. Indeed, we will see that α-layer pair stability is strictly weaker than α-layer global stability (Proposition 3.1 and Example 3.1). - The last one, called α-layer individual stability, focuses on the "willingness" of an agent to stay with its partner. It requires that for each unmatched pair, at least one of the agents prefers to stay with its partner in at least α layers. In our introductory example, the matching M1 is also 2-layer individually stable. Thus, it is tempting to assume that α-layer individual stability also generalizes α-layer global stability. This is, however, not true as the following matching M2 = {{u1, w2}, {u2, w1}} is 2-layer globally stable but not 2- layer individually stable. Neither does the latter implies the former. We refer to Example 3.2 for more explanations. 1.1 Related work While we are not aware of research on an arbitrary number ℓ of layers, there is some work on ℓ = 2 layers. Weems [48] considered the case where each agent has two preference lists that are the reverse of each other. He provided a polynomial-time algorithm to find a bistable matching, i.e. a matching that is stable in both layers. Thus, while his concept falls into our α-layer global stability concept for α = ℓ = 2, it is a special case since the preference lists in the two layers are the reverse of each other. In fact, for α = ℓ = 2, we show that the complexity of determining α-layer global stability is NP-hard. Aggregating the preference lists of multiple layers into one (by comparing each pair of agents) and then searching for a "stable" matching for the agents with aggregated preferences is a plausible approach to multi-modal stable marriages. As already noted by Farczadi et al. [23], the aggregated preferences may be intransitive or even cyclic. Addressing this situation, they consider a generalized variant of STABLE MARRIAGE, where each agent u of one side, say U , has a strict preference list ≻u (as in the original STABLE MARRIAGE) while each agent w of the other side, say W , may order each possible pair of partners separately, expressed by a subset Bw ⊆ U × U of ordered pairs. They defined a matching M to be stable if no unmatched pair {u, w} satisfies "w ≻u M (u) and (u, M (u)) ∈ Bw". It turns out that our concept of individual stability and their concept for a more generalized case where both sides of the agents may have intransitive preferences are related, and we can use one of their results as a subroutine. In a way, our analysis provides a more fine-grained view, since we consider a richer model and thus are able to discuss how certain assumptions on elements of this model (e.g., the number of layers, the threshold value α, etc.) affect the computational complexity of the problem. Aziz et al. [2] considered a variant of STABLE MARRIAGE, where each agent has a probability for each ordered pair of potential partners. Assigning a probability of 1 to either (x, y) or (y, x) for each x and y, their variant is closely related to the one of Farczadi et al. [23] and is shown to be NP-hard. We refer to several expositions [35, 27, 31, 39, 33, 7] for a broader overview on STABLE MARRIAGE and related problems. 1.2 Our contributions We introduce three main concepts of stability for STABLE MARRIAGE with multi-modal preferences. In Section 2 we formally define these concepts, global stability, pair stability, and individual stability, and provide motivating and illustrating examples. In Section 3, we study the relations between the three concepts 3 Table 1: The computational complexity of finding matchings stable according to the three consideerd definitions-α-layer global stability, α-layer pair stability, and α-layer individual stability-for instances with 2n agents and ℓ layers. All results hold for each value of α specified in the first column. Results marked with ∗ hold even if we assume that each agent of one side has the same preference list in all layers. The NP-hardness results hold even for a fixed number of layers. Parameters global stability pair stability individual stability Arbitrary O(n2) [25] NP-h [T. 4.2+P. 4.4] 1 = α 2 ≤ α = ℓ ⌊ℓ/2⌋ < α < ℓ NP-h [P. 5.1] 2 ≤ α ≤ ⌊ℓ/2⌋ NP-h [P. 5.1] Single-layered O(n2) [25] NP-h [C. 4.3+P. 4.4] NP-h [P. 5.4+P. 5.5] NP-h∗ [C. 5.3] O(n2) [25] O(ℓ · n2) [T. 4.1] ? NP-h∗ [T. 5.2] NP-h for unbounded α [T. 6.2] NP-h∗ when 2 ≤ α ≤ ⌊ℓ/2⌋ [C. 5.3] NP-h∗ when 2 ≤ α ≤ ⌊ℓ/2⌋ [T. 5.2] W[1]-h & in XP for α [T. 6.2] O(ℓ · n2) when α > ⌊ℓ/2⌋ [P. 6.3] O(ℓ · n2) when α > ⌊ℓ/2⌋ [P. 6.3] Uniform α ≥ ℓ/2 + 1 α = ℓ/2 O(ℓ · n) [P. 6.7] O(ℓ · n) [P. 6.7] ? ? nO(log (n)) + O(ℓ · n2) [C. 6.6] GRAPH ISOM.-hard [T. 6.5] and show that pair stability is the least restrictive form while global and individual stability are in general incomparable (also see Figure 1 for a much refined picture). In Section 4, we consider the special case of all-layers stability (α = ℓ) for the three concepts. On the one hand, we provide a polynomial-time algorithm for checking individual stability for arbitrary large number of preference lists. On the other hand, through an involved construction, we show NP-hardness for the other two stability concepts, even if there are only two layers. The hardness results demonstrate a complexity dichotomy for both global and pair stability since for single-layer preference lists, all three concepts of stability are the same and polynomial- time computable. In Section 5 we investigate the case of finding stable matchings with respect to less than all layers and only find NP-hardness results. In Section 6, we identify two special scenarios with strong but natural restrictions on the preference lists. For the fist scenario we assume that one side of the agents has single-layered preferences, i.e. on one side the preference list of each agent remains the same in all layers. We find that under such restrictions two out of three studied concepts are equivalent, and can be computed in polynomial time; for global stability we obtain W[1]-hardness (and also NP-hardness) and XP membership for the threshold parameter α. In the second scenario, we assume that the preferences of all agents on each side are uniform in each layer, i.e. when for each fixed layer and side all agents have the same preference list, and when considering individual stability we find surprising tight connections to the complexity of the GRAPH ISOMORPHISM problem. Table 1 gives a broad overview on our complexity results. 2 Definitions and Notations For each natural number t by [t] we denote the set {1, 2, . . . , t}. Let U = {u1, . . . , un} and W = {w1, . . . , wn} be two n-element disjoint sets of agents. There are ℓ lay- ers of preferences, where ℓ is a non-negative integer. For each i ∈ [ℓ] and each u ∈ U , let ≻(i) u be a linear order on W that represents the ranking of agent u over all agents from W in layer i. Analogously, for each i ∈ [ℓ] and each w ∈ W , the symbol ≻(i) w represents a linear order on U that encodes preferences of w in layer i. We refer to such linear orders as preference lists. A preference profile Pi of layer i ∈ [ℓ] is a collection of preference lists of all the agents in layer i, {≻(i) a a ∈ U ∪ W }. Let U ⋆ W = {{u, w} u ∈ U ∧ w ∈ W }. A matching M ⊆ U ⋆ W is a set of pairwisely disjoint pairs, i.e. for each two pairs p, p′ ∈ M it holds that p ∩ p′ = ∅. If {u, w} ∈ M , then we also use M (u) to 4 refer to w and M (w) to refer to u, and we say that u and w are their respective partners under M ; otherwise we say that {u, w} is an unmatched pair. Example 2.1 below shows an example matching and introduces a graphical notation that we will use throughout the paper. Example 2.1. Consider two sets of agents, U = {u1, u2, u3} and W = {w1, w2, w3}, and two layers of preference profiles, P1 and P2. Let us recall that in the following diagram the preferences are represented through vertical lists where more preferred agents are put above the less preferred ones. For instance, in the diagram the preference list of agent u3 in the first layer (profile P1) is w2 ≻(1) u3 w3 ≻(1) u3 w1. P1: w3 w2 w1 u1 w1 u2 u3 u1 w1 w2 w3 u2 w2 u3 u1 u2 w2 w3 w1 u3 w3 u3 u1 u2 P2: w2 w3 w1 u1 w1 u1 u2 u3 w3 w1 w2 u2 w2 u2 u3 u1 w1 w2 w3 u3 w3 u3 u1 u2 In our diagrams we will depict stable matchings in each layer through edges between matched nodes. If a layer has more than one stable matching, then we will use different types of lines (solid, dashed, dotted) and different colors to distinguish between them. For instance, in the above example profile P1 has one stable matching M1 = {{u1, w3}, {u2, w1}, {u3, w2}}, and P2 has three stable matchings: (1) M2 = ⋄ {{u1, w1}, {u2, w2}, {u3, w3}}, (2) M3 = {{u1, w2}, {u2, w3}, {u3, w1}}, and (3) M1. Let us now introduce two notions that we will use when defining various concepts of stability. Definition 2.1 (Dominating pairs and blocking pairs). Let M be a matching over U ∪ W . Consider an unmatched pair {u, w} ∈ (U ⋆ W ) \ M and a layer i ∈ [ℓ]. We say that {u, w} dominates {u, v} in layer i if w ≻(i) (1) u is unmatched in M or {u, w} dominates {u, M (u)} in layer i, and (2) w is unmatched in M or {u, w} dominates {w, M (w)} in layer i. u v. We say that {u, w} is blocking matching M in layer i if it holds that For a single layer i, a matching M is stable in layer i if no unmatched pair is blocking M in layer i. Let us illustrate the concept of dominating and blocking pairs through Example 2.1. Consider the matching M3 = {{u1, w2}, {u2, w3}, {u3, w1}} and profile P1 of layer 1. Here, pair {u1, w3} dominates both {u1, w2} (since u1 prefers w3 to w2) and {u2, w3} (since w3 prefers u1 to u2). Thus, {u1, w3} is a blocking pair and so it witnesses that M is not stable in profile P1. We are interested in matchings which are stable in multiple layers, i.e. we aim at generalizing the classic STABLE MARRIAGE problem [25, 35, 27, 39] which is defined for a single layer to the case of multiple layers. The idea behind each of the concepts defined below is similar: in order to call a matching stable for multiple layers we require that it must be stable in at least a certain, given number of layers α (α is a number indicating the "strength" of the stability). However, for different concepts we require a different level of agreement with respect to which layers are required for stability. Informally speaking, on the one end of the spectrum we have a variant of stability where we require a global agreement of the agents regarding the set of α layers for which the matching must be stable. On the other end of the spectrum we have a variant where we assume that the agents act independently: an agent a would deviate if it would find another agent, say b, such that a prefers b to its matched partner in some α layers, and b prefers a to its matched partner in another, possibly different, set of α layers. In the intermediate case, we require that a deviating pair must agree on the subset of layers which form the reason for deviation. We formally define the three concepts below. 5 2.1 α-layer global stability Informally speaking, a matching M is α-layer globally stable if there exist α layers in each of which M is stable. Definition 2.2 (global stability). A matching M is α-layer globally stable if there exists a set S ⊆ [ℓ] of α layers, such that for each layer i ∈ S and for each unmatched pair {u, w} ∈ U ⋆ W \ M at least one of the two following conditions holds: (1) pair {u, M (u)} dominates {u, w} in layer i, or (2) pair {w, M (w)} dominates {w, u} in layer i. The following example describes a scenario where the above concept of multi-layer stability appears to be useful. Example 2.2. Assume that the preferences of the agents depend on external circumstances which are not known a priori. Assume that each layer represents a different possible state of the universe. If we want to find a matching that is stable in as many states of the universe as possible, then we need to find an α-layer ⋄ globally stable matching for the highest possible value of α. Already for α-layer global stability we see substantial differences compared to the original concept of stability for a single layer. It is guaranteed that such a matching always exists for α = 1; indeed this would be a matching that is stable in an arbitrary layer. However, one can observe that as soon as α > 1 an α-layer globally stable matching might not exist (see Example 3.1). 2.2 α-layer pair stability While α-layer global stability requires that the agents globally agree on a certain subset of α layers for which the matching should be stable, pair stability forbids each unmatched pair to block more than a certain number of layers. The formal definition, using the domination concept, is as follows: Definition 2.3 (pair stability). A matching M is α-layer pair stable if for each unmatched pair {u, w} ∈ (U ⋆ W ) \ M , there is a set S ⊆ [ℓ] of α layers such that for each layer i ∈ S at least one of the following conditions holds: (1) pair {u, M (u)} dominates {u, w} in layer i, or (2) pair {w, M (w)} dominates {w, u} in layer i. Definition 2.3 can be equivalently formulated using a generalization of the concept of blocking pairs. Let β ∈ [ℓ] be an integer bound. We say that a pair {u, w} ∈ (U ⋆ W ) \ M is β-blocking M if there exists a subset S ⊆ {1, 2, . . . , ℓ} of β layers such that for each i ∈ S, pair {u, w} is blocking M in layer i. Proposition 2.1. A matching M is α-layer pair stable if and only if no unmatched pair p is (ℓ − α + 1)- blocking M . Proof. To prove the statement, we show that a matching M is not α-layer pair stable if and only if there is an unmatched pair p that is (ℓ − α + 1)-blocking M . For the "if" direction, assume that {u, w} is an unmatched pair and R ⊆ [ℓ] is a subset of ℓ−α+1 layers such that {u, w} is blocking every layer in R. Now consider an arbitrary subset S ⊆ [ℓ] of size α. By the cardinalities of R and S, it is clear that S ∩ R 6= ∅. Let i ∈ S ∩ R be such a layer. Then, by assumption, we have that {u, w} is blocking M in layer i. This means that none of the conditions stated in Definition 2.3 holds. Thus, {u, w} is an unmatched pair witnessing that M is not α-layer pair stable. For the "only if" direction, assume that M is not α-layer pair stable and let {u, w} be an unmatched pair that witnesses the non-α-layer pair stability of M . We claim that {u, w} is (ℓ−α+1)-blocking M . Towards a contradiction, suppose that {u, w} is not (ℓ − α + 1)-blocking M . Then, there must be a subset S ⊆ [ℓ] of at least α layers where the pair {u, w} is not blocking M in each layer in S. Equivalently, we can say that 6 for each layer i ∈ S, {u, M (u)} dominates {u, w} in layer i or {w, M (w)} dominates {u, w} in layer i-a contradiction to {u, w} being a witness. The following example motivates α-layer pair stability. Example 2.3. Consider the case when the preferences of the agents depend on a context, yet a context is pair-specific. For instance, in matchmaking a woman may have different preferences over men depending on which country they will decide to live in. Thus, a pair of a man and a woman is blocking if they agree on certain conditions, and if they will find each other more attractive than their current partners according to ⋄ the agreed conditions. In Section 3, we show that α-layer global stability implies α-layer pair stability (Proposition 3.1). This, among other things, implies that for α = 1 an α-layer pair stable matching always exists. However, as soon as α ≥ 2 the existence is no longer guaranteed (see Example 3.1). 2.3 α-layer individual stability We move to the third and last concept of stability. Definition 2.4 (individual stability). A matching M is α-layer individually stable if for each unmatched pair {u, w} ∈ (U ⋆ W ) \ M there is a set S ⊆ [ℓ] of α layers such that at least one of the following conditions holds: (1) pair {u, M (u)} dominates {u, w} in each layer of S, or (2) pair {w, M (w)} dominates {w, u} in each layer of S. The following example illustrates a potential application in the domain of partnership agencies. Example 2.4. Assume that each layer describes a single criterion for preferences. The preferences of each agent may differ depending on the criterion. For instance, the two sets of agents can represent, respectively, men and women, as in the traditional stable marriage problem. Different criteria may correspond, for in- stance, to the intelligence, sense of humor, physical appearance etc. Assume that an agent a will have no incentive to break his or her relationship with b, and to have an affair with c if he or she prefers b to c according to at least α criteria. In order to match men with women so that they form stable relationships, ⋄ one needs to find an α-layer individually stable matching. Definition 2.4 can be equivalently formulated using a generalization of the concept of dominating pairs. Let β ∈ [ℓ] be an integer bound. We say that a pair {u, w} is β-dominating {u, w′} if there is a subset R ⊆ [ℓ] of β layers such that for each i ∈ R the pair {u, w} dominates {u, w′} in layer i. Proposition 2.2. A matching M is α-layer individually stable if and only if no unmatched pair {u, w} exists that is both (ℓ − α + 1)-dominating {u, M (u)} and (ℓ − α + 1)-dominating {w, M (w)}. Proof. To prove the statement, we show that a matching M is not α-layer individually stable if and only if there is an unmatched pair p that is (ℓ − α + 1)-dominating {u, M (u)} and (ℓ − α + 1)-dominating {w, M (w)}. For the "if" direction, assume that {u, w} is an unmatched pair and R1, R2 ⊆ [ℓ] are two (possibly different) subsets of ℓ − α + 1 layers each, such that {u, w} is dominating {u, M (u)} in each layer i ∈ R1 and is dominating {w, M (w)} in each layer j ∈ R2. Now consider an arbitrary subset S ⊆ [ℓ] of size α. By the cardinalities of R1, R2, and S , it is clear that S ∩ R1 6= ∅ and S ∩ R2 6= ∅. Let i ∈ S ∩ R1 and j ∈ S ∩ R2 be two layers in the intersections. Then, by assumption, we have that {u, w} is dominating {u, M (u)} in layer i and {u, w} is dominating {w, M (w)} in layer j. This means that none of the conditions stated in Definition 2.4 holds. Thus, {u, w} is an unmatched pair witnessing that M is not α-layer individually stable. For the "only if" direction, assume that M is not α-layer individually stable and let {u, w} be an un- matched pair that witnesses the non-α-layer individual stability of M . We claim that {u, w} is (ℓ − α + 1)- dominating {u, M (u)} and is (ℓ − α + 1)-dominating {w, M (w)}. Towards a contradiction, first suppose 7 that {u, w} is not (ℓ − α + 1)-dominating {u, M (u)}, meaning that there are at most ℓ − α layers where {u, w} dominates {u, M (u)}. This implies that there is a subset S ⊆ [ℓ] of α layers such that for each i ∈ S, the pair {u, M (u)} is dominating {u, w}, a contradiction to {u, w} being a witness of the non-α- layer individual stability of M . Analogously, if {u, w} was not (ℓ − α + 1)-dominating {w, M (w)}, then we could obtain the same contradiction. For α = 1 an α-layer individually stable matching always exists (it will follow from Propositions 3.1 and 3.3); however, this is no longer the case when α ≥ 2 (see Proposition 3.2 and Example 3.1). Observe that according to α-layer individual stability the preferences of the agents can be represented as sets of linear orders: it does not matter which preference order comes from which layer. This is not the case for the other two concepts. 2.4 Central computational problems In this paper, we study the algorithmic complexity of finding matchings that are stable according to the above definitions. To this end, we first investigate how the three concepts relate to each other. Next, we formally define the search problem of finding an α-layer globally stable matching. GLOBALLY STABLE MARRIAGE Input: Two disjoint sets of n agents each, U and W , ℓ preference profiles, and an integer bound α ∈ [ℓ]. Output: Return an α-layer globally stable matching if one exists, or claim there is no such. The other two problems, PAIR STABLE MARRIAGE and INDIVIDUALLY STABLE MARRIAGE, are defined analogously. 3 Relations Between the Multi-Layer Concepts of Stability Below we establish relations among the three concepts. We start by showing that α-layer pair stability is a weaker notion than α-layer global stability and α-layer individual stability. Proposition 3.1. An α-layer globally stable matching is α-layer pair stable. Proof. Let M be an α-layer globally stable matching and let S ⊆ {1, . . . , ℓ} be such that S = α and that for each i ∈ S, matching M is stable in layer i. For the sake of contradiction let us assume that M is not α-layer pair stable. By Proposition 2.1, let {u, w} be an (ℓ − α + 1)-blocking pair for M . Let S′ ⊆ {1, . . . , ℓ} be such that S′ = ℓ − α + 1 and that for each i ∈ S′, pair {u, w} blocks M in layer i. Since S′ + S = ℓ + 1, we get that S ∩ S′ 6= ∅. Let i ∈ S ∩ S′. This gives a contradiction since on the one hand M is stable in layer i, and on the other hand {u, w} blocks M in layer i. Proposition 3.2. An α-layer individually stable matching is α-layer pair stable. Proof. Consider an α-layer individually stable matching M . Towards a contradiction, suppose that M is not α-layer pair stable. By Proposition 2.1, this means that there exists an unmatched pair {u, w} and a subset S′ ⊆ [ℓ] of ℓ − α + 1 layers such that {u, w} is blocking M in each layer from S′. This means that {u, w} is both (ℓ − α + 1)-dominating {u, M (u)} and (ℓ − α + 1)-dominating {w, M (w)}. Then, by Proposition 2.2, M is not α-layer individually stable, a contradiction. Example 3.1, below, shows a matching which is α-layer pair stable, but which is not α-layer globally sta- ble. This example, together with Proposition 3.1, also shows that α-layer global stability is strictly stronger than α-layer pair stability. 8 Example 3.1. Consider an instance with six agents and two layers of preference profiles. P1: w1 w2 w3 u1 w1 u2 u1 u3 w2 w1 w3 u2 w2 u2 u1 u3 w3 w1 w2 u3 w3 u3 u1 u2 P2: w2 w1 w3 u1 w1 u3 u1 u2 w3 w1 w2 u2 w2 u1 u2 u3 w1 w3 w2 u3 w3 u2 u1 u3 Observe that matching M = {{u1, w1}, {u2, w3}, {u3, w2}} is 1-layer individually stable and, thus 1-layer pair stable. However, M is blocked by pair {u2, w1} in the first layer and by {u1, w2} in the second. Thus, M is not 1-layer globally stable. Indeed the only 1-layer globally stable matchings are indicated by the solid lines, which are also 1-layer individually stable (and thus 1-layer pair stable). As soon as α ≥ 2, α-layer pair stability is not guaranteed to exist, even if ℓ > α. To see this we augment the instance with one more layer whose preference lists are identical to the first layer given in Example 2.1. One can verify that for each of all six possible matchings, there is always an unmatched pair that is blocking ⋄ at least two layers. For α = 1, we observe that 1-layer pair stability is equivalent to 1-layer individual stability. Proposition 3.3. A matching is 1-layer pair stable if and only if it is 1-layer individually stable. Proof. By Proposition 3.2, we know that 1-layer individual stability implies 1-layer pair stability. It remains to show the other direction. Let M be a 1-layer pair stable matching. Suppose, for the sake of contradic- tion, that M is not 1-layer individually stable. By Proposition 2.2, this means that there is an unmatched pair {u, w} that is both ℓ − 1 + 1 = ℓ-dominating {u, M (u)} and ℓ − 1 + 1 = ℓ-dominating {w, M (w)}. This implies that the pair {u, w} is indeed ℓ-blocking M , which by Proposition 2.1, is a contradiction to M being 1-layer pair stable. Example 3.2 shows that for α > 1, individual stability and pair stability are not equivalent, neither is individual stability equivalent to global stability. Example 3.2. Consider the example given in Section 1. Recall that the first layer admits exactly one stable matching, namely M1 = {{u1, w1}, {u2, w2}} (depicted by solid lines). The second layer also admits exactly one (different) stable matching, namely M2 = {{u1, w2}, {u2, w1}} (also depicted by solid lines). The third layer has two stable matchings, M1 and M2 (depicted by solid lines and dashed lines, resp.). Thus, both M1 and M2 are 2-layer globally stable (and 2-layer pair stable). However, M1 is 2-layer individually stable while M2 is not. To see why M2 is not 2-layer individually stable, we can verify that the unmatched pair p = {u1, w1} dominates {u1, w2} in the first and the third layer and it dominates {u2, w1} in the first two layers. By Proposition 2.2, M2 is not 2-layer individually stable since ℓ − α + 1 = 2. If we restrict the example to the last two layers only, then matching M2 is also evidence that an ℓ-layer globally stable (which, by Proposition 3.4, implies ℓ-layer pair stability) is not ℓ-layer individually stable. ⋄ For α = ℓ global stability and pair stability are equivalent. Proposition 3.4. For α = ℓ, a matching is α-layer globally stable if and only if it is α-layer pair stable. Proof. By Proposition 3.1, ℓ-layer global stability implies ℓ-layer pair stability. Now, assume that a match- ing M is ℓ-layer pair stable. For the sake of contradiction, suppose that M is not ℓ-layer globally stable. This means that there exists a pair, say {u, w}, and a layer, say i, such that {u, w} is blocking in layer i. Thus, {u, w} is 1-blocking M , and so M cannot satisfy ℓ-layer pair stability. This gives a contradiction. 9 It is somehow counter-intuitive that even an ℓ-layer globally stable matching (i.e. a matching that is stable in each layer) may not be ℓ-layer individually stable (see Example 3.2). By Proposition 3.5 we can thus infer that ℓ-layer global stability is strictly weaker than ℓ-layer individual stability. Proposition 3.5. For α = ℓ, an α-layer individually stable matching is α-layer globally stable. Proof. Proposition 3.2 and Proposition 3.4 imply the statement since α = ℓ. By Example 3.2, ℓ-layer global stability does not imply ℓ-layer individual stability. However, it implies ⌈ℓ/2⌉-layer individual stability. Proposition 3.6. Every ℓ-layer globally stable matching is ⌈ℓ/2⌉-layer individually stable. There are in- stances where ℓ-layer globally stable matchings are not (⌈ℓ/2⌉ + 1)-layer individually stable. Proof. For the first statement, let M be an ℓ-layer globally stable matching. Suppose, for the sake of contradiction, that M is not ⌈ℓ/2⌉-layer individually stable. Let β = ℓ − ⌈ℓ/2⌉ + 1, which is ⌊ℓ/2⌋ + 1. By Proposition 2.2, let {u, w} be an unmatched pair that is both β-dominating {u, M (u)} and β-dominating {w, M (w)}. Since 2 · β > ℓ, there is at least one layer i where {u, w} is dominating both {u, M (u)} and {w, M (w)}, meaning that {u, w} is blocking layer i, a contradiction to M being ℓ-layer globally stable. To see why ℓ-layer global stability may not imply (⌈ℓ/2⌉ + 1)-layer individual stability, consider the following instance with four agents and ℓ = 4 layers. P1: w1 w2 u1 w1 u1 u2 w1 w2 u2 w2 u1 u2 P2: w1 w2 u1 w1 u1 u2 w2 w1 u2 w2 u1 u2 P3: w2 w1 u1 w1 u2 u1 w2 w1 u2 w2 u2 u1 P4: w2 w1 u1 w1 u1 u2 w2 w1 u2 w2 u2 u1 M = {{u1, w1}, {u2, w2}} is the only 4-layer globally stable matching. However, it is not 3-layer individ- ually stable as the unmatched pair {u1, w2} dominates {u1, w1} in layers 3 and 4 and dominates {u2, w2} in layers 1 and 2. By Proposition 2.2, M is not 3-layer individually stable since ℓ − α + 1 = 2. The relations among the different concepts of multi-layer stability are depicted in Figure 1. A 1-layer globally stable matching always exists. Together with Propositions 3.1 and 3.2, we obtain the following. Proposition 3.7. A preference profile with ℓ layers always admits a matching, which is 1-layer globally stable, 1-layer pair stable, and 1-layer individually stable. 4 All-Layers Stability (α = ℓ) In this section, we discuss the special case when α = ℓ. It turns out that deciding whether a given instance admits an ℓ-layer individually stable matching can be solved in polynomial time. For the other two concepts of stability, however, the problem becomes NP-hard even when ℓ = 2. 4.1 Algorithm for ℓ-layer individual stability The algorithm for deciding ℓ-layer individual stability is based on the following simple lemma. Lemma 4.1. Let u ∈ U and w ∈ W be two agents such that w is the first ranked agent of u in some layer i ∈ [ℓ], and let u′ ∈ U \ {u} be another agent such that w prefers u over u′ in some layer j ∈ [ℓ]. Then, no ℓ-layer individually stable matching contains {u′, w}. 10 ℓ-global Prop 3.5, Ex 3.2 Prop 3.6 for α ≤ ⌈ℓ/2⌉ ℓ-individual α-global α-individual 1-global Props 3.1 and 3.3, Ex 3.1 1-individual 3 . 3 p P r o Prop Pro p P r o P r o p 3 . 4 p 3 . 1 , E x 3 . 1 3.1, E x 3.1 1-pair α-pair ℓ-pair 3.2 3.5,Ex 3.2 3.2, E x and 3.4 Props Figure 1: Relations among the different multi-layer concepts of stability for different values of α. Herein, an arc is to be read like an implication: one property implies the other. Proof. Let u, w, u′ be the three agents and let i, j be the two (possibly equal) layers as described by the assumption. Suppose towards a contradiction that there is an ℓ-layer individually stable matching with {u′, w} ∈ M . This implies that {u, w} is an unmatched pair under M . However, w prefers u over u′ = M (w) in layer j and u prefers w over M (u) in layer i-a contradiction to M being ℓ-layer individually stable. Lemma 4.1 leads to Algorithm 1 which looks quite similar to the so-called extended Gale-Shapley al- gorithm by Irving [28]. The crucial difference is that we loop into different layers and we cannot delete a pair p of agents that does not belong to any stable matching, as it may still serve to block certain matchings. Instead of deleting such pair, we will mark it. Herein, marking a pair {u, w} means marking the agent u (resp. w) in the preference list of w (resp. u) in every layer. The correctness of Algorithm 1 follows from Lemmas 4.2 to 4.4. Lemma 4.2. If a pair {u′, w} is marked during the execution of Algorithm 1, then no ℓ-layer individually stable matching contains this pair. Proof. Each pair is marked within two "foreach" loops in Line 2 and Line 3, respectively (we will refer to them as the "outer" loop and the "inner" loop). Let us fix an arbitrary u ∈ U and i ∈ [ℓ] and consider the pairs which was marked when the outer and the inner loops were run for u and i, respectively. We show the statement via induction on the sequence of pairs which were marked when u and i was considered for the two loops. For the induction to begin, let {u′, w} with u′ ∈ U and w ∈ W be the first pair that is marked during the execution. This implies that agent u ranks w in the first position in layer i and that w prefers u to u′ in some (possibly different) layer. By Lemma 4.1, no ℓ-layer individually stable matching contains {u′, w}. For the induction assumption, let {u′, w} be the mth pair (for given u and i) that is marked during the execution and no ℓ-layer individually stable matching contains a pair that is marked prior to {u′, w}. Suppose for the sake of contradiction that there is an ℓ-layer individually stable matching M which contains the marked pair {u′, w}. The fact that {u′, w} has been marked implies that 11 Algorithm 1: Algorithm for finding an ℓ-layer individually stable matching. Input: A set of agents U ∪ W and ℓ layers of preferences. 1 repeat 2 3 4 5 6 7 8 9 10 11 foreach agent u ∈ U do foreach layer i = 1, 2, . . . , ℓ do w ← the first ranked agent in u's preference list in layer i r ← 1 repeat foreach u′ with w : u ≻(j) w u′ for some layer j do mark {u′, w} r ← r + 1 w ← the rth ranked agent in u's preference list in layer i until {u, w} is not marked 12 until (some agent's preference list consists of only marked agents) or (no new pair was marked in the last iteration) 13 if some agent's preference list consists of only marked agents then no ℓ-layer individually stable matching exists 14 else return M = {{u, w} w ← the first unmarked agent in u's preference list in any layer} as an ℓ-layer individually stable matching 1. u ranks w in the pth position in layer i for some p, and 2. w prefers u over u′ in some layer j. However, by the description of the algorithm in layer i (Lines 4–11) for each agent w′ that u prefers to w in layer i, i.e. w′ ≻(i) u w, we have that {u, w′} is marked (see the "until" condition in Line 11). The induction assumption implies that M does not contain any {u, w′} with w′ ≻(i) u w. Thus, it follows that u prefers w to M (u) in layer i, i.e. w ≻(i) u M (u). This is a contradiction to M being ℓ-layer individually stable on the unmatched pair {u, w} since there is a layer j ∈ [ℓ] such that u ≻(j) w u′ = M (w). The following lemma ensures that in Line 14 if w is matched to an agent u, then it is the most preferred unmarked agent of u in all layers. Lemma 4.3. If no agent's preference list consists of only marked agents and there is an agent u and two different layers i, j ∈ [ℓ], i 6= j such that the first unmarked agent in the preference list of u in layer i differs from the one in layer j, then Algorithm 1 will mark at least one more pair. Proof. Suppose towards a contradiction that no new pair is marked, but there is an agent u ∈ U such that the first agent unmarked by u is different in different layers, say w and w′ in layers i and j, with w 6= w′ and i 6= j. Since no new pair will be marked, u is the last unmarked agent in the preference lists of w and w′ in all layers (see Line 8 of Algorithm 1). Since U = W there is a different agent u′ ∈ U \ {u} such that for each agent w ∈ W we have that u′ is not the last unmarked agent in the preference list of w in any layer. Since no agent's preference list consists of only marked agents, the preference list of u′ (in some layer) contains an agent which is unmarked. Denote this agent as w′. Again, since no new pair will be marked, in the preference list of w′′, agent u′ is the last unmarked agent-a contradiction. When Algorithm 1 terminates and no agent contains a preference list that consists of only marked agents, then we can construct an ℓ-layer individually stable matching by assigning to each agent u its first unmarked agent in any preference list (note that Lemma 4.3 ensures on termination that for each agent it holds that in all layers is first unmarked agent is the same). Lemma 4.4. If upon termination no agent's preference list consists of only marked agents, then the match- ing M computed by Algorithm 1 is ℓ-layer individually stable. 12 u M (u) and w : u ≻(j) Proof. Towards a contradiction suppose that M returned by Algorithm 1 is not ℓ-layer individually stable. That is, there is an unmatched pair {u, w} ∈ (U ⋆ W ) \ M with u ∈ U and w ∈ W and two layers i, j ∈ [ℓ] such that u : w ≻(i) w M (w). Observe that agent u is matched with the first agent, denoted as x, in the preference list of u such that the pair {u, x} is not marked, and so we infer that {u, w} is marked. Thus, the innermost loop of the algorithm has been run for the pair {u, w} (see Line 11). By Line 8 of Algorithm 1 for all agents u′ where w : u ≻(j) w u′ for some layer j′ ∈ [ℓ], the pair {u′, w} is marked. This includes the pair {M (w), w} since w : u ≻(j) w M (w)-a contradiction to Lemma 4.2. Finally, we obtain that Algorithm 1 computes an ℓ-layer individually stable matching if one exists. Theorem 4.1. For α = ℓ, Algorithm 1 solves INDIVIDUALLY STABLE MARRIAGE in O(ℓ · n2) time. Proof. Let I = (U, W, P1, P2, . . . , Pℓ) with 2 · n agents be the input of Algorithm 1. By Lemma 4.2, no ℓ- layer individually stable matching contains a marked pair. If there is an agent whose preference list consists of only marked agents, then we can immediately conclude that the given instance is a no-instance. Otherwise, Lemma 4.4 proves that the algorithm returns an ℓ-layer individually stable matching. It remains to show that the algorithm terminates and has running time O(ℓ · n2). Since there are in total O(n2) pairs, the algorithm will eventually terminate, either because some agent's preference list consists of only marked agents or because no new new pair will be marked. By using a list that points to the first unmarked agent of each agent u in each layer, and by using a table that stores pairs which are already marked and reconsidered by Line 8, the algorithm needs to "touch" each pair at most twice, once when it is not yet marked and a second time when it is already marked. 4.2 NP-hardness for ℓ-layer global stability and ℓ-layer pair stability In contrast to ℓ-layer individual stability, in this section we show that deciding GLOBALLY STABLE MAR- RIAGE is NP-hard as soon as ℓ = 2. We establish this by reducing the NP-complete 3-SAT problem [26] to the decision variant of GLOBALLY STABLE MARRIAGE. The idea behind this reduction is to introduce for each variable four agents that admit exactly two possible globally stable matchings, one for each truth value. Then, we construct a satisfaction gadget for each clause by introducing six agents. These agents will have three possible globally stable matchings. We use a layer for each literal contained in the clause to enforce that setting the literal to false will exclude exactly one of the three globally stable matchings. Therefore, unless one of the literals in the clause is set to true, no globally stable matching remains. Using the above idea, we can already show hardness of deciding ℓ-layer global stability for ℓ = 3. With some tweaks and using a restricted variant of 3-SAT [26] (see Lemma 4.5), we can strengthen our hardness result to hold even for ℓ = 2. From here on, we call a clause monotone if the contained literals are either all positive or all negative. Lemma 4.5. 3-SAT is NP-hard even if each clause has either two or three literals, and no size-three clause is monotone while all size-two clauses are monotone Proof. We start with a 3-SAT instance and do the following. For each variable xi introduce a helper vari- able zi, and make sure that the helper variable zi is set to false if and only if the original variable xi is set to true. To achieve this, we add to the instance two new clauses (xi ∨ zi) and (xi ∨ zi). Finally, for each original clause (note that it has size three) that contains only positive literals (resp. only negative literals), say xi∨xj ∨xk (resp. xi∨xj ∨xk), we replace an arbitrary literal, say xi (resp. xi), with zi (resp. zi). Observe that in the new instance, each original clause has size three and contains at least one negative and at least one positive literal, and that the newly introduced clauses have size two and are monotone. It is straightforward to see that the original instance is a yes-instance if and only if the new instance is a yes-instance. Now, we are ready to present one of our main results. 13 Theorem 4.2. GLOBALLY STABLE MARRIAGE is NP-hard even if α = ℓ = 2. Proof. We provide a polynomial-time reduction from an NP-complete restricted variant of 3-SAT as given by Lemma 4.5 to the decision version of GLOBALLY STABLE MARRIAGE. Further, without loss of gener- ality we assume that no clause contains two literals of the form x and x as it will be satisfied anyway and can be ignored from the input instance. Let (X, C) be an instance of the aforementioned 3-SAT variant with X = {x1, x2, . . . , xn} being the set of variables and C = {C1, C2, . . . , Cm} being the set of clauses of size at most three each. To unify the expression, for each size-three clause Cj = ℓ1 j we order the literals so that the first literal is positive and the second one is negative. For each size-two clause Cj = ℓ1 j (note that it is monotone), we order the literals arbitrarily, and we call it a positive clause if it contains only positive literals, otherwise we call it a negative clause. j ∨ ℓ2 j ∨ ℓ2 j ∨ ℓ3 For each variable xi ∈ X, we create four variable agents xi, xi, yi, yi (we will make it clear when using xi and xi whether we are referring to the literals or the variable agents). We will construct the preference lists of the variable agents so that each globally stable matching contains either M true := {{xi, yi}, {xi, yi}} or M false will correspond to setting the variable xi to true or false, respectively. := {{xi, yi}, {xi, yi}}. Briefly put, using M true and M false i i i i For each clause Cj ∈ C, we create six clause agents aj, bj, cj, dj, ej, fj . We will construct preference lists for these clause agents so that for each size-three-clause, there are exactly three different ways in which these agents are matched in a globally stable matching, and for each size-two-clause, there are exactly two such ways. We use two layers to enforce that setting a different literal contained in the clause Cj to false excludes exactly one of these ways. In total, we have 4n + 6m agents and we divide them into two groups U and W with U = {xi, xi i ∈ [n]}} ∪ {ai, bi, cj j ∈ [m]} and W = {yi, yi i ∈ [n]} ∪ {dj, ej, fj j ∈ [m]}. Preference lists of the variable agents. The preference lists of the variable agents restricted to the variable agents have the same pattern. We use the symbol "· · · " to denote some arbitrary order of the remaining agents (that is, agents which were not yet explicitly mentioned in the preference list). Layer (1) : ∀i ∈ [n]: Layer (2) : ∀i ∈ [n]: xi : yi ≻ Di ≻ yi ≻ · · · , xi : yi ≻ yi ≻ · · · , yi : xi ≻ Ai ≻ xi ≻ · · · , yi : xi ≻ xi ≻ · · · . xi : yi ≻ yi ≻ · · · , xi : yi ≻ D′ i ≻ yi ≻ · · · , yi : xi ≻ xi ≻ · · · , yi : xi ≻ A′ i ≻ xi ≻ · · · . It remains to specify the meaning of symbols Ai, Di, A′ i, and D′ i. Ai denotes a list (in an arbitrary order) of all clause agents aj that satisfy either of the following conditions: (a) aj corresponds to a size-three-clause Cj such that the second literal of clause Cj (which is a negative literal) is xi, or (b) it corresponds to a negative size-two-clause Cj such that the first literal of clause Cj is xi. Di denotes a list (in an arbitrary order) of all clause agents dj such that the first literal of clause Cj is xi (note that in this case Cj has either three literals or exactly two positive literals). A′ i denotes a list (in an arbitrary order) of all clause agents aj such that the last literal of Cj is xi (note that in this case Cj has either three literals or exactly two positive literals). D′ i denotes a list (in an arbitrary order) of all clause agents dj such that the last literal of Cj is xi (note that in this case Cj has either three literals or exactly two negative literals). 14 To illustrate the above notation, suppose that variable xi appears in four size-three-clauses, call them C1, C2, C3, and C5, and in two size-two-clauses: C4 and C6. The positive literal xi is the first literal in clauses C1, C3, and C4. The negative literal xi is the second literal in C2, and the last literal in C5 and C6. In this case, Ai = a2, Di could be Di = d1 ≻ d3 ≻ d4, A′ i is empty, and D′ i could be D′ i = d5 ≻ d6. Preference lists of the clause agents. The preference lists for the clause agents in the first layer are "fixed" when restricted to the clause agents; they only differ in the positions of variable agents. For a clause Cj and an integer t ∈ {1, 2, 3} let C (t) if Cj has two literals). For a literal ℓi which is xi or xi, by X(ℓi), Y (ℓi), X(ℓi), and Y (ℓi), we denote the variable agents xi, yi, xi, and yi, respectively, all corresponding to variable xi. For instance, for a clause Cj = x2 ∨ x4 ∨ x5, we have that Y (C (1) j denote the t-th literal in Cj (there will be no C (3) ) = y2, and Y (C (2) ) = y4. j j j Layer (1), ∀j ∈ [m]: Cj = 3: ) ≻ fj ≻ · · · , dj : bj ≻ cj ≻ X(C (1) ) ≻ aj ≻ · · · , j aj : dj ≻ ej ≻ Y (C (2) bj : ej ≻ fj ≻ dj ≻ · · · , cj : fj ≻ dj ≻ ej ≻ · · · , j Cj = 2 and Cj is positive: aj : dj ≻ ej ≻ · · · , bj : ej ≻ dj ≻ · · · , cj : fj ≻ · · · , Cj = 2 and Cj is negative: aj : dj ≻ Y (C (1) j ) ≻ ej ≻ · · · , bj : ej ≻ dj ≻ · · · , cj : fj ≻ · · · , ej : cj ≻ aj ≻ bj ≻ · · · , fj : aj ≻ bj ≻ cj ≻ · · · , dj : bj ≻ X(C (1) ej : aj ≻ bj ≻ · · · , fj : cj ≻ · · · , j ) ≻ aj ≻ · · · , dj : bj ≻ aj ≻ · · · , ej : aj ≻ bj ≻ · · · , fj : cj ≻ · · · . The preference lists for the second layer depends on the "positiveness" of the last literal. There are two variants: Layer (2), ∀j ∈ [m] with Cj = 3: Variant 1 (C (3) j is positive) : aj : fj ≻ dj ≻ Y (C (3) j ) ≻ ej ≻ · · · , dj : cj ≻ aj ≻ bj ≻ · · · , bj : dj ≻ ej ≻ fj ≻ · · · , cj : ej ≻ fj ≻ dj ≻ · · · , Variant 2 (C (3) j is negative) : aj : ej ≻ fj ≻ dj ≻ · · · , bj : fj ≻ dj ≻ ej ≻ · · · , cj : dj ≻ ej ≻ fj ≻ · · · , Layer (2), ∀j ∈ [m] with Cj = 2: ej : aj ≻ bj ≻ cj ≻ · · · , fj : bj ≻ cj ≻ aj ≻ · · · , dj : aj ≻ bj ≻ X(C (3) ej : bj ≻ cj ≻ aj ≻ · · · , fj : cj ≻ aj ≻ bj ≻ · · · , j ) ≻ cj ≻ · · · , Variant 1 (Cj is positive) : j aj : dj ≻ Y (C (2) bj : ej ≻ dj · · · , cj : fj ≻ · · · , Variant 2 (Cj is negative) aj : dj ≻ ej ≻ · · · , 15 ) ≻ ej ≻ · · · , dj : bj ≻ aj ≻ · · · , ej : aj ≻ bj · · · , fj : cj ≻ · · · , dj : bj ≻ X(C (2) j ) ≻ aj ≻ · · · , bj : ej ≻ dj · · · , cj : fj ≻ · · · , ej : aj ≻ bj · · · , fj : cj ≻ · · · . This completes the construction which can be done in polynomial time. Before we show the correctness of our construction, we first discuss some properties that each 2-layer globally stable matching M must satisfy. Claim 1. Let M be a 2-layer globally stable matching for our two-layer preference profiles. For each variable xi ∈ X, it holds that either M true i ⊆ M or M false i ⊆ M . Proof. To see this, we distinguish between two cases, depending on whether the partner of xi, M (xi), is yi or not. If M (xi) 6= yi, then by the stability of M for the first layer, it follows that yi prefers its partner M (yi) to xi in the first layer as otherwise xi and yi are forming a blocking pair for the first layer. Since xi is the only agent that yi prefers to xi in this layer, we have that M (yi) = xi. Then, it must hold that M (xi) = yi as otherwise xi and yi would block M in the first layer. Thus, M false i ⊆ M . Similarly, if M (xi) = yi, then by the stability of M and by construction of the preference lists of xi and (of Claim 1) ⋄ yi in the second layer we must have that M (xi) = yi. This leads to M true i ⊆ M . We obtain a similar result for the clause agents. For each clause Cj ∈ C with Cj = 3, let N 1 j = {{aj, ej }, {bj, fj}, {cj , dj}}. j = {{aj , fj}, {bj , dj}, {cj , ej}}, N 3 {{aj, dj }, {bj , ej}, {cj , fj}}, N 2 j = Claim 2. Let Cj ∈ C be a size-three-clause, and let xi be a variable that appears (as either a positive or a negative literal) in Cj . For a 2-layer globally stable matching M the following conditions hold: (i) If xi is the first literal in Cj and if M false (ii) If xi is the second literal in Cj and if M true (iii) If xi is the third literal in Cj and if M false (iv) If xi is the third literal in Cj and if M true i ⊆ M , then either N 2 j ⊆ M or N 3 j ⊆ M . i ⊆ M , then either N 1 i ⊆ M , then either N 1 i ⊆ M , then either N 1 j ⊆ M or N 3 j ⊆ M or N 2 j ⊆ M or N 2 j ⊆ M . j ⊆ M . j ⊆ M . Proof. We consider the four cases separately: i (i) Assume that xi is the first literal in Cj and M false ⊆ M . This implies that {xi, yi} ∈ M . Consider the preference list of xi in the first layer, and observe that dj appears in Di. Since xi prefers dj to its partner yi in the first layer, it follows that dj must obtain a partner that it prefers to xj in the first layer. By the preference list of dj in the first layer, we have that M (dj) ∈ {bj, cj }. If M (dj) = bj, then by the preference list of bj in the first layer it follows that both ej and fj must obtain partners that they find better than bj in the first layer. This means that M (fj) = aj and M (ej) ∈ {aj, cj }, implying that M (ej ) = cj . Analogously, if M (dj) = cj , then {aj, ej} ∈ M as otherwise they will block the first layer since the most preferred agents of both aj and ej are already assigned to someone else, and aj and ej are each other's second most preferred agents. Then, bj must obtain a partner that it prefers to dj . Since fj is the only agent left that bj prefers to dj, we get that M (bj) = fj, and so N 3 j ⊆ M . (ii) Assume that xi is the second literal in Cj and M true i ⊆ M (thus, in particular, {xi, yi} ∈ M ). Since aj appears in Ai in the preference list of yi in the first layer, we infer that yi prefers aj to its partner xi in the first layer. Thus, it follows that aj must obtain a partner that it prefers to yi in the first layer, i.e. that M (aj) ∈ {dj, ej }. If M (aj) = dj , then by considering the preference list of dj in the first layer we infer that both bj and cj obtain partners that they find better than dj in the first layer. This means that M (cj) = fj , and M (bj) ∈ {ej, fj}. Since fj is taken by cj , we get that M (bj) = ej . Together, we have that N 1 Analogously, if M (aj) = ej , then {bj, fj} ∈ M as otherwise they would block the first layer since the most preferred agents of both bj and fj are already assigned to someone else, and bj and fj are each other's second most preferred agent. Moreover, cj must obtain a partner that it prefers to ej . Since dj is the only agent left that cj prefers to ej , we obtain that M (cj ) = dj . This leads to N 3 j ⊆ M . j ⊆ M . 16 (iii) Assume that xi is the third literal in Cj and M false i ⊆ M . Observe that in this case aj appears in A′ i in the preference list of yi in the second layer, and since {xi, yi} ∈ M , that yi prefers aj to its partner xi in the second layer. It follows that aj must obtain a partner that it prefers to yj in the second layer. By investigating the preference list of aj in the second layer (note that we are in Variant 1), we have that M (aj) ∈ {fj, dj }. If M (aj) = fj, then by looking at the preference list of fj in the second layer we infer that both bj and cj must obtain partners that they find better than fj in the second layer. Thus M (cj) = ej , and consequently, M (bj) = dj . Summarizing, in this case we have that N 2 Analogously, if M (aj) = dj , then {bj, ej} ∈ M as otherwise they would block the second layer. Moreover, fj must obtain a partner that it prefers to aj . Since cj is the only agent left that fj prefers to aj , we obtain that M (cj ) = fj. This leads to N 1 j ⊆ M . j ⊆ M . (iv) Finally, assume that xi is the third literal in Cj and M true i ⊆ M . In this case, we have that dj appears in D′ i in the preference list of xi in the second layer, and that {xi, yi} ∈ M . This means that xi prefers dj to its partner yi in the second layer, and so it must be the case that dj obtains a partner that it prefers to xj in the second layer. As a result, we have that M (dj) ∈ {aj, bj}. If M (dj) = aj , then the preference list of aj indicates that both ej and fj must obtain partners that they find better than aj in the second layer. Thus, M (fj) = cj , and M (ej) ∈ {bj, cj}. Consequently, M (ej ) = bj, and we get that N 1 j ⊆ M . Finally, if M (dj) = bj , then {cj, ej} ∈ M as otherwise they would block the second layer. Further, aj must obtain a partner that it prefers to dj , thus M (aj) = fj. Consequently, N 2 j ⊆ M . (of Claim 2) ⋄ For each clause Cj ∈ C with Cj = 2, let N 1 j = {{aj , dj}, {bj , ej}}, N 2 j = {{aj, ej }, {bj , dj}}. Claim 3. Let Cj ∈ C be a size-two-clause, and let xi be a variable that appears (as either a positive or a negative literal) in Cj . Assume that M is a 2-layer globally stable matching. The following holds: (i) If xi is the first literal in Cj and if M false (ii) If xi is the last literal in Cj and if M true (iii) If xi is the last literal in Cj and if M false (iv) If xi is the first literal in Cj and if M true i ⊆ M , then N 2 i ⊆ M , then N 2 i ⊆ M , then N 1 i ⊆ M , then N 1 j ⊆ M . j ⊆ M . j ⊆ M . j ⊆ M . Proof. We show the first two statements together and the last two statements together. Assume that one of the conditions in the first two statements holds, that is, 1. xi is the first literal in Cj and M false 2. xi is the last literal in Cj and M true i ⊆ M , or i ⊆ M . This implies that 1. either {xi, yi} ∈ M , and in the first layer the list Di contains dj, or 2. {xi, yi} ∈ M , and in the second layer the list D′ i contains dj and we are in Variant 2. Since xi prefers all agents from Di to yi in the first layer and xi prefers all agents from D′ i to yi in the second layer, we must have that dj obtains a partner that it prefers to xi in the first layer or to xi in Variant 2 of the second layer. In either case, bj is the only agent that fulfills the requirement, implying that {bj, dj } ∈ M . By looking at the preference lists of bj and ej in the first layer, we derive that {aj, ej} ∈ M . Thus, N 2 j ⊆ M . Analogously, assume that one of the conditions in the last two statements holds, that is, 1. xi is the last literal in Cj and M false 2. xi is the first literal in Cj and M true i ⊆ M , or i ⊆ M . This implies that 1. {xi, yi} ∈ M , and in the second layer we have Variant 1 such that the list A′ 2. {xi, yi} ∈ M , and in the first layer the list Ai contains aj. i contains aj, or Since yi prefers all agents from A′ i to xi in the second layer and yi prefers all agents from Ai to xi in the first layer, we must have that aj obtains a partner that it prefers to yi in the second layer (Variant 1) 17 or to yi in the first layer. In either case, dj is the only agent that fulfills the requirement, implying that {aj, dj} ∈ M . By the preference lists of dj and bj in the first layer, we further derive that {bj, ej } ∈ M . Thus, N 1 (of Claim 3) ⋄ j ⊆ M . Now, we are ready to show that (X, C) admits a satisfying truth assignment if and only if there exists a 2-layer globally stable matching for the so-constructed instance. (⇒) For the "only if" direction, assume that σ : X → {T, F } is a satisfying truth assignment for (X, C). We claim that the matching M constructed as follows is all-layer globally stable. (1) For each variable xi ∈ X with σ(xi) = T , let M true i ⊆ M . (2) For each size-three-clause Cj , identify a literal ℓj such that σ(ℓj) makes Cj satisfied. If ℓj is Cj's first i ⊆ M ; otherwise let M false literal, then let N 1 j ⊆ M . If ℓj is the second literal, then let N 2 j ⊆ M . Otherwise let N 3 j ⊆ M . (3) For each size-two-clause Cj , let {cj, fj} ∈ M . Identify a literal ℓj such that σ(ℓj) makes Cj satisfied. j ⊆ M ; otherwise let N 2 If ℓj is the first literal in Cj , then let N 1 Towards a contradiction suppose that M is not 2-layer globally stable, and let p = {u, w} be a possible blocking pair with u ∈ U and w ∈ W . First, we observe that p involves neither two variable agents that correspond to different variables nor two clause agents that correspond to different clauses. Second, p does not involve two variable agents that belong to the same variable since for each layer and for each two variable agents that correspond to the same variable, exactly one of both is already matched to its most preferred agent. Third, p also does not involve two clause agents that belong to the same size-two-clause as either of such clause agents is already matched with its most preferred agent. j ⊆ M . Next, consider the case that u and w are two clause agents that belong to the same size-three-clause, say Cj . If {u, w} is blocking M in the first layer, then we know that N 3 j ⊆ M as otherwise either u or w already obtains its most preferred agent. But then {u, w} cannot be blocking M in the first layer as for each agent w′ that is preferred to M (u) by u in the first layer, we have that w′ prefers M (w′) to u in the first layer. Similarly, if {u, w} is blocking M in the second layer with Variant 1 (resp. Variant 2), then we know that N 1 j ⊆ M ) as otherwise either u or w already obtains its most preferred agent. Since for each agent w′ such that u prefers w′ to M (u) in the second layer we have that w′ prefers M (w′) to u, it follows that {u, w} cannot be blocking the second layer. j ⊆ M (resp. N 2 Now, suppose that p involves a variable agent and a clause agent. By the construction of the preference lists, we can assume that the clause agent involved in the blocking pair p is either an aj or a dj for some j ∈ [m]. We distinguish between two cases, depending on the size of Cj. Case 1: Cj = 3. If aj ∈ p and p is blocking the first layer, then by the preference list of aj in the first layer, we have that N 2 j ⊆ M . By the construction of the matching M , we have that the truth assignment of the second literal, say xi, in Cj makes Cj satisfied; note that by our convention, the second literal is always negative. This implies that M false i ⊆ M . Since p involves aj and is blocking the first layer, it follows that the agent yi that corresponds to variable xi prefers ai to M (yi) in the first layer. This means that M true i ⊆ M , a contradiction. Analogously, if aj ∈ p and p is blocking the second layer, then by the preference list of aj in the second layer, we have that the preference list of aj comes from Variant 1 and N 3 j ⊆ M . By the construction of the matching M , we have that the truth assignment of the third literal which is positive in Cj (recall that Variant 1 was used) makes Cj satisfied. Let this literal be xi. Then, it must hold that M true i ⊆ M . Since p involves aj and is blocking the second layer (due to Variant 1), it follows that the agent yi that corresponds to variable xi prefers aj to M (yi) in the second layer. This means that M false ⊆ M , which results in a contradiction. i If dj ∈ p and p is blocking the first layer, then by the preference list of dj in the first layer, we have that N 1 j ⊆ M . By the construction of the matching M , we have that the truth assignment of the first literal, say xi, in Cj makes Cj satisfied; note that by convention, the first literal is always positive. This implies that M true i ⊆ M . Since p involves dj and is blocking the first layer, it follows that the agent xi that corresponds 18 to variable xi prefers dj to M (xi) in the first layer. By the preference list of xi in the first layer, it follows that M false i ⊆ M , which also yields a contradiction. Finally, if dj ∈ p and p is blocking the second layer, then by the preference list of dj in the second layer, we have that the preference list of dj comes from Variant 2 and N 3 j ⊆ M . By the construction of the matching M , we have that the truth assignment of the third literal which is negative in Cj makes Cj satisfied. Denote this literal by xi. Then, it follows that M false i ⊆ M . Since p involves dj and is blocking the second layer (due to Variant 2), it follows that the agent xi that corresponds to variable xi in Cj prefers dj to M (xi) in the second layer. By the preference list of xi in the first layer, this means that M true i ⊆ M , which is a contradiction. Case 2: Cj = 2. If aj ∈ p, then by the preference lists of aj in any of the two layers, we have that N 2 j ⊆ M . Hence, the second literal in Cj makes it satisfied. We distinguish between two cases. If the second literal in Cj is positive, say xi, then M true i ⊆ M and the other involved agent in p must be either yi or yi. Since yi prefers its partner xi to aj in both layers, it follows that yi is the other involved agent. However, by the preference list of yi in the first layer, Ai does not contain aj , meaning that yi also prefers its partner xi to aj in both layers, which is a contradiction to p being a blocking pair. If the second literal in Cj is negative, say xi, then M false ⊆ M and our reasoning is very similar. First we infer that the other involved agent in p must be either yi or yi. Since yi prefers its partner xi to aj in both layers, it follows that the other agent in p is yi. However, by the preference list of yi in the second layer, A′ i does not contain aj , which means that yi prefers its partner to aj in both layers. Thus, in this case we also get a contradiction. i If dj ∈ p, then our reasoning is very similar. First, by looking at the preference lists of dj in any of the two layers, we infer that N 1 j ⊆ M . By the construction of the matching M , we get that the first literal in Cj makes it satisfied. We consider two cases. If this literal is positive, say xi, then M true i ⊆ M and the other involved agent in p must be either xi or xi. Agent xi prefers its partner yi to dj in both layers and so it cannot be involved in the blocking pair. Thus, xi is the other involved agent. However, by the preference list of xi in the first layer, D′ i does not contain dj, meaning that xi also prefers its partner yi to dj in both layers, a contradiction to p being a blocking pair. If the first literal in Cj is negative, say xi, then M false ⊆ M and the other involved agent in p must be either xi or xi. Since xi prefers its partner yi to dj in both layers, it follows that xi is the other involved agent. However, by the preference list of xi in the last layer, Di does not contain dj, meaning that xi prefers its partner yi to dj in both layers, which is again a contradiction. i (⇐) For the "if" direction, let M be a 2-layer globally stable matching. We construct a truth assign- ment σ as follows. For each variable agent xi, if M true i ⊆ M , then let σ(xi) = T ; otherwise by Claim 1 we have that M false ⊆ M , and let σ(xi) = F . Suppose, towards a contradiction, that σ is not a satisfying assignment and let Cj be a clause where none of the literals is evaluated to true. We distinguish between two cases. i Case 1: Cj = 3. Let xr, xs, and ℓt be the first, second, and the third literal in Cj. Since none of these literals is evaluated to true, it follows that M false s ⊆ M . By statements (i) and (ii) in Claim 2, we must have that N 3 j ⊆ M . However, by the statements (iii) and (iv) in Claim 2, applied for ℓt, we must have that either N 1 Case 2: Cj = 2. Let the first and the second literals in Cj correspond to variables xi and xk, respectively. If Cj is positive, then since Cj is not satisfied, we have that M false k ⊆ M . By Claim 3, we have that both N 1 j must belong to M , which leads to a contradiction. j ⊆ M , a contradiction. j ⊆ M or N 2 j and N 2 , M false , M true r i Analogously, if Cj is negative, then since Cj is not satisfied, we have that M true , M true k ⊆ M . By i Claim 3, we have that both N 1 j and N 2 j must belong to M , a contradiction. Altogether, we showed that the constructed matching is globally stable for two layers. This concludes the proof of Theorem 4.2. 19 Since ℓ-layer global stability equals ℓ-layer pair stability (Proposition 3.4), by Theorem 4.2 we obtain the following corollary for the pair stability. Corollary 4.3. PAIR STABLE MARRIAGE is NP-hard even if α = ℓ = 2. By adding to the profile constructed in the proof of Theorem 4.2 an arbitrary number of layers with preferences that are stable anyway, we can deduce hardness for arbitrary α = ℓ ≥ 2. Proposition 4.4. For each α = ℓ ≥ 2, both GLOBALLY STABLE MARRIAGE and PAIR STABLE MAR- RIAGE are NP-hard. Proof. We add to the profile constructed in the proof of Theorem 4.2 ℓ − 2 layers with preferences of the following form: Layers (3)–(ℓ),∀i ∈ [n] : ∀j ∈ [m] : xi : yi ≻ yi ≻ · · · , xi : yi ≻ yi ≻ · · · , aj : dj ≻ ej ≻ fj ≻ · · · , bj : ej ≻ fj ≻ dj ≻ · · · , cj : fj ≻ dj ≻ ej ≻ · · · , yi : xi ≻ xi ≻ · · · , yi : xi ≻ xi ≻ · · · . dj : bj ≻ cj ≻ aj ≻ · · · , ej : cj ≻ aj ≻ bj ≻ · · · , fj : aj ≻ bj ≻ cj ≻ · · · . It is straightforward that a matching is ℓ-layer globally stable if and only if it is 2-layer globally stable for the first two layers. 5 Multi-Layer Stable Marriage with α < ℓ In this section we show that for each of the three concepts that we introduced in Section 2 the problem of computing a multi-layer stable matching is computationally hard as soon as 2 ≤ α < ℓ. 5.1 NP-hardness for α-layer global stability To find a matching M that is α-layer globally stable, even if α < ℓ, the main difficulty is not just to determine α layers where M should be stable. In fact, we sometimes need to find a matching that is stable in some specific layers. This requirement allows us to adapt the construction in the proof of Theorem 4.2 to show hardness for deciding α-layer global stability for the case when 2 ≤ α < ℓ. Proposition 5.1. For each fixed number α with α ≥ 2, GLOBALLY STABLE MARRIAGE is NP-hard. Proof. To prove the NP-hardness, we adapt the reduction in the proof of Theorem 4.2 which shows that deciding α-layer global stability for α = ℓ = 2 is NP-hard. Let P be the constructed two-layer instance in the proof of Theorem 4.2. Besides the original agents from P, we introduce two sets U and W of dummy agents with U = W = 2·(ℓ−α+1), where U = {u1, u2, . . . , uℓ−α+1} and W = {w1, w2, . . . , wℓ−α+1}. The idea of introducing such dummy agents is to make sure that each α-layer globally stable matching must include all pairs {uj, wj}, j ∈ [ℓ − α + 1]. However, this is the case only when such matching is stable in the two layers constructed in the NP-hardness proof of Theorem 4.2; we denote these two layers as layers (1) and (2). In the following, we use "· · · " to denote an arbitrary order of the unmentioned agents. Preferences of the original agents. The preferences of the original agents in the first two layers are the same as in P in the proof of Theorem 4.2. For each other layer, the preferences of the original agents are as follows. Layers (3)–(ℓ),∀i ∈ [n] : xi : yi ≻ yi ≻ · · · , yi : xi ≻ xi ≻ · · · , 20 ∀j ∈ [m] : xi : yi ≻ yi ≻ · · · , aj : dj ≻ ej ≻ fj ≻ · · · , bj : ej ≻ fj ≻ dj ≻ · · · , cj : fj ≻ dj ≻ ej ≻ · · · , yi : xi ≻ xi ≻ · · · . dj : bj ≻ cj ≻ aj ≻ · · · , ej : cj ≻ aj ≻ bj ≻ · · · , fj : aj ≻ bj ≻ cj ≻ · · · . Preferences of the dummy agents. The preferences of the dummy agents are as follows; let ℓ = ℓ−α+1: Layers (1)–(α), ∀j ∈ [ℓ] : Layer (i + α), 1 ≤ i ≤ ℓ − 1, ∀j ∈ [ℓ] : uj : wj ≻ · · · , uj : w(j mod ℓ)+i ≻ · · · , wj : uj ≻ · · · , wj : u(j−1 mod ℓ)+i ≻ · · · . Observe that each dummy agent obtains a different partner in different layers with indices higher than α. More precisely, for each layer (i + α) with 1 ≤ α ≤ ℓ − 1, the only stable matching in this layer must include Mi = {{uj, w(j mod ℓ)+1} 1 ≤ j ≤ ℓ}} since uj and w(j mod ℓ)+1 are each other's most preferred agent. Moreover, by the same reasoning, each layer with index at most α admits exactly the same stable matching regarding the dummy agents which is different from any layer with index higher than α, namely M0 = {{uj , wj} 1 ≤ j ≤ ℓ}. For each two distinct values i, j ∈ {0, 1, . . . , ℓ − 1}, however, we have that Mi ∩ Mj = ∅. This means that each α-layer globally stable matching must include M0 and must be stable in the first α layers, including the first two layers. Now, it is straightforward to see that a matching M is 2-layer globally stable for P if and only if M ∪M0 is α-layer globally stable for our new instance. We remark that our proof for Proposition 5.1 also implies hardness for α = ℓ for arbitrary ℓ ≥ 2. 5.2 NP-hardness for α-layer individual stability For α-layer individual stability, we also obtain a hardness result by reducing from the NP-hard PERFECT SMTI problem, the problem of finding a perfect SMTI-stable matching with (possibly) incomplete prefer- ence lists and ties [32, 38] which is defined as follows. A preference list is incomplete if not all agents from one side are considered acceptable to an agent from the other side. A preference list has a tie if there are two agents in the list which are considered to be equally good. As a result, a preference list of an agent u from one side can be considered as a weak (i.e. transitive and complete) order (cid:23)u on a subset of the agents on the other side. We use ≻u and ∼u to denote the asymmetric and symmetric part of the preference list, respectively. Equivalently, two agents x and y are said to be tied by u if x (cid:23)u y and y (cid:23)u x, denoted as x ∼u y. Formally, we say that a matching M for a PERFECT SMTI with two disjoints sets U and W of agents is SMTI-stable if there are no SMTI-blocking pairs for M . A pair {u, w} is SMTI-blocking M if all of the following three conditions are satisfied: (i) u and w appear in the preference lists of each other, (ii) w ≻u M (u) or u is not matched to any agent from W , and (iii) u ≻w M (w) or w is not matched to any agent from U . The reduction is based on the following ideas: In a PERFECT SMTI instance I the preference list of an agent z may have ties. To encode ties, we first "linearize" the preference list of z in I to obtain two linear preference lists such that the resulting lists restricted to the tied agents are reverse to each other. Then, we let half of the ℓ layers have one of the preference lists and let the remaining half to have the other list. Since α < ℓ/2, it is always possible to find half layers which fulfill our α-layer individual stability constraint. In I, two agents, say x and y, may not be acceptable to each other. To encode this, we introduce to the source instance ℓ pairs of dummy agents with ℓ layers of preferences that preclude x and y from being matched together. However, to make sure that an agent x is not matched to any dummy agent, we have to require that ℓ ≥ 4. 21 Theorem 5.2. For each fixed number ℓ of layers with ℓ ≥ 4 and for each fixed value α with 2 ≤ α ≤ ⌊ℓ/2⌋, INDIVIDUALLY STABLE MARRIAGE is NP-hard, even if on one side, the preference list of each agent is the same in all layers. Proof. Assume that ℓ ≥ 4 and that 2 ≤ α ≤ ⌊ℓ/2⌋. We give a polynomial-time reduction from the NP-hard PERFECT SMTI problem [32, 38]. Let I be an instance of PERFECT SMTI. In I we are given two disjoint sets of agents, U and W , with U = W = n; each agent u ∈ U is endowed with a weak order (cid:23)u on a subset of W . By the SMTI- stability, an agent u prefers not to be assigned to any agent rather than to be assigned to an agent outside of its preference list. We assume that ties occur in the preferences of the agents from the side U only, that there is at most one tie per list, and each tie is of length two as this variant remains NP-hard [38, Theorem 2.2]. From I we construct an instance I ′ of the problem of finding an α-layer individually stable matching in the following way. We copy the sets of agents U and W ; further, we introduce a set of 2ℓ · n dummy agents P ∪ R with P = R = ℓ · n. We denote the elements in these sets as: P = {pi,j 1 ≤ i ≤ n ∧ 1 ≤ j ≤ ℓ} and R = {ri,j 1 ≤ i ≤ n ∧ 1 ≤ j ≤ ℓ}. One side of the bipartite "acceptability graph" will consist of the agents from U ∪ P , and the other side of the agents from W ∪ R. We construct the preference orders of the agents as follows: Agents from U . Consider an agent u ∈ U , and let Lu denote its preference list in I. In I ′ we construct the preference list of u from Lu as follows. We iterate over Lu starting from the top position. If agent u prefers x over y, then we assume that u also prefers x over y in all layers in I ′. If x and y are tied in Lu, then we assume that u prefers x over y in the first ⌈ℓ/2⌉ layers and y over x in the remaining ⌊ℓ/2⌋ layers (or the other way around). The remaining parts of the preference orders of u are constructed as follows: first, let us assume that u = ui ∈ U . Right after all agents from Lu, agent u puts in all layers ri,1, ri,2, . . . , ri,ℓ, respectively in the following orders: (1) ri,1 ≻ ri,2 ≻ . . . ≻ ri,ℓ, (2) ri,2 ≻ ri,3 ≻ . . . ≻ ri,ℓ ≻ ri,1, and so on, until (ℓ) ri,ℓ ≻ ri,1 ≻ ri,2 ≻ . . . ≻ ri,ℓ−1. Next, u puts all the remaining agents in an arbitrary order. For example, if ℓ = 5 and Lu is equal to w1 ≻ w4 ≻ w3 ∼ w5, then the preference lists of u in the five layers will be as follows, where "· · · " denotes some arbitrary but fixed order of the remaining agents. Layer (1) : agent ui : w1 ≻ w4 ≻ w3 ≻ w5 ≻ ri,1 ≻ ri,2 ≻ ri,3 ≻ ri,4 ≻ ri,5 ≻ · · · , Layer (2) : agent ui : w1 ≻ w4 ≻ w3 ≻ w5 ≻ ri,2 ≻ ri,3 ≻ ri,4 ≻ ri,5 ≻ ri,1 ≻ · · · , Layer (3) : agent ui : w1 ≻ w4 ≻ w3 ≻ w5 ≻ ri,3 ≻ ri,4 ≻ ri,5 ≻ ri,1 ≻ ri,2 ≻ · · · , Layer (4) : agent ui : w1 ≻ w4 ≻ w5 ≻ w3 ≻ ri,4 ≻ rr,5 ≻ ri,1 ≻ ri,2 ≻ ri,3 ≻ · · · , Layer (5) : agent ui : w1 ≻ w4 ≻ w5 ≻ w3 ≻ rr,5 ≻ ri,1 ≻ ri,2 ≻ ri,3 ≻ ri,4 ≻ · · · . Observe that in the first three layers w3 is preferred to w5 and in the remaining layers w5 is preferred to w3. Agents from W . For each agent wi from W , we recall that the preferences of wi in I do not have ties (that was one of the assumptions in the problem we reduce from). Let Lwi denote the preference list of wi. The preferences of wi in I ′ are the same in all layers, where the second "· · · " denotes some arbitrary but fixed order of the remaining agents. Layers (1)-(ℓ) : agent wi : Lwi ≻ pi,1 ≻ pi,2 ≻ · · · ≻ pi,ℓ ≻ · · · . Agents from P ∪ R. Consider pi,j ∈ P : this agent ranks wi first, next ri,j, and next all the remaining agents in some arbitrary order: Layers (1)-(ℓ) : agent pi,j : wi ≻ ri,j ≻ · · · . 22 The preferences of an agent from ri,j ∈ R are constructed analogously: Layers (1)-(ℓ) : agent ri,j : ui ≻ pi,j ≻ · · · . This completes the description of the construction of instance I ′. Obviously, the preferences of each agent from W ∪ R are the same in all layers. Now, we will show that there exists a perfect SMTI-stable matching in I if and only if there exists an α-layer individually stable matching in I ′. For the "only if" direction, assume that the instance I has a perfect SMTI-stable matching M . We claim that M ′ = M ∪ (cid:8){ri,j, pi,j} 1 ≤ i ≤ n ∧ 1 ≤ j ≤ ℓ(cid:9) is α-layer individually stable for I ′. First, M ′ is a perfect matching for I ′ as M is a perfect matching for I. Second, observe that no two agents from R ∪ P are blocking M ′ as for each agent a in R ∪ P it prefers its partner M ′(a) to every other agent in R ∪ P in all layers. Third, no agent from U ∪ W can form a blocking pair with an agent from R ∪ P for the matching M ′ as each agent a from U ∪ W prefers its partner M ′(a) = M (a) ∈ La to every other agent in R ∪ P in all layers. Now, consider two arbitrary agents u and w with u ∈ U and w ∈ W such that {u, w} is unmatched. We show that we can always find a set S of ⌊ℓ⌋ ≥ α layers such that M ′(u) ≻u w in each layer from S or M ′(w) ≻w u in each layer from S. We can assume that u and w are acceptable to each other in I as otherwise both u and w prefer to be with their respective partner M ′(u) and M ′(w) rather than with each other in all layers. Let us consider the following cases; note that the preference list of w does not have ties and remains the same in all layers. Case 1: u ≻w M ′(w) = M (w). By the stability of M we have that M ′(u) = M (u) (cid:23)u w in in- stance I. For the case that M ′(u) and w tied by u we can identify ⌊ℓ/2⌋ layers, either the first ⌊ℓ/2⌋ layers or the last ⌊ℓ/2⌋ layers where u prefers M ′(u) to w. For the case that M ′(u) ≻u w we have that u prefers M ′(u) to w in all layers. Case 2: M ′(w) ≻w u. In this case we know that w prefers M ′(w) to u in all layers. For the "if" direction, assume that M ′ is an α-layer individually stable matching for I ′. First, observe that no agent ui ∈ U can be matched with an agent that it ranks lower than any agent from {ri,j 1 ≤ j ≤ ℓ} in any layer. Indeed, for such matching each pair {ui, ri,j}, with j ∈ [ℓ], would be blocking M ′ in all layers. Similarly, ui cannot be matched with ri,j for j ∈ [ℓ] as the pair {ui, ri,(j+ℓ−2 mod ℓ)+1} would be blocking M ′ in exactly ℓ−1 layers, namely those layers other than the jth layer, which are more than ℓ−α layers. For instance, if ui was matched with ri,1, then {ui, ri,ℓ} would be blocking the 2nd, 3rd, . . . , ℓth layers; if ui was matched with ri,2, then (ui, ri,1) would be blocking the 1st, 3rd, 4th, . . . , ℓth layers, etc. Thus, each agent u from U must be matched with someone from Lu, where Lu is the preference list of u in I. Consequently, no agent in W is matched with an agent in P as otherwise, by the pigeonhole principle, some agent in U must be matched with an agent in R which is not possible by our reasoning above. Also, by a similar reasoning we deduce that each agent w from W must be matched with someone from Lw, where Lw is the preference list of w in I. Now, we show that M = {{u, w} ∈ M ′ u, w ∈ U ∪ W } is a perfect SMTI-stable matching for I. Since M ′ is a perfect matching in I ′, by the reasoning above, it follows that M is a perfect matching in I. Suppose, for the sake of contradiction, that there is an unmatched pair {x, y} /∈ M that is SMTI-blocking M . This means that x and y are acceptable to each other, and that y ≻x M (x) = M ′(x) and x ≻y M (y) = M ′(y) in I. By the preference lists of x and y in I ′ and by the definition of M , it follows that in each layer x prefers y to M ′(x) and y prefers x to M ′(y)-a contradiction to M ′ being α-layer individually stable since α > 2. 5.3 NP-hardness of α-layer pair stability We note that in the instance constructed in the proof of Theorem 5.2 every agent from the side W ∪R has the same preference list in all layers. Later on, in Proposition 6.1 we will show that in such a case the concepts 23 of α-layer individual stability and α-layer pair stability are equivalent, Thus, we obtain the same hardness result for pair stability when α ≤ ⌊ℓ/2⌋. Corollary 5.3. For each fixed number ℓ of layers with ℓ ≥ 4 and for each fixed value α with 2 ≤ α ≤ ⌊ℓ/2⌋, PAIR STABLE MARRIAGE is NP-hard even if on one side the preference list of each agent is the same in all layers. For α > ⌈ℓ/2⌉, we use an idea similar to the one used for showing Proposition 5.1. Proposition 5.4. For each fixed number α with ⌈ℓ/2⌉ + 1 ≤ α ≤ ℓ, PAIR STABLE MARRIAGE is NP-hard. Proof. Assume that α ≥ ⌈ℓ/2⌉ + 1. To prove the NP-hardness, we slightly adapt the reduction in the proof of Theorem 4.2 which shows that deciding α-layer global stability is NP-hard for α = ℓ = 2. Let P be the two-layer instance constructed in the proof of Theorem 4.2. The idea is to copy ℓ/2 times profile P and make sure that an α-layer pair stable matching must be stable in the two layers of the original profile. For the preference lists in the ℓ layers, we do the following; let k = ⌊ℓ/2⌋. 1. We make k copies of the profile P. 2. If ℓ is odd, then we add an ℓth layer with the following preference lists: Layer (ℓ),∀i ∈ [n] : ∀j ∈ [m] : xi : yi ≻ yi ≻ · · · , xi : yi ≻ yi ≻ · · · , aj : dj ≻ ej ≻ fj ≻ · · · , bj : ej ≻ fj ≻ dj ≻ · · · , cj : fj ≻ dj ≻ ej ≻ · · · , yi : xi ≻ xi ≻ · · · , yi : xi ≻ xi ≻ · · · . dj : bj ≻ cj ≻ aj ≻ · · · , ej : cj ≻ aj ≻ bj ≻ · · · , fj : aj ≻ bj ≻ cj ≻ · · · . This completes the construction, which can clearly be done in polynomial time. We claim that profile P with two layers has a 2-layer globally stable matching if and only if the new profile with ℓ layers has an α-layer pair stable matching. For the "only if" direction, it is straightforward to see that each 2-layer globally stable matching for P is ℓ-layer globally stable for the new profile. By Proposition 3.1, M is also ℓ-layer pair stable for the new instance. For the "if" direction, assume that M is an α-layer pair stable matching for the new instance with ℓ layers. We claim that M is 2-layer globally stable for instance P. First, for each unmatched pair {u, w} /∈ M , let Sunblock({u, v}) be the set that consists of all layers that are not blocked by {u, w}: Sunblock({u, v}) := {i ∈ [ℓ] M (u) ≻(i) w u}. Since M is α-layer pair stable it follows that Sunblock({u, v}) ≥ α ≥ ⌈ℓ/2⌉ + 1; the last inequality holds by our assumption on the value of α. We claim that Sunblock({u, v}) contains at least k + 1 layers from the first 2 · k layers. If ℓ is odd, then ⌈ℓ/2⌉ + 1 = k + 2, and the claim follows; otherwise ℓ = 2k and ⌈ℓ/2⌉ + 1 = k + 1, implying our claim. Since the first 2k layers are k copies of the two layers from P, we can assume without loss of generality that Sunblock({u, v}) contains at least the first k + 1 layers. Now, it is obvious that T{u,v} /∈M Sunblock({u, v}) contains at least the first two layers. This implies that no unmatched pair is blocking the first two layers, and hence that M is 2-layer globally stable for the instance P. u w or M (w) ≻(i) Corollary 5.3 and Proposition 5.4 cover the whole range of the potential values of α except for α = ⌊ℓ/2⌋ + 1 when ℓ is odd. As we will see in the next section Theorem 5.2 cannot be strengthened to cover the value α = ⌊ℓ/2⌋ + 1 (see Proposition 6.3), and so, also Corollary 5.3 cannot be directly strength- ened. However, we can tweak the construction from Theorem 5.2, breaking the restriction that on one side the preference list of each agent is the same in all layers, and obtain hardness for α-layer pair stability for α = ⌊ℓ/2⌋ + 1. Proposition 5.5. For each fixed odd number ℓ of layers with ℓ ≥ 5 and for the case when α = ⌊ℓ/2⌋ + 1, PAIR STABLE MARRIAGE is NP-hard. 24 Proof. We provide a reduction from an instance I of the NP-hard PERFECT SMTI problem which is very similar to the reduction given in the proof of Theorem 5.2. Consequently, instead of describing the new reduction from scratch, we will only explain how it differs from the one from the proof of Theorem 5.2. For each agent wi ∈ W in the proof of Theorem 5.2, the preference list of wi was the same in all layers. Now, in the last ℓ − 1 layers this list is constructed in exactly the same way as in the proof of Theorem 5.2. However, in the first layer we set the first part of the list to be reversed in comparison to the remaining (ℓ − 1) layers; ←−− Lwi be the reverse of the strict preference list of w in the input instance of PERFECT SMTI and let the let second "· · · " denote some arbitrary but fixed order of the remaining agents: Layer (1) : agent wi : ←−− Lwi ≻ pi,1 ≻ pi,2 ≻ · · · ≻ pi,ℓ ≻ · · · . The preference lists of all other agents are constructed in exactly the same way as in the proof of Theorem 5.2. We prove that I admits a perfect SMTI-stable matching if and only if the constructed in- stance I ′ with ℓ layers admits an α-layer pair stable matching with α = ⌊ℓ/2⌋ + 1. For the "only if" direction, assume that M is a perfect SMTI-stable matching for I and consider match- ing M ′ = M ∪ (cid:8){ri,j, pi,j} 1 ≤ i ≤ n ∧ 1 ≤ j ≤ ℓ(cid:9). We will show that M ′ is α-layer pair stable for I ′. First of all, just as in the proof of Theorem 5.2 we deduce that no agent from P ∪ R and no agent from U ∪ W will form a blocking pair. Neither will any two agents that are not acceptable to each other in I form a blocking pair. Now, consider two arbitrary agents u and w with u ∈ U and w ∈ W that are acceptable to each other in I. We need to find a subset of ⌊ℓ/2⌋ + 1 layers, where in each layer in the subset u prefers M ′(u) to w or w prefers M ′(w) to u . We distinguish between two cases concerning the preference list of w in I; note that it does not have ties: Case 1: u ≻w M ′(w) = M (w) in I. This implies that w prefers M ′(w) to u in the first layer in I ′. Thus, it suffices if we can find ⌊ℓ/2⌋ layers in the last ℓ − 1 layers, where u prefers M ′(u) to w. By the stability of M we have that M ′(u) = M (u) (cid:23)u w in instance I. For the case that M ′(u) ≻u w in I we have that u prefers M ′(u) to w in all layers. For the case that M ′(u) and w are tied by u we can identify ⌊ℓ/2⌋ layers, either the layers from 2 to ⌊ℓ/2⌋ + 1 or the layers from ⌊ℓ/2⌋ + 2 to ℓ, where u prefers M ′(u) to w. Additionally, in the first layer w prefers M (w) to u, which gives in total the subset of ⌊ℓ/2⌋ + 1 layers. Case 2: M ′(w) ≻w u. In this case we know that w prefers M ′(w) to u in the last ℓ − 1 layers. For the "if" direction, assume that M ′ is an α-layer pair stable matching for I ′. By the same reasoning as in the proof of Theorem 5.2 we deduce that each agent u ∈ U must be matched with someone that it prefers to each agent from R in each layer, and that w ∈ W must be matched with an agent that it prefers to each agent from P in all layers. Thus, u and M ′(u) (resp. w and M ′(w)) must be acceptable to each other in I, meaning that M = {{u, w} ∈ M ′ u ∈ U, w ∈ W } is a perfect matching for I. We show that M is SMTI-stable. For the sake of contradiction, suppose that an unmatched pair {u, w} is SMTI-blocking M . This means that w prefers u to M (w) = M ′(w) in the last ℓ − 1 layers in I ′, and that u prefers w to M (u) = M ′(u) in all ℓ layers, a contradiction to M ′ being α-layer pair stable, since α ≥ 2. 6 Two Special Cases of Preferences In this section we consider two well-motivated special cases of our general multi-layer framework for sta- ble matchings. We will discuss how the corresponding simplifying assumptions affect the computational complexity of finding multi-layer stable matchings. Interestingly, even under seemingly strong assumptions some variants of our problem remain computationally hard. 25 6.1 Single-layered preferences on one side Consider the special case where the preferences of the agents from U can be expressed through a single layer. Formally, we model this by assuming that for each agent from U , its preference list is the same in all layers. In this case we say that the agents from U have single-layered preferences. Single-layered preferences on one side can arise in many real-life scenarios. For instance, consider the standard example of matching residents with hospitals and, similarly as in Example 2.4, assume that each layer corresponds to a certain criterion. It is reasonable to assume that the hospitals evaluate their potential employees with respect to the level of their qualifications only (thus, having a single layer of preferences), while the residents take into account a number of factors such as how far is a given hospital from the place they live, the level of compensation, the reputation of the hospital, etc. First, we observe that in such a case two out of our three solution concepts from Section 2 are equivalent. Proposition 6.1. If each agent from U has single-layered preferences, then α-layer pair stability and α- layer individual stability are equivalent for each α. Proof. The fact that α-layer individual stability implies α-layer pair stability follows from Proposition 3.2. Let us prove the other direction. Let M be an α-layer pair stable matching. Towards a contradiction, suppose that M is not α-layer individually stable. By Proposition 2.2, let p = {u, w} be an unmatched pair of agents such that there is a subset S1 of ℓ − α + 1 layers where p is dominating {u, M (u)}, and that there is a subset S2 of (ℓ − α + 1) layers where p is dominating {w, M (w)}. By our assumption of single-layered preferences for each agent in U , we have that p is dominating {u, M (u)} in every layer. Thus, the pair p is blocking M in each layer in S2-a contradiction to Proposition 2.1. For profiles with single-layered preferences of the agents on one side, α-layer global stability is strictly stronger than the other two concepts: Example 6.1. Consider four agents with the following three layers of preference profiles: P1: w1 w2 u1 w1 u2 u1 w2 w1 u2 w2 u1 u2 P2: w1 w2 u1 w1 u2 u1 w2 w1 u2 w2 u2 u1 P3: w1 w2 u1 w1 u1 u2 w2 w1 u2 w2 u1 u2 Let M = {{u1, w2}, {u2, w1}}. We show that M is 2-layer pair stable but not 2-layer globally stable. Indeed, M is stable only in the first layer, so it cannot be 2-layer globally stable. To see why M is 2-layer pair stable, consider the unmatched pairs {u1, w1} and {u2, w2}. The first one only blocks the third layer, ⋄ and the latter one only blocks the second layer. 6.1.1 Global stability By Propositions 3.4 and 6.1, we can find out whether an instance with single-layered preferences on one side admits an α-layer globally stable matching in time O(ℓα · α · n2) by guessing a subset of α layers and using Algorithm 1. However, the following result shows that fixed-parameter tractability (FPT) for the parameter α, i.e., the existence of an algorithm running in f (α) · (ℓ · n)O(1) time for some computable function f , is unlikely (for details on parameterized complexity we refer to the books of Cygan et al. [17], Downey and Fellows [19], Flum and Grohe [24], and Niedermeier [42]). Theorem 6.2. Even if the preferences of the agents from U are single-layered GLOBALLY STABLE MAR- RIAGE is NP-hard and is W[1]-hard for the threshold parameter α. It can be solved in O(ℓα · α · n2) time. 26 Proof. For the running time statement, let I be an instance of GLOBALLY STABLE MARRIAGE with ℓ layers. We guess a subset S ⊆ [ℓ] of α layers and check whether a matching M exists that is stable in all layers of S. Now consider the instance I ′ restricted to the α layers in S. By Proposition 3.4, M is α-layer globally stable in I ′ if and only if M is α-layer pair stable in I ′. Since each agent on one side has the same preference list in all layers, by Proposition 6.1, M is α-layer pair stable in I ′ if and only if M is α-layer individually stable in I ′. By Theorem 4.1, we can use Algorithm 1 to decide whether M is α-layer individually stable in I ′ in O(α · n2) time. The total running time is thus O(ℓα · α · n2). For the last statement, we provide a parameterized reduction1 from the W[1]-complete INDEPENDENT SET problem parameterized by the size k of the solution. We will see that the reduction is also a polynomial- time reduction, showing the first statement since INDEPENDENT SET is also NP-hard. In the INDEPENDENT SET problem we are given an undirected graph G = (V, E) with vertex set V and edge set E, and a non-negative integer k, and we ask whether G admits a k-vertex independent set, i.e. a vertex subset V ′ ⊆ V with k pairwisely non-adjacent vertices. Given an INDEPENDENT SET instance (G = (V, E), k), we construct an instance with V layers with the set of agents U ⊎ W as follows. Assume that V = {v1, v2, . . . , vn}. For each vertex vi ∈ V we construct six agents, three for each side, denoted by ui, ui, wi, wi, ai and bi. Let U = {ui, ui, ai 1 ≤ i ≤ n} and W = {wi, wi, bi 1 ≤ i ≤ n}. We create a layer for each vertex so that if a matching is stable for a layer, then an independent set solution has to include the corresponding vertex and exclude any of its adjacent vertices. Again, the notation "· · · " denotes an arbitrary order of the unmentioned agents. Agents from U . The preference list of each agent in U is the same for all layers. ∀i ∈ [n] : agent ui : wi ≻ wi ≻ · · · , agent ui : wi ≻ wi ≻ · · · , agent ai : wi ≻ bi ≻ · · · . Agents from W . For each layer i, 1 ≤ i ≤ n, the preference list of agents wi and wi and of agents wj and wj for vj 6= vi are constructed in such a way that they encode the adjacency structure of graph G. agent wi : ui ≻ ai ≻ · · · , agent wi : ui ≻ · · · , ∀j with {vi, vj} ∈ E : agent wj : uj ≻ · · · , agent wj : uj ≻ · · · , ∀k with {vi, vk} /∈ E : agent wk : uk ≻ uk ≻ · · · , agent wk : uk ≻ uk ≻ · · · . The preference list of each bj with j ∈ [n] remains the same in all layers and is as follows. agent bj : aj ≻ · · · . Observe that for each layer i ∈ [n], wi is the most preferred agent of ai. Thus, a matching M is stable in layer i only if M (wi) ∈ {ui, ai}. From this we infer that for M to be stable in layer i it must also hold that M (ui) = wi. This implies that M (wi) = ui as otherwise {ui, wi} would be blocking layer i. Further, if M is stable in layer i, then for each vertex vj that is adjacent to vi, it must hold that M (wj) = uj and M (wj) = 1A parameterized reduction from a parameterized problem Π1 to a parameterized problem Π2 is an algorithm mapping an instance (x, k) to an instance (x′, k′) in f (k) · xO(1) time such that k′ ≤ g(k), and that (x, k) ∈ Π1 if and only if (x′, k′) ∈ Π2, where f and g are some computable functions. 27 uj . In the following, for each i ∈ [n], let M vc Then, we have the following observation for the case that a matching M is stable in layer i: i = {{ui, wi}, {ui, wi}} and M ind i = {{ui, wi}, {ui, wi}}. M vc i ⊆ M and for each vertex vj incident with {vi, vj} ∈ E it holds that M ind j ⊆ M . (1) Intuitively, the matching M ind ing M vc i means that vertex vi belongs to an independent set. i means that vertex vj does not belong to an independent set while the match- To complete the construction we let α = k. Clearly, the construction can be done in polynomial time. Now, we claim that the given graph G has an independent set of size k if and only if the constructed instance has an α-layer globally stable matching. For the "only if" part, assume that V ′ ⊆ V is a size-k independent set for G. We show that the j ∪ {{ai, bi} i ∈ [n]} is stable in each layer i with vi ∈ V ′. matching M = Svi∈V ′ M vc Suppose, for the sake of contradiction, that there is a layer i with vi ∈ V ′ and there is an unmatched pair p = {x, y} with x ∈ U and y ∈ W that is blocking layer i, i.e. the following holds. i ∪ Svj∈V \V ′ M ind In layer i, agent x prefers y to M (x) and agent y prefers x to M (y). First, y /∈ {bj j ∈ [n]} since M (bj) = aj is the most preferred agent of bj. Second, y /∈ {wj, wj {vi, vj} ∈ E} as both wj and wj already obtain their most preferred agents, namely uj and uj in layer i. Third, y /∈ {wj, wj vj ∈ V ′}, as in this way wj and wj obtain uj and uj as their partners, and since V ′ is an independent set, we have that {vi, vj} /∈ E, and so uj and uj are the most preferred partners of wj and wj. Now, the only possible choice for y would be agent wj or wj such that {vi, vj} /∈ E and vj /∈ V ′. By our construction of M we have that M (wj) = uj and M (wj) = uj. First, consider the case when y = wj. By the preference list of wj in layer i, if {x, y} is a blocking pair, then x = uj . However, uj already obtains its most preferred agent, namely, wj; a contradiction. Analogously, the case when y = wj also results in a contradiction. Summarizing, matching M is stable in each layer i with vi ∈ V ′. For the "if" part, assume that our constructed instance admits an α-layer globally stable matching M . We show that the vertex subset V ′ := {vi ∈ V M is stable in layer i} is an independent set of size k. Clearly, V ′ = α = k. Suppose, for the sake of contradiction, that V ′ contains two adjacent vertices vi and vj with {vi, vj} ∈ E. Since M is stable in layer i and {vi, vj} ∈ E, by our observation (1) we deduce that M vc j ⊆ M . However, this is a contradiction to M being stable in layer j. i ⊆ M and M ind 6.1.2 Individual stability and pair stability Observe that, by Theorem 5.2, we know that finding an α-layer individually stable matching with prefer- ences single-layered on one side is NP-hard if ℓ ≥ 4 and α ≤ ⌊ℓ/2⌋. Next, we establish a relation between the individual (and thus pair) stability for preferences single- layered on one side, and the stability concept in the traditional single-layer setting, but with general (in- complete and possibly intransitive) preferences as studied by Farczadi et al. [23]. This relation allows us to construct a polynomial-time algorithm for finding an α-layer individually stable (and hence α-layer pair stable) matching with single-layer preferences on one side when α ≥ ⌊ℓ/2⌋ + 1. Proposition 6.3. If the preferences of the agents on one side are single-layered and α ≥ ⌊ℓ/2⌋ + 1, then PAIR STABLE MARRIAGE and INDIVIDUALLY STABLE MARRIAGE can be solved in O(ℓ · n2) time. Proof. We will reduce our problem to the STABLE MARRIAGE WITH GENERAL PREFERENCES (SMG) problem [23]. Let I be an instance of our problem, let U ∪ W denote the set of agents in I, and let ℓ be the number of layers. We construct an instance I ′ of SMG as follows. In I ′ we have the same set of agents as in I. For each agent u ∈ U we copy the preferences from I to I ′ (such an agent has the same preference 28 list in all layers). The preferences of the agents from W can be arbitrary binary relations on the set V . Thus, we use an ordered pair (u, u′) of two agents to denote that u is regarded as good as u′. Formally, for each agent w ∈ W we define the general preferences of w, denoted as Rw, as follows: For each two agents u, u′ ∈ U we let (u, u′) ∈ Rw if and only if w prefers u to u′ in at least α layers. First, by our assumption on the value of α, we observe that the preferences of the agents from W are asymmetric as, i.e., for each pair of agents u, u′ ∈ U we have that {(u, u′), (u′, u)} ∩ Rw ≤ 1. Now, we will prove that a matching M is α-layer pair stable in I if and only if it is stable in I ′ according to the definition of stability by Farczadi et al. [23]. Indeed, according to Farczadi et al. [23] a pair {u, w} is SMG-blocking if and only if the following two conditions hold: (1) w ≻u M (u) and (2) (M (w), u) /∈ Rw. The first condition is equivalent to saying that u prefers w to M (u) in each layer in I. The second condition holds if and only if w prefers M (w) to u in less than α layers. This is equivalent to saying that w prefers u to M (w) in at least ℓ − α + 1 layers, and so the two conditions are equivalent to saying that {u, w} is (ℓ − α + 1)-blocking M in I. For asymmetric preferences SMG can be solved in O(n2) time [23, Theorem 2], where the number of agents is 2n. The reduction to an SMG instance takes O(ℓ · n2) time. The number of agents in I equals the number of agents in I ′. Thus, the problem (deciding α-layer pair stability) can be solved in O(ℓ · n2) time. By Proposition 6.1, we obtain the same result for α-layer individual stability. 6.2 Uniform preferences in each layer In this section we consider the case when for each layer the preferences of all agents from U (resp. all agents from W ) are the same-we call such preferences uniform in each layer. This special case is motivated with the following observation pertaining to Example 2.4: preferences uniform in a layer can arise if the criterion corresponding to the layer is not subjective. For instance, if a layer corresponds to the preferences regarding the wealth of potential partners, it is natural to assume that everyone prefers to be matched with a wealthier partner (and so the preferences of all agents for this criterion are the same); similarly it is natural to assume that the preferences of all hospitals are the same: candidates with higher grades will be preferred by each hospital. First, we observe that for uniform preferences no two among the three concepts are equivalent. Example 6.2. Consider four agents with the following four layers of uniform preferences: P1: w1 w2 u1 w1 u1 u2 w1 w2 u2 w2 u1 u2 P2: w1 w2 u1 w1 u2 u1 w1 w2 u2 w2 u2 u1 P3: w2 w1 u1 w1 u1 u2 w2 w1 u2 w2 u1 u2 P4: w2 w1 u1 w1 u2 u1 w2 w1 u2 w2 u2 u1 Let M1 = {{u1, w1}, {u2, w2}} and M2 = {{u1, w2}, {u2, w1}}. We observe that M1 is stable only in layers (1) and (4) whereas M2 is stable only in layers 2 and 3. Thus, neither is 3-layer globally stable. One can check that neither is 3-layer individually stable. However, both M1 and M2 are 3-layer pair stable. To see why this is the case we observe that for M1, both unmatched pairs {u1, w2} and {u2, w1} are each blocking only one layer, namely layers 2 and 3, respectively. Moreover, if we restrict the instance to only the first three layers, then we have the following results: 1. M1 is not even 2-layer globally stable but it is 2-layer individually stable as for each unmatched pair p with respect to M1, at least one agent in p obtains a partner which is its most preferred agent in at least two layers. 2. M2 is 2-layer globally stable (it is stable in layers 2 and 3) but it is not 2-layer individually stable. To see why it is not 2-layer individually stable, we consider the unmatched pair {u1, w1}. There are 29 3 − 2 + 1 = 2 layers where u1 prefers w1 to its partner M2(u1) = w2 and there are two layers where w1 prefers u1 to its partner M2(w1). ⋄ 6.2.1 Individual stability For preferences that are uniform in each layer, we find that there is a close relation between INDIVIDUALLY STABLE MARRIAGE and GRAPH ISOMORPHISM, the problem of finding an isomorphism between graphs or deciding that there exists none. Herein, an instance of GRAPH ISOMORPHISM consists of two undirected graphs G and H with the same number of vertices and the same number of edges. We want to decide whether there is an edge-preserving bijection f : V (G) → V (H) between the vertices, i.e. for each two vertices u, v ∈ V (G) it holds that {u, v} ∈ E(G) if and only if {f (u), f (v)} ∈ E(H). We call such bijection an isomorphism between G and H. We explore this relation through the following construction. For an instance I of INDIVIDUALLY STA- BLE MARRIAGE we construct two directed graphs GI and HI as follows. The agents from U and W will correspond to the vertices in GI and HI , respectively. For each two vertices u, u′ ∈ U we add to GI an arc (u, u′) if the agents from W prefer u to u′ in at least (ℓ − α + 1) layers. Analogously, for each two agents w and w′, we add to HI an arc (w, w′) if the agents from U prefer w to w′ in at least (ℓ − α + 1) layers. Let E(GI ) and E(HI ) denote the arc sets of GI and HI , respectively. We first explain how the so constructed graphs can be used to find an α-layer individually stable match- ing in the initial instance I, or to claim there is no such a matching. Proposition 6.4. A matching M for instance I is α-layer individually stable if and only if the following two properties hold. 1. For each two vertices u, u′ ∈ U , it holds that: (u, u′) ∈ E(GI ) implies (M (u′), M (u)) /∈ E(HI ). 2. For each two vertices w, w′ ∈ W , it holds that: (w, w′) ∈ E(HI ) implies (M (w′), M (w)) /∈ E(GI ). Proof. For the "only if" direction, assume that M is α-layer individually stable. Towards a contradiction, suppose that one of both properties stated above does not hold. That is, there exist two vertices u, u′ ∈ U such that (u, u′) ∈ E(GI ) and (M (u′), M (u)) ∈ E(HI ) or there exist two vertices w, w′ ∈ W such that (w, w′) ∈ E(HI ) and (M (w′), M (w)) ∈ E(GI ). For the first case, it follows that there is a subset S of at least ℓ − α + 1 layers such that all agents (including M (u′)) in W prefer u to u′ in each layer of S, and there is a (possibly different) subset R of at least ℓ − α + 1 layers such that all agents (including u) in U prefer M (u′) to M (u) in each layer of R. This means that the pair {u, M (u′)} is (ℓ − α + 1)-dominating {u′, M (u′)} and is (ℓ − α + 1)-dominating {u, M (u)}-a contradiction to Proposition 2.2. Analogously, the second case also leads to a contradiction to Proposition 2.2 regarding the unmatched pair {M (w′), w}. For the "if" direction, assume that both properties hold. Towards a contradiction and by Proposition 2.2, suppose that there is an unmatched pair, call it {u, w} with u ∈ U and w ∈ W , which is (ℓ − α + 1)- dominating {u, M (u)} and is (ℓ − α + 1)-dominating {w, M (w)}. By our construction of GI and HI , it follows that (w, M (u)) ∈ E(HI ) and (u, M (w)) ∈ E(GI )-a contradiction to the second property. Using a construction by McGarvey [40], given an arbitrary directed graph, we can indeed construct multi-layer preferences that induce this graph. Lemma 6.1. For each two directed graphs GI and HI with m arcs each there exists an instance with ℓ = 2m layers of preferences that induces GI and HI via McGarvey's construction, where m denotes the number of arcs in GI (and thus in HI ). Proof. Our profile uses the vertex sets of GI and HI as the two disjoint subsets of agents, denoted as U and W , respectively. For each arc in the graphs GI (resp. HI ) we construct two layers of preference lists 30 Arcs to all other vertices except for the deputy. primeG deputyG connectorG {v,v′} . . . connectorG ∗ v sinkG {v,v′} v′ Figure 2: Construction of the graphs GI and HI in the proof of Theorem 6.5. The diagram shows the case {v, v′} ∈ G. for the agents from W (resp. U ) to "encode" it. We describe how to construct the preference lists for an arc in GI , say (u, u′). The construction for the arcs in HI works analogously. To encode the arc (u, u′), −→ we construct two layers where the preference lists for the agents in W are as follows; denote by X some arbitrary but fixed order of the agents other than u and u′ and let ←− X be the reverse of −→ X . One layer : u ≻ u′ ≻ ←− X ≻ u ≻ u′. The other layer : −→ X . Finally, we set α = ℓ/2 = m. Note that for each two agents u and u′ in GI all agents from W prefer u to u′ in either exactly m − 2 layers, or exactly m layers, or exactly m + 2 layers. It is straightforward to see that our constructed instance induces the two input graphs GI and HI . Using Proposition 6.4 and Lemma 6.1 as tools, we can show that for the preferences of the agents being uniform in all layers, the problem of finding an α-layer individually stable matching is at least as hard as the graph isomorphism problem. Theorem 6.5. GRAPH ISOMORPHISM is polynomial-time reducible to INDIVIDUALLY STABLE MAR- RIAGE, where the preferences of the agents are uniform in all ℓ layers, ℓ is even, and α = ℓ/2. Proof. Let G, H be two undirected graphs that form an instance of GRAPH ISOMORPHISM. Without loss of generality, assume that n ≥ 4 (number of vertices) and m ≥ 3 (number of edges). From G and H we construct an instance I of the problem of deciding whether there exists an α-layer individually stable matching for preferences being uniform in all ℓ layers, where α = ℓ/2. By Lemma 6.1 we can describe this instance by providing the corresponding directed graphs GI and HI . We show how to construct GI from G. The graph HI is constructed from H analogously. Let V and E denote the sets of vertices and edges in G. We copy all vertices from G to GI (we will refer to these vertices as non-special) and we additionally introduce five types of "special" vertices, which we call 31 2(cid:1) + 1 connectors, m sinks, and (cid:0)n p . One remaining connector is distinguished and denoted as connectorG primeG, deputyG, (cid:0)n and the sources formally: With each pair of vertices p = {v, v′} ∈ (cid:0)V as connectorG edge e ∈ E we have one sink, denoted as sinkG denoted as sourceG SINKG = {sinke e ∈ E}, and CONNECTORG = {connectorG the set of all sinks, and the set of non-special connectors, respectively: • For each pair e = {v, v′} ⊆ V of vertices, we do the following: 2(cid:1) − m sources. We specify the connectors, the sinks, 2(cid:1) we associate one connector, denoted ∗ . Further, for each e , and for each non-edge e = {v, v′} /∈ E we have a source, 2(cid:1) \ E}, 2(cid:1)} denote the set of all sources, e . The arcs in GI are constructed as follows. Let SOURCEG = {sourcee e ∈ (cid:0)V e e ∈ (cid:0)V 1. If {v, v′} ∈ E, then we add to GI the following five arcs: (v, sinkG (v′, connectorG (sourceG e ), and (sinkG e , connectorG e , v′), (v, connectorG e , v), (sourceG 2. For each other non-special vertex u ∈ V \ {v, v′}, we add to GI the arc (connectorG 3. For each other source or sink x ∈ SOURCEG ∪ SINKG \ {sinkG e , sourceG e }, we add to GI the e ), (v, connectorG e ), e ). Otherwise, we add to GI the following five arcs: e ), (v′, connectorG e ), and (sourceG e ), (v′, sinkG e ). e , connectorG e , u). arc (connectorG e , x). • For each source and each sink x ∈ SOURCEG ∪ SINKG we add to GI an arc (x, connectorG ∗ ). For each non-special vertex v ∈ V , we additionally add to G the arc (connectorG ∗ , v). • For each vertex x ∈ V ∪ SOURCEG ∪ SINKG ∪ CONNECTORG ∪ {connectorG ∗ } except for the deputy, we add to GI an arc (primeG, x). • For each vertex x ∈ SOURCEG ∪ SINKG ∪ {primeG} we add to GI the arc (deputyG, x). For each connector y ∈ CONNECTORG ∪ {connectorG ∗ } we add to GI the arc (y, deputyG). This completes the construction of GI (crucial elements of this construction are illustrated in Figure 2). Observe a useful property: Each vertex in GI except primeG has at least two incoming arcs; primeG has exactly one incoming arc, namely from deputyG. Indeed, since GI has at least three edges (and so at least three connectors), deputyG has at least three incoming arcs from the connectors. Each connector connectorG ∗ has arcs from all sources and sinks (there are at least six of them). For each sink, source, and each non-special vertex there are at least two incoming arcs, one from the prime and the other from the deputy. {v,v′} has incoming arcs from v and v′; The special connector connectorG The arcs in HI are constructed analogously. We claim that there is an α-layer individually stable match- ing in the instance (GI , HI) with α = ℓ/2 if and only if there is an isomorphism between G and H. {v,v′} ∈ SOURCEG ∪ SINKG we let M (cid:16)sG (⇐) For the "if" direction, assume that there is an isomorphism f : V (G) → V (H) between G to H. We show that the following matching M is m-layer individually stable. For each vertex v ∈ V (G) let M (v) = {v,v′}(cid:17) = f (v) ∈ V (H). Further, for each source or sink sG {v,v′} is a sink, then {v, v′} ∈ E(G); since f is sH {f (v),f (v′ )}. Why should such a matching exist? If sG an isomorphism, we have that {f (v), f (v′)} ∈ E(H) and so the sink sH {f (v),f (v′ )} exists. Analogously, if sG {v,v′} is a source, then sH {v,v′} is also a source and exists in H. Similarly, we match the corresponding connectors: for each pair of vertices {v, v′} we let M (cid:16)connectorG {f (v),f (v′ ))}, and we ∗ . Finally, we let M (deputyG) = deputyH and M (primeG) = primeH . let M (connectorG Since f is an isomorphism between G and H, by the construction of GI and HI , an arc (x, y) in GI (resp. HI ) implies no arc (M (x), M (y)) in HI (resp. GI ). By Proposition 6.4, M is m-layer individually stable. {v,v′}(cid:17) = connectorH ∗ ) = connectorH (⇒) For the "only if" direction, assume that M is an m-layer individually stable matching for (GI , HI ). We start by showing M (primeG) = primeH . For the sake of contradiction, suppose that this is not the case, and let y = M (primeG) ∈ V (HI ), with y 6= primeH . Since y 6= primeH , there are at least two vertices w1, w2 ∈ V (HI) with (w1, y), (w2, y) ∈ E(HI ). Thus, one of them is not matched to deputyG, say M (w1) 6= deputyG. Since (w1, y) ∈ E(HI ), by Proposition 6.4, it must hold that (primeG, M (w1)) = 32 (M (y), M (w1)) /∈ E(GI ). This is a contradiction with M (w1) 6= deputyG since primeG has outgoing arcs to all vertices but deputyG. Second, we show that M (deputyG) = deputyH . The reason for this is that using Proposition 6.4 for the arc (deputyG, primeG) implies that (M (primeG), M (deputyG)) = (primeH, M (deputyG)) cannot exists in HI . By construction, primeH has an arc to all vertices except deputyH . Thus, M (deputyG) = deputyH . By an analogous reasoning focusing on the deputy vertex, we deduce that each connector in GI must be matched with some connector in HI . Further, for each source or sink sG ∈ SOURCEG ∪ SINKG since ∗ ), M (sG)) does not exist (sG, connectorG in HI ; thus there are at least 6 forbidden arcs from M (connectorG ∗ ) to some vertices which are sinks, sources, or non-special vertices. This means that connectorG ∗ because each other connector in HI has all but three outgoing arcs to such vertices. Thus, we deduce that each source/sink must be matched with a source/sink only, and consequently, that non-special vertices in GI are matched with non-special vertices in HI . We show that the bijection f : V (GI ) → V (HI ) derived from M by setting f (v) = M (v) for each v ∈ V is an isomorphism between G and H. ∗ ) ∈ E(GI ), by Proposition 6.4, it follows that (M (connectorG ∗ can only be matched to connectorH e . We know that M (connectorG e ) ∈ E(GI ) and (connectorG e ) ∈ CONNECTORH , say M (connectorG e ) = connectorH Consider an arbitrary pair e = {v, v′} ⊆ V (G) of non-special vertices and its corresponding connector connectorG {w,w′}. We claim that {w, w′} = {M (v), M (v′)}. Towards a contradiction, suppose that M (v) /∈ {w, w′}. Then, (v, connectorG {w,w′}, M (v)) ∈ E(HI ), a contradiction to Proposition 6.4. Fi- nally, we show that e ∈ E(G) if and only if {f (v), f (v′)} = {M (v), M (v′)} = {w, w′} ∈ E(H). If e ∈ E(G), then sinkG e ) ∈ E(GI ). By Proposition 6.4, it follows that e ) ∈ SOURCEH ∪ {w,w′}, M (sinkG (connectorH SINKH , we have that M (sinkG e ) ∈ E(GI ) {w,w′}, w) /∈ E(GI ), and so s is a sink, and w and w′ are connected in H. Similarly, if we infer that (sH e /∈ E(G), then we deduce that sourceG {w,w′}, where s is a source or a sink. Further, since (v, sinkG e exists and (sinkG e )) = (M (connectorG e ), M (sinkG e )) /∈ E(HI ). Since M (sinkG e and sourceH {w,w′} exist, and thus {w, w′} /∈ E(H). e , connectorG e ) = sH Theorem 6.5 implies that developing a polynomial-time algorithm for our problem is currently out of scope, since the question of whether GRAPH ISOMORPHISM is solvable in polynomial time is still open. Besides Theorem 6.5 there are other interesting implications of Proposition 6.4 and Lemma 6.1. For α ≥ ℓ/2 + 1 our problem can be reduced to the TOURNAMENT ISOMORPHISM problem, which, given two tournament graphs, asks whether there is an arc-preserving bijection between the vertices of the two tour- naments [3, 46, 47]. TOURNAMENT ISOMORPHISM has been studied extensively in the literature (for a more detailed discussion see, e.g., [3, 47, 46]), but to the best of our knowledge it is still open whether it is solvable in polynomial time [3]. The best known algorithm solving TOURNAMENT ISOMORPHISM runs in nO(log n) time, where n denotes the number of vertices. Corollary 6.6. If the preferences of the agents are uniform in all ℓ layers and α ≥ ℓ/2 + 1, then INDIVID- UALLY STABLE MARRIAGE can be solved in nO(log n) + O(ℓ · n2) time, where n denotes the number of agents. Proof. Assume that α ≥ ℓ/2 + 1 and construct the two directed graphs as we did for Proposition 6.4. Since ℓ − α + 1 ≤ ℓ/2, for each pair of vertices x and y in GI (resp. HI ) at least one arc from (x, y) and (y, x) exists. Note that such graphs are not necessarily tournaments, where for each two vertices x and y exactly one of (x, y) and (y, x) exists. But we can deal with the case when one of the graphs is not a tournament. If both (x, y) and (y, x) exist in GI or in HI , then by Proposition 6.4 no α-layer individually stable matchings exists. Thus, the only non-trivial case is when the graphs GI and HI are tournaments. Moreover, in such a case, the condition from Proposition 6.4 can be reformulated as (x, y) ∈ GI if and only if (M (x), M (y)) ∈ HI and this is the condition that M is a tournament isomorphism between GI and HI . Consequently, for α ≥ ℓ/2 + 1 the problem of finding an α-layer individually stable matching can be reduced to TOURNAMENT ISOMORPHISM. Note that the number of vertices in the constructed graphs 33 equals the number of agents in our problem. By the result of Babai and Luks [3], we obtain an algorithm for our problem with the desired running time. 6.2.2 Global stability There exists a fairly straightforward polynomial-time algorithm for finding α-layer globally stable match- ings. Proposition 6.7. If the preferences of the agents are uniform in all ℓ layers, then GLOBALLY STABLE MARRIAGE can be solved in O(ℓ · n) time, where n denotes the number of agents. Proof. It is apparent that for uniform preferences of the agents, each layer admits a unique stable matching: for each i ∈ [n] the i-th most preferred agent from U is matched with the i-th most preferred agent from W . Further, such a matching can be computed in O(n) time. Thus, our algorithm proceeds as follows. For each layer we compute a unique stable matching, and we pick the matching which is stable in the largest number of layers. Our algorithm returns this matching if it is stable in at least α layers; otherwise, the algorithm outputs that there exists no α-layer globally stable matchings for the given instance. 7 Open Problems and Conclusions We have considered a new multi-layer model of preferences in the context of the STABLE MARRIAGE problem. We identified three natural concepts of stability and discussed their relations with each other. Our results show that the algorithmic problem of finding stable matchings according to each of the three concepts is, in general, computationally hard. On the positive side, we also managed to identify a number of natural special cases which are tractable (Table 1 summarizes our results). Interestingly, while in the world of multi-layer stable matchings the case of two layers already leads to most computational hardness results, in the world of maximum-cardinality matching in two-layer graphs one obtains polynomial-time solvability, while in the case of three layers one encounters NP-hardness [14]. Our work provides a rich structure for analyzing computational properties of the problems we consid- ered, and we view our work as only initiating this line of research. Indeed, it directly leads to the following open questions: (1) How hard is it to find an α-layer individually stable matching for ⌈ℓ/2⌉ < α < ℓ? (2) When the preferences of the agents are uniform in each layer and α ≥ ℓ/2 + 1, we have shown that the decision variant of INDIVIDUALLY STABLE MARRIAGE is solvable in quasi-polynomial time nO(log n) + O(ℓ · n2)) which implies that the problem is in the complexity class LOGSNP [43]. It would be interesting to know whether it is also complete for LOGSNP.2 However, LOGSNP-hardness for our problem would also imply LOGSNP-hardness for GRAPH ISOMORPHISM (see Theorem 6.5). (3) When the preferences of the agents are uniform in each layer, how hard is it to search for an α-layer pair stable matching for arbitrary α > 1 or an α-layer individually stable matching when α < ℓ/2, or in general when the number of layers is constant. We also believe that a number of other parameters and special cases can be motivated naturally in the context of our model, in particular parameters quantifying the degree to which the preferences of the agents differ. Analogous parameterizations have been studied in computational social choice, for instance for the NP-hard KEMENY SCORE problem [6, 5]. 2LOGSNP-hardness has been encountered and discussed for natural problems in Computational Social Choice [10, 11]. 34 Continuing our research on special cases of input preferences (Section 6), it might be interesting to study stable matching with multi-layer structured preferences, such as single-peaked [8], single-crossing [44, 41], and 1-Euclidean [16, 34, 15] preferences. We note that it can be detected in polynomial time whether a pref- erence profile has any of these structure [4, 18, 22, 18, 20, 9, 34] and we refer the reader to Bredereck et al. [12] and Elkind et al. [21] for an overview of the literature on single-peakedness and single-crossingness. We also note that Bartholdi III and Trick [4] worked on stable roommates for narcissistic and single-peaked preferences, while Bredereck et al. [13] extended this line by also studying other structured preferences and including preferences with ties and incompleteness. Finally, our multi-modal view on the bipartite variant (STABLE MARRIAGE) can be generalized to the non-bipartite variant (STABLE ROOMMATES) and the case with incomplete preferences with ties. It would be interesting to see whether our computational tractability results can transfer to these cases. References [1] D. J. Abraham, P. Bir´o, and D. Manlove. "Almost stable" matchings in the roommates problem. In Pro- ceedings of the Third International Workshop on Approximation and Online Algorithms (WAOA '05), pages 1–14, 2005. 2 [2] H. Aziz, P. Bir´o, T. Fleiner, S. Gaspers, R. de Haan, N. Mattei, and B. Rastegari. Stable matching with uncertain pairwise preferences. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '17), pages 344–352. AAAI Press, 2017. 3 [3] L. Babai and E. Luks. Canonical labeling of graphs. In Proceedings of the 15th Annual ACM Sympo- sium on Theory of Computing (STOC '83), pages 171–183. ACM Press, 1983. 33, 34 [4] J. J. Bartholdi III and M. Trick. Stable matching with preferences derived from a psychological model. Operations Research Letters, 5(4):165–169, 1986. 35 [5] N. Betzler, J. Guo, C. Komusiewicz, and R. Niedermeier. Average parameterization and partial ker- nelization for computing medians. Journal of Computer and System Sciences, 77(4):774–789, 2011. 34 [6] N. Betzler, R. Bredereck, and R. Niedermeier. Theoretical and empirical evaluation of data reduction for exact kemeny rank aggregation. Autonomous Agents and Multi-Agent Systems, 28(5):721–748, 2014. 34 [7] P. Bir´o. Applications of matching under preferences. In Trends in Computational Social Choice, pages 345–373. AI Access, 2017. 3 [8] D. Black. The Theory of Committees and Elections. Cambridge University Press, 1958. 35 [9] R. Bredereck, J. Chen, and G. J. Woeginger. A characterization of the single-crossing domain. Social Choice and Welfare, 41(4):989–998, 2013. 35 [10] R. Bredereck, J. Chen, P. Faliszewski, J. Guo, R. Niedermeier, and G. J. Woeginger. Parameterized algorithmics for computational social choice: Nine research challenges. Tsinghua Science and Tech- nology, 19(4):358–373, 2014. 34 [11] R. Bredereck, J. Chen, S. Hartung, S. Kratsch, R. Niedermeier, O. Such´y, and G. J. Woeginger. A multivariate complexity analysis of lobbying in multiple referenda. Journal of Artificial Intellgence Research, 50:409–446, 2014. 34 35 [12] R. Bredereck, J. Chen, and G. J. Woeginger. Are there any nicely structured preference profiles nearby? Math. Soc. Sci., 79:61–73, 2016. 35 [13] R. Bredereck, J. Chen, U. P. Finnendahl, and R. Niedermeier. Stable roommate with narcissistic, single-peaked, and single-crossing preferences. In Proceedings of the 5th International Conference on Algorithmic Decision Theory (ADT '17), pages 315–330. Springer, 2017. 35 [14] R. Bredereck, C. Komusiewicz, S. Kratsch, H. Molter, R. Niedermeier, and M. Sorge. Assessing the computational complexity of multi-layer subgraph detection. In Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC '17), pages 128–139. Springer, 2017. 34 [15] J. Chen, K. Pruhs, and G. J. Woeginger. The one-dimensional Euclidean domain: Finitely many obstructions are not enough. Social Choice and Welfare, 48(2):409–432, 2017. 35 [16] C. H. Coombs. A Theory of Data. John Wiley and Sons, 1964. 35 [17] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015. 26 [18] J. Doignon and J. Falmagne. A polynomial time algorithm for unidimensional unfolding representa- tions. Journal of Algorithms, 16(2):218–233, 1994. 35 [19] R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Springer, 2013. 26 [20] E. Elkind, P. Faliszewski, and A. Slinko. Clone structures in voters' preferences. In Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 496–513. ACM Press, 2012. 35 [21] E. Elkind, M. Lackner, and D. Peters. Structured preferences. In Trends in Computational Social Choice, pages 187–207. AI Access, 2017. 35 [22] B. Escoffier, J. Lang, and M. Ozturk. Single-peaked consistency and its complexity. In Proceedings of the 18th European Conference on Artificial Intelligence (ECAI '08), pages 366–370. IOS Press, 2008. 35 [23] L. Farczadi, K. Georgiou, and J. K onemann. Stable marriage with general preferences. Theory of Computing Systems, 59(4):683–699, 2016. 3, 28, 29 [24] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006. 26 [25] D. Gale and L. S. Shapley. College admissions and the stability of marriage. The American Mathe- matical Monthly, 120(5):386–391, 1962. 1, 2, 4, 5 [26] M. R. Garey and D. S. Johnson. Computers and Intractability-A Guide to the Theory of NP- Completeness. W. H. Freeman and Company, 1979. 13 [27] D. Gusfield and R. W. Irving. The Stable Marriage Problem–Structure and Algorithms. Foundations of Computing Series. MIT Press, 1989. 2, 3, 5 [28] R. W. Irving. Stable marriage and indifference. Discrete Applied Mathematics, 48(3):261–272, 1994. 11 [29] R. W. Irving. Optimal stable marriage. In M. Kao, editor, Encyclopedia of Algorithms, pages 1470– 1473. Springer, 2016. 2 36 [30] R. W. Irving. Stable marriage. In M. Kao, editor, Encyclopedia of Algorithms, pages 2060–2064. Springer, 2016. 2 [31] K. Iwama and S. Miyazaki. A survey of the stable marriage problem and its variants. In International Conference on Infomatics Education and Research for Knowledge-Circulating Society, pages 131–136, 2008. 3 [32] K. Iwama, S. Miyazaki, Y. Morita, and D. Manlove. Stable marriage with incomplete lists and ties. In Proceedings of the 26th International Colloquium on Automata, Languages, and Programming (ICALP '99), pages 443–452, 1999. 21, 22 [33] B. Klaus, D. F. Manlove, and F. Rossi. Matching under preferences. In Handbook of Computational Social Choice. Cambridge University Press, 2016. 3 [34] V. Knoblauch. Recognizing one-dimensional Euclidean preference profiles. Journal of Mathematical Economics, 46(1):1–5, 2010. 35 [35] D. Knuth. Mariages Stables. Les Presses de L'Universit´e de Montr´eal, 1976. 2, 3, 5 [36] B. Maggs and R. Sitaraman. Algorithmic nuggets in content delivery. SIGCOMM Computer Commu- nication Review, 45(3):52–66, 2015. 2 [37] D. Manlove. Hospitals/residents problem. In M. Kao, editor, Encyclopedia of Algorithms. Springer, 2016. 2 [38] D. Manlove, R. W. Irving, K. Iwama, S. Miyazaki, and Y. Morita. Hard variants of stable marriage. Theoretical Computer Science, 276(1-2):261–279, 2002. 21, 22 [39] D. F. Manlove. Algorithmics of Matching Under Preferences, volume 2 of Series on Theoretical Computer Science. WorldScientific, 2013. 2, 3, 5 [40] D. C. McGarvey. A theorem on the construction of voting paradoxes. Econometrica, 21(4):608–610, 1953. 30 [41] J. A. Mirrlees. An exploration in the theory of optimal income taxation. Review of Economic Studies, 38:175–208, 1971. 35 [42] R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006. 26 [43] C. H. Papadimitriou and M. Yannakakis. On limited nondeterminism and the complexity of the V-C dimension. Journal of Computer and System Sciences, 53(2):161–170, 1996. 34 [44] K. W. Roberts. Voting over income tax schedules. Journal of Public Economics, 8(3):329–340, 1977. 35 [45] A. E. Roth and M. A. O. Sotomayor. Two-Sided Matching: A Study in Game-Theoretic Modeling and Analysis. Cambridge University Press, 1992. Part of Econometric Society Monographs. 2 [46] P. Schweitzer. A polynomial-time randomized reduction from tournament isomorphism to tournament asymmetry. Technical report, arXiv:1704.08529, 2017. 33 [47] F. Wagner. Hardness results for tournament isomorphism and automorphism. In Proceedings of the 32nd International Symposium on Mathematical Foundations of Computer Science (MFCS '07), pages 572–583. Springer, 2007. 33 [48] B. P. Weems. Bistable versions of the marriages and roommates problems. Journal of Computer and System Sciences, 59(3):504–520, 1999. 3 37
1111.7033
1
1111
2011-11-30T02:07:22
Stability of Evolving Multi-Agent Systems
[ "cs.MA", "cs.NE" ]
A Multi-Agent System is a distributed system where the agents or nodes perform complex functions that cannot be written down in analytic form. Multi-Agent Systems are highly connected, and the information they contain is mostly stored in the connections. When agents update their state, they take into account the state of the other agents, and they have access to those states via the connections. There is also external, user-generated input into the Multi-Agent System. As so much information is stored in the connections, agents are often memory-less. This memory-less property, together with the randomness of the external input, has allowed us to model Multi-Agent Systems using Markov chains. In this paper, we look at Multi-Agent Systems that evolve, i.e. the number of agents varies according to the fitness of the individual agents. We extend our Markov chain model, and define stability. This is the start of a methodology to control Multi-Agent Systems. We then build upon this to construct an entropy-based definition for the degree of instability (entropy of the limit probabilities), which we used to perform a stability analysis. We then investigated the stability of evolving agent populations through simulation, and show that the results are consistent with the original definition of stability in non-evolving Multi-Agent Systems, proposed by Chli and De Wilde. This paper forms the theoretical basis for the construction of Digital Business Ecosystems, and applications have been reported elsewhere.
cs.MA
cs
Stability of Evolving Multi-Agent Systems Philippe De Wilde, Senior Member, IEEE, and Gerard Briscoe 1 1 1 0 2 v o N 0 3 ] A M . s c [ 1 v 3 3 0 7 . 1 1 1 1 : v i X r a Abstract-A Multi-Agent System is a distributed system where the agents or nodes perform complex functions that cannot be written down in analytic form. Multi-Agent Systems are highly connected, and the information they contain is mostly stored in the connections. When agents update their state, they take into account the state of the other agents, and they have access to those states via the connections. There is also external, user-generated input into the Multi-Agent System. As so much information is stored in the connections, agents are often memory-less. This memory-less property, together with the randomness of the external input, has allowed us to model Multi-Agent Systems using Markov chains. In this paper, we look at Multi-Agent Systems that evolve, i.e. the number of agents varies according to the fitness of the individual agents. We extend our Markov chain model, and define stability. This is the start of a methodology to control Multi-Agent Systems. We then build upon this to construct an entropy-based definition for the degree of instability (entropy of the limit probabilities), which we used to perform a stability analysis. We then investigated the stability of evolving agent populations through simulation, and show that the results are consistent with the original definition of stability in non- evolving Multi-Agent Systems, proposed by Chli and De Wilde. This paper forms the theoretical basis for the construction of Digital Business Ecosystems, and applications have been reported elsewhere. I. INTRODUCTION Multi-Agent Systems is a growing field primarily because of recent developments of the Internet as a means of circulat- ing information, goods and services. Many researchers have contributed valuable work to the area in recent years [39]. However, despite both Evolutionary Computing and Multi- Agent Systems being mature research areas [38], [30] their integration, creating evolving agent populations, is a recent development [47]. This integration is non-trivial, because agents can be considered as state machines and Evolutionary Computing algorithms have been developed to work on nu- merical data and strings without memory effects. So, our aim here is to determine, for Multi-Agent Systems which make use of Evolutionary Computing [29], [7], [46], macroscopic variables that characterise their stability. While there are several definitions of stability defined for Multi-Agent Systems [40], [1], [34], [54], [33], they are not applicable because of the Evolutionary Computing dynamics inherent in the context of evolving agent populations. Chli and De Wilde [15] model Multi-Agent Systems as Markov chains, which are an established modelling approach in Evo- lutionary Computing [44]. They model agent evolution in time as Markov processes, and so view a Multi-Agent System as a discrete time Markov chain with potentially unknown Philippe De Wilde is with the Intelligent Systems Lab, Department of Com- puter Science, Heriot Watt University, United Kingdom, [email protected]. Gerard Briscoe is with the Systems Research Group, Computer Laboratory, University of Cambridge, United Kingdom, [email protected]. transition probabilities, considered stable when its state has converged to an equilibrium distribution [15]. Also, while there is past work on modelling Evolutionary Computing algorithms as Markov chains [43], [36], [24], [20], we have found none including Multi-Agent Systems. Therefore, we decided to extend the existing Chli-DeWilde definition of agent stability to include the dynamics of Evolu- tionary Computing, including population dynamics and macro- states of the population state-space. We have applied our efforts reported here to the construction of Digital Business Ecosystems [35], [6], Digital Ecosys- tems (distributed adaptive open socio-technical systems, with properties of self-organisation, scalability and sustainability, inspired by natural ecosystems) for conducting business that enable network-based economies, levelling the playing field for Small and Medium sized Enterprises (SMEs) [5], [10]. SMEs provide substantial employment and conduct much innovative activity, but struggle in global markets on a far from level playing field, where large companies have distinct advantages [49]. So, we created Digital Ecosystems to be the digital counterparts of natural ecosystems [12], [8], which are considered to be robust, self-organising and scalable architectures that can automatically solve complex, dynamic problems [11], [5], [7]. This lead to a novel optimisation tech- nique inspired by natural ecosystems, where the optimisation works at two levels: a first optimisation, migration of agents which are distributed in a decentralised peer-to-peer network, operating continuously in time; this process feeds a second optimisation based on evolutionary computing that operates locally on single peers and is aimed at finding solutions to satisfy locally relevant constraints. So, the local search is improved through this twofold process to yield better local optima faster, as the distributed optimisation provides prior sampling of the search space through computations already performed in other peers with similar constraints. Therefore, our extended Chli-DeWilde stability was invaluable in un- derstanding and developing the evolving agent populations in these Ecosystem-Oriented Architectures (EOAs) [9], because it was important for us to be able to understand, model, and define stability, including the determination of macroscopic variables to characterise the stability, of the order constructing processes within, the evolving agent populations. II. MULTI-AGENT SYSTEMS A software agent is a piece of software that acts, for a user in a relationship of agency, autonomously in an environment to meet its designed objectives [57]. So, a Multi- Agent System is a system composed of several software agents, collectively capable of reaching goals that are difficult to achieve by an individual agent or monolithic system [57]. Examples of problems which are appropriate to Multi- Agent Systems research include online trading [42], disaster response [45], and modelling social structures [50]. Multi- agent systems are applied in the real world to graphical applications such as computer games and films. They are also used for coordinated defence systems, with other applications including transportation, logistics, as well as in many other fields. It is widely being advocated for use in networking and mobile technologies, to achieve automatic and dynamic load balancing, high scalability, and self-healing networks. The systems studied by Wiener [56] model information flow between an actor and the environment. Input, state and output and defined, and consequently an evolution equation can be established. In such a system it is possible to distinguish an observational sequence (of the inputs), followed by a decisional sequence of outputs [53]. III. CHLI-DEWILDE STABILITY We will now briefly introduce Chli-DeWilde stability for Multi-Agent System and Evolutionary Computing, sufficiently to allow for the derivation of our extensions to Chli-DeWilde stability to include Multi-Agent Systems with Evolutionary Computing. Chli-DeWilde stability was created to provide a clear notion of stability in Multi-Agent Systems [15], because while computer scientists often talk about stable or unstable systems [52], [4], they did so without having a concrete or uniform definition of stability. So, the Chli-DeWilde definition of stability for Multi-Agent Systems was created [15], derived [14] from the notion of stability defined by De Wilde [19], [28], based on the stationary distribution of a stochastic system, making use of discrete-time Markov chains, which we will now introduce1. If we let I be a countable set, in which each i ∈ I is called a state and I is called the state-space. We can then say that λ = (λi : i ∈ I) is a measure on I if 0 ≤ λi < ∞ for all i∈I λi = 1 [14]. So, if X is a random variable taking values in I and we have λi = Pr(X = i), then λ is the distribution of X, and we can say that a matrix P = (pij : i, j ∈ I) is stochastic if every row (pij : j ∈ I) is a distribution [14], [37]. We can then extend familiar notions of matrix and vector multiplication to cover a general index set I of potentially infinite size, by defining the multiplication of a matrix by a measure as λP , which is given by i ∈ I, and additionally a distribution if(cid:80) (cid:88) j∈I (λP )i = λjpij. (1) We can now describe the rules for a Markov chain by a definition in terms of the corresponding matrix P [14], [37]. Definition 1. We say that (X t)t≥0 is a Markov chain with initial distribution λ = (λi : i ∈ I) and transition matrix P = (pij : i, j ∈ I) if: 1A more comprehensive introduction to Markov chain theory and stochastic processes is available in [37] and [16]. 2 1) Pr(X 0 = i0) = λi0 and 2) Pr(X t+1 = it+1 X 0 = i0, . . . , X t = it) = pitit+1. We abbreviate these two conditions by saying that (X t)t≥0 is Markov(λ, P ). definition the Markov From this first process resulting in only the current state of is memoryless2, the system being required to describe its subsequent behaviour. We say that a Markov process X 0, X 1, . . . , X t has a stationary distribution if the probability distribution of X t becomes independent of the time t [15]. So, the following theorem is an easy consequence of the second condition from the first definition. Theorem 1. A discrete-time random process (X t)t≥0 is Markov(λ, P ), if and only if for all t and i0, . . . , it we have (2) Pr(X 0 = i0, . . . , X t = it) = λi0pi0i1 ··· pit−1it. This first theorem depicts the structure of a Markov chain [14], [37], [16], illustrating the relation with the stochastic matrix P . The next Theorem shows how the Markov chain evolves in time, again showing the role of the matrix P . Theorem 2. Let (X t)t≥0 be M arkov(λ, P ), then for all t, s ≥ 0: 1) Pr(X t = j) = (λP t)j and 2) Pr(X t = j X 0 = i) = Pr(X t+s = j X s = i) = (P t)ij. For convenience (P t)ij can be denoted as p(t) ij . Given this second theorem we can define p(t) ij as the t-step transition probability from the state i to j [14], and we can now introduce the concept of an invariant distribution [14], in which we say that λ is invariant if λP = λ. (3) theorem will link the existence of an invariant The next distribution, which is an algebraic property of the matrix P , with the probabilistic concept of an equilibrium distribution. This only applies to a restricted class of Markov chains, those with irreducible and aperiodic stochastic namely, matrices. However, there is a multitude of analogous results for other types of Markov chains which we can refer [37], [16], and the following theorem is provided as an indication, of the family of theorems that apply. An irreducible matrix P is one for which, for all i, j ∈ I there exist a sufficiently large t such that p(t) ij > 0. I matrix P and is aperiodic if for 2Markov systems with probabilities is a very powerful modelling technique, applicable in large variety of scenarios, and it is common to start memoryless, in which the output probability distribution only depends on the current input. However, there are scenarios in which alternative modelling techniques, like queueing systems, are more suitable, such as when there is asynchronous communications, and to fully characterise the system state at time (t), the history of states at (t-1), (t-2), ... might also need to be considered. all states i ∈ I we have p(t) ii > 0 for all sufficiently large t [14], [37], [16]. The meaning of these properties can broadly be explained as follows. An irreducible Markov chain is a chain where all states intercommunicate. For this to happen, there needs to be a non-zero probability to go from any state to any other state. This communication can happen in any number t of time steps. This leads to the condition p(t) ij > 0 for all i and j. An aperiodic Markov chain is a chain where all states are aperiodic. A state is aperiodic if it is not periodic. Finally, a state is periodic if subsequent occupations of this state occur at regular multiples of a time interval. For this to happen, p(t) ii has to be zero for t an integral multiple of a number. This leads to the condition p(t) ii > 0 for a-periodicity. For further explanations, please refer to [16]. Theorem 3. Let P be irreducible, aperiodic and have an invariant distribution, λ an arbitrary distribution, and suppose that (X t)t≥0 is Markov(λ, P ) [14], then Pr(X t = j) → p∞ j as t → ∞ for all j ∈ I and ij → p∞ p(t) j as t → ∞ for all i, j ∈ I. (4) (5) We can now view a system S as a countable set of states I with implicitly defined transitions between them, and at time t the state of the system is the random variable X t, with the key assumption that (X t)t≥0 is Markov(λ, P ) [14], [37], [16]. Definition 2. The system S is said to be stable when the distribution of its states converge to an equilibrium distribution, Pr(X t = j) → p∞ j as t → ∞ f or allj ∈ I. (6) More intuitively, the system S, a stochastic process X 0, ... is stable if the probability distribution of X t X 1, X 2, becomes independent of the time index t for large t [15]. Most Markov chains with a finite state-space and positive transition probabilities are examples of controllable stable systems, because after an initialisation period they reach a stationary distribution [14]. A Multi-Agent System can be viewed as a system S, with the system state represented by a finite vector X, having dimensions large enough to represent the states of the agents in the system. The state vector will consist of one or more elements for each agent, and a number of elements to define general properties3 of the system state. Hence there are many more states of the system (different state vectors) than there are agents. We can then model agent death, i.e. not being present in the system, by setting the vector elements for that agent to a fixed value that is shared by no other agent, called d [14]. 3These general properties are intended to represent properties that are external to the agents, and as such could include the coupling between the agents. However, we would expect such properties, as the coupling between the agents, to be stored within the agents themselves, and so be part of the elements defining the agents. 3 IV. INCLUDING EVOLUTION Having now introduced Chli-DeWilde stability, we will now briefly introduce Evolutionary Computing, sufficiently to allow for the derivation of our extensions to Chli-DeWilde stability to include Multi-Agent Systems with Evolutionary Computing. Evolution is the source of many diverse and creative solutions to problems in nature [17], [22]. However, it can also be useful as a problem-solving tool in artificial systems. Computer scientists and other theoreticians realised that the selection and mutation mechanisms that appear so effective in biological evolution could be abstracted to a computational algorithm [30]. This Evolutionary Computing is now recognised as a sub-field of artificial intelligence (more particularly computational intelligence) that involves combinatorial optimisation problems [3]. A. Evolutionary Algorithms Evolutionary algorithms are based upon several fundamental principles from biological evolution, including reproduction, mutation, recombination (crossover), natural selection, and survival of the fittest. As in biological populations, evolution occurs by the repeated application of the above operators [2]. An evolutionary algorithm operates on the collection of individuals making up a population. An individual, in the natural world, is an organism with an associated fitness [27]. So, candidate solutions to an optimisation problem play the role of individuals in a population, and a cost (fitness) function determines the environment within which the solutions live, analogous to the way the environment selects for the fittest individuals. The number of individuals varies between different implementations and may also vary during the use of an evolutionary algorithm. Each individual possesses some characteristics that are defined through its its genetic composition, which will be passed genotype, onto the descendants of that individual [2]. Processes of mutation (small random changes) and crossover (generation of a new genotype by the combination of components from two individuals) may occur, resulting in new individuals with genotypes differing from the ancestors they will come to replace. These processes iterate, modifying the characteristics of the population [2]. Which members of the population are kept, and used as parents for offspring, depends on the fitness (cost) function of the population. This enables improvement to occur [2], and corresponds to the fitness of an organism in the natural world [27]. Recombination and mutation create the necessary diversity and thereby facilitate novelty, while selection acts as a force increasing quality. Changed pieces of information resulting from recombination and mutation are randomly chosen. Selection operators can be either deterministic, or stochastic. In the latter case, individuals with a higher fitness have a higher chance to be selected than individuals with a lower fitness [2]. B. Evolving Agent Populations While the construction of Multi-Agent Systems that make use of Evolutionary Computing differs [47], [7], they uni- versally include populations of agents evolving to provide i.e. evolving agent populations. So, desired functionality, extending Chli-DeWilde stability to the class of Multi-Agent Systems that make use of Evolutionary Computing requires understanding population dynamics and macro-states. 1) Population Dynamics: Change of notation. Section III has defined the main properties of Markov chains that we use to model Multi-Agent Systems. We have used the standard notation, as used in [37] and many other textbooks on stochastic processes. This notion uses integers to denote states. These integers are easily used to label the rows and columns of the transition matrix. At the end of Section II, we made the step from Markov chain to multi-agent system. There are many more states than agents, and both ought to be labeled by integers. This turns out to be confusing, and therefore we make a change of notation here. We will now label the agents with integers i, and the states by vectors. Each agent i is in a scalar state ξi. All n agents together are in an n-dimensional vector state ξ. (An agent can be described by multiple numbers, but we group these here into a single scalar ξi, just as multiple binary digits can be read as a single integer.) The states of the agents are random variables. The actual values of the random variable ξi will be denoted by numbers Xi or Yi. The actual values of the vector of random variables ξ will be denoted by vectors X or Y. All the states can vary in time, and time will be denoted by the superscript t. The symbol for t is the same as in Section II, but the symbols i and X have a new meaning. The symbol i now denotes the agent, and Xi is a number describing the state of the agent i. The change of notation is essential because each agent is described by a random variable that has the Markov property. The multi-agent system is a network of interacting Markov chains. Without our change of notation, one would need multiple subscripts counting different things. A Multi-Agent System that makes use of Evolutionary Computing, an evolving agent population, is composed of n agents, with each agent i in a state ξt i at time t, where i = 1, 2, . . . , n. The states of the agents are random variables, and so the state vector for the Multi-Agent System is a vector of random variables ξt, with the time being discrete, t = 0, 1, . . . . The interactions among the agents are noisy, and are given by the probability distributions i = Xiξt = Y), Pr(XiY) = Pr(ξt+1 i = 1, . . . , n, (7) where Xi is a value for the state of agent i, and Y is a value for the state vector of the Multi-Agent System. The probabilities implement a Markov process [51], with the noise caused by mutations. Furthermore, the agents are individually subjected to a selection pressure from the environment of the system, which is applied equally to all the agents of the population. So, the probability distributions are statistically independent, and Pr(XY) = Πn i=1 Pr(ξt+1 i = Xiξt = Y). (8) (cid:88) Y 4 This is a discrete time equation used to calculate the evolution of the state occupation probabilities from t = 0, while equation (8) is the probability of moving from one state to another. The Multi-Agent System is self-stabilising if the limit distribution of the occupation probabilities exists and is non-uniform, i.e. p∞ X = limt→∞pt X (10) exists for all states X, and there are states X and Y such that X (cid:54)= p∞ p∞ Y . (11) These equations imply that some configurations of the system after an extended time will be more likely than others, because the likelihood of their occurrence no longer changes. Such a system is stable, because the likelihood of states occurring no longer changes with time, and this is the definition of stability developed in [15]. This is stability in the stochastic sense, because there is some indeterminacy in the future evolution described by the probability distributions. So, even with knowing the initial conditions, there are many directions in which the process might evolve, but still some paths will be more probable than others. Equation (10) is the probabilistic equivalent of an attractor4 in a system with deterministic interactions, which we had to extend to a stochastic process because mutation is inherent in Evolutionary Computing. While the number of agents in the Chli-DeWilde formalism can vary, we require it to vary according to the selection pressure acting upon the evolving agent population. We must therefore formally define and extend the definition of dead agents, by introducing a new state d for each agent. If an i = d, then it is dead and does not agent is in this state, ξt affect the state of other agents in the population. If an agent i has low fitness then that agent will likely die, because Pr(dY) = Pr(ξt+1 i = dξt = Y) (12) will be high for all Y. Conversely, if an agent has high fitness, then it will likely replicate, becoming a similarly successful agent (mutant), or crossover might occur changing the state of the successful agent and another agent. 2) Population Macro-States: The state of the system, an evolving agent population, S is determined by the collection of agents of which it consists at a specific time t, which potentially changes as the time increases, t+1. This collection of agents will have varying fitness values, and so the one with the highest fitness at the current time t is the current maximum fitness individual. For example, an evolving agent population with individuals ranging in fitness between 36.2% and 45.8%, the current maximum fitness individual (agent) is the one with a fitness of 45.8%. So, we can define a macro-state M as a set of states (evolving agent populations) with a common property, here possessing at least one copy of the current maximum fitness individual. Therefore, by its definition, each macro-state M must also have a maximal state composed entirely of copies of the current maximum fitness individual. If the population size is not fixed (not in nature, can be in evolutionary computing), the state space of the evolving agent If the occupation probability of state X at time t is denoted by pt X, then pt X = Pr(XY)pt−1 Y . (9) 4An attractor is a set of states, invariant under the dynamics, towards which neighbouring states asymptotically approach during evolution [55]. 5 where N is the number of possible states, and taking log to the base N normalises the degree of instability. The degree of instability will range between zero (inclusive) and one (exclusive), because a maximum instability of one would only occur in the theoretical extreme scenario of a non- discriminating selection pressure [25]. V. SIMULATION AND RESULTS A. Evolutionary Dynamics A simulated agent population was evolved relative to an arti- ficial selection pressure created by a fitness function generated from a user request R. An individual (agent) of the population consisted of a set of attributes, a1, a2, ..., and a user request consisted of a set of required attributes, r1, r2, .... The fitness function for evaluating an individual agent A, relative to a user request R, was f itness(A, R) = (14) 1 +(cid:80) 1 r∈R r − a , where a is an attribute of the agent A such that the differ- ence to the required attribute r of R was minimised. The abstract agent descriptions was based on existing and emerg- ing technologies for semantically capable Service-Oriented Architectures [41], such as the OWL-S semantic markup for web services [31]. We simulated an agent's semantic description with an abstract representation consisting of a to simulate the properties of a semantic set of attributes, description. Each attribute representing a property of the se- mantic description, ranging between one and a hundred. Each simulated agent was initialised with a semantic description of between three and six attributes, which would then evolve in number and content. Equation 14 was used to assign fitness values between 0.0 and 1.0 to each individual of the current generation of the population, directly affecting their ability to replicate into the next generation. The Evolutionary Computing process was encoded with a low mutation rate, a fixed selection pressure and a non-trapping fitness function (i.e. did not get trapped at local optima5). The type of selection used was fitness-proportional and non- elitist, with fitness-proportional meaning that the fitter the individual the higher its probability of surviving to the next generation. Non-elitist means that the best individual from one generation was not guaranteed to survive to the next generation; it had a high probability of surviving into the next generation, but it was not guaranteed as it might have been mutated [21]. These initial parameters where chosen to focus 5These constraints can be considered in abstract using the metaphor of the fitness landscape, in which individuals are represented as solutions to the problem of survival and reproduction [58]. All possible solutions are distributed in a space whose dimensions are the possible properties of individuals. An additional dimension, height, indicates the relative fitness (in terms of survival and reproduction) of each solution. The fitness landscape is envisaged as a rugged, multidimensional landscape of hills, mountains, and valleys, because individuals with certain sets of properties are fitter than others [58]. Here the ruggedness of the fitness landscape is not so severe, relative to the population diversity (population size and mutation rate), to prevent the evolving population from progressing to the global optima of the fitness landscape. Fig. 1. State-Space of an Evolving Agent Population: A possible evolutionary path through the state-space is shown, with the selection pressure of the evolutionary process driving it towards the maximal state of the maximum macro-state Mmax. population is infinite, but in practise would be bounded by resource availability. So, there is also an infinite number of configurations for an evolving agent population that has the same current maximum fitness individual. So, the state-space I of the system (evolving agent pop- ulation) S can be grouped to a set macro-states {M}. For one macro-state, which we will call the maximum macro- state Mmax, the current maximum fitness individual will be the global maximum fitness individual, which is the optimal solution (fittest individual) that the evolutionary computing process can reach through the evolving agent population (system) S. For example, an evolving agent population at its maximum macro-state Mmax, with individuals ranging in fitness between 88.8% and 96.8%, the global maximum fitness individual (agent) is the one with a fitness of 96.8% and there will be no fitter agent. Also, we can therefore refer to all other macro-states of the system S as sub-optimal macro-states, as there can be only one maximum macro-state Mmax. We can consider the macro-states of an evolving agent population visually through the representation of the state- space I of the system S shown in Figure 1, which includes a possible evolutionary path through the state-space. Traversal through the state-space I is directed by the selection pressure of the evolutionary process acting upon the population S, driving it towards the maximal state of the maximum macro- state Mmax, consisting entirely of copies of the optimal solution. It is the equilibrium state that the system S is forever falling towards without ever quite reaching, because of the noise (mutation) within the system. Yet, the maximum macro- state Mmax, in which this maximal state is located, will be reached, provided the system does not get trapped at local optima, i.e. the probability of being in the maximum macro- state Mmax at infinite time is one, p∞ = 1. Furthermore, we can define quantitatively the probability distribution of the macro-states that the system occupies at infinite time. For a stable system, as defined by equation (11), the degree of instability, δ, is the entropy of its probability distribution at infinite time, Mmax δ = H(p∞) = −(cid:88) X p∞ X logN (p∞ X ), (13) macrostatemaximal stateevolutionary pathstatemaximummacro-stateMmax global maximum fitness, p∞ Mmax = limt→∞p(t) Mmax = 1, 6 while the states of the macro-state Mhalf each possessed at least one individual with fitness equal to half of the global maximum fitness, p∞ = limt→∞p(t) = 0, Mhalf Mhalf Fig. 2. Graph of Evolutionary Dynamics: This shows both the maximum and average fitness increasing over the generations of a typical evolving agent population, and as expected the average fitness remains below the maximum fitness because of variation in the evolving agent population [23]. on studying our extended Chli-DeWilde stability, rather than the evolutionary computing process itself. Crossover (recombination) was then applied to a randomly chosen 10% of the surviving population. Mutations were then applied to a randomly chosen 10% of the surviving population; point mutations were randomly located, consisting of inser- tions (an attribute was inserted into an agent), replacements (an attribute was replaced in an agent), and deletions (an attribute was deleted from an agent). Rates of 10% where chosen, because they would provide the necessary behaviour to a sufficient degree. A dynamic population size was used, with an initial population size of 300, to ensure exploration of the available agent attribute combination space, which increased with the average size of the population's agents, because fixed population sizes can sometimes fail to sufficient search available combination spaces. The issue of bloat [26] was controlled by augmenting the fitness function with a parsimony pressure [48], which biased the search to smaller agents, evaluating larger than average agents with a reduced fitness, and thereby providing a dynamic control limit which adapted to the average size of the individuals of the evolving agent population. We first plotted the fitness of the evolutionary process for a typical evolving agent population to elucidate its inherent evolutionary dynamics. The graph in Figure 2 shows both the maximum and average fitness increasing over the generations of a typical evolving agent population, and as expected the average fitness remains below the maximum fitness because of variation in the evolving agent population [23], showing that the inherent dynamism of evolutionary processes applies to evolving agent populations. B. Stability 1) Initial Parameters: An evolving agent population was called stable if the distribution of the limit probabilities existed and was non-uniform, as defined by equations (10) and (11). The simplest case was a typical evolving agent population with a global optimum, which was stable if there were at least two macro-states with different limit occupation probabilities. So, we considered the maximum macro-state Mmax and one of the sub-optimal macro-states, Mhalf . Where the states of the macro-state Mmax each possessed at least one individual with thereby fulfilling the requirements of equations (10) and (11). A value of t = 1000 was chosen to represent t = ∞ experimentally, because the simulation has often been observed to reach the maximum macro-state Mmax within 500 generations. Therefore, the probability of the system S being in the maximum macro-state Mmax at the thousandth generation is expected to be one, p1000 = 1. Furthermore, the probability of the system being in the sub-optimal macro- state Mhalf at the thousandth generation is expected to be zero, p1000 Mhalf 2) Predictions: The sub-optimal macro-state Mhalf , having a lower fitness, is predicted to be seen earlier in the evolu- tionary process before disappearing as higher fitness macro- states are reached. The system S will take longer to reach the maximum macro-state Mmax, but once it does will likely remain, leaving only briefly depending on the strength of the mutation rate, as the selection pressure was non-elitist. = 0. Mmax 3) Results: Figure 3 shows, for a typical evolving agent population, a graph of the probability as defined by equation (9) of the maximum macro-state Mmax and the sub-optimal macro-state Mhalf at each generation, averaged from ten thou- sand simulation runs for statistical significance. The behaviour of the simulated system S was as expected, being in the maximum macro-state Mmax only after generation 178 and always after generation 482. It was also observed being in the sub-optimal macro-state Mhalf only between generations 37 and 113, with a maximum probability of 0.053 at generation 61. This is because the evolutionary path (state transitions) could avoid visiting the macro-state. 4) Conclusions: As expected the probability of being in the maximum macro-state Mmax at the thousandth generation was one, p1000 = 1, and so the probability of being in Mmax Fig. 3. Graph of the Probabilities of the Macro-States Mmax and Mhalf at each Generation: The system S, a typical evolving agent population, was in the maximum macro-state Mmax only after generation 178 and always after generation 482. It was also observed being in the sub-optimal macro-state Mhalf only between generations 37 and 113. 020406080100100200300FitnessGenerationMaximumFitnessAverageFitness00.20.40.60.812004006008001000ProbabilityGenerationpMmaxpMhalf 7 where t = 1000 was an effective estimate for t = ∞. This result was expected because the maximum macro-state Mmax at the thousandth generation was one, p1000 = 1, and so the probability of being in any other macro-state at the thousandth generation was zero. Mmax 2) Conclusions: The system therefore showed no instabil- ity, as there is no entropy in the occupied macro-states at infinite time. We can therefore conclude that the degree of instability of our extended Chli-DeWilde stability can provide a macroscopic value to characterise the level of stability of evolving agent populations (Multi-Agent Systems with Evolutionary Computing). E. Stability Analysis 1) Initial Parameters: We then performed a stability analy- sis (similar to a sensitivity analysis [13]) of a typical evolving agent population, by varying its key parameters while mea- suring its stability. We varied the mutation and crossover rates from 0% to 100% in 10% increments to provide a sufficient density of measurements to identify any trends that might be present, calculating the degree of instability, δ from (13), at the thousandth generation. These degree of instability values were averaged over 10 000 simulation runs to ensure statistical significance, and graphed against the mutation and crossover rates in Figure 5. to 60%, 2) Results: It shows that the crossover rate had little effect on the stability of the evolving agent population, whereas the mutation rate did significantly affect stability. With the mutation rate under or equal the evolving agent population showed no instability, with δ values equal to zero as the system S was always in the same macro-state M at infinite time, independent of the crossover rate. With the mutation rate above 60% the instability increased significantly, with the system being in one of several different macro-states at infinite time; with a mutation rate of 70% the system was still very stable, having low δ values ranging between 0.08 and 0.16, but any other macro-state, including the sub-optimal macro-state Mhalf , at the thousandth generation was zero, p1000 = 0. Mhalf We can therefore conclude that our extended Chli-DeWilde stability accurately models the stability over time of evolving agent populations (Multi-Agent Systems with Evolutionary Computing). C. Visualisation 1) Results: A visualisation for the state of a typical evolv- ing agent population, from the experiment of previous subsec- tion, at the thousandth generation is shown in Figure 4, with each line representing an agent and each shade representing an agent attribute, with the identical agents grouped for clarity. It shows that the evolving agent population reached the maximum macro-state Mmax and remained there, but as expected never reached its maximal state, where all the agents are identical and have maximum fitness, which is indicated by the lack of total uniformity in the visualisation. Fig. 4. Visualisation of an Evolving Agent Population at the 1000th Generation: The population consists of 323 agents, with each line representing an agent, and each shade representing an agent attribute. So, we see a population consisting of multiple agents, many of which are identical, having the same maximum global fitness. The identical agents were grouped for clarity, and as expected the system S reached the maximum macro-state Mmax. 2) Conclusions: The result was as expected, a lack of total uniformity in the visualisation, because of the mutation (noise) within the evolutionary process, which is necessary to create the opportunity to find fitter (better) sequences and potentially avoid getting trapped at any local optima that may be present. We can therefore conclude that the macro-state interpretation of our extended Chli-DeWilde stability accurately models the state-space of evolving agent populations (Multi-Agent Systems with Evolutionary Computing). D. Degree of Instability 1) Results: Given that our simulated evolving agent pop- ulation is stable as defined by equations (10) and (11), we can determine the degree of instability as defined by equation (13). So, calculated from its limit probabilities, the degree of instability was δ = H(p1000) = −(cid:88) X p1000 X logN (p1000 X ) = −1logN (1) = 0, Fig. 5. Graph of Stability with Different Mutation and Crossover Rates: With the mutation rate under or equal to 60%, the evolving agent population showed no instability, with δ values equal to zero as the system S was always in the same macro-state M at infinite time, independent of the crossover rate. With the mutation rate above 60% the instability increased significantly. 1451278910111213141516179341415131545678910111213141516179341415135678910111213141516179341415134578910111213141516179341415134568910111213141516179341415134567910111213141516179341415134567810111213141516179341415134567891091112131415161793414151345678910121314151617934141513456789101112141314151617934141513456789101112813141516179341415134567891011121213141516179341415134567891011121415161793414151345678910111213314151617934141513456789101112131614151617934141513456789101112131516179341415134567891011121314161793414151345678910111213141516121793414151345678910111213141516174934141513456789101112131415161734141513456789101112131415161794141513456789101112131415161793141513456789101112131415161793141513456789101112614151617934141513456789103121314151617934141513456789101112131415166934141513456789101112131415161593414151345678101011121314151617934141513456789101112131415161791141415134567891011121314151617974141513456789101112131415161793314151345678910111213141516179312141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415EvolvingAgentPopulationatMaximumMacro-state:MmaxpMmax(1000)=1AgentPopulation020406080100204060801000.10.20.30.40.5DegreeofInstabilityCrossoverRateMutationRateDegreeofInstability once the mutation rate was 80% or greater the system became quite unstable, shown by high δ values nearing 0.5. 3) Conclusions: As one would have expected, an extremely high mutation rate had a destabilising affect on the sta- bility of evolving agent populations. Also, as expected the crossover rate had only a minimal effect, because variation from crossover was limited once the population matured, consisting of agents identical or very similar to one another. It should also be noted that the stability of the system is different to its performance at optimising, because while showing no instability with mutation rates below 60% (inclusive), it reached the maximum macro-state Mmax only with a mutation rate of 10% or above, while at 0% it was stable at sub-optimal macro-states between Mtenth (inclusive) and Mtwentieth (inclusive), i.e. with at least one individual with a fitness between twentieth (inclusive) to a tenth (inclusive) of the global maximum fitness, as indicated by all of the 0% Mutation Rate experiments have degree of instability, δ, values of zero in Figure 5. This is because there was no mutation (mutate rate = 0%), and so the evolving agent populations always remained near the sub-optimal macro-state to which they where initialised (seeded), with any crossover rate having little effect. We can therefore conclude that the degree of instability of our extended Chli-DeWilde stability can used of perform stability analyses (similar to a sensitivity analyses [13]) of evolving agent populations (Multi-Agent Systems with Evolu- tionary Computing). VI. CONCLUSIONS Our extension of Chli-DeWilde stability was developed to provide a greater understanding of stability in Multi- Agent Systems that make use of Evolutionary Computing, i.e. evolving agent populations. We then built upon this to construct an entropy-based definition for the degree of instability, which provides information about the level of stability, applicable to Multi-Agent Systems with or without Evolutionary Computing. Furthermore, it can be used to perform a stability analysis, similar to a sensitivity analysis, of Multi-Agent Systems. Collectively, the experimental results confirm that Chli- DeWilde stability has been successfully extended to evolving agent populations, while our definition for the degree of insta- bility provides a macroscopic value to characterise the level of stability. These findings also support the proposition that Chli- DeWilde stability can be widely applied to different classes of Multi-Agent Systems. So, our extended Chli-DeWilde stability is a useful tool for analysing Multi-Agent Systems, with or without Evolutionary Computing, providing an effective understanding and quantification to help better understand the stability of such systems. Overall, an insight has been achieved into the stability of Multi-Agent Systems that make use of Evolutionary Comput- ing, which is a first step in being able to control such systems. For example, say one wanted to avoid a number of bad states. If the probability of being in those states kept changing with time, it would be difficult to devise a strategy to avoid these 8 states. However, if the probability converges in time, while one could not guarantee to avoid those states, one could at least calculate the expected damage, i.e. the probability of being in a state times by the penalty for being in it, summed over all the states one wishes to avoid. Stochastic control of multi-agent systems will be the subject of further work. Our future work will also consider include more experi- mental scenarios to further consolidate the conclusions, with a range of different fitness landscapes [58], including flat ones (from the neutral theory of molecular evolution [25]) and ones with multiple global optima. VII. ACKNOWLEDGMENTS The authors would like to thank the following for encour- agement and suggestions; Dr Paolo Dini of the London School of Economics and Political Science, Dr Maria Chli of Aston University, and Dr Jon Rowe of the University of Birmingham. This work was supported by the EU-funded OPAALS Network of Excellence (NoE), Contract No. FP6/IST-034824. REFERENCES [1] D. Angeli and P.A. Bliman. Stability of leaderless discrete-time multi- agent systems. Mathematics of Control, Signals, and Systems (MCSS), 18(4):293–322, 2006. [2] T. Back. Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms. Oxford University Press, 1996. [3] T Baeck, D Fogel, and Z Michalewicz, editors. Handbook of Evolutionary Computation. CRC Press, 1997. [4] H. Balakrishnan, M. Stemm, S. Seshan, and R. Katz. Analyzing stability in wide-area network performance. In Scott Leutenegger, editor, International Conference on Measurement and Modeling of Computer Systems, pages 2–12. ACM Press, 1997. [5] G Briscoe. Digital Ecosystems. PhD thesis, Imperial College London, 2009. [6] G Briscoe. Complex adaptive digital ecosystems. In ACM Management of Emergent Digital Ecosystems Conference, 2010. [7] G Briscoe and P De Wilde. Digital Ecosystems: Evolving service- In IEEE Bio Inspired Models of Network, oriented architectures. Information and Computing Systems Conference, 2006. [8] G Briscoe and P De Wilde. Computing of applied digital ecosystems. In ACM Management of Emergent Digital Ecosystems Conference, 2009. [9] G Briscoe and P De Wilde. Digital Ecosystems: Stability of evolving agent populations. In ACM Management of Emergent Digital Ecosystems Conference, 2009. [10] G Briscoe and P De Wilde. The computing of digital ecosystems. International Journal of Organizational and Collective Intelligence, 1(4), 2010. [11] G Briscoe and S Sadedin. Natural science paradigms. In Digital Business Ecosystems, pages 48–55. European Commission, 2007. [12] G Briscoe, S Sadedin, and G Paperin. Biology of applied digital ecosystems. In IEEE Digital Ecosystems and Technologies Conference, pages 458–463, 2007. [13] Dan Cacuci, Mihaela Ionescu-Bujor, and Ionel Navon. Sensitivity and Uncertainty Analysis. CRC Press, 2003. [14] M Chli. Convergence and Interactivity of Multi-Agent Systems. PhD thesis, Imperial College London, 2006. [15] M Chli, P De Wilde, J Goossenaerts, V Abramov, N Szirbik, L Correia, P Mariano, and R Ribeiro. In E Santos Jr and P Willett, editors, International Conference on Systems, Man, and Cybernetics, pages 551–556. IEEE Press, 2003. Stability of multi-agent systems. [16] D. Cox and H. Miller. The Theory of Stochastic Processes. CRC Press, 1977. John Murray, 1859. [17] C Darwin. On the Origin of Species by Means of Natural Selection. [18] K De Jong, D Fogel, and H Schwefel. A history of evolutionary computation. In Baeck et al. [3], pages 1–12. 9 [19] P. De Wilde, H. Nwana, and L. Lee. Stability, fairness and scalability International Journal of Knowledge-Based of multi-agent systems. Intelligent Engineering Systems, 3:84–91, 1999. [20] A Eiben, E Aarts, and K Van Hee. Global convergence of genetic algorithms: A Markov chain analysis. In H Schwefel and R Manner, editors, Parallel Problem Solving from Nature, pages 4–12. Springer, 1991. [21] A. Eiben and J. Smith. Introduction to Evolutionary Computing. Springer, 2003. [22] D Futuyma. Evolutionary Biology. Sinauer Associates, 1998. [23] D Goldberg. Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, 1989. [24] D Goldberg and P Segrest. Finite Markov chain analysis of genetic In John Grefenstette, editor, International Conference on algorithms. Genetic Algorithms and their application, pages 1–8. Lawrence Erlbaum Associates, 1987. [25] M. Kimura. The neutral theory of molecular evolution. Cambridge University Press, 1983. [47] R. Smith and N. Taylor. A framework for evolutionary computation In Janice Glasgow, editor, International in agent-based systems. Conference on Intelligent Systems, pages 221–224. AAAI Press, 1998. [48] T. Soule and J. Foster. Effects of code growth and parsimony pressure on populations in genetic programming. Evolutionary Computation, 6:293– 309, 1998. [49] J Stanley and G Briscoe. The abc of digital business ecosystems. Com- munications Law - Journal of Computer, Media and Telecommunications Law, 15(1), 2010. [50] R. Sun and I. Naveh. Simulating organizational decision-making using a cognitively realistic agent model. Journal of Artificial Societies and Social Simulation, 7(3), 2004. [51] J Suzuki. A Markov chain analysis on simple genetic algorithms. IEEE Transactions on Systems, Man, and Cybernetics, 25:655–659, 1995. [52] James Thomas and Katia Sycara. Heterogeneity, stability, and efficiency International in distributed systems. Conference on Multi Agent Systems, pages 293 – 300. IEEE Press, 1998. [53] R. Vallee. Cognition et systeme (cognition and systems). Paris: In Yves Demazeau, editor, [26] J Koza. Genetic Programming: On the Programming of Computers by l'Interdisciplinaire Systeme (s), 1995. Means of Natural Selection. MIT Press, 1992. [54] G. Weiss. Multiagent Systems: A Modern Approach to Distributed [27] E. Lawrence. Henderson's dictionary of biological terms. Pearson Artificial Intelligence. MIT Press, 1999. [55] E Weisstein. CRC Concise Encyclopedia of Mathematics. CRC Press, Education, 2005. [28] LC Lee, HS Nwana, DT Ndumu, and P. De Wilde. The stability, scalability and performance of multi-agent systems. BT Technology Journal, 16:94–103, 1998. [29] S. Mabu, K. Hirasawa, and J. Hu. A graph-based evolutionary algorithm: Genetic network programming (GNP) and its extension using reinforcement learning. Evolutionary Computation, 15:369–398, 2007. [30] P Marrow. Nature-inspired computing technology and applications. BT Technology Journal, 18:13–23, 2000. [31] D. Martin, M. Paolucci, S. McIlraith, M. Burstein, D. McDermott, D. McGuinness, B. Parsia, T. Payne, M. Sabou, M. Solanki, Naveen Srinivasan, and Katia Sycara. Bringing semantics to web services: The OWL-S approach. In Jorge Cardoso and Amit Sheth, editors, Semantic Web Services and Web Process Composition, pages 6–9. Springer, 2004. [32] T. Marwala, P. De Wilde, L. Correia, P. Mariano, R. Ribeiro, Scalability and V. Abramov, N. Szirbik, and J. Goossenaerts. In optimisation of a committee of agents using genetic algorithm. ICSC Symposium D Campbell and C Fyfe, editors, Soft Computing and Intelligent Systems For Industry. ICSC-NAISO Academic Press, 2001. International [33] G. Mohanarajah and T. Hayakawa. Formation stability of multi-agent In American Control Conference, systems with limited information. 2008, pages 704–709, 2008. [34] L. Moreau. Stability of multiagent systems with time-dependent communication links. IEEE Transactions on Automatic Control, 50:169– 182, 2005. [35] F Nachira, A Nicolai, P Dini, M Le Louarn, and L Rivera Le´on, editors. Digital Business Ecosystems. European Commission, 2007. [36] A. Nix and M. Vose. Modeling genetic algorithms with Markov chains. Annals of Mathematics and Artificial Intelligence, 5:79–88, 1992. [37] J. Norris. Markov Chains. Cambridge University Press, 1997. [38] H Nwana. Software agents: An overview. Knowledge Engineering [39] H.S. Nwana. Software agents: An overview. Knowledge Engineering Review, 11:205–244, 1996. Review, 11(3):205–244, 1996. [40] R. Olfati-Saber, J. Fax, and R. Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95:215–233, 2007. [41] P Rajasekaran, J Miller, K Verma, and A Sheth. Enhancing web services description and discovery to facilitate composition. In Jorge Cardoso and Amit Sheth, editors, Semantic Web Services and Web Process Composition, pages 55–68. Springer, 2004. [42] A. Rogers, E. David, N.R. Jennings, and J. Schiff. The effects of proxy bidding and minimum bid increments within eBay auctions. ACM Transactions on the Web (TWEB), 1(2):9, 2007. [43] G Rudolph. Convergence analysis of canonical genetic algorithms. IEEE Transactions on Neural Networks, 5:96–101, 1994. [44] G. Rudolph. Finite Markov chain results in evolutionary computation: A tour d'horizon. Fundamenta Informaticae, 35:67–89, 1998. [45] N. Schurr, J. Marecki, M. Tambe, P. Scerri, N. Kasinadhuni, and J. Lewis. The future of disaster response: Humans working with In AAAI Spring Symposium on multiagent teams using DEFACTO. Homeland Security, 2005. [46] R. Smith, C. Bonacina, P. Kearney, and W. Merlat. Embodiment of evolutionary computation in general agents. Evolutionary Computation, 8:475–493, 2000. 2003. [56] N. Wiener. Cybernetics or Control and Communication in the Animal and the Machine. MIT Press, 1948. [57] M Wooldridge. Introduction to MultiAgent Systems. Wiley, 2002. [58] S Wright. The roles of mutation, inbreeding, crossbreeding and selection in evolution. In D. Jones, editor, International Congress on Genetics, pages 356–366. Brooklyn botanic garden, 1932. BIOGRAPHIES Philippe De Wilde is a Professor at the Intelligent Systems Lab, Department of Computer Science, and Head of the School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh, United Kingdom. Research interests: stability, scalability and evolution of multi-agent systems; networked populations; coordination mechanisms for popula- tions; group decision making under uncertainty; neural networks, neuro-economics. He tries to dis- cover biological and sociological principles that can improve the design of decision making and of networks. Research Fellow, British Telecom, 1994. Laureate, Royal Academy of Sciences, Letters and Fine Arts of Belgium, 1988. Senior Member of IEEE, Member of IEEE Computational Intelligence Society and Systems, Man and Cybernetics Society, ACM, and British Computer Society. Associate Editor, IEEE Transactions on Systems, Man, and Cybernetics, Part B, Cybernetics. Gerard Briscoe is a Research Associate at the Systems Research Group of the Computer Labora- tory, University of Cambridge, UK, and a Visiting Scholar at Intelligent Systems Lab of the School of Mathematical and Computer Sciences, Heriot-Watt University, UK. Before this he was a postdoctoral researcher at the Department of Media and Com- munications of the London School of Economics and Political Science, UK. He received his PhD in Electrical and Electronic Engineering from Imperial College London, UK. Before which he worked as a Research Fellow at the MIT Media Lab Europe, after completing his B/MEng in Computing also from Imperial College London. His research interests include Sustainable Computing, Cloud Computing, Social Media and Natural Computing.
1902.00380
3
1902
2019-11-24T12:17:38
ACSEE: Antagonistic Crowd Simulation Model with Emotional Contagion and Evolutionary Game Theory
[ "cs.MA", "cs.MM" ]
Antagonistic crowd behaviors are often observed in cases of serious conflict. Antagonistic emotions, which is the typical psychological state of agents in different roles (i.e. cops, activists, and civilians) in crowd violent scenes, and the way they spread through contagion in a crowd are important causes of crowd antagonistic behaviors. Moreover, games, which refers to the interaction between opposing groups adopting different strategies to obtain higher benefits and less casualties, determine the level of crowd violence. We present an antagonistic crowd simulation model, ACSEE, which is integrated with antagonistic emotional contagion and evolutionary game theories. Our approach models the antagonistic emotions between agents in different roles using two components: mental emotion and external emotion. We combine enhanced susceptible-infectious-susceptible (SIS) and game approaches to evaluate the role of antagonistic emotional contagion in crowd violence. Our evolutionary game theoretic approach incorporates antagonistic emotional contagion through deterrent force, which is modelled by a mixture of emotional forces and physical forces defeating the opponents. Antagonistic emotional contagion and evolutionary game theories influence each other to determine antagonistic crowd behaviors. We evaluate our approach on real-world scenarios consisting of different kinds of agents. We also compare the simulated crowd behaviors with real-world crowd videos and use our approach to predict the trends of crowd movements in violence incidents. We investigate the impact of various factors (number of agents, emotion, strategy, etc.) on the outcome of crowd violence. We present results from user studies suggesting that our model can simulate antagonistic crowd behaviors similar to those seen in real-world scenarios.
cs.MA
cs
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 1 ACSEE: Antagonistic Crowd Simulation Model with Emotional Contagion and Evolutionary Game Theory 9 1 0 2 v o N 4 2 ] A M . s c [ 3 v 0 8 3 0 0 . 2 0 9 1 : v i X r a Chaochao Li, Pei Lv, Dinesh Manocha, Hua Wang, Yafei Li, Bing Zhou, and Mingliang Xu* Abstract -- Antagonistic crowd behaviors are often observed in cases of serious conflict. Antagonistic emotions, which is the typical psychological state of agents in different roles (i.e. cops, activists, and civilians) in crowd violent scenes, and the way they spread through contagion in a crowd are important causes of crowd antagonistic behaviors. Moreover, games, which refers to the interaction between opposing groups adopting different strategies to obtain higher benefits and less casualties, determine the level of crowd violence. We present an antagonistic crowd simulation model, ACSEE, which is integrated with antagonistic emotional contagion and evolutionary game theories. Our approach models the antagonistic emotions between agents in different roles using two components: mental emotion and external emotion. We combine enhanced susceptible-infectious-susceptible (SIS) and game approaches to evaluate the role of antagonistic emotional contagion in crowd violence. Our evolutionary game theoretic approach incorporates antagonistic emotional contagion through deterrent force, which is modelled by a mixture of emotional forces and physical forces defeating the opponents. Antagonistic emotional contagion and evolutionary game theories influence each other to determine antagonistic crowd behaviors. We evaluate our approach on real-world scenarios consisting of different kinds of agents. We also compare the simulated crowd behaviors with real-world crowd videos and use our approach to predict the trends of crowd movements in violence incidents. We investigate the impact of various factors (number of agents, emotion, strategy, etc.) on the outcome of crowd violence. We present results from user studies suggesting that our model can simulate antagonistic crowd behaviors similar to those seen in real-world scenarios. Index Terms -- Group violence, emotional contagion, evolutionary game theory ! 1 INTRODUCTION Crowd simulation has received increased attention in virtual reality, games, urban modeling, and pedestrian dy- namics. One of the most important tasks in crowd sim- ulation is to generate realistic crowd behaviors. Physical methods [1], [2], [3], psychology principles [4], [5], [6], or approaches from other relatively matured disciplines [7], [8], [9], [10] are leveraged into the crowd simulation to improve the similarity between simulation results and real- world crowd movements. As pointed out in [4], emotion has a great influence on crowd behavior and it often invokes an agent to implement either a positive or negative behavioral response. Thus, the emotion modeling in crowd simulation is always the main focus in latest research work. How- ever, the emotional aspect of antagonistic crowd behaviors among people in different roles is left unexplored [11]. Analyzing the emotions of antagonistic crowd behaviors is indeed extremely important, as it can help us understand evolution process of antagonistic crowd behaviors and pre- dict trends of crowd movements. In this paper, we mainly deal with the problem of sim- *Corresponding author. • • Chaochao Li, Pei Lv, Hua Wang, Yafei Li, Bing Zhou, and Mingliang Xu are with Center for Interdisciplinary Information Science Research, ZhengZhou University, 450000. • Dinesh Manocha is with Department of Computer Science and Electrical & Computer Engineering, University of Maryland, College Park, MD, USA. E-mail: {ielvpei, ieyfli, iebzhou, iexumingliang} @zzu.edu.cn; [email protected]; [email protected]; [email protected] ulating antagonistic crowd behaviors. Such behaviors are associated with acts of violation and destruction and are typically carried out as a sign of defiance against a central authority or an indication of conflict between opposing groups [12]. Our goal is to develop a new crowd simulation model that can predict trends of crowd movement in these situations while ignoring the trajectory of a particular indi- vidual, discuss the conditions of winning and losing sides, and help to develop measures to quell incidents of crowd violence. Not only will such a method be useful for training police officers, but it could also predict the trends of crowd movements and provide the decision for controlling crowd violence incidents. It is difficult to simulate realistic antagonistic crowd be- haviors because of complex influencing factors. In practice, such behaviors are closely related to antagonistic emotions [13], [14], i.e. the emotions between opposed groups, and evolutionary game theory [5], [12]. In the pursuit of more realistic antagonistic behaviors in virtual agents, antagonis- tic emotion simulation should be incorporated into crowd simulation models [6]. Most prior crowd simulation models ignore antagonistic emotions and individuals' antagonistic behaviors. Fu et al. [15] focus on agents' emotions for only one role without involving the antagonistic emotions be- tween different types of agents. Some empirical methods of modeling antagonistic behaviors are presented in the form of riot games [16], game theoretic models [17], and social networks. These methods are based on statistical spatial- temporal analysis and role-playing dynamics in crowds and can generate emergent social phenomena. Other models use JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 2 evolutionary game theory to simulate the behaviors and interactions between different kinds of agents [12], [18]. Evolutionary game theory has successfully helped explain many complex and challenging aspects of biological and social phenomena in recent decades [18]. Inspired by the idea that more offspring will be produced by more fit biolog- ical organisms in a given environment, evolutionary game theory provides us with the methodology to study strategic interactions among agents in incidents of crowd violence [19]. There is considerable work on evaluating individuals' emotions [20], [21]. Panic, for example, destroys an individ- ual's normal mental function, transforms the individual into an irrational state, and can lead to unpredictable abnormal behaviors. Furthermore, Durupinar et al. [5] point out that agents' emotions dominate their decision-making process in games and other behaviors. However, the relationship between antagonistic emotion and antagonistic crowd be- havior has not been fully explored [15]. It is challenging to accurately model antagonistic emotions among agents in different roles because the antagonism is complex and changes constantly and dynamically [22]. Moreover, prior methods do not consider the effect of antagonistic emotion on evolutionary game theory despite the fact that emotion influences an agent's behavior significantly. For example, Lv et al. [23] calculate emotions based on political viewpoints of individuals at political rallies. Their method doesn't involve evolutionary game theory or explore the relationship be- tween evolutionary game theory and antagonistic emotion. Recent advances in crowd simulation models attempt to simulate plausible human behavior by introducing psy- chological phenomena to virtual agents [6]. Inspired by the psychological theory in [24], which shows the char- acterization and simulation of emotional contagion, these psychological phenomena effectively improve the reliability of simulations. Fu et al. [15] integrate emotional contagion with individual movement to obtain realistic emotions and behaviors in a crowd during an emergency. Based on this method, we propose an enhanced SIS model considering the benefits of games and test our antagonistic emotional contagion method among agents in different roles. More- over, we integrate antagonistic emotional contagion with evolutionary game theory through deterrent force, which describes the differences between agents more accurately. Finally, we determine antagonistic crowd behaviors com- bining antagonistic emotional contagion and evolutionary theories. Our main contributions include: • We propose a method to simulate emotion contagion between antagonistic agents in different roles, which is determined by combing the enhanced SIS and game approaches. • We propose a kind of deterrent force, which is mod- elled by a mixture of emotional forces and physical forces defeating the opponents, and it helps individ- uals make reasonable decisions in the games. • We integrate antagonistic emotions into an evolu- tionary game theoretic method through deterrent force to model antagonistic crowd behaviors more realistically. Our model can generate simulation results that are clos- est to the real-world scenarios in the overall trends of crowd movements. We have implemented our model and tested it on several outdoor scenarios with varying ratios of different types of roles. Our simulation results are compared with the real-world videos and we evaluate the benefits of our model by performing user studies. The results indicate that the behaviors of agents generated by our model are closer to real-world scenes in the overall trend of crowd movements than those seen in other methods. The rest of this paper is organized as follows. We review related work in Section 2. We give an overview of our method in Section 3. We introduce our model in Section 4 and show it can be used to generate antagonistic crowd behaviors. We describe the implementation and highlight its performance on complex scenarios in Section 5. We also present results from our preliminary user studies in Section 5. 2 RELATED WORK In this section, we provide a brief overview of prior works in emotional contagion, evolutionary game theory, and agent- based crowd simulation. 2.1 Emotional contagion Emotion is a psychological parameter and has a significant influence on individuals in a crowd [5], [25], [26], [27]. Emotional contagion is closely related to human movement [28], [29], [30]. In this subsection, we introduce some repre- sentative works about emotional contagion [4]. The epidemiological susceptible-infectious-recovered (SIR) model [31] divides the individuals in a crowd into three categories: infected, susceptible, and recovered. The analysis of the spread of epidemic among these three groups has also been extended to other fields. In [32], the extended model is used to simulate the spread of rumors. Some re- searchers use the epidemiological SIR model in conjunction with other models to describe emotion propagation under specific situations. In [5], the epidemiological SIR model is improved by combining it with the OCEAN (openness, conscientiousness, extroversion, agreeableness, neuroticism) personality model [33]. In [34], a qualitatively simulated approach to model emotional contagion is proposed for large-scale emergency evacuation. The method shows that the effectiveness of rescue guidance is influenced by the leading emotions in a crowd. Moreover, in [15], the cellular automata model based on the SIR model (CA-SIRS) is used to describe emotional contagion in a crowd during an emer- gency, capturing the dynamic process "susceptible-infected- recovered-susceptible." However, in some case, people only need to consider two emotional states: infected and sus- ceptible. Hill et al. [35] evaluate the spread of long-term emotional states across a social network based on the clas- sical SIS (Susceptible Infected Susceptible) model. Cai et al. [36] combine the OCEAN and SIS models to simulate emotional contagion on crowd evacuation. Song et al. [37] discuss the factors influencing individual evacuation de- cision making in the view of social contagion based on Susceptible-Infective (SI) model. Emotional contagion can also be used in traffic simulation [38], [39], [40] and crowd queuing simulation [41]. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 3 Fig. 1: Overview of our ACSEE model. (a) Crowd violence occurs. Civilians, activists, and cops are specified in our model and they can perceive environmental information. The basic attributes of these agents are introduced in Section 4.2. (b) Our antagonistic emotional contagion method consists of two components: mental emotion and external emotion. After the outbreak of the crowd violence, the antagonistic emotions of each agent are updated at each time step (Section 4.3). (c) We calculate the antagonistic emotion and deterrent force of each agent. The situation of the cops and activists is determined based on the deterrent force, which is defined according to antagonistic emotion. The game between antagonistic cops and activists is carried out in different situations. Agents use different strategies to carry out game interactions and their benefits are analyzed (Section 4.4). Their strategies are evolved over time using the evolutionary learning method. (d) We present behavior control method based on deterrent force, strategy, and benefit (Section 4.5). Agents choose rational movement directions and actions and their positions are updated. We use step (b) to calculate the positions of all the agents at the next time step. (e) If the crowd violence subsides, the incident ends. A thermodynamic-based emotional contagion model is introduced by Bosse et al. [42] in the ASCRIBE system. The authors use a multi-agent based approach to define emo- tional contagion within groups. Their study focuses on the emotions of a collective entity rather than the emotions of single individuals. Neto et al. [6] adapt the model proposed by Bosse et al. [43] into BioCrowds and cope with different groups of agents. Tsai et al. [44] present an emotional con- tagion model that spreads the highest level of emotion to surrounding agents in their ESCAPES framework. In [45], dynamic emotion propagation is described from the per- spective of social psychology, combining thermodynamic- based models and epidemiological-based models. According to the behaviors of different agents in antag- onistic scenarios, we define three kinds of agents. Each kind of agents is assigned a role separately: civilians, activists, and cops. Because of the antagonism between agents with different roles, the above-mentioned emotional contagion models can't be directly applied to crowd violent scenes. In this paper, we propose antagonistic emotions. Antagonistic emotions are the opposite emotions of agents in different roles. Different roles of agents come from opposing groups in crowd violent scenes. In our model the emotions of cops and activists are the antagonistic emotions. Antagonistic emotional contagion is the emotional contagion process of antagonistic agents in different roles under certain situa- tions. Our antagonistic emotional contagion method can quantitatively characterize dynamic changes in the antag- onistic emotions between different roles. 2.2 Evolutionary game theory In this subsection, we summarize some representative works about evolutionary game theory. Evolutionary game theory has solved many biological problems. For example, in [46], genome-driven evolutionary game theory helps to explain the rise of metabolic interde- pendencies in microbial communities. Some researchers have applied evolutionary game the- ory to the recommendation system. Saab et al. [47] use classical and spatial evolutionary game theory as a possible solution to the Sybil attack in recommender systems. Li et al. [48] propose a new stability analysis of repeated games and evolutionary games based on a subset of Nash equilibrium. Evolutionary game theory can help us understand the behaviors of individuals better. Huang et al. [49] present a model in which every mutation leads to a new game between the mutants and the residents based on a evolu- tionary game theoretic approach. Evolutionary game theory is one of the most effective approaches to understand and analyze widespread cooperative behaviors among individ- uals [50]. In [51], the combination of evolutionary game theory and graph theory provides an extended framework to investigate cooperative behavior in social systems. Quek et al. [12] focus on the development of a spatial evolution- ary multiagent social network to study the macroscopic- JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 behavioral dynamics of civil violence due to microscopic game-theoretic interactions between goal-oriented agents. Some previous works [12], [52] study antagonistic crowd behaviors in crowd violence incidents based on evolution- ary game theory but do not fully consider the differences of antagonistic emotions and deterrent forces of agents with different roles. In this paper, we further improve the evolutionary game theoretic method. At first, game in our model is established between opposing groups (cops and activists). When these agents confront different scenarios and situations, they adopt different strategies such as defec- tion or cooperation to get higher benefits and less casualties. Evolutionary game theory is a modeling approach of strate- gic interactions among agents in crowd violent incidents based on natural selection mechanism. Natural selection mechanism means that more offspring will be produced by more fit biological organisms in a given environment. We use evolutionary game theory to analyze the strategies and benefits of agents. Our model incorporates antagonistic emotions into evolutionary game theory to describe the differences between agents, which estimates situations of antagonistic scenes more accurately. 2.3 Agent-based crowd simulation Agent-based model is a kind of versatile method can sim- ulate complex scenarios. In an agent-based model, all the agents are endowed with greater autonomy and have their own inherent attributes and properties. Agents can receive information from the surrounding environment, which will influence their actions and decisions [53]. They have sep- arate velocities and moving directions. Hence, an agent- based model can produce complex crowd behaviors. In con- trast to agent-based models, flow-based and particle-based models cannot accurately describe the differences between agents [54]. A flow-based model is mainly used to simulate high-density crowds and has no individuals or groups. A particle-based model cannot model high-level decision- making behaviors. Therefore, we integrate the proposed model with an agent-based method. In this subsection, we summarize this kind of methods. An agent-based approach is the most common way to simulate crowd movements [55]. Kountouriotis et al. [54] use the agent-based model to simulate thousands of agents in real time, which integrates a high level of indi- vidual parametrization, such as group behaviors between friends and between a leader and a follower. Luo et al. [56] introduce a novel framework for proactive steering in agent-based crowd simulation. The Social Forces Model is combined with an agent-based method to simulate crowds [57]. In this model, repulsive and tangential forces of each agent are introduced to avoid collisions with surrounding agents and obstacles. However, all the agents share the same attributes and move with the same speed, which doesn't conform to real-world scenarios. Some agent-based methods are used to simulate crowd movements in emergency scenarios. In these scenarios, the emotional state of an agent is a very important influencing factor in simulating realistic behaviors. Shendarkar et al. [58] present a novel crowd simulation model for emergency response using BDI (belief, desire, intention) agents. Luo 4 et al. [59] describe the human-like decision-making process based on various physiological, emotional, and social group attributes for agents under normal and emergency situa- tions. Aydt et al. [60] propose an emotion model integrated with an agent-based method in serious games based on modern appraisal theory. In contrast to the above meth- ods, which don't involve antagonistic scenes or emotions between agents in different roles, our method focuses on antagonistic emotions and the relationship between antago- nistic emotions and evolutionary game theory. TABLE 1: The parameters used in our ACSEE model. Notation Description PR eex i eme i ∆eex i,j (t) ∆eex c (t) ∆benei (t) ∆eme i (t) ∆ei (t) ei (t) Ta2c Tc2a fi (t) Fi (t) Fi (t) ∆Fi Pdie Twarn warn time Twarn time The radius of perceived range External emotion of agent i Mental emotion of agent i The increase in the strength of agent i's external emotion received from agent j at time t The increment of external emotion of agent c at time t The difference of the benefits of the games at time t and t − 1 for agent i The increment of the mental emotion of agent i at time t The increment of the total emotion of agent i at time t The total emotion of agent i at time t If the emotion value of an activist exceeds the threshold Ta2c, role transition from activist to civilian occurs. If the emotion value of a civilian less than the threshold Tc2a , role transition from civilian to activist occurs. The deterrent force of agent i at time t The total deterrent force of agents of the same type for agent i at time t The total deterrent force of his or her opponents in the cells neighboring agent i at time t The difference of the total deterrent forces between cops and activists that agent i can perceive at time t The death probability The early warning threshold The time of early warning The time of early warning threshold 3 OVERVIEW OF OUR APPROACH In this section, we introduce some basic and important concepts about crowd behavior simulation and crowd emo- tional contagion. We also give an overview of our method. 3.1 Crowd behavior simulation Crowd behavior simulation can be defined as a process of emulating or simulating the movement of large amount of entities, characters or agents [61]. At a broad level, crowd movement is governed by psychological status of individu- als and their surrounding environment [22]. When humans form a crowd, interaction becomes an essential part of the overall crowd movement [5]. For agent-based methods of crowd simulation used in this paper, each agent is as- sumed as an independent decision-making entity, which has knowledge of the environment and a desired goal position JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 at each step of the simulation. The interactions between an agent with others or with the environment are often performed at a local level [62]. A typical crowd simulation model can be defined as in Equation 1. P t represents the positions of all the agents in the scene at time t and P t+1 is the positions of all the agents at time t + 1, which can be induced by crowd simulation model f. P t+1 = f (P t) (1) 3.2 Crowd emotional contagion Crowd simulation research has recently taken a new di- rection for modeling emotion of individuals to generate believable, heterogeneous crowd behaviors. Emotion of an agent can greatly affect its ability to perceive, learn, behave, and communicate within the surrounding environment [5]. The emotion owned by one agent provides information about other agents' behavioral intentions and modulates his or her behavioral decision-making process. Based on their appraisal of the environment, emotions of the agents in a crowd are updated dynamically at different time. In antagonistic scenes, such emotional changes become more obvious and play a vital role in crowd interaction behaviors. As shown in Equation 2, the emotion values of all the agents Et+1 at time t + 1 can be computed according to their relative positions P t and emotions of the agents Et at time t. Et+1 = g(Et, P t) (2) 3.3 Overview of our ACSEE model This paper mainly discusses the influence of antagonistic emotions on agents' behaviors, whose purpose is to com- pute and update the status of all the agents at different time steps according to their emotions and roles. The crowd emotion is fully integrated into crowd behavior simulation, also with considering the confrontation between agents with different roles, such as civilians, activists, and cops. Given the positions P t, the emotions Et, and the roles Rt of all the agents at time t, our crowd simulation model ACSEE(P t, Et) estimates the positions P t+1, the emotions Et+1, and the roles Rt+1 of all the agents at next time step as Equation 3. {P t+1, Et+1, Rt+1} = ACSEE(f (P t−1), g(Et−1, P t−1), Rt) = ACSEE(P t, Et, Rt) (3) (ACSEE) based on Emotional 4 ACSEE MODEL We present a novel Antagonistic Crowd behavior Simulation model contagion and Evolutionary game theories. Our model consists of three important modules: antagonistic emotional contagion, an- tagonistic evolutionary gaming, and behavior control. The antagonistic emotional contagion method is designed by combining the enhanced SIS and game approaches. Using the antagonistic emotions of agents, we define their deter- rent forces in Section 4.4. The enhanced evolutionary game theoretic approach is determined based on the deterrent forces of agents. Our ACSEE model computes the behavior of each agent by modeling the influence from antagonistic emotional contagion and evolutionary game theories. The flowchart of our ACSEE model is presented in Figure 1. 5 4.1 Symbols and Notations For convenience, the important parameters used in the ACSEE model and their descriptions are listed in Table 1. 4.2 Agent modeling in antagonistic scenes In this section, we mainly describe the role of different kinds of agents and the assumptions we formulated. 4.2.1 Civilians, activists, and cops Crowd violence incidents are often caused by some serious social contradictions, where a certain amount of activists challenge or break the normal and peaceful social order or stability in different ways of violence such as large- scale gathering, group activities, and physical conflicts. We classify the agents in the crowd under such situations as civilians, activists, or cops based on their roles according to [12], [63]. Civilians are neutral agents in the environment and pose no danger to the central authority. In general, civilians are vulnerable groups and do not participate in confrontation. The cops do their best to protect civilians while the activists persecute them. However, civilians may change their roles if conditions are favorable to express their anger and frustra- tion publicly. For example, because of the instigation of the surrounding activists, the civilians may turn into activists to participate in the riot. Activists aim to create havoc and fuel the ongoing unrest while avoiding being defeated by cops. Cops maintain public order by suppressing activists and play a key role in preventing terrorist attack. In real- world scenarios, cops and activists can represent any two an- tagonistic groups [13]. Civilians can also represent onlookers and neutral parties. 4.2.2 Assumptions Antagonistic crowds arise for many complex influencing factors. The simulation of antagonistic crowd behaviors considering all the influencing factors is an insoluble prob- lem. From the observations of the real antagonistic crowd behaviors, we formulate the following assumptions to make this problem solvable. • Emotions of cops are positive while those of activists are negative. Civilians are neutral agents. The pro- cess of emotional contagion can change their emo- tions. Cops with high positive emotions will make the agents around them more positive. Activists with high negative emotions will make the agents around them more negative. Civilians don't actively affect the emotions of surrounding agents [5]. • An agent can maintain a perceived range that is centered around it. We regard the perceived range of an agent as a circular area with a fixed radius PR [5], [64]. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 6 • Agents use different strategies to interact with their opposing agents. Agents' strategies refer to the ac- tions taken during the games. According to the en- countered situation, activists and cops can adopt one of two different strategies: cooperation or defection [12], [65]. The cooperation strategy of activists means accepting peaceful settlements and running away from the cops. The activists with defection strategy will revolt aggressively and instigate civilians to revolt. The cops with cooperation strategy keep away from large gatherings of activists to protect civilians. The defection strategy of cops means pursuing ac- tivists. • The agent may be classified as death. Dead agents are subdued by their opponents and pose no threat any more. It doesn't mean biological death. 4.3 Antagonistic emotional contagion module Since emotion has an important influence on people's be- havior decision-making, accurate emotion modeling is es- sential and fundamental for a crowd simulation model [5]. In this section, we present our antagonistic emotional contagion module. Emotions in our model incorporate the antagonism between agents in different roles. ei denotes the emotion of agent i. ei ∈ (−1, 1) and ei (cid:54)= 0. There are two different types of emotion: positive emotion and negative emotion. When the emotion value is greater than 0, the emotion is positive. The higher the emotion value of an agent, the more positive his/her emotion. When the emotion value is less than 0, the emotion of the agent becomes negative. The lower the emotion value of an agent, the more negative his/her emotion. When an emotion value is closer to 0, the agent is regarded as being in a peaceful state and he or she tends to be conservative. The descriptions of different emotion values of different roles are listed in Table 2. TABLE 2: The descriptions of different emotion values of different roles Descriptions of emotion Roles Cops Activists Civilians Closer to 1 high morale; brave in subduing the activists escape from cops not challenging cops brave; not fear of activists Emotion Closer to 0 peaceful peaceful peaceful Closer to −1 low morale; afraid of activists; dare not to fight with activists arrogant and attack cops uneasy, suffering, fear of activists, and obeyed In such an antagonistic game scenario, individuals will be influenced by external and internal stimuli. External stimuli mainly come from the external environment and are often accepted by individuals passively. Internal stimuli come from the subjective perception and judgment of indi- viduals by themselves. Both the internal and external stimuli in the antagonistic scenarios are able to produce emotions, so the emotion of an agent ei consists of two parts. The first part is the external emotion eex , which is influenced by i surrounding agents. The second part is the mental emotion eme [66], which is determined by an agent's own subjective i consciousness. Therefore, the final emotion value is defined as follows [67], [68]: ei = eex i + eme i (4) 4.3.1 External emotion Our method for calculating external emotion is inspired by the emotional contagion model in [15]. An agent can be affected by others in his or her perceived range. The increase in the strength of external emotion of agent i (∆eex i,j (t)) received from agent j at time t is defined as: ∆eex i,j(t) = [1 − 1 (1 + exp(−L)) ] × ei(t) × Aj,i × Bi,j (5) where L represents the distance between agent i and j, ei denotes the emotion of agent i, Aj,i is the intensity of emotion received by i from sender j, and Bi,j is the intensity of emotion which is sent from i to receiver j. Civilians can only passively receive the emotional conta- gion from surrounding agents and cannot actively influence others. The increment of external emotion of agent o at time t is denoted as ∆eex o (t) includes emotional influences received from all the cops and activists in the perceived range of agent o . ∆eex o (t) is defined as follows: o (t). ∆eex k(cid:88) ∆eex o (t) = n(cid:88) ∆eex o,ci (t) + ∆eex o,aj (t) (6) i=1 j=1 (t) and ∆eex o,aj where ∆eex (t) denote the increase in the o,ci strength of the external emotion transmitted from cop ci and activist aj to agent o. 4.3.2 Mental emotion Each agent establishes game play with agents in the oppos- ing group who are in his or her perceived range. Because civilians are neutral members and remain peaceful, we assume that no game interaction will occur between civilian agents. The benefits of each game are determined according to the method outlined in Section 4.4. Mental emotion is defined as the difference between the benefits of two games and the mental emotion of civilians is a constant [69]. The difference between the benefits of the games at time t and t− 1 for agent i is denoted as ∆benei (t) = benei (t)− benei (t − 1). The threshold that leads to emotional fluctua- tions is δ. The relationship between the increment of mental emotion and the difference between the benefits at time t is defined by:  rand(−0.01, 0.01), ∆benei(t) < δ δ+exp(δ/∆benei(t)) , ∆benei(t) ≥ δ δ+exp(∆benei(t)/δ) , ∆benei(t) ≤ −δ − 0.1 0.1 (7) ∆eme i (t) = In Equation 7, ∆benei (t) < δ means that the difference between benefits fails to reach the emotional fluctuation threshold δ. Therefore, there is little change in the emotion of agent i. In this case, the mental emotion value is a random number on the interval (-0.01, 0.01). ∆benei (t) ≥ δ means that the benefit at time t is higher than that at time t− 1. The benefit increase makes the cops more positive and activists more negative. ∆benei (t) ≤ −δ means that the difference between the benefits of time t and t − 1 is higher than the emotional fluctuation threshold δ. The benefit at time t is lower than that at time t − 1. The benefit decrease makes cops more negative and activists more positive. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 4.3.3 Emotion updating Our emotion updating method for agents is presented in Figure 2. The mental and external emotions of each agent are updated according to the evolution of the games and changes in agents' locations. The external emotion of an agent is determined by the emotional contagion (external stimulus) of surrounding cops and activists. The differences between the benefits of games (internal stimulus), which is defined in Section 4.3.2, lead to the changes in the mental emotions of cops and activists. Fig. 2: Emotion updating method. The benefit of the game between cops and activists is the internal stimulus, which leads to the changes in mental emotions. Emotional contagion among different kinds of agents is the external stimulus, which leads to the changes in external emotions. The increment of the total emotion (∆eo (t)) of agent o at time t is defined as follows: ∆eo(t) = ∆eex o (t) + ∆eme o (t) (8) For each time step, the total emotion value is updated. At time t, the total emotion value of agent o is defined as follows: eo(t) = eo(t − 1) + ∆eo(t) (9) 4.4 Antagonistic evolutionary gaming module In our model an agent establishes game play with all the agents from the opposing group within his or her perceived range, according to game theory. When agents confront dif- ferent scenarios and situations, they adopt different strate- gies and get varying benefits. They aim to maximize their benefits and minimize casualties according to the current situation. In this subsection, we present the evolutionary game theoretic module of our model, which is used to analyze the strategies and benefits of agents. At first, agents estimate surrounding situations based on the deterrent forces of the agents in their perceived range. Deterrent force is a kind of power by which an agent can beat his or her opponents and is closely related to the agent's behavior. Emotion plays a crucial role in agents' deterrent forces [70]. The deterrent force of agent i is defined in the following equation: (cid:16)ei (t) · π (cid:17) fi (t) = sin 2 (10) where ei (t) is the emotion of agent i at time t. The more positive or negative the emotion of an agent is, the greater the deterrent force the agent possesses [70]. The total deter- rent forces are defined as follows: 7 (cid:88) (cid:88) k∈A k∈ A Fi (t) = Fi (t) = fk (t) fk (t) (11) (12) where the set A denotes agents of the same type in the perceived range of agent i and the set of the opposing agents in the perceived range of agent i is A. The situation is defined according to the difference be- tween the total deterrent forces of cops and activists per- ceived by agent i, which is expressed in Equation 13, as follows. ∆Fi = Fi (t) − Fi (t) (13) Under different situations, the benefits gained during the games are different. The benefit matrix is defined according to varying situations. In contrast, the benefit matrix defined in [12] is based on the number of cops and activists and assumes that the deterrent forces of all the agents are the same. Instead, we define the benefit matrix based on the deterrent forces of cops and activists. We fully account for the differences between the deterrent forces of all the agents, which conforms to real-world scenes. The benefit matrix corresponding to different situations is shown in Table 3. TABLE 3: Benefit matrix of cops and activists. ∆F denotes the situations of cops and activists. ∆F > 0 means that the total deterrent force of the cops is higher than that of the activists. ∆F < 0 and ∆F = 0 are defined in a similar way. Activists and cops can adopt two different strategies: cooperation or defection. We list the benefits of cops and activists corresponding to different situations. For example, the ratio of the benefits of the cops using a cooperation strategy to the activists using a cooperation strategy is 1:4 when ∆F > 0. The ratio of the benefits of the cops using a cooperation strategy to the activists using a defection strategy is 2:2 when ∆F > 0 [12] Situations Benefit ∆F > 0 ∆F < 0 ∆F = 0 Strategy of cops Cooperation Defection Cooperation Defection Cooperation Defection Strategy of activists Cooperation Defection 1,4 3,3 4,1 2,2 3,3 5,0 2,2 4,1 3,3 1,4 0,5 1,1 When the total deterrent force of the cops is higher than that of the activists (∆F > 0), if both groups adopt a strategy of cooperation, cops miss an opportunity to make arrests. Compared with activists, cops reap fewer benefits. If both groups defect, cops gain the upper hand because they have a higher total deterrent force and therefore reap more benefits. If cops cooperate and activists defect, both groups' JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 benefits remain relatively neutral. Cops should defect to confront activists while activists should cooperate to avoid challenging cops and inviting casualties. If cops defect and activists cooperate, cops exert dominance over activists and activists avoid direct conflict. Therefore, both groups obtain benefits. When the total deterrent force of cops is less than or equal to that of activists (∆F < 0 or ∆F = 0), their benefits are defined similarly. After a game, the strategies of cops and activists are updated according to the results of that game. Each agent is defined by a binary string. This string encodes the strategy bits in different situations. This string suggests the strategies an agent should adopt when ∆F = 0, when ∆F > 0, and when ∆F < 0. Then the effectiveness or benefit of each strategy is calculated. The more beneficial strategy is chosen and it will be passed on to the offspring in an attempt to create a better strategy. 4.5 Behavior control module The behavior control method of agents is determined by antagonistic emotional contagion and evolutionary game theoretic approaches. In this section, we present some rules about how agents determine their positions at the next time step and their living states. Agents determine their positions at the next time step based on the cellular automaton model [15]. A cellular space of M × N cells is defined and each agent occupies one cell. At each time step, agents choose to move to their neighboring cells or stay still. Whether an agent moves or not depends on the deterrent forces exhibited by his or her neighboring agents. For a cop or an activist, this is divided into the following possible cases according to real-world videos: • If the total deterrent force of agents in the opposing group is higher than that of agents of the same type in agent i' s neighboring cells, he or she has to move. The moving direction of agent i is determined by the expected benefits of his or her neighboring cells. At first, the neighboring cells around agent i will be checked to find the empty ones (an empty cell means that there is not an agent in it). Then the expected benefits of all the empty cells are calculated. The cell with the highest benefit is the position to which agent i will move. • Next we consider the situation where the total de- terrent force of the opposing agents is less than that of agents of the same type in agent i's neighboring cells. If agent i's strategy is defection, he or she will move to the nearest opposing agent (i.e. attack the opposing agent). If agent i's strategy is cooperation, he or she will stay away from opposing agents and move to the nearest civilian. If agent i is a cop, he or she will protect the civilian. If agent i is an activist, he or she will attack the civilian. In this case, agent i may also choose to stay still. • Agent i with no neighbors chooses to move. The moving direction is the same as the situation where the total deterrent force of the opposing agents is less than that of agents of the same type. (cid:32) (cid:33) (cid:80) Fi(cid:80) (cid:95) F i 8 • Civilians move to safer positions where there are more cops around them. The agent with a defection strategy attacks his or her opponents. The agent may be dead. A dead agent in this case means being subdued by his or her opponents and therefore posing no threat to these opponents. It doesn't mean real death. At each time step, the death probability of each agent is calculated and denoted as Pdie. In contrast to the definition in [12], which is based on the number of cops and activists, we define Pdie based on the total deterrent forces of cops and activists. ln0.1 · Pdie = 1 − exp (14) where(cid:80) Fi represents the total deterrent force of agents of the same type, and(cid:80) (cid:98)Fi represents the total deterrent force (cid:80) Fi(cid:80) (cid:95) ensure a plausible value (Pdie = 0.9) when(cid:80) Fi = (cid:80) (cid:95) of his or her opponents in the cells neighboring agent i. denotes the total deterrent force of the cop-to-activist ratio within the perceived range of agent i. ln0.1 is set to F i F i [12], [71]. Each agent has an early warning threshold Twarn. When the value of Pdie exceeds the threshold Twarn, the value of warn time increases by 1. When the value of warn time exceeds the threshold Twarn time, the agent will die. Because the endurance of each agent is different, the values of the thresholds Twarn and Twarn time are also different for each agent. 5 IMPLEMENTATION AND PERFORMANCE We have implemented our model using Visual C++ to sim- ulate antagonistic crowd behaviors based on Unity3D . The computing environment is a common PC with a quadcore 2.50 GHz CPU,16 GB memory, and an Nvidia GeForce GTX 1080 Ti graphics card. TABLE 4: List of parameter values used in our simulation Scenario Number of agents Civilians Activists Cops Size of 2-D Grid Ta2c Tc2a Emotion Civilians Activists Cops No.1:Activists attack civilians No.2:Role transitions No.3:Cops encircling activists No.4:Real-world 1 No.5:Real-world 2 No.6:Real-world 3 No.7:Real-world 4 80 80 80 10 80 3 0 No.8:Real-world 5 100 No.9:ACSEE vs. CVM 80 50 50 50 50 50 14 30 30 50 40 70 70 30 30 40 20×20 squares 20×20 squares 20×20 squares 20×20 squares 20×20 squares 20×20 squares 100 40×40 squares 100 40×40 squares 0.1 0.1 0.1 0.1 0.1 1 1 1 -0.5 -0.5 -0.5 -0.5 -0.5 -1 -1 -1 30 20×20 squares 0.1 -0.5 0.1 0.1 0.1 0.1 0.1 0.1 0 0.1 0.1 -0.5 -0.5 -0.5 -0.5 -0.5 -0.1 and -0.3 -0.2 -0.9 and -0.2 -0.5 0.5 0.5 0.5 0.5 0.5 0.9 0.8 0.9 0.5 We run a series of experiments involving varying role number ratios in outdoor scenarios. The parameter val- ues in different scenarios used in the simulation runs are listed in Table 4. The perceived range PR of agents is 10, Twarn ∈ [0.7, 0.9], and Twarn time ∈ [8, 20]. Figures 3, 6, JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 9 (a) (e) (b) (f) (c) (g) (d) (h) Fig. 3: The numbers of three types of agents at different time steps according to different initial Rca (the ratio of cops to activists): (a) Rca is 0 (0 cops), (b) Rca is 0.6 (30 cops), (c) Rca is 0.8 (40 cops), (d) Rca is 1 (50 cops), (e) Rca is 1.2 (60 cops), (f) Rca is 1.4 (70 cops), and (g) Rca is 1.6 (80 cops). (h) Active ratio curves for different initial Rcas. (a) shows a steep drop in the number of civilians. The number of activists remains the same because there are no cops to fight with the activists. We can see from (a) to (g) that the number of dead activists increases as Rca increases. When Rca is 1.2, all the activists have been subdued by cops. The time required for all the activists to be subdued by cops decreases as Rca increases. The civilian survival time lengthens and there are more surviving civilians as Rca increases. We can see that there is an initial rise in the number of civilians in (f) and (g) because the total deterrent force of the cops is much higher than that of the activists. Some activists change their roles (from activist to civilian). (h) shows the overview of active ratios (ratios of the activists to the sum of the activists and civilians) corresponding to different Rcas. An inverse relationship between the active ratio and the Rca is presented. Therefore, increasing the ratio of cops can help subdue activists. 7, 9, and 12 report the results of 200 runs. The average of the 200 runs is the final result. We investigate the effect of varying role number ratios on the crowd violence results (in Section 5.1). By analyzing the simulation results, we find that our model can account for many emergent phenomena (discussed in Section 5.3). Next, we study how different important factors influence crowd violence. In Section 5.4 we show the impact of emotional contagion on the results of crowd violence. We compare the different simulation results with or without considering emotional contagion. In Section 5.5, the relationship between the deterrent force and the strategy is revealed. The strategies adopted by each agent in different situations are analyzed. In Section 5.6, our simulation results are compared with the real-world videos and the simulation results generated by different models. The real-world videos are chosen from the public dataset and real antagonistic events. More details about comparisons can be seen in the supplementary video. User studies are performed to evaluate our method in Section 5.7. Fig. 4: The positions of all the agents at the 168th frame (Rca is 1). The green, purple, and blue circles represent civilians, activists, and cops, respectively. The stronger the color intensity of a circle, the higher the deterrent force of the agent. 5.1 The impact of ratios of agents in different roles on the result of crowd violence We investigate the effects of varying ratios of agents in different roles on the results of crowd violence. By analyzing a large number of real-world antagonistic videos, we select several representative values of Rca (the ratio of cops to activists). In this section the initial Rcas are 0, 0.6, 0.8, 1, 1.2, 1.4, and 1.6. The initial numbers of civilians and activists are 80 and 50, respectively. The initial emotion values of all the activists and cops are -0.5 and 0.5, respectively. We can learn from Figure 3 that the number of different kinds of agents determines the outcome of crowd violence to some extent. When we increase the ratio of cops, they can JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 10 (a) (d) (g) (b) (e) (h) (c) (f) (i) Fig. 5: Some fascinating emergent phenomena our model uncovers. (a), (b), and (c) are the simulations of activists attacking civilians. (d), (e), and (f) are the simulations of role transitions. (g), (h), and (i) are the simulations of cops encircling activists. The green, purple, blue, and grey circles are civilians, activists, cops, and dead agents, respectively. The stronger the color intensity of a circle, the higher the deterrent force of the agent. subdue activists quickly, stabilize the situation, and reduce civilian casualties. When Rca is 1, it means that the initial total deterrent force of the cops is equal to that of the activists. Both cops and activists have the same probability of winning. However, in the end, the cops fail which means that all the cops are subdued by the activists. We offer a detailed explanation in the following analysis. Figure 4 shows the positions of all the agents at the 168th frame when Rca is 1. At this time step, the numbers of cops and activists are the same. Activists with strong deterrent forces are mainly located in the upper right corner of the scene. Some cops with weak deterrent forces are among the crowd of activists (upper right corner of the scene). Some surrounding civilians turn into activists because of the incitement of the activists with high deterrent forces. The cops with strong deterrent forces are in the upper left corner of the scene, which makes it difficult for them to rescue the cops in the upper right corner. When the cops with weak deterrent forces are killed by the activists with strong deterrent forces, there are fewer cops left. Finally, all the activists get together to attack the remaining cops and the activists win. We learn from Figure 4 that activists participate in collective behavior to create regions of low cop-to-activist ratios, which reduces the chances of activist death. The conglomeration of scattered activists into small groups and the amalgamation of small groups into large ones make it difficult to wipe them out [71]. Although the number of agents determines the outcome of crowd violence to a certain extent, some take advantage of agents' spatial distributions to affect the outcome of crowd violence. 5.2 The impact of agent parameters on the result of crowd violence In this section we analyze the impact of agent parameters on the result of crowd violence. We choose two parameters which have great influences on the simulation results: PR (the radius of perceived range) and A or B in Equation 5. In Equation 5, Aj,i is the strength attribute by which an emotion is received by i from sender j and Bi,j is the strength attribute by which an emotion is sent from i to receiver j. We discuss the relationship between active ratios (ratios of activists to the sum of the activists and civilians) and the parameters. The initial numbers of the civilians, activists, and cops are 80, 50, and 70, respectively. The initial emotions of the civilians, activists, and cops are 0.1, -0.5, and 0.5, respectively. The initial total deterrent force of the cops is higher than that of the activists. We show active ratios according to various values of PR in Figure 6. We assume that all individuals have the same PR. When PR of agents are different, the results of active ratios are also different. With the increase of PR, agents can more accurately estimate the situations. Therefore, the high total deterrent force of cops plays a role in defeating the activists. The active ratio decreases with the increase of PR. In addition, we also discuss the relationship between the values of A or B and active ratios in Figure 7. A and JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 11 Fig. 6: Active ratios corresponding to different PRs (the radius of perceived range). The active ratio decreases with the increase of PR. When PR is greater than 10, the active ratio tends to be stable. We choose PR = 10 in this paper. Fig. 7: Active ratios corresponding to different values of A. The active rate decreases with the increases of A. When A is greater than 0.8, the active ratio tends to be stable. We choose A = 0.8 in this paper. B are very important parameters for emotional contagion in Equation 5. The values of them are positively correlated with the values of emotional contagion. We suppose all the strength attributes of A between any two individuals are the same and those of B between any two individuals are the same. The relationship between the active ratio and A is the same as that between the active ratio and B. We take A as an example to discuss this relationship. As the value of A increases, agents' emotions also increase and the difference between the total deterrent forces of cops and activists is greater. Due to the high deterrent force of cops, more and more activists are subdued by cops. Therefore when the value of A increases, the active rate decreases. 5.3 Emergent phenomena uncovered by our model Our model can simulate many emergent phenomena that conform to real-world scenes. Figures 5a, 5b, and 5c show Fig. 8: Simulation of antagonistic crowd behavior using 3D character models. that activists with strong deterrent forces attack civilians. At the top left corner of this scene, there are a lot of civilians. Many activists are at the lower right corner of Figure 5a. Agents of the same type gather together according to [72]. Therefore, it is reasonable that agents of the same type gather together. The number of activists is larger than that of the cops. We can see from Figure 5a that the total deterrent force of the activists is stronger than that of the cops. Activists attack civilians (Figure 5b) and more and more civilians die (Figures 5b and 5c). At the lower right corner of Figure 5d, there are plenty of cops with high deterrent forces near the highlighted activist and his deterrent force is weak. If he continues to resist, he will die. He therefore transitions roles (from activist to civilian). When all the other activists die, he survives (Figure 5f). When the number of surrounding activists is large enough, it may impel civilians to become activists [73]. In Figure 5g, there are many more cops than activists. The total deterrent force of the cops is much stronger than that of the activists. At first, the cops divide the activists into two groups (Figure 5g) and prevent the activists from gathering together to form a larger group. Next, the cops eliminate these two groups of activists individually. There are some activists in the left side of the scene (the first group). Cops encircle these activists and more activists will die. When all the activists on the left side are eliminated, the cops return to the activists on the right side of the scene (the second group). These activists are encircled by the cops. Finally, all the activists are killed by the cops and the cops win. Figure 8 shows the simulation of antagonistic crowd behavior using 3D character models. The activists with high deterrent forces on the left of the scene are not afraid of the cops with low deterrent forces. In the upper left corner of the scene, the activists with high deterrent forces attack a civilian. The civilian runs away from the activists. In the middle and lower part of the scene, the cop with a high deterrent force attacks the activist and he runs away from the cop. 5.4 The impact of emotional contagion on the result of crowd violence The impact of emotional contagion on the results of crowd violence is presented in Figure 9. The initial numbers of civilians, activists, and cops are 80, 50, and 40, respectively. In Figure 9a, the initial emotion values of the cops are higher than those of the activists. At the 53rd time step, the number JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 12 (a) (b) Fig. 9: The changes in the number of civilians, activists, and cops: (a) considering emotional contagion and (b) not considering emotional contagion. (a) (b) Fig. 10: Simulation results (a) considering emotional con- tagion and (b) not considering emotional contagion. In (a) the deterrent forces of the agents are different and the same types of agents are more likely to gather together. In (b) the deterrent forces of all the agents are the same and the same type of agents are dispersed. of activists is zero. All the activists have been wiped out by the cops. At first the number of civilians increases because the total deterrent force of the cops is much higher than that of the activists. Some activists change their role (from activist to civilian). In Figure 9b, all the agents without emotion have the same deterrent force. At the 41st time step, the number of cops is zero and the activists win. We can learn from Figure 9 that the emotion module of our model can describe the differences observed between the agents. In our model, the deterrent forces of all the agents are different according to their emotions. The greater the absolute value of an agent's emotion, the higher the deterrent force of that agent. Although the number of agents is small, it is still possible to overcome a larger group of opponents by improving the emotions and deterrent forces of them. Therefore, our model can simulate situations in which agents overcome their more numerous opponents. Figure 10 shows simulation results with and without considering emotion. In Figure 10a the deterrent forces of the agents are different. The stronger the color intensity of a circle, the higher the deterrent force of the agent. Because of emotional contagion, the same types of agents are more likely to gather together, which is similar to what happens in real-world scenarios [72]. In Figure 10b the deterrent forces of all the agents are the same and the same type of agents are more dispersed. Figure 11 shows the heat maps of antagonistic emotion. (a) (c) (b) (d) Fig. 11: The heat maps of antagonistic emotion: (a) heat map at the 5th time step, (b) heat map at the 17th time step, (c) heat map at the 27th time step, and (d) heat map at the 42th time step. The red area represents the emotions of the cops. The blue area represents the emotions of the activists. The stronger the color intensity, the larger the value of the emotion. Fig. 12: Cooperation ratios of cops and activists at different time steps: (a) when the total deterrent force of the activists is higher than that of the cops; (b) when the total deterrent force of the activists is equal to that of the cops; (c) when the total deterrent force of the activists is less than that of the cops. Different colors represent different types of agents' emo- tions. The stronger the color intensity, the larger the value of the emotion. At first, the emotions of the cops and the activists are very weak. Later, as a result of the confrontation between cops and activists, both types of emotions increase. Since the initial emotions of the cops are higher than those of activists, the overall emotional scope of the cops becomes wider and wider and that of the activists becomes smaller and smaller. Finally, all the activists are wiped out by the cops and there is no blue area on the map. 5.5 The influence of deterrent force on strategy selec- tion We present the relationship between deterrent force and strategy selection in this subsection. We analyze the strat- egy (cooperation or defection) adopted by each agent with respect to their different deterrent forces. Figure 12 shows the overview of cooperation ratios (the ratio of the number of agents adopting a cooperation strat- egy to the total number of this type of agents) in relation to JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 different deterrent forces. When the total deterrent force of the activists is higher than that of the cops (Figure 12a), most of the cops adopt a cooperation strategy to avoid causalities and conserve their fighting forces. When the total deterrent force of the activists is equal to that of the cops, the cooperation ratios of cops and activists are almost the same from the 5th time step to the 45th time step. After the 45th time step, the cops defeat the activists. More and more cops adopt defection strategy, the cooperation ratio of the cops decreases, and the cooperation ratio of the activists increases. When the total deterrent force of the activists is less than that of the cops, the cooperation ratio of the activists is higher than that of the cops. In summary, the agent with a higher deterrent force is more likely to adopt a defection strategy and the agent with a lower deterrent force is more likely to adopt a cooperation strategy. 5.6 Comparisons To validate our approach, we compare our simulation re- sults with those generated by the CVM [12] and ABEC [74] models and real-world videos. Main goal of our model is to predict trends of crowd movements in these situations without explicitly modeling the trajectory of a particular individual. Simulation results obtained by our model are closest to the real-world scenes in the overall trends of crowd movements. The real scenes shown in Figures 13a and 13c are chosen from the public web dataset [75]. The real scenes of Figures 13e, 13g, and 13i are chosen from real antagonistic incidents on YouTube. For the real-world scenarios in Figure 13, we use different colors to distinguish different roles of indi- viduals. The green, purple, and blue circles and cylinders represent civilians, activists, and cops, respectively. The red arrows are the dominant paths of crowd movements. Cops and activists in this case represent two opposing groups. Civilians in this case represent onlookers and neutrals. There are no deaths of activists or cops in these scenes. The scenes can be simulated by increasing the values of the thresholds of Twarn and Twarn time for our model. The parameter values used in the simulation runs are listed in Table 4. More details can be seen in the supplementary video. We use the dominant path and entropy metric to quan- titively evaluate our simulation results. Dominant path is defined based on collectiveness of crowd movements. Collectiveness, which indicates the degree to which indi- viduals acting as a unit, is a fundamental and universal measurement for various crowd systems, including crowds in antagonistic scenes [76]. Individuals locally coordinate their movements and behaviors with their neighbors, and then the crowd is self-organized into collective movements without external control. The method proposed in [77] is used to calculate the collectiveness of our simulation results. When the collectiveness of individual movements in a cer- tain area is significantly higher than that of surrounding area, a small group of agents with similar movements is formed. The center of the group is determined according to the average of the positions of all the agents in this group. The trajectory of the group center forms its dominant path 13 (b) (d) (f) (h) (j) (a) (c) (e) (g) (i) Fig. 13: Comparisons between real scenes and our simula- tion results. (a), (c), (e), (g), and (i) are five real antagonistic scenes. (b), (d), (f), (h), and (j) are our corresponding simula- tion results generated by our ACSEE model. The red arrows are the dominant paths of crowd movements. and can be treated as the movement trend of the whole group. Using this method, we can get the dominant paths of the real-world videos. We use entropy metric [78], angular error (AE) [79], and inter-group distance metric (IDM) [80] to evaluate our crowd simulation results. They are used to evaluate the errors of trajectories, movement directions, and distances between each group, respectively. These three evaluation methods complement each other, which are used to evaluate our results more comprehensively. An entropy metric [78] is adopted to evaluate the error between the dominant paths of simulation results and that of the real-world videos. A lower entropy value implies a higher similarity between the simulation results and the real-world scenarios. Table 5 shows the entropy metric of JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 the simulation results achieved by the CVM, ABEC, and ACSEE (ours) models on different scenarios in Figure 13. The simulation results obtained by our model conform to the real-world videos best. The angular error (AE) [79] between the movement direction of the simulation result (Vx, Vy) and that of the ground-truth (Vxgt, Vygt) is also used to evaluate our crowd simulation method. This AE is defined in Equation 15. The inter-group distance metric (IDM) [80] compares the difference in the average distances between each pair of clustered agents. Tables 6 and 7 show the AE and IDM of our simulation results on different scenarios in Figure 13. Tables 5, 6, and 7 show that our method consistently outperforms the CVM and ABEC models. Compared with the CVM model, our ACSEE model considers the agents' an- tagonistic emotions and accurately describe the differences between agents' deterrent forces. Compared with the ABEC model only considering emotional contagion in antagonistic scenarios, our method considers not only antagonistic emo- tion, but also the relationship between antagonistic emotion and evolutionary game theory. The agent is able to choose a more reasonable strategy according to the situation. AE = cos xgt + V 2 ygt) (15) −1((Vx · Vxgt + Vy · Vygt)/(cid:112)V 2 x + V 2 y (cid:112)V 2 TABLE 5: Entropy metric for our simulation algorithms on different scenarios from Figure 13. A lower entropy value implies higher similarity between the simulation results and the real-world scenarios. Simulations with an entropy score less than 1.000 are considered very visually similar to the source data and those with a score greater than 6.000 are visually very different [78]. Scene No. 2 (Figure 13c) is too large and chaotic and the collectiveness of crowd movement is not so obvious. Therefore, the entropy value of Scene No. 2 is larger than 1.000, but this value is far less than 6.000. Scene No. 1 ACSEE ABEC CVM 0.193 0.232 0.259 2 1.310 1.320 1.369 3 0.255 0.268 0.270 4 0.104 0.139 0.151 5 0.117 0.180 0.187 TABLE 6: AE for the simulation algorithms on different scenes from Figure 13. A lower value for AE implies higher similarity with respect to the real-world crowd videos. We report mean and variance of AE at different time steps. Scene No. 1 2 3 4 5 ACSEE ABEC CVM 0.132/0.150 0.285/0.329 0.210/0.099 0.090/0.003 0.036/0.003 0.214/0.155 0.463/3.027 0.999/12.822 0.500/0.002 0.558/0.006 1.329/20.709 1.579/1.500 1.464/14.452 0.948/0.007 0.856/0.062 The simulation result generated by our model is com- pared with those of the CVM [12] and ABEC [74] models in Figure 14. More details can be seen in the supplementary video. In contrast to the CVM and ABEC models, our method can better quantify the differences of the deterrent forces of all the agents. Besides, we also integrate antag- onistic emotional contagion into evolutionary game theory TABLE 7: IDM (pixel) for our simulation algorithms on different scenes from Figure 13. Lower numbers are better. 14 Scene No. ACSEE ABEC CVM 1 1 31 40 2 30 32 42 3 2 21 32 4 6 18 49 5 12 35 63 to estimate situations of antagonistic scenes more accurately, which helps agents make reasonable strategies in the games. Therefore our simulation result is the most similar to the real-world scenario. 5.7 User Studies In this section we describe user studies conducted to demon- strate the perceptual benefits of our ACSEE model com- pared to other models in simulating antagonistic crowd behaviors. Experiment Goals & Expectations: Our main goal is to measure how close the crowd movement tendencies gener- ated using different models are to those observed in real- world videos. We hypothesize that in both studies, agents simulated with our ACSEE model will exhibit overall more plausible antagonistic crowd movements than other models. Therefore, participants will strongly prefer our model to the other models. Experimental Design: Two user studies were conducted based on a paired-comparison design. In each study, partic- ipants were shown pre-recorded videos in a side-by-side comparison of simulation results generated by different models and a real-world video. In particular, we asked the users to compare the crowd movement tendencies gen- erated by different crowd simulation models with those observed in real-world videos. The studies had no time constraints and the participants were free to take breaks between the benchmarks. We encouraged the users to watch these videos as many times as they wanted and finally give a stable score. Comparison Methods: The first study compares our ACSEE model considering emotion with our model that does not consider emotion. The second study compares our model with the CVM [12] and ABEC [74] models. Environments: We use outdoor scenarios without ob- stacles. In these scenarios, the green, purple, blue, and grey circles are civilians, activists, cops, and dead agents, respectively. Metrics: Participants were shown two pre-recorded videos in a side-by-side comparison of the simulation result and a real-world video. We asked the users to first watch the real-world video and then rate each simulation result on a scale of 1 - 5 in terms of the similarity of movement tendencies between the real-world video and the simulation result video. A score of 1 indicates most dissimilar and a score of 5 indicates most similar movement tendencies. Results: There are 39 participants (20 female) with a mean age of 25.12± 3.26 years in these studies. We measure the mean and the variance of their scores and then compute the p-values using a two-tailed t-test. The means of their JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 15 (a) Real scenario (b) CVM result (c) ABEC result (d) Our result Fig. 14: Comparisons between the real scenario and sim- ulation results of different crowd simulation models. The simulation result obtained by our model conform to the real- world video best. Fig. 15: User evaluation of simulation scenes. (a) Compari- son of simulation results considering emotion and without considering emotion. (b) Comparison of simulation results generated by the CVM, ABEC, and ACSEE models. Partic- ipants were asked to rate each simulation result on a scale of 1 - 5 in terms of the similarity of movement tendencies between the real-world videos and the simulation result videos. We can see from the results that our simulation results are most similar to real-world scenarios. scores for our model without emotion and with emotion are 2.87 ± 0.67 and 3.73 ± 0.93, respectively. The means of their scores for the CVM, ABEC, and ACSEE models are 2.56 ± 1.44, 3.30 ± 0.50, and 3.70 ± 0.90, respectively. The p-value for Figure 15a comparison is 2.97e−26. The p- values for the comparison of the CVM and ACSEE models and that of the ABEC and ACSEE models in Figure 15b are 2.97e−26 and 1.05e−17, respectively. We observe that the antagonistic crowd behavior simulations generated by our ACSEE model score much higher than the other models at a statistically significant rate (p-value<0.05). The result indicates that the addition of antagonistic emotion and the integration of antagonistic emotion and evolutionary game theory improve the perceptual similarity of our simulations to the crowd movement tendencies in real-world scenes. Our model gets higher scores than the CVM and ABEC models, as detailed in Figure 15b. Participants indicate their preference for our ACSEE model. 6 CONCLUSION AND LIMITATIONS We present a new model for antagonistic crowd behavior simulation integrated with emotional contagion and evolu- tionary game theory. Our approach builds on well-known psychological theories to present a comprehensive and an- tagonistic emotional contagion model. Based on the emo- tional calculation method, we propose the deterrent force to determine the situation of cops and activists. According to the situation, an enhanced evolutionary game theoretic ap- proach incorporated with antagonistic emotional contagion is determined. Finally, we present a behavior control deci- sion method based on the antagonistic emotional contagion and evolutionary game theoretic approaches. Our proposed model is verified by simulations. We in- vestigate the impact of different factors (number of agents, emotion, strategy, etc.) on the outcome of crowd violence. Our model is compared with real-world videos and previ- ous approaches. Results show that our proposed model can reliably generate realistic antagonistic crowd behaviors. However, our model still has several limitations. Al- though our simulation results are closer to the real-world scenes in the overall trend of crowd movement, the antago- nistic emotions in a crowd violent scene cannot be obtained directly or inferred accurately. One of the main reasons is that the quality of most of the real videos is poor, since they are often captured by moving phones. At present, there is no effective methods to identify and quantify the emotion values of all the individual in such videos with poor quality. Thus, the initial state of our model is set empirically according to real-world videos, which is time- consuming and not very accurate. In the future, we plan to use the latest wearable equipment to collect these data and provide a new method that can quickly and accurately obtain the initial state. Moreover, the strategies and benefits calculated by our antagonistic evolutionary game theoretic approach are the ideal situations. Game theory assumes that all individuals are rational. However, some people in real scenes are irrational and extreme, which doesn't fully satisfy the precondition of game theory. In practice, people do not necessarily adopt the optimal strategy because of the limitations of perception and other complex factors. Our current calculation result is optimal, which is only one of the possible results. In fact, it is impossible for all simulation results to be consistent with the real results. We will continue to improve our prediction results considering more actual situations of antagonistic crowds. At present, the behavior control in our model is proposed based on the cellular automata [15]. Other more complex behavioral control methods will be further considered. 7 ACKNOWLEDGMENTS This work was supported by National Natural Science Foundation of China under Grant Number 61672469, 61772474, 61822701, 61872324, Program for Science & Tech- nology Innovation Talents in Universities of Henan Province (20HASTIT021, 18HASTIT020) and Youth Talent Promotion Project in Henan Province (2019HYTP022). [3] JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 REFERENCES [1] D. Helbing, I. Farkas, and T. Vicsek, "Simulating dynamical fea- tures of escape panic," Nature, vol. 407, no. 6803, pp. 487 -- 490, 2000. [2] M. Zucker, J. Kuffner, and M. Branicky, "Multipartite RRTs for rapid replanning in dynamic environments," in Proc. IEEE Conf. Robotics and Automation, 2007, pp. 1603 -- 1609. I. Karamouzas and M. Overmars, "Simulating and evaluating the local behavior of small pedestrian groups," IEEE Transactions on Visualization and Computer Graphics, vol. 18, no. 3, pp. 394 -- 406, 2012. [4] G. Zhang, D. Lu, and H. Liu, "Strategies to utilize the positive emotional contagion optimally in crowd evacuation," IEEE Trans- actions on Affective Computing, vol. 14, no. 8, pp. 1 -- 14, 2017. [5] F. Durupinar, U. Gudukbay, A. Aman, and N. I. Badler, "Psycho- logical parameters for crowd simulation: from audiences to mobs," IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 9, pp. 2145 -- 2159, 2016. [6] A. B. F. Neto, C. Pelachaud, and S. R. Musse, "Giving emotional contagion ability to virtual agents in crowds," in Proc. Intelligent Virtual Agents, vol. 10498, 2017, pp. 63 -- 72. J. Bruneau, A.-H. Olivier, and J. Pettre, "Going through, going around: A study on individual avoidance of groups," IEEE Trans- actions on Visualization and Computer Graphics, vol. 21, no. 4, pp. 520 -- 528, 2015. S. J. Guy, J. Chhugani, S. Curtis, P. Dubey, M. Lin, and D. Manocha, "PLEdestrians: a least-effort approach to crowd simulation," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Animation, 2010, pp. 119 -- 128. J. Ondrej, J. Pettre, A.-H. Olivier, and S. Donikian, "A synthetic- vision based steering approach for crowd simulation," vol. 29, no. 4, pp. 123:1 -- 123:9, 2010. [10] S. A. Stuvel, N. Magnenat-Thalmann, D. Thalmann, A. F. van der Stappen, and A. Egges, "Torso crowds," IEEE Transactions on Visualization and Computer Graphics, vol. 23, no. 7, pp. 1823 -- 1837, 2017. [11] Y. Zhang, L. Qin, R. Ji, S. Zhao, Q. Huang, and J. Luo, "Exploring coherent motion patterns via structured trajectory learning for crowd mood modeling," IEEE Transactions on Circuits and Systems for Video Technology, vol. 27, no. 3, pp. 635 -- 648, MAR 2017. [12] H. Y. Quek, K. C. Tan, and H. A. Abbass, "Evolutionary game theoretic approach for modeling civil violence," IEEE Transactions on Evolutionary Computation, vol. 13, no. 4, pp. 780 -- 800, 2009. [13] H. Situngkir, "On massive conflict: Macro-micro link," Journal of [7] Social Complexity, vol. 1, no. 4, FEB 2004. [8] [9] [14] M. Xu, H. Jiang, X. Jin, and Z. Deng, "Crowd Simulation and Its Applications: Recent Advances," Journal of Computer Science and Technology, vol. 29, no. 5, pp. 799 -- 811, SEP 2014. [15] L. Fu, W. Song, W. Lv, and S. Lo, "Simulation of emotional conta- gion using modified SIR model: A cellular automaton approach," Physica A Statistical Mechanics & Its Applications, vol. 405, pp. 380 -- 391, 2014. [16] S. Parikh and C. Cameron, "Riot games: A theory of riots and mass political violence," in Proc. 7th Wallis Inst. Conf. Political Economy, New York: Univ. Rochester, OCT 2000. [17] R. B. Myerson, Game theory : analysis of conflict. Harvard Univer- sity Press, 1997. [20] [18] S. Y. Chong, J. Humble, G. Kendall, J. Li, and X. Yao, "Iterated prisoner's dilemma and evolutionary game theory," The Iterated Prisoners' Dilemma: 20 Years On, pp. 23 -- 62, 2007. [19] J. Li, G. Kendall, and R. John, "Computing nash equilibria and evolutionarily stable states of evolutionary games," IEEE Transac- tions on Evolutionary Computation, vol. 20, no. 3, pp. 460 -- 469, 2016. ´A. G´omez, L. L´opez-Rodr´ıguez, H. Sheikh, J. Ginges, L. Wilson, H. Waziri, A. V´azquez, R. Davis, and S. Atran, "The devoted ac- tor's will to fight and the spiritual dimension of human conflict," Nature Human Behaviour, vol. 1, no. 9, pp. 673 -- 679, SEP 2017. [21] H. Jiang, Z. Deng, M. Xu, X. He, T. Mao, and Z. Wang, "An emotion evolution based model for collective behavior simulation," in Proc. Symp. Interactive 3D Graphics and Games, 2018, pp. 10:1 -- 10:6. [22] S. Kim, S. J. Guy, D. Manocha, and M. C. Lin, "Interactive simulation of dynamic crowd behaviors using general adaptation syndrome theory," in Proc. Symp. Interactive 3D Graphics and Games, 2012, pp. 55 -- 62. [23] P. Lv, Z. Zhang, C. Li, Y. Guo, B. Zhou, and M. Xu, "Crowd behavior evolution with emotional contagion in political rallies," IEEE Transactions on Computational Social Systems, vol. 6, no. 2, pp. 377 -- 386, APR 2019. 16 [24] S. Huerre, J. Lee, M. Lin, and C. O'Sullivan, "Simulating believable crowd and group behaviors," in Proc. ACM SIGGRAPH Asia, 2010, pp. 13:1 -- 13:92. [25] C. M. D. Melo, J. Gratch, and P. J. Carnevale, "Humans vs. computers: Impact of emotion expressions on peoples decision making," IEEE Transactions on Affective Computing, vol. 6, no. 2, pp. 127 -- 136, 2015. [26] J. Tang, Y. Zhang, J. Sun, J. Rao, W. Yu, Y. Chen, and A. C. M. Fong, "Quantitative study of individual emotional states in social networks," IEEE Transactions on Affective Computing, vol. 3, no. 2, pp. 132 -- 144, APR 2012. [27] M. Xu, X. Xie, P. Lv, J. Niu, H. Wang, C. Li, R. Zhu, Z. Deng, and B. Zhou, "Crowd behavior simulation with emotional contagion in unexpected multi-hazard situations," IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1 -- 15, 2019. [28] M. Xu, Y. Wu, Y. Ye, I. Farkas, H. Jiang, and Z. Deng, "Collec- tive Crowd Formation Transform with Mutual Information-Based Runtime Feedback," Computer Graphics Forum, vol. 34, no. 1, pp. 60 -- 73, FEB 2015. [29] M. Xu, Y. Wu, P. Lv, H. Jiang, M. Luo, and Y. Ye, "miSFM: On combination of Mutual Information and Social Force Model towards simulating crowd evacuation," Neurocomputing, vol. 168, pp. 529 -- 537, 2015. [30] I. J. Farkas, J. Kun, Y. Jin, G. He, and M. Xu, "Keeping speed and distance for aligned motion," Phys. Rev. E, vol. 91, p. 012807, Jan 2015. [31] W. O. Kermack and A. G. Mckendrick, "Contributions to the math- ematical theory of epidemics," Bulletin of Mathematical Biology, vol. 53, no. 1, pp. 57 -- 87, MAR 1991. [32] L. Zhao, H. Cui, X. Qiu, X. Wang, and J. Wang, "SIR rumor spreading model in the new media age," Physica A Statistical Mechanics & Its Applications, vol. 392, no. 4, pp. 995 -- 1003, 2013. [33] F. Durupinar, N. Pelechano, J. Allbeck, U. Gudukbay, and N. I. Badler, "How the ocean personality model affects the perception of crowds," IEEE Computer Graphics and Applications, vol. 31, no. 3, pp. 22 -- 31, 2011. [34] J. H. Wang, S. M. Lo, J. H. Sun, Q. S. Wang, and H. L. Mu, "Qual- itative simulation of the panic spread in large-scale evacuation," Simulation, vol. 88, no. 12, pp. 1465 -- 1474, 2012. [35] A. L. Hill, D. G. Rand, M. A. Nowak, and N. A. Christakis, "Emotions as infectious diseases in a large social network: the SISa model," in Proceeding of the Royal Society B-Biological Sciences, vol. 277, no. 1701, 2010, pp. 3827 -- 3835. [36] M. Cao, G. Zhang, M. Wang, D. Lu, and H. Liu, "A method of emotion contagion for crowd evacuation," Physica A Statistical Mechanics & Its Applications, vol. 483, pp. 250 -- 258, OCT 2017. [37] Y. Song and X. Yan, "A method for formulizing disaster evacu- ation demand curves based on SI model," International Journal of Environmental Research and Public Health, vol. 13, no. 10, pp. 986:1 -- 986:21, 2016. [38] M. Xu, H. Wang, S. Chu, Y. Gan, X. Jiang, Y. Li, and B. Zhou, "Traf- fic simulation and visual verification in smog," ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 1, pp. 3:1 -- 3:17, 2019. [39] X. Lu, Z. Wang, M. Xu, W. Chen, and Z. Deng, "A personality model for animating heterogeneous traffic behaviors," Comput. Animat. Virtual Worlds, vol. 25, no. 3-4, pp. 363 -- 373, 2014. [40] H. Wang, M. Xu, F. Zhu, Z. Deng, Y. Li, and B. Zhou, "Shadow traffic: A unified model for abnormal traffic behavior simulation," Computers & Graphics, vol. 70, pp. 235 -- 241, 2018. [41] J. Xue, H. Yin, P. Lv, M. Xu, and Y. Li, "Crowd queuing simulation with an improved emotional contagion model," Science China Information Sciences, vol. 62, no. 4, pp. 044 101:1 -- 044 101:3, 2019. [42] T. Bosse, R. Duell, Z. A. Memon, J. Treur, and C. N. V. D. Wal, "A multi-agent model for mutual absorption of emotions," in Proc. 23rd EuropeanConf. Mod. and Sim., 2009, pp. 212 -- 218. [43] T. Bosse, R. Duell, Z. A. Memon, J. Treur, and N. van der Wal, "A multi-agent model for emotion contagion spirals integrated within a supporting ambient agent model," in Proc. Principles of Practice in Multi-Agent Systems, vol. 5925, 2009, pp. 48 -- 67. [44] J. Tsai, N. Fridman, E. Bowring, M. Brown, S. Epstein, G. Kaminka, S. Marsella, A. Ogden, I. Rika, A. Sheel, M. E. Taylor, X. Wang, A. Zilka, and M. Tambe, "ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison," in Proc. Autonomous Agents and Multiagent Systems, 2011, pp. 457 -- 464. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 [45] J. Tsai, E. Bowring, S. Marsella, and M. Tambe, "Empirical eval- uation of computational fear contagion models in crowd disper- sions," Autonomous Agents and Multi-Agent Systems, vol. 27, no. 2, pp. 200 -- 217, 2013. [46] A. R. Zomorrodi and D. Segre, "Genome-driven evolutionary game theory helps understand the rise of metabolic interdepen- dencies in microbial communities." Nature Communications, vol. 8, no. 1, pp. 1563 -- 1574, NOV 16 2017. [47] F. Saab, A. Kayssi, I. Elhajj, and A. Chehab, "Playing with sybil," ACM Sigapp Applied Computing Review, vol. 16, no. 2, pp. 16 -- 25, 2016. [48] J. Li, G. Kendall, and R. John, "Computing nash equilibria and evolutionarily stable states of evolutionary games," IEEE Transac- tions on Evolutionary Computation, vol. 20, no. 3, pp. 460 -- 469, 2016. [49] W. Huang, B. Haubold, C. Hauert, and A. Traulsen, "Emergence of stable polymorphisms driven by evolutionary games between mutants," Nature Communications, vol. 3, JUN 2012. [50] M. H. Vainstein, C. Brito, and J. J. Arenzon, "Percolation and cooperation with mobile agents: Geometric and strategy clusters," Physical Review E, vol. 90, no. 2, pp. 860 -- 877, 2014. [51] J. Li, C. Zhang, Q. Sun, Z. Chen, and J. Zhang, "Changing the intensity of interaction based on individual behavior in the iter- ated prisoners dilemma game," IEEE Transactions on Evolutionary Computation, vol. 21, no. 4, pp. 506 -- 517, 2017. [52] C. K. Goh, H. Y. Quek, K. C. Tan, and H. A. Abbass, "Modeling civil violence: An evolutionary multi-agent, game theoretic ap- proach," in Proc. IEEE Congress on Evolutionary Computation, 2006, pp. 1624 -- 1631. [53] F. Tian, H. Li, W. Chen, T. Qin, E. Chen, and T. Y. Liu, "Agent behavior prediction and its generalization analysis," in Twenty- eighth AAAI Conference on Artificial Intelligence, 2014, pp. 1300 -- 1306. [54] V. Kountouriotis, S. C. A. Thomopoulos, and Y. Papelis, "An agent- based crowd behaviour model for real time crowd behaviour simulation," Pattern Recognition Letters, vol. 44, pp. 30 -- 38, JUL 15 2014. [55] D. Helbing and S. Balietti, "How to do agent-based simulations in the future: From modeling social mechanisms to emergent phenomena and interactive systems design," Chapter "Agent-Based Modeling" of the book "Social Self-Organization" by Dirk Helbing (Springer, Berlin, 2012), pp. 25 -- 70, 2013. [56] L. Luo, C. Chai, J. Ma, S. Zhou, and W. Cai, "Proactivecrowd: Modelling proactive steering behaviours for agent-based crowd simulation," Computer Graphics Forum, vol. 37, no. 1, pp. 375 -- 388, FEB 2018. [57] D. Helbing and P. Molnar, "Social force model for pedestrian dynamics," Physical Review E, vol. 51, no. 5, pp. 4282 -- 4286, 1995. [58] A. Shendarkar, K. Vasudevan, S. Lee, and Y. J. Son, "Crowd simulation for emergency response using BDI agent based on virtual reality," in Simulation Conference, 2006. [59] L. Luo, S. Zhou, W. Cai, M. Y. H. Low, F. Tian, Y. Wang, X. Xiao, and D. Chen, "Agent-based human behavior modeling for crowd simulation," Computer Animation & Virtual Worlds, vol. 19, pp. 271 -- 281, AUG 2008. [60] H. Aydt, M. Lees, L. Luo, W. Cai, M. Y. H. Low, and S. K. Kadirve- len, "A computational model of emotions for agent-based crowds in serious games," in IEEE/WIC/ACM International Conference on Web Intelligence & Intelligent Agent Technology, 2011. [61] F. M. Nasir and M. S. Sunar, "A survey on simulating real-time crowd simulation," in International Conference on Interactive Digital Media, 2015. [62] S. Patil, J. van den Berg, S. Curtis, M. C. Lin, and D. Manocha, "Directing crowd simulations using navigation fields," IEEE Trans- actions on Visualization and Computer Graphics, vol. 17, no. 2, pp. 244 -- 254, FEB 2011. [63] F. Bu and J. Sun, "The psychological behaviour research of individ- uals in mass violence events," in Proceedings of the 8th International Conference on Intelligent Computing Theories and Applications, ser. ICIC, 2012, pp. 625 -- 632. [64] X. Wang, N. Liu, S. Liu, Z. Wu, M. Zhou, J. He, P. Cheng, C. Miao, and N. M. Thalmann, "Crowd formation via hierarchical plan- ning," in ACM SIGGRAPH Conference on Virtual-Reality Continuum and ITS Applications in Industry, 2016, pp. 251 -- 260. [65] S. Schutte, "Violence and Civilian Loyalties: Evidence from Afghanistan," Journal of Conflict Resolution, vol. 61, no. 8, pp. 1595 -- 1625, SEP 2017. 17 [66] I. Funahashi, "Kayika vedana (physical emotion) and cetasika vedana (mental emotion)," Journal of Indian and Buddhist Studies, vol. 10, pp. 510 -- 511, 1962. [67] E. M. Reiman, R. D. Lane, G. L. Ahern, G. E. Schwartz, R. J. Davidson, K. J. Friston, L. S. Yun, and K. Chen, "Neuroanatomical correlates of externally and internally generated human emotion," The American journal of psychiatry, vol. 154, no. 7, pp. 918 -- 925, 1997. [68] C. E. Salas, D. Radovic, and O. H. Turnbull, "Inside-out: compar- ing internally generated and externally generated basic emotions." Emotion, vol. 12, no. 3, pp. 568 -- 578, 2012. [69] R. W. Picard, Affective computing. Cambridge, MA, USA: MIT Press, 1997. [70] L. J. Carlson and R. Dacey, "The use of fear and anger to alter crisis initiation," Conflict Management and Peace Science, vol. 31, no. 2, pp. 168 -- 192, APR 2014. [71] J. M. Epstein, "Modeling civil violence: An agent-based computa- tional approach," in Proceedings of the National Academy of Sciences of the United States of America, vol. 99, 2002, pp. 7243 -- 7250. [72] G. L. Bon, The Crowd: A Study of the Popular Mind. Flint Hill, VA: Fraser Publishing Company, 1982. [73] P. Sunita and C. Charles, "Riot games: A theory of riots and mass political violence," in Proc. 7th Wallis ins. Conf. Political Economy, 2000. [74] L. Huang, G. Cai, H. Yuan, and J. Chen, "From public gatherings to the burst of collective violence: An agent-based emotion contagion model," in IEEE International Conference on Intelligence and Security Informatics, 2018, pp. 193 -- 198. [75] R. Mehran, A. Oyama, and M. Shah, "Abnormal crowd behavior detection using social force model," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit, 2009, pp. 935 -- 942. [76] B. Zhou, X. Tang, H. Zhang, and X. Wang, "Measuring crowd collectiveness," in Proc. Computer Vision and Pattern Recognition, 2013, pp. 3049 -- 3056. [77] M. Xu, C. Li, P. Lv, N. Lin, R. Hou, and B. Zhou, "An efficient method of crowd aggregation computation in public areas," IEEE Transactions on Circuits & Systems for Video Technology, vol. 28, no. 10, pp. 2814 -- 2825, 2018. [78] S. J. Guy, J. V. D. Berg, W. Liu, R. Lau, M. C. Lin, and D. Manocha, "A statistical similarity measure for aggregate crowd dynamics," ACM Transactions on Graphics, vol. 31, no. 6, pp. 190:1 -- 190:11, 2012. [79] I. Kajo, A. S. Malik, and N. Kamel, "An evaluation of optical flow algorithms for crowd analytics in surveillance system," in International Conference on Intelligent and Advanced Systems, 2016. [80] D. Wolinski, S. Guy, A.-H. Olivier, M. Lin, D. Manocha, and J. Pettre, "Parameter estimation and comparative evaluation of crowd simulations," Computer Graphics Forum, vol. 33, no. 2, pp. 303 -- 312, MAY 2014. Chaochao Li is a Ph.D candidate in the School of Information Engineering of Zhengzhou Uni- versity, China, and his research interest is com- puter graphics and computer vision. He got his B.S. degree in computer science and technology from the School of Information Engineering of Zhengzhou University. Pei Lv is an associate professor in School of Information Engineering, Zhengzhou University, China. His research interests include video anal- ysis and crowd simulation. He received his Ph.D in 2013 from the State Key Lab of CAD&CG, Zhejiang University, China. He has authored more than 20 journal and conference papers in these areas, including IEEE TIP, IEEE TCSVT, IEEE TACACM MM, etc. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, NOVEMBER 2019 Dinesh Manocha is the Paul Chrisman Iribe Chair in Computer Science & Electrical and Computer Engineering at the University of Mary- land College Park. He is also the Phi Delta Theta/Matthew Mason Distinguished Professor Emeritus of Computer Science at the Univer- sity of North Carolina - Chapel Hill. He has won many awards, including Alfred P. Sloan Re- search Fellow, the NSF Career Award, the ONR Young Investigator Award, and the Hettleman Prize for scholarly achievement. His research in- terests include multi-agent simulation, virtual environments, physically- based modeling, and robotics. His group has developed a number of packages for multi-agent simulation, crowd simulation, and physics- based simulation that have been used by hundreds of thousands of users and licensed to more than 60 commercial vendors. He has published more than 510 papers and supervised more than 35 PhD dissertations. He is an inventor of 9 patents, several of which have been licensed to industry. His work has been covered by the New York Times, NPR, Boston Globe, Washington Post, ZDNet, as well as DARPA Legacy Press Release. He is a Fellow of AAAI, AAAS, ACM, and IEEE and also received the Distinguished Alumni Award from IIT Delhi. See http://www.cs.umd.edu/∼dm 18 Mingliang Xu is a full professor in the School of Information Engineering of Zhengzhou Univer- sity, China, and currently is the director of CIISR (Center for Interdisciplinary Information Science Research) and the vice General Secretary of ACM SIGAI China. He received his Ph.D. degree in computer science and technology from the State Key Lab of CAD&CG at Zhejiang Univer- sity, Hangzhou, China. He previously worked at the department of information science of NSFC (National Natural Science Foundation of China), Mar.2015-Feb.2016. His current research interests include computer graphics, multimedia and artificial intelligence. He has authored more than 60 journal and conference papers in these areas, including ACM TOG, ACM TIST, IEEE TPAMI, IEEE TIP, IEEE TCYB, IEEE TCSVT, ACM SIGGRAPH (Asia), ACM MM, ICCV, etc. Hua Wang was born in 1982. She received her PhD degree in Computer Science from the Institute of Computing Technology, Chinese Academy of Sciences, in 2015. She is currently an associate professor of Zhengzhou University of Light Industry, Zhengzhou, China. Her main research interests include traffic animation and environment modeling. Yafei Li is an assistant professor in the School of Information Engineering, Zhengzhou University, Zhengzhou, China. He received the PhD degree in computer science from Hong Kong Baptist University, in 2015. He held a visiting position in the Database Research Group with Hong Kong Baptist University. His research interests span mobile and spatial data management, location- based services, and urban computing. He has authored more than 20 journal and conference papers in these areas, including IEEE TKDE, IEEE TSC, ACM TWEB, ACM TIST, PVLDB, IEEE ICDE, WWW, etc. Bing Zhou is currently a professor at the School of Information Engineering, Zhengzhou Univer- sity, Henan, China. He received the B.S. and M.S. degrees from Xi'an Jiao Tong University in 1986 and 1989, respectively,and the Ph.D. degree in Beihang University in 2003, all in computer science. His research interests cover video processing and understanding, surveil- lance, computer vision, multimedia applications.
0912.4553
1
0912
2009-12-23T02:42:33
Consensus Dynamics in a non-deterministic Naming Game with Shared Memory
[ "cs.MA", "cs.AI" ]
In the naming game, individuals or agents exchange pairwise local information in order to communicate about objects in their common environment. The goal of the game is to reach a consensus about naming these objects. Originally used to investigate language formation and self-organizing vocabularies, we extend the classical naming game with a globally shared memory accessible by all agents. This shared memory can be interpreted as an external source of knowledge like a book or an Internet site. The extended naming game models an environment similar to one that can be found in the context of social bookmarking and collaborative tagging sites where users tag sites using appropriate labels, but also mimics an important aspect in the field of human-based image labeling. Although the extended naming game is non-deterministic in its word selection, we show that consensus towards a common vocabulary is reached. More importantly, we show the qualitative and quantitative influence of the external source of information, i.e. the shared memory, on the consensus dynamics between the agents.
cs.MA
cs
Consensus Dynamics in a non-deterministic Naming Game with Shared Memory Regina ldo J. da Silva Filho, Matthias R. Brust and Carlos H.C. Ribeiro Computer Science Division Technological Institute of Aeronautics (ITA) São José dos Campos, Brazil Abstract—In the naming game, individuals or agents exchange pairwise local information in order to communicate about objects in their common environment. The goal of the game is to reach a consensus about naming these objects. Originally used to investigate language formation and self-organizing vocabularies, we extend the classical naming game with a globally shared memory accessible by all agents. This shared memory can be interpreted as an external source of knowledge like a book or an Internet site. The extended naming game models an environment similar to one that can be found in the context of social bookmarking and collaborative tagging sites where users tag sites using appropriate labels, but also mimics an important aspect in the field of human-based image labeling. Although the extended naming game is non-deterministic in its word selection, we show that consensus towards a common vocabulary is reached. More importantly, we show the qualitative and quantitative influence of the external source of information, i.e. the shared memory, on the consensus dynamics between the agents. Keywords-distributed collaboration; consensus; naming game; collaborative tagging; shared memory; multi-agent system I. INTRODUCTION The natural emergence of a common language between individuals still remains an unexplained phenomenon. However, a deeper understanding of the evolutionary processes of indispensable for developing is language formation autonomous multi-agent systems where each agent can potentially have different origins and where no knowledge about the language used in an open-ended environment is provided. To put in a question: How can these agents build a common language through local negations and reach a consensus about the meaning of their vocabulary? A promising model for a deeper understanding of the common language phenomenon is the naming game [1]. It describes a model in which individuals can reach a consensus on how to name different objects. All individuals (or agents) exist in the same environment and sense the same set of objects. The agents are able to invent or create words for the objects. An interaction between two agents is a word transmission from one agent (the speaker) to the second agent (the hearer). The goal of the game is to reach an agreement between speaker and hearer about the object-word association used for a single object [2]. In this way, a self-organized vocabulary or even a common language with syntactic and semantic levels can be built [3]. The naming game thus is a microscopic model for the interaction dynamics among autonomous agents that communicate without any centralized control [4]. The interesting fact is that a consensus can be reached by means of local interactions. Distributed models can be used to understand, for instance, how large populations reach an agreement with respect to the usage of a certain word, how new language constructs are established, the spreading of rumors and opinions, or even how words propagate in social networks. Besides its application in modeling the language formation process for individuals, agents or robots (in particular in the field of artificial intelligence), the naming game is of relevance to understand the consensus dynamics of collaborative tagging systems of web sites like delicious and flickr [5] that have become increasingly popular in recent years. The users of such sites can attach keywords or tags to provide information (e.g., favorite sites on the Internet). In a recent study [6], it is shown how collaborative tagging can lead to both regularities regarding users’ activities, tag frequency and keyword usage, and stabilities concerning relative proportions between tags for a given URL and strings that define the location of programs or files in the Internet. Although it is potentially possible to have a constantly increasing number of tags, these findings indicate convergence of a name descriptor (the collection of tags) and the concept (the contents in the location itself). Different variants of naming games played by humans can help to overcome one of the most challenging problems for search engines: Image labeling. The ESP game [7] aims to use humans’ perceptual abilities in order to create valuable output in the process of image labeling. Two players are shown the same image but they are not able to communicate. They are then asked to describe the image with labels under a given time constraint (e.g. Google Image Labeler uses 2 minutes). As soon as they use a common label, it is saved in the database to index the image, the players earn points accordingly and the next image is shown. The objective is to get as many points as possible. While the ESP game is initially designed for a two- player game, in a broader context, the label consensus dynamics of the naming game can be directly used to improve the description accuracy of the images. Research on the naming game uses mainly the introduced communication model above and focuses on showing its convergence empirically [1,3,8]. The convergence of a deterministic naming game, on is the other hand, mathematically proven in [2]. One common characteristic of
1803.04934
1
1803
2018-03-13T16:53:50
An agent-based evaluation of impacts of transport developments on the modal shift in Tehran, Iran
[ "cs.MA", "cs.AI", "cs.CY" ]
Changes in travel modes used by people, particularly reduction of the private car use, is an important determinant of effectiveness of transportation plans. Because of dependencies between the choices of residential location and travel mode, integrated modelling of these choices has been proposed by some researchers. In this paper, an agent-based microsimulation model has been developed to evaluate impacts of different transport development plans on choices of residential location and commuting mode of tenant households in Tehran, the capital of Iran. In the proposed model, households are considered as agents who select their desired residential location using a constrained NSGA-II algorithm and in a competition with other households. In addition, they choose their commuting mode by applying a multi-criteria decision making method. Afterwards, effects of development of a new highway, subway and bus rapid transit (BRT) line on their residential location and commuting mode choices are evaluated. Results show that despite the residential self-selection effects, these plans result in considerable changes in the commuting mode of different socioeconomic categories of households. Development of the new subway line shows promising results by reducing the private car use among the all socio-economic categories of households. But the new highway development unsatisfactorily results in increase in the private car use. In addition, development of the new BRT line does not show significant effects on the commuting mode change, particularly on decrease in the private car use.
cs.MA
cs
An agent-based evaluation of impacts of transport developments on the modal shift in Tehran, Iran Ali Shirzadi Babakan, Abbas Alimohammadi, and Mohammad Taleai This is an Author's Original Manuscript (Preprint) of an Article Published by Taylor & Francis Group in Journal of Development Effectiveness, 2015, Vol. 7, No. 2, 230-251. DOI: 10.1080/19439342.2014.994656 To link to this article: http://dx.doi.org/10.1080/19439342.2014.994656 Abstract Changes in travel modes used by people, particularly reduction of the private car use, is an important determinant of effectiveness of transportation plans. Because of dependencies between the choices of residential location and travel mode, integrated modeling of these choices has been proposed by some researchers. In this paper, an agent-based microsimulation model has been developed to evaluate impacts of different transport development plans on choices of residential location and commuting mode of tenant households in Tehran, the capital of Iran. In the proposed model, households are considered as agents who select their desired residential location using a constrained NSGA-II algorithm and in a competition with other households. In addition, they choose their commuting mode by applying a multi-criteria decision making method. Afterwards, effects of development of a new highway, subway, and bus rapid transit (BRT) line on their residential location and commuting mode choices are evaluated. Results show that despite the residential self-selection effects, these plans result in considerable changes in the commuting mode of different socio-economic categories of households. Development of the new subway line shows promising results by reducing the private car use among the all socioeconomic categories of households. But the new highway development unsatisfactorily results in increase in the private car use. In addition, development of the new BRT line does not show significant effects on the commuting mode change, particularly on decrease of the private car use. Keywords Transportation impacts; Modal shift; Commuting mode choice; Residential self-selection; Agent-based microsimulation model; NSGA-II algorithm; Multi-criteria decision making. 1 1. Introduction There is a strong and complex relationship between the choices of residential location and travel mode. Necessity of simultaneous modeling of these choices in an integrated framework has been realized by many researchers (e.g. Lerman 1976; Naess 2013; Nurlaela and Curtis 2012; Vega and Reynolds-Feighan 2009). Within this framework, the residential 'self-selection' with respect to travel behavior can be considered. This type of residential self-selection is referred to the tendency of people to choose a particular neighborhood according to their travel abilities, needs, and preferences (Mokhtarian and Cao 2008; Van Wee 2009). For example, people with strong preferences for use of the public transport services usually tend to live in regions with higher accessibilities to these services. On the other hand, those who prefer to use the private car for their daily travels usually tend to live in regions with minimum restrictions on private car use. However, when a car driving lover moves to a region with a good accessibility to public transport services, he/she will be exposed to advantages of using these services and may change his/her travel behavior. Land use and transportation plans can have considerable impacts on the built environment and subsequently on the travel behavior of people (Cao, Mokhtarian, and Handy 2007; Ewing and Cervero 2010; Guo and Chen 2007; Pinjari et al. 2007; Haddad et al. 2011; van de Walle 2009; Rand 2011). Some researchers have found that these impacts are subject to spurious effects of the residential self-selection (e.g. Cao, Mokhtarian, and Handy 2009; Handy, Cao, and Mokhtarian 2005; Mokhtarian and Cao 2008; Van Wee 2009). In other words, land use and transportation plans may not result in change of the travel behavior of people, but they may only result in movement of some people to neighborhoods of their desired transport services. As a result, ignoring the residential self-selection may lead to an overestimation of travel mode changes. For example, after development of a new subway in an area, models ignoring the residential self-selection may overestimate the contribution of subway in people's travel mode choice. Therefore, consideration of the residential self-selection is prerequisite for evaluating the impacts of land use and transportation plans on the travel behavior of people. Majority of researches in the fields of residential location and travel mode choices have used the discrete choice models (e.g. multinomial logit (MNL), nested logit (NL), generalized extra value (GEV), mixed logit, and probit) based on the random utility maximization theory (e.g. Nurlaela and Curtis 2012; Vega and Reynolds-Feighan 2009; Rashidi, Auld, and Mohammadian 2012; Sener, Pendyala, and Bhat 2011). These conventional models are mainly based on the aggregated characteristics of people (Crooks and Heppenstall 2012; Ettema 2011). However, researchers are usually interested to investigate the impacts of land use and transportation plans on the behavior of individual households, persons or subgroups. One of the efficient and most widely used tools in this area is microsimulation. However, microsimulation models (MSMs) have some limitations in modeling of individuals' behavior in terms of their preferences, 2 decisions, plans, and interactions. These limitations can be considerably mitigated by the integration of MSMs with individual-based models such as the agent-based models (ABMs) (Birkin and Wu 2012; Crooks and Heppenstall 2012). ABMs are suitable for the simulation of situations where there are a large number of heterogeneous individuals with different behaviors (Davidsson 2001). ABMs are bottom-up approaches that attempt to model the complex systems at the level of individuals presented as 'agents'. Agents are the fundamental elements of these models who have different characteristics and act and interact with each other based on their perceptions of the environment (Birkin and Wu 2012; Parker et al. 2003). There is no overall agreement on definition of the term 'agent', but most agents have several common features such as the autonomy, heterogeneity, and activity (Crooks and Heppenstall 2012; Wooldridge and Jennings 1995). Behaviors of agents and their relationships with other agents and the surrounding environment are generally modeled by a set of rules. These rules are typically derived from the existing literature, expert knowledge, data surveys or empirical works (Crooks and Heppenstall 2012). Increasingly, several researchers (e.g. Benenson 1998; Devisch et al. 2009; Ettema 2011; Haase, Lautenbach, and Seppelt 2010; Waddell et al. 2003; Gaube and Remesch 2013; Salvini and Miller 2005; Veldhuisen, Timmermans, and Kapoen 2000) have used agent-based and microsimulation models for studying the residential location and travel mode choices. The main purpose of this paper is evaluating the impacts of transport developments on the residential location and commuting mode choices of individual tenant households in Tehran, the capital of Iran. For this purpose, an agent-based microsimulation model is developed to simulate these choices. As far as the authors know, utilizing of ABMs for the evaluation of these impacts has not been considered by previous works. Therefore, the main contribution of this study is the exploration of relationships between transport development, residential self-selection, and modal shift behavior of individual households using an agent- based microsimulation model. Also, in this paper, a novel framework is proposed for choosing the residential location and commuting mode by households. In contrast with previous works, which mainly use the discrete choice models based on the random utility maximization theory, in this framework, an evolutionary multi-objective decision making algorithm (NSGA-II) combined with a competition method is used for residential location choice and a multi-criteria decision making method is used for commuting mode choice. By considering different objectives, criteria and preferences for each agent, the proposed choice mechanism leads to better consideration of the heterogeneity among agents. Due to the lack of efficient public transport services and cheap prices of fuel in Tehran, most people prefer to use the private car in their daily travels. Therefore, different land use and transportation plans are annually prepared in Tehran with the aim of reducing the dependency of people to private car use and encouraging them to use public transport services. For this purpose, urban and transportation planners 3 need a simulation tool to estimate the effectiveness of their plans for reducing the private car use. Although some researchers, such as Jokar Arsanjani, Helbich, and de Noronha Vaz (2013); and Meshkini and Rahimi (2011), attempt to simulate the spatial and/or temporal urban sprawl patterns in Tehran, they do not consider effects of future land use and transportation plans on the residential location and commuting mode choices. Therefore, the proposed microsimulation model in this paper is the first attempt to simulate these effects at the individual level in Tehran. This model considerably helps urban and transportation planners to simulate and predict residential self-selection and commuting mode changes resulting from the future implementation of the transport development plans (TDPs) in Tehran. The remainder of this paper is organized as follows. An overview of the available transportation networks and commuting modes in Tehran is provided in section 2. Section 3 describes the proposed model in details. Results of the implementation and validation of the proposed model are discussed in section 4. In section 5, three transportation projects of the future development plan of Tehran are simulated and resulting changes in the residential location and commuting mode of agents are examined. Finally, major implications of the research findings are presented in the concluding section. 2. Transportation and commuting modes in Tehran This study is conducted in Tehran, the capital of Iran. Tehran with an area of about 750 square kilometers and a population of about 8.3 million is located at 51 8(cid:1) to 51 37(cid:1) longitude and 35 34(cid:1) to 35 50(cid:1) latitude. This metropolis is comprised of extensive transportation networks including about 550 kilometers of highways, a subway network with 4 active intraurban lines and 72 stations with the length of about 125 kilometers, 250 bus lines with the length of about 3000 kilometers, and 6 bus rapid transit (BRT) lines with the length of about 102 kilometers (Tehran Municipality 2013). Tehran is divided into 560 traffic analysis zones (TAZs) which are used as the spatial units in this study. Figure 1 shows the existing transportation networks and TAZs in Tehran. Figure 1: Existing transportation networks and TAZs in Tehran 4 in Tehran, their capacities are not enough to accommodate this problems such as the traffic congestion and air pollution. Although there in urban population as well as the , Tehran has experienced a dramatic growth in urban population as well as Over the past three decades, Tehran coupled with the poor urban planning and inefficient public transport services coupled with the poor urban planning and inefficient public transport car ownership. This growth coupled with the poor urban planning and inefficient public transport have led to significant problems such as the traffic congestion and air pollution. Although there are extensive road networks in Tehran, not enough to accommodate this increasing s its study to the work number of vehicles especially during travel (commuting), because it is one of the important daily travel types, encompassing all transport travel (commuting), because it is one of the , encompassing all transport including the private modes, and results in peak-hours traffic car, subway, bus, BRT, and local taxi car, subway, bus, BRT, and local taxi for commuting of people in Tehran. Shares of these transport people are shown in Figure 2. As illustrated in this Figure, other modes modes in commuting of Tehran's people shown in Figure 2. As illustrated in this Figure, other modes shares in commuting of such as the walking, bicycle, call taxi a such as the walking, bicycle, call taxi and institutional services have minor shares in people. during the peak hours of traffic. This paper limits its study to traffic. There are five common transport modes including 21% 10.5% 9.5% 13.5% 34.5% 11% Private car Subway Bus BRT Taxi Others Tehran Municipality 2013) Figure 2: Shares of different transport modes in commuting of Tehran's people (Tehran Municipality 2013 Figure 2: Shares of different transport modes in commuting of Tehran's people 3. Proposed model of residential location and commuting mode of tenant households considered as agents who select their optimal residential alternatives from based microsimulation model is developed to evaluate the impacts of different developed to evaluate the impacts of different In this paper, an agent-based microsimulation model households in Tehran, TDPs on the joint choices of residential location and commuting mode of tenant . In the proposed model, households are generated using the Monte Carlo simulation. are generated using the Monte Carlo simulation. the capital of Iran. In the proposed model, from the available They are considered as agents who select their optimal residential alternatives constrained NSGA-II algorithm (nondominated sorting genetic algorithm II) (nondominated sorting genetic algorithm II). residential zones using a constrained NSGA is a fast and efficient multi-objective decision making algorithm in which multiple conflicting multiple conflicting NSGA-II is a fast and efficient multi demographic and objectives are considered for residential location choic to consideration of more socioeconomic characteristics and also socioeconomic characteristics and also their criteria and preferences. This leads to consideration of thereby more precise simulation of the residential location choice. heterogeneity among agents and thereby more residential location choice. Afterwards, agents compete with each other in different time periods to select a final residence from their Afterwards, agents compete with each other a final residence from their . After determination of the residence of agents, their employed members employed members are residential alternatives. After determination of the re agents who select the best available commuting mode based on their preferences to considered as the new agents who select the best available commuting mode based on their preferences to different criteria such as the travel time, travel cost, and different criteria such as the travel time, travel cost, and comfortableness using a multi a multi-criteria decision are simulated and resulting changes in the residential self- making method. Finally, different making method. Finally, different TDPs are simulated and resulting changes in the residential residential location choice of agents according to their 5 selection and commuting mode choice of agents are examined. Main components of the proposed model are shown in Figure 3. Population Synthesis Monte Carlo Simulation Agents Residential Alternatives Selection Residential Location Choice Multi-Objective Decision Making (NSGA-II) Appropriate Alternatives Competition Agent-Based Modeling Commuting Mode Choice Commuting Mode Multi Criteria Decision Making Residential Location Figure 3: Main components of the proposed model 3.1. Population synthesis A population of tenant households (agents) is generated using the Monte Carlo simulation such that aggregation of their attributes matches with the available demographic data. Attributes of agents are generated in a sequential approach as used by Miller et al. (2004). In this approach, initially the monthly income, number and age of the members of agents are generated. Then, the former residential zone, the number of employed members and their professional category, the number of owned cars, and the required residential area of agents are generated based on the previously determined attributes. Afterwards, the workplace of employed members of agents is randomly allocated to a zone by using the available rates of different employment categories in TAZs. Finally, criteria and preferences of agents and their employed members for choosing their residential location and commuting mode are generated according to the previously determined attributes and a survey sample consisting of stated preferences of 1580 tenant households in Tehran. This survey was conducted by filling the questionnaires in February 2012, where households with different socioeconomic characteristics stated their criteria and preferences for choosing their residential location and commuting mode in the scale range of 0 (unimportant) to 9 (very important). Table 1 presents the major criteria and the percentage of households in different socioeconomic categories who assigned a preference number greater than 4 to each criterion. 6 Table 1: A summary of the residential and commuting criteria and preferences of 1580 surveyed tenant households in Tehran Attribute Category Percentage Housing Rent to to Accessibility Accessibility Educational Locations Commercial Locations Residential location choice criteria (%) Commuting mode choice criteria (%) Accessibility to Green and Recreational Locations Accessibility to Cultural Locations Accessibility to Remedial Locations Accessibility to Highways Accessibility to Subway Stations Accessibility to Bus Stops Air and Noise Pollutions Distance from the Workplace Distance from the Former Residence Without Traffic Restrictions Commuting Cost In- vehicle time Out-of- vehicle time Comfortability Security Reliability Size Monthly income (million IRR)* Number of Cars Total Single Couple 3-4 > 4 < 10 10-25 > 25 0 1 > 1 5.6 28.1 54.8 11.5 17.6 63.1 19.3 10.8 68.8 20.4 100 100 100 100 100 100 100 100 100 100 100 100 29.5 8.6 66.9 92.9 45.0 59.9 29.5 66.7 56.1 27.3 51.4 11.4 38.3 35.6 31.3 17.6 36.6 43.0 45.0 34.8 28.0 34.5 9.1 41.7 59.9 63.2 36.0 52.3 67.5 51.5 55.5 42.2 52.3 9.1 6.3 9.4 5.5 5.0 8.3 9.8 10.5 7.8 7.5 8.0 5.7 22.3 35.8 44.5 20.5 34.1 32.1 45.6 32.7 19.3 31.3 70.5 82.7 83.4 82.4 67.6 84.5 88.9 22.8 86.5 100 82.3 * Note: IRR (Iranian Rial), At the time of this study 1$ equivalent to 31500 IRR. 39.8 48.6 55.3 59.3 57.9 53.8 46.2 83.6 54.6 31.4 53.0 12.5 18.0 21.0 21.4 32.7 18.7 11.5 62.6 17.6 4.3 19.7 34.1 46.6 43.2 43.4 23.4 42.2 66.9 30.4 40.7 60.9 43.7 92.0 89.9 85.5 82.4 93.9 86.7 80.3 95.3 86.3 83.5 86.7 37.5 50.7 59.8 59.3 65.5 54.7 51.5 64.9 54.1 57.5 55.9 60.2 61.3 55.5 54.9 43.2 54.9 78.4 5.3 53.4 98.4 57.3 100 99.1 99.3 100 100 100 96.7 100 99.6 98.1 99.4 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 96.6 93.0 90.4 90.7 80.2 92.1 100.0 78.9 91.1 99.7 91.5 25.0 27.7 26.2 26.9 19.1 26.2 35.1 18.1 26.1 32.9 26.6 56.8 46.8 45.2 49.5 37.4 46.9 54.8 45.0 45.5 51.9 46.8 3.2. Residential alternatives selection In the real world, households do not search all zones to select their residence, but they limit their search space to few desired zones according to their characteristics, requirements and preferred criteria. This fact is followed for the residential location choice of agents in the proposed model. Thus, using a constrained NSGA-II algorithm, the residential choice set of agents is limited to up to 10 optimal residential alternatives among the all TAZs. The NSGA-II algorithm, developed by Deb et al. (2002), is a fast and efficient multi-objective decision making method for the selection of the best solutions among the many available solutions. Details of this algorithm can be found in the study by Deb et al. (2002). According to the survey sample of stated preferences of tenant households in Tehran, the following rules are used as different objective functions in the NSGA-II algorithm. Depending on their criteria and preferences, agents may consider all or some of these rules in the process of their residential location choice. rule1: Agents select zones as their residential alternatives in which the housing rent per square meter is compatible with their affordability and required residential area. For this purpose, maximum and minimum percentages of the monthly income which agents are willing to pay for renting a residence are simulated by the Monte Carlo simulation approach as described in section 3.1. Therefore, the search space of agents is limited to zones in which rent of their required residential area is between the specified minimum and maximum percentages of their monthly income. It should be noted that the main reason for considering the minimum limit is that many agents, particularly those with high incomes, usually prefer to reside in neighborhoods with qualified cultural and social characteristics. rule2: Agents prefer to select zones in closer distances to the workplaces of their employed members. rule3: Agents prefer to select zones in closer distance from their former residential area. rule4: Agents prefer to select zones with minimum environmental pollutions. A constraint is considered for agents with very important preferences for air and noise pollutions, as they only search among zones in which pollution levels are medium to clean. 7 rule5: Agents prefer to select zones with no traffic restrictions on the private car use. A constraint is considered for agents with very important preferences for traffic restrictions, as they only search among the non-restricted zones. rule6: Agents prefer to select zones with higher accessibilities to public facilities including the commercial, educational, green, recreational, remedial, and cultural facilities. Accessibility of zones to the public facilities for each agent is calculated by Eq. (1) (Tsou, Hung, and Chang 2005). (cid:1)(cid:2)(cid:3) (cid:4) (cid:5)(cid:5)(cid:6)(cid:7)(cid:3) (cid:8) (cid:9)(cid:10)(cid:11) (cid:8) (cid:12)(cid:2)(cid:10)(cid:11) (cid:13)(cid:14) (cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:16)(cid:17)(cid:18)(cid:19)(cid:20)(cid:21) (cid:7) (cid:10)(cid:11) where: (cid:1)(cid:2)(cid:3) is the accessibility of zone i to the public facilities for agent a; f is the type of public facility; (cid:22)(cid:7) is the jth case of the fth type of public facility; (cid:6)(cid:7)(cid:3) is the preference of agent a to the type of public facility f which is simulated by the Monte Carlo simulation method, where (cid:23)(cid:6)(cid:7)(cid:3) (cid:4) (cid:20); (cid:9)(cid:10)(cid:11) is the relative effect of (cid:22)(cid:7) which is calculated by (cid:9)(cid:10)(cid:11) (cid:4) (cid:1)(cid:10)(cid:11)(cid:24)(cid:25)(cid:26)(cid:27)(cid:15)(cid:19)(cid:1)(cid:10)(cid:11)(cid:21), where (cid:1)(cid:10)(cid:11) is the area of (cid:22)(cid:7); (cid:12)(cid:2)(cid:10)(cid:11) is the distance between zone i and the public facility (cid:22)(cid:7). rule7: Agents prefer to select zones with higher accessibilities to transportation services including the highways and/or public transport services (bus and subway stations). Accessibility of zones to the transportation services for each agent is calculated by Eq. (2) (Currie 2010; Delbosc and Currie 2011). (cid:1)(cid:28)(cid:2)(cid:3) (cid:4) (cid:5)(cid:5)(cid:6)(cid:29)(cid:3) (cid:8) (cid:1)(cid:10)(cid:30) (cid:1)(cid:2) (cid:29) (cid:10)(cid:30) (cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:16)(cid:17)(cid:18)(cid:19)(cid:31)(cid:21) where: (cid:1)(cid:28)(cid:2)(cid:3) is the accessibility of zone i to transportation services for agent a; t is the type of transportation service; (cid:22)(cid:29) is the jth case of the tth type of transportation service; (cid:6)(cid:29)(cid:3) is the preference of agent a to the type of transportation service t which is simulated by the Monte Carlo simulation method, where (cid:23)(cid:6)(cid:29)(cid:3) (cid:4) (cid:20); Ai is the area of zone i; (cid:1)(cid:10)(cid:30) is the service area of (cid:22)(cid:29) which is inside the zone i; the service ranges of highways, subway stations, BRT, and bus stops are set to 2, 1.9, 1.7 and 1.2 km, respectively. These distances, obtained from the comprehensive transportation and traffic studies of Tehran, are slightly higher than those used in other 8 cities, because besides walking, Tehran's people usually use cheap local taxis for access to the transport services. 3.3. Competition Agents compete with each other in different time periods to choose a residence from their residential alternatives. For this purpose, they are randomly distributed in monthly time periods according to the volume of relocation in different months of the year in Tehran. In addition, the residential capacity of each zone is estimated by multiplying the ratio of residential area in that zone to all zones, the number of agents, and an equilibrium parameter in each period. The equilibrium parameter is derived from the volume of demand and supply for renting residences in different months of the year in Tehran. Agents search their residential alternatives according to the distance from their former residence and reside in the first alternative which has the residential capacity. If the residential capacity of a zone is not enough to satisfy demands of all agents, they compete with each other for residing in that zone. In this competition, agents with fewer members (except singles), with higher incomes, and without a child would succeed, respectively. If demandants are equal with respect to the mentioned criteria, winners are randomly selected and defeated agents try to reside in their next alternatives. This process is continued until all agents reside in one of their residential alternatives or all alternatives of the defeated agents are evaluated. If a number of agents cannot reside in any of their alternatives, they are moved to the competition process in the next time period. If they still cannot reside in any zone, no residence is allocated for them. Generally, they are agents with low incomes who cannot afford to rent a residence in any zone and they probably have to move to suburbs. 3.4. Commuting mode choice After determination of the residential location of agents, the employed members of agents are considered as the new agents who select the best available commuting mode based on their criteria and preferences using a multi-criteria decision making method. The most important criteria for the commuting mode choice are derived from the survey sample of stated preferences of commuting mode choice in Tehran. These criteria include the travel cost, out-of-vehicle time, in-vehicle time, comfortability, security, and reliability. It is requested from a number of transportation experts to evaluate the transport modes including the walking, private car, bus, BRT, subway, and taxi with respect to these criteria at the daily peak hours of traffic in Tehran. They relatively compare the transport modes with respect to each criterion and assign a score in the scale range of 1 to 10. The average of normalized scores of experts is used as the score of each transport mode with respect to each criterion. Agents have their own preferences with respect to these criteria. These preferences are normalized and used for the calculation of the suitability of each transport mode for each agent as follows. 9 !(cid:3) (cid:4) (cid:5)(cid:6)"(cid:3) (cid:8) &!" (cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:16)(cid:17)(cid:18)(cid:19)'(cid:21) # "$% where: !(cid:3)(cid:15)is the suitability of the transport mode m for agent a; (cid:6)"(cid:3) is the preference of agent a to the criterion c, where (cid:23)(cid:6)"(cid:3) (cid:4) (cid:20); &!" is the score of transport mode m with respect to the criterion c. Finally, agents choose the transport mode with the maximum suitability for their commuting. It should be noted that the level-of-service (LOS) attributes including the travel cost, in-vehicle and out-of-vehicle times for different transport modes are obtained from the shortest path between the residence and workplace of agents on the network models in GIS. 4. Implementation and validation The proposed model was implemented by the MATLAB software version 7.12. Using the Monte Carlo simulation, 50000 tenant households with different socio-economic characteristics were generated as agents. They searched among TAZs and selected their optimal residential alternatives using the NSGA-II algorithm. Then, they chose a final residence from their alternatives by the aforementioned competition mechanism. Figure 4 shows the distribution of residential locations of agents in TAZs. Finally, 58941 employed members of the simulated households selected their commuting mode according to Equation (3). Selected modes by different socioeconomic categories of agents are presented in Table 2. Figure 4: Distribution of residential zones of the simulated agents in Tehran 10 Table 2: Commuting modes of different socioeconomic categories of the simulated agents in Tehran Attribute Category Number Percentage Private Car Gender Household Size Average Monthly Income of Household (million IRR*) Number of Private Cars of Household Commuting Distance (km) Total Female Male Single Couple 3-4 > 4 < 10 10-25 > 25 0 1 > 1 < 5 5 - 15 > 15 18104 40837 2888 17394 31636 7023 10597 37331 11013 6532 40050 12359 9607 37782 11552 58941 30.7 69.3 4.9 29.5 53.7 11.9 18.0 63.3 18.7 11.1 67.9 21.0 16.3 64.1 19.6 100 39.1 38.5 47.5 40.1 37.9 35.1 29.2 37.7 51.2 0.0 34.8 71.6 21.7 36.7 59.4 38.7 Commuting mode (%) Subway 12.9 12.2 10.1 11.8 12.7 13.6 17.8 11.9 9.0 25.7 12.2 6.1 11.7 10.8 18.2 12.4 Bus 13.7 14.1 9.8 13.0 14.5 15.9 19.1 14.7 6.5 23.4 15.7 3.5 15.7 17.1 2.3 14.0 BRT 10.6 10.9 7.8 10.0 11.3 11.8 15.7 10.8 6.1 20.6 11.7 2.9 12.0 12.7 3.5 10.8 Taxi 22.5 22.4 23.7 23.6 21.8 22.0 16.8 23.1 25.6 28.5 23.8 14.7 28.6 22.6 16.6 22.4 Walking 1.2 1.9 1.1 1.5 1.9 1.6 1.4 1.8 1.6 1.8 1.8 1.2 10.3 0.0 0.0 1.7 One of the greatest challenges of utilizing the ABMs is their validation (Crooks and Heppenstall 2012). In this research, a survey sample of 1485 actual tenant households was used for validation of the proposed model. These data were not used in the population synthesis of agents. Residence and commuting mode of these households were simulated by the proposed model and results were compared with their actual residence and commuting mode. Validation results for different socioeconomic categories of sample households are presented in Table 3. As shown in this table, the proposed model correctly simulates the residential zone of 62.6% of households and the commuting mode of 69.6% of their employed members. Also, the model properly simulates the commuting mode of 78.0% of females and 76.8% of all households who use the private car for their commuting. Therefore, the proposed model seems to show a good and promising performance. Table 3: Validation results of the proposed model Attribute Category Number Percentage Gender Household Size Average Monthly Income of Household (million IRR) Number of Private Cars of Household Commuting Distance (km) Total Female Male Single Couple 3-4 > 4 < 10 10-25 > 25 0 1 > 1 < 5 5 - 15 > 15 391 1094 58 475 820 132 247 937 301 147 1059 279 205 968 312 1485 26.3 73.7 3.9 32.0 55.2 8.9 16.6 63.1 20.3 9.9 71.3 18.8 13.8 65.2 21.0 100 Correctly Simulated Residential Zone (%) 59.8 63.5 70.7 64.2 62.2 55.3 64.4 60.3 68.1 62.6 62.7 62.0 64.9 62.5 61.2 62.6 * Correctly Simulated Residential Neighborhood (%) 78.8 82.4 87.9 83.2 80.5 78.8 86.2 80.7 80.1 78.9 82.7 78.1 86.8 81.5 77.9 81.5 Correctly Simulated Commuting Mode (%) Subway Bus BRT Taxi Walking 67.3 68.3 60.0 65.0 69.8 70.0 68.0 68.6 65.2 76.7 66.7 56.3 72.2 55.2 86.8 68.1 61.7 62.9 50.0 61.5 64.2 58.3 62.7 62.8 60.0 70.0 61.8 40.0 71.4 61.4 42.9 62.6 61.1 63.5 50.0 60.4 65.2 62.5 63.9 62.6 63.2 62.5 63.2 60.0 74.1 61.4 50.0 63.0 65.6 66.0 66.7 70.9 63.8 62.5 63.4 67.2 63.0 67.6 65.9 64.4 78.1 65.6 47.4 65.9 75.0 66.7 0.0 62.5 75.0 66.7 50.0 70.0 75.0 60.0 68.2 100 67.9 100 100 67.9 Private Car 78.0 76.3 79.3 77.4 76.6 73.5 70.8 75.3 82.0 100 72.0 85.0 57.6 74.4 84.3 76.8 * Note: A neighborhood with Euclidean distance of 5 kilometers 11 5. Impact assessment of the TDPs In this section, impacts of three TDPs including construction of a new highway, BRT, and subway on the residential self-selection and commuting mode choice of tenant households are evaluated. These TDPs are the major under construction components of the future development plan of Tehran and will be operational in the near future (Figure 5). In this research, these TDPs are separately simulated and their effects on the accessibility and housing rent are estimated. Then, the simulated agents reselect their residence and commuting mode under the new conditions. Since all other conditions are assumed to be constant and only the transportation system is changed, the observed changes in the residential location and commuting mode of agents can be attributed to the impacts of TDPs. Figure 5: Location of the new transport development plans (TDPs) in Tehran TDPs influence many components of a city including the accessibility, travel behavior, traffic, environmental pollutions, land uses, residential location, and housing price in the long- and/or short-time periods. However, in this research, only the impacts of TDPs on the accessibility, travel behavior, housing rent, and residential location choice are investigated. In other words, it is assumed that these TDPs do not have any significant impacts on other determinants of the residential location and commuting mode choices. TDPs significantly improve the accessibility of their neighborhoods to the transport services. The accessibility of TAZs to the transport services is updated using Eq. (2). As a result, due to improvement of the accessibility, the housing rent is also changed in these neighborhoods. Consultations with real- estate agencies besides the experiences obtained from the construction of previous TDPs in Tehran show that the highway and subway developments can have significant impacts on the housing rent, but the BRT developments have not considerable effects on the housing rent. Therefore, the housing rents within the neighborhoods of the highway and subway developments are updated using the following equation: 12 ((cid:2)# (cid:4) )(cid:1)(cid:2) * (cid:23)(cid:1)(cid:2)++,-((cid:2) . (cid:23)(cid:19)(cid:1)(cid:2)++, /++,((cid:2)(cid:21) (cid:1)(cid:2) (cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:15)(cid:16)(cid:17)(cid:18)(cid:19)0(cid:21)(cid:15) where: ((cid:2)# and Ri are the new and previous housing rents per square meter in zone i, respectively; r and 12 are the beginning and ending radiuses of a ring buffer around the new highway or subway; Ai and (cid:1)(cid:2)++, are the areas of zone i and the ring buffer with radiuses r and 12, respectively; /++, is the change rate of housing rent in the buffer area. The values of this parameter are empirically estimated by consultation with the real-estate agencies and by experiences obtained from the construction of previous TDPs in Tehran. For studying how the residential location and commuting mode of agents are changed by TDPs, the proposed model was repeatedly run and changes of the residential location and commuting mode of agents were observed. A summary of these changes is presented in Table 4. Generally, considerable changes in the commuting mode of agents are observed in neighborhoods of TDPs. However, a part of these changes is due to residential self-selection of some agents with respect to their commuting preferences. In other words, some agents with high interests to commute by the private car, subway or BRT move to vicinities of the new highway, subway or BRT, respectively. Therefore, increase in the ridership of subway or BRT in neighborhoods of the new developments does not necessarily indicate the effectiveness of these plans. But what is important is that which and how many agents change their commuting mode to the developed modes. Results of these investigations are shown in Table 4. Interesting results are obtained from simulation of the residential location and commuting mode choices of agents after implementation of the new highway (TDP 1). Private car use significantly increases in the neighboring zones of the new highway (Figure 6). This increase is greater in the northern neighboring zones and indicates that residents of these zones are more interested to use the private car, because the mean car ownership in these zones is more than those of the other neighboring zones. However, private car use also shows a decreasing trend in some zones, because a number of agents with high interests to private car use move from these zones to the neighborhoods of the new highway (residential self- selection effects). Although increase in the private car use in the neighboring zones of the new highway is partly due to the residential self-selection, some agents also change their commuting mode to the private car. As presented in Table 4, development of the new highway generally results in 1.1% increase in the private car use. On the other hand, the greatest decreases of the private car use are observed in the shares of subway, bus and BRT, respectively. Figure 7 shows increase in the private car use by different socioeconomic categories of agents. As can be seen, after implementation of the new highway, agents with fewer members, higher incomes, more owned cars, and longer commuting distances show more 13 interests to change their commuting mode to the private car. As a result, development of the new highway encourages people to use their private cars and may result in increase in the traffic congestion and environmental pollutions in the long term. This completely conflicts with the main goal of urban and transportation planners in Tehran which is decreasing the private car use. Figure 6: Changes of the private car use in TAZs after implementation of the new highway e t a v i r p e h t n i e s a e r c n I ) % ( e s u r a c (a) e t a v i r p e h t n i e s a e r c n I ) % ( e s u r a c 1.5 1.2 0.9 0.6 0.3 0 1.8 1.5 1.2 0.9 0.6 0.3 0 e t a v i r p e h t n i e s a e r c n I ) % ( e s u r a c Single Couple 3-4 > 4 Household size (b) e t a v i r p e h t n i e s a e r c n I ) % ( e s u r a c 1.5 1.2 0.9 0.6 0.3 0 1.8 1.5 1.2 0.9 0.6 0.3 0 < 10 10-25 > 25 Monthly income (c) 1 0 > 1 Number of owned cars (d) < 5 5-15 > 15 Commuting distance Figure 7: Increase in the private car use by agents with different household sizes (a); monthly incomes (b); number of owned cars (c); and commuting distances (d) after implementation of the new highway 14 By development of the new subway line (TDP 2), accessibility of many deprived areas of the southwest of Tehran to the subway network is significantly improved. This plan results in substantial changes in the commuting mode of residents in the southwest zones of Tehran. As illustrated in Figure 8, share of the subway in commuting of people increases up to 17.5% in some southwest zones. Also, due to interconnection of the subway lines, use of the subway shows slight increases in the neighborhoods of the previous stations. However, because of the residential self-selection effects, use of the subway decreases in some zones which are mainly located in north of the new line and have poor accessibilities to the subway network. In other words, a number of agents with high interests to use the subway mode move from these zones to neighborhoods of the new subway stations. In addition to residential self-selection which leads to increase in subway use in the neighboring zones of the new subway line, some agents change their commuting mode to the subway. As shown in Table 4, implementation of the new subway line results in 2.8% increase in the share of subway and 1.07% decrease in the private car use. Figure 9 shows increase in the subway use by different socioeconomic categories of agents. Although after implementation of the new subway line, all categories of agents show considerable willingness to change their commuting mode to the subway, agents with more members, lower incomes, fewer owned cars, and longer commuting distances show higher interests to change their commuting mode to the subway. Results show that development of the new subway line is significantly effective in decrease in the private car use even among the agents with high incomes and more than one owned car. Figure 8: Changes of the subway use in TAZs after implementation of the new subway line 15 y a w b u s e h t n i e s a e r c n I ) % ( e s u (a) y a w b u s e h t n i e s a e r c n I ) % ( e s u 3 2.5 2 1.5 1 0.5 0 5 4 3 2 1 0 Single Couple 3-4 > 4 Household size y a w b u s e h t n i e s a e r c n I ) % ( e s u (b) y a w b u s e h t n i e s a e r c n I ) % ( e s u (c) 0 1 > 1 Number of owned cars (d) 3.5 3 2.5 2 1.5 1 0.5 0 5 4 3 2 1 0 10-25 < 10 Monthly income > 25 < 5 5-15 > 15 Commuting distance Figure 9: Increase in the subway use by agents with different household sizes (a); monthly incomes (b); number of owned cars (c); and commuting distances (d) after implementation of the new subway line Figure 10 shows changes of the BRT use in TAZs after implementation of the new BRT line (TDP 3). These changes are greater in the southern neighboring zones of the new line. This shows that residents of these zones have more willingness to use BRT for their commuting. The main reason for this may be that the mean income and car ownership in these zones are less than those of the other neighboring zones and generally agents with low incomes and fewer owned cars show higher interests to use BRT. In contrast to increase in BRT use in the neighboring zones of the new line, its use decreases in a significant number of zones. In other words, some agents with high interests to use BRT for their commuting move from these zones to neighborhoods of the new line. Therefore, share of the BRT decreases in these zones and increases in neighborhoods of the new line. This indicates that a major part of impacts of the new BRT line on the commuting mode changes is due to residential self-selection. As a result, total share of the BRT mode does not show a significant increase. As presented in Table 4, after implementation of the new BRT line, only 0.36% of agents change their commuting mode to the BRT. Also, share of the private car does not show a meaningful decrease. As illustrated in Figure 11, agents with more members, lower incomes, fewer owned cars, and shorter commuting distances show higher interests to change their commuting mode to BRT. However, agents with high incomes and more than one owned car do not show considerable interests to change their commuting mode to BRT. As a result, the new BRT line does not show significant efficiency to encourage agents especially those with high incomes and a high number of owned cars to change their commuting mode form the private car to the BRT mode. 16 Figure 10: Changes of the BRT use in TAZs after implementation of the new BRT line 0.4 0.3 0.2 0.1 0 0.6 0.5 0.4 0.3 0.2 0.1 0 e s u T R B e h t n ) % ( i e s a e r c n I (a) e s u T R B e h t n i e s a e r c n I ) % ( (c) e s u T R B e h t n ) % ( Single Couple 3-4 > 4 Household size i e s a e r c n I (b) e s u T R B e h t n i e s a e r c n I ) % ( (d) 1 > 1 0 Number of owned cars 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.6 0.5 0.4 0.3 0.2 0.1 0 < 10 10-25 > 25 Monthly income < 5 5-15 > 15 Commuting distance Figure 11: Increase in the BRT use by agents with different household sizes (a); monthly incomes (b); number of owned cars (c); and commuting distances (d) after implementation of the new BRT line 17 Table 4: Changes in the residential location and commuting mode of agents after implementation of the three transport development plans in Tehran Changes in the Residential Zone and Share of the Commuting Modes (%) Development of the new highway (TDP 1) Private Subway Bus BRT Taxi Walking Residential Development of the new subway line (TDP 2) Private Subway Bus BRT Taxi Walking Residential Development of the new BRT line (TDP 3) Private Subway Bus BRT Taxi Walking Attribute Category Number Percentage Monthly Income Gender Average Female 18104 40837 Male Household Size Single 2888 17394 Couple 31636 7023 10597 37331 11013 6532 40050 12359 9607 37782 11552 58941 3-4 > 4 < 10 10-25 > 25 0 1 > 1 < 5 5 - 15 > 15 Commuting Distance (km) of Household (million IRR) Private Cars of Number of Household Total Residential Zone 3.92 3.93 4.47 4.15 3.80 3.73 3.58 4.28 3.10 1.97 4.64 2.65 3.45 4.00 4.11 3.93 30.7 69.3 4.9 29.5 53.7 11.9 18.0 63.3 18.7 11.1 67.9 21.0 16.3 64.1 19.6 100 Car +1.08 +1.11 +1.25 +1.14 +1.08 +1.03 +0.92 +1.09 +1.30 0.00 +1.09 +1.72 +0.59 +1.08 +1.58 +1.10 -0.39 -0.41 -0.48 -0.42 -0.40 -0.34 -0.33 -0.44 -0.35 -0.06 -0.37 -0.71 -0.07 -0.29 -1.06 -0.41 -0.30 -0.31 -0.35 -0.33 -0.28 -0.33 -0.25 -0.28 -0.44 0.00 -0.30 -0.49 -0.20 -0.40 -0.09 -0.31 -0.10 -0.28 -0.09 -0.29 -0.10 -0.31 -0.10 -0.28 -0.09 -0.30 -0.10 -0.24 -0.14 -0.20 -0.07 -0.28 -0.37 -0.13 0.00 +0.06 -0.12 -0.28 -0.45 -0.08 -0.09 -0.17 -0.03 -0.36 -0.30 -0.14 -0.29 -0.10 -0.01 -0.01 0.00 -0.01 -0.01 -0.01 -0.01 -0.01 -0.01 0.00 -0.01 0.00 -0.06 0.00 0.00 -0.01 Zone 4.08 4.08 4.40 4.04 4.11 3.92 4.63 4.23 3.04 6.87 4.38 1.63 2.07 4.28 5.10 4.08 Car -1.01 -1.10 -0.76 -0.98 -1.11 -1.27 -1.43 -1.01 -0.93 0.00 -1.14 -1.41 -0.09 -0.65 -3.28 -1.07 +2.73 +2.84 +2.35 +2.66 +2.89 +2.96 +3.17 +2.84 +2.32 +4.55 +2.76 +2.03 +0.66 +2.68 +4.99 +2.80 -0.49 -0.45 -0.42 -0.42 -0.48 -0.53 -0.43 -0.50 -0.37 -1.26 -0.46 -0.06 -0.08 -0.69 -0.04 -0.46 -0.56 -0.58 -0.45 -0.53 -0.63 -0.50 -0.45 -0.66 -0.39 -1.35 -0.61 -0.05 -0.07 -0.85 -0.07 -0.57 -0.67 -0.71 -0.73 -0.74 -0.67 -0.67 -0.85 -0.67 -0.64 -1.94 -0.54 -0.52 -0.40 -0.49 -1.60 -0.69 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 -0.01 0.00 0.00 0.00 Zone 0.65 0.69 0.76 0.64 0.69 0.68 0.82 0.79 0.16 1.91 0.61 0.27 0.44 0.84 0.36 0.68 Car -0.07 -0.08 -0.03 -0.08 -0.07 -0.10 -0.14 -0.07 -0.02 0.00 -0.10 -0.02 -0.10 -0.08 -0.02 -0.07 -0.08 -0.07 -0.07 -0.07 -0.08 -0.07 -0.13 -0.08 -0.03 -0.18 -0.08 -0.02 -0.08 -0.09 -0.02 -0.08 -0.04 -0.03 -0.03 -0.02 -0.04 -0.04 -0.08 -0.02 -0.03 -0.09 -0.02 -0.03 -0.04 -0.03 -0.03 -0.03 +0.37 +0.36 +0.31 +0.34 +0.37 +0.38 +0.62 +0.35 +0.15 +0.58 +0.40 +0.12 +0.52 +0.39 +0.15 +0.36 -0.17 -0.17 -0.17 -0.16 -0.18 -0.16 -0.25 -0.17 -0.06 -0.29 -0.19 -0.04 -0.23 -0.18 -0.08 -0.17 -0.01 -0.01 0.00 -0.01 -0.01 -0.01 -0.01 -0.01 -0.02 -0.02 -0.01 -0.01 -0.06 0.00 0.00 -0.01 6. Conclusion In this paper, the residential location choice of tenant households and the commuting mode choice of their employed members were modeled using an agent-based microsimulation model. Then, impacts of the three TDPs including development of the new highway, subway and BRT line on these choices were evaluated by repeatedly running the model. Although microsimulation models have some limitations such as data requirements and computational complexities, recent advances in computational capacities and integration with new technologies such as ABMs have reduced these limitations. Agent-based microsimulation models enable us to study the residential location choice and travel behavior of individuals. Also, it provides a robust and flexible framework for implementation of different rules, assumptions, interactions, and levels of description and aggregation. This framework allows us to better study the behavioral and causal relationships in the urban system. Results of the present study indicate that TDPs lead to considerable effects on the commuting mode choice of households. A major part of these effects is due to the residential self-selection of households with respect to their travel preferences. After implementation of each TDP, some households who prefer to commute by the developed mode attempt to move to its neighborhood. Therefore, use of the developed mode is increased in neighborhoods of the development. As a result, it should be noted that the increase in use of the developed mode in its neighboring areas does not necessarily indicate its efficiency, because a significant part of this increase is due to the residential self-selection. In addition to residential self- selection effects, these plans lead to considerable changes in commuting mode of households. This is very important for evaluating the efficiency of different transportation plans. Results show that the new highway leads to increase in the private car use in commuting of households. In other words, after implementation of the new highway, private car use becomes more attractive for some households who 18 previously used the public transport services. This is exactly the opposite of what urban and transportation planners desire and may result in more traffic, air and noise pollutions in the long term. But, results of the new subway line development are very promising, because it leads to decrease in the private car use. Some households from all socioeconomic categories, even those with high incomes and a high number of owned cars, change their commuting mode from the private car to the subway. Furthermore, development of the new BRT line results in change of the commuting mode of some households. However, these changes are more observable among households with low incomes and without the private car. In other words, households with high incomes and a high number of owned cars do not show interest to change their commuting mode from the private car to BRT. Therefore, it seems that the new subway line is more popular than the new BRT line, and it is more efficient to decrease the private cars use. It should be emphasized that results of this research are exposed to assumptions, rules and conditions of the simulation and can be regarded as the scenario-based results. Various aspects of the proposed model can be improved in the future. First, the rules and conditions used in this study to model the behavior of agents and their relationships with other agents and the surrounding environment can be enhanced to improve the results. Second, use of the TAZs as the spatial units leads to modifiable areal unit problem (MAUP) and errors in measurement of the network-based attributes of the transport services. This means that changes in size or configuration of zones can affect the results. In order to reduce these effects and also to enhance the efficiency of the proposed model in the large-scale planning, smaller spatial units such as the census blocks, cells, and parcels can be used. In addition, effects of varying sizes and configurations of spatial units on results can be examined. Third, the proposed model can be extended to evaluate impacts of TDPs on the residential location and commuting mode choices of not only tenant households but also all households. Fourth, the proposed model can be used to evaluate impacts of different transport policies (e.g. changes in the fuel price, changes in the parking space and cost, and changes in the existing transportation networks) on residential location and commuting mode choices of households. Fifth, although commuting mode choice has been modeled in a typical day of the year in this paper, the model can be developed to consider time-related criteria including season, weather conditions, and school holidays in selection of an appropriate commuting mode. Finally, a price bidding framework and a housing supply module can be added to the proposed model in the future. 19 References Benenson, I. 1998. "Multi-agent simulations of residential dynamics in the city." Computers, Environment and Urban Systems 22:25-42. Birkin, M., and B. Wu. 2012. "A Review of Microsimulation and Hybrid Agent-Based Approaches." In Agent- Based Models of Geographical Systems, edited by A.J. Heppenstall, A.T. Crooks, L.M. See and M. Batty, 51-68. Dordrecht: Springer. Cao, X., P.L. Mokhtarian, and S. Handy. 2009. "Examining the impacts of residential self-selection on travel behavior: a focus on empirical findings." Transport Reviews 29:359-95. Cao, X., P.L. Mokhtarian, and S.L. Handy. 2007. "Do changes in neighborhood characteristics lead to changes in travel behavior? A structural equations modeling approach." Transportation 34:535-56. Crooks, A.T., and A.J. Heppenstall. 2012. "Introduction to Agent-Based Modelling." In Agent-Based Models of Geographical Systems, edited by A.J. Heppenstall, A.T. Crooks, L.M. See and M. Batty, 85-105. Dordrecht: Springer. Currie, G. 2010. "Quantifying spatial gaps in public transport supply based on social needs." Journal of Transport Geography 18:31-41. Davidsson, P. 2001. "Multi agent based simulation: Beyond social simulation." In Multi agent based simulation, edited by S. Moss and P. Davidsson. Heidelberg: Springer. Deb, K., A. Pratap, S. Agarwal, and T. Meyarivan. 2002. "A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II." IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 6 (2):182-97. Delbosc, A., and G. Currie. 2011. "Using Lorenz curves to assess public transport equity." Journal of Transport Geography 19:1252-9. Devisch, O.T.J., H.J.P. Timmermans, T.A. Arentze, and A.W.J. Borgers. 2009. "An agent-based model of residential choice dynamics in nonstationary housing markets." Environment and Planning A 41(8):1997- 2013. Ettema, D. 2011. "A multi-agent model of urban processes: Modelling relocation processes and price setting in housing markets." Computers, Environment and Urban Systems 35:1-11. Ewing, R., and R. Cervero. 2010. "Travel and the built environment:a meta-analysis." Journal of the American Planning Association 76(3):265-294. Gaube, V., and A. Remesch. 2013. "Impact of urban planning on household's residential decisions: An agent-based simulation model for Vienna." Environmental Modelling & Software 45:92-103. Guo, J.Y., and C. Chen. 2007. "The built environment and travel behavior: making the connection." Transportation 34:529-33. Haase, D., S. Lautenbach, and R. Seppelt. 2010. "Modeling and simulating residential mobility in a shrinking city using an agent-based approach." Environmental Modelling & Software 25:1225-40. Haddad, E.A., F.S. Perobelli, E.P. Domingues, and M. Aguiar. 2011. "Assessing the ex ante economic impacts of transportation infrastructure policies in Brazil." Journal of Development Effectiveness 3 (1):44-61. 20 Handy, S., X. Cao, and P. Mokhtarian. 2005. "Correlation or causality between the built environment and travel behavior? Evidence from Northern California." Transportation Research Part D 10:427-44. Jokar Arsanjani, J., M. Helbich, and E. de Noronha Vaz. 2013. "Spatiotemporal simulation of urban growth patterns using agent-based modeling: The case of Tehran." Cities 32:33-42. Lerman, S.R. 1976. "Location, housing, automobile ownership, and mode to work: a joint choice model." Transportation Research Record 610:6-11. Meshkini, A., and H. Rahimi. 2011. "Changes in population settlement pattern in urban system of Tehran province (1966 to 2006)." Journal of Geography and Regional Planning 4(7):371-82. Miller, E.J., J.D. Hunt, J.E. Abraham, and P.A. Salvini. 2004. "Microsimulating urban systems." Computers, Environment and Urban Systems 28:9-44. Mokhtarian, P.L., and X. Cao. 2008. "Examining the impacts of residential self-selection on travel behavior: a focus on methodologies." Transportation Research Part B 42:204-28. Naess, P. 2013. "Residential location, transport rationales and daily-life travel behaviour: The case of Hangzhou Metropolitan Area, China." Progress in Planning 79:1-50. Nurlaela, S., and C. Curtis. 2012. "Modeling household residential location choice and travel behavior and its relationship with public transport accessibility." Procedia - Social and Behavioral Sciences 54:56-64. Parker, D.C., S.M. Manson, M.A. Janssen, M.J. Hoffmann, and P. Deadman. 2003. "Multi-agent systems for the simulation of land-use and land-cover change: A review." Annals of the Association of American Geographers 93 (2):314-37. Pinjari, A., R. Pendyala, C. Bhat, and P. Waddell. 2007. "Modeling residential sorting effects to understand the impact of the built environment on commute mode choice." Transportation 34:557-73. Rand, J. 2011. "Evaluating the employment-generating impact of rural roads in Nicaragua." Journal of Development Effectiveness 3(1):28-43. Rashidi, T.H., J. Auld, and A. Mohammadian. 2012. "A behavioral housing search model: Two-stage hazard-based and multinomial logit approach to choice-set formation and location selection." Transportation Research Part A 46:1097–107. Salvini, P.A., and E.J. Miller. 2005. "ILUTE: An Operational Prototype of a Comprehensive Microsimulation Model of Urban Systems." Networks and Spatial Economics 5:217-34. Sener, I.N. , R.M. Pendyala, and C.R. Bhat. 2011. "Accommodating spatial correlation across choice alternatives in discrete choice models: an application to modeling residential location choice behavior." Journal of Transport Geography 19:294-303. Tehran Municipality. 2013. Tehran statistical yearbook 2012-2013. Tehran, Iran: ICT Organization of Tehran Municipality. Tsou, K.-W., Y.-T. Hung, and Y.-L. Chang. 2005. "An accessibility-based integrated measure of relative spatial equity in urban public facilities." Cities 22 (6):424-35. van de Walle, D. 2009. "Impact evaluation of rural road projects." Journal of Development Effectiveness 1(1):15-36. 21 Van Wee, B. 2009. "Self-Selection: A Key to a Better Understanding of Location Choices, Travel Behaviour and Transport Externalities?" Transport Reviews 29(3):279-92. Vega, Amaya, and Aisling Reynolds-Feighan. 2009. "A methodological framework for the study of residential location and travel-to-work mode choice under central and suburban employment destination patterns." Transportation Research Part A: Policy and Practice 43 (4):401-19. Veldhuisen, K.J., H.J.P. Timmermans, and L.L. Kapoen. 2000. "RAMBLAS: a regional planning model based on the microsimulation of daily activity travel patterns." Environment and Planning A 32:427-43. Waddell, P., A. Borning, M. Noth, N. Freier, M. Becke, and G.F. Ulfarsson. 2003. "Microsimulation of urban development and location choices: Design and implementation of UrbanSim." Networks and Spatial Economics 3(1):43-67. Wooldridge, M., and N.R. Jennings. 1995. "Intelligent agents: Theory and practice." The Knowledge Engineering Review 10 (2):115-52. 22
1711.10283
1
1711
2017-11-28T13:30:45
Data Backup Network Formation with Heterogeneous Agents
[ "cs.MA" ]
Social storage systems are becoming increasingly popular compared to the existing data backup systems like local, centralized and P2P systems. An endogenously built symmetric social storage model and its aspects like the utility of each agent, bilateral stability, contentment, and efficiency have been extensively discussed in Mane et. al. (2017). We include heterogeneity in this model by using the concept of Social Range Matrix from Kuznetsov et. al (2010). Now, each agent is concerned about its perceived utility, which is a linear combination of its utility as well as others utilities (depending upon whether the pair are friends, enemies or do not care about each other). We derive conditions when two agents may want to add or delete a link, and provide an algorithm that checks if a bilaterally stable network is possible or not. Finally, we take some special Social Range Matrices and prove that under certain conditions on network parameters, a bilaterally stable network is unique.
cs.MA
cs
Data Backup Network Formation with Heterogeneous Agents (Extended Abstract) Harshit Jaina, Guduru Sai Tejaa, Pramod Manea, Kapil Ahujaa and Nagarajan Krishnamurthyb 7 1 0 2 v o N 8 2 ] A M . s c [ 1 v 3 8 2 0 1 . 1 1 7 1 : v i X r a Abstract -- Social storage systems [1], [2], [3] are becoming increasingly popular compared to the existing data backup systems like local, centralized and P2P systems. An endogenously built symmetric social storage model and its aspects like the utility of each agent, bilateral stability, contentment, and efficiency have been extensively discussed in [4]. We include heterogeneity in this model by using the concept of Social Range Matrix from [5]. Now, each agent is concerned about its perceived utility, which is a linear combination of its utility as well as others utilities (depending upon whether the pair are friends, enemies or do not care about each other). We derive conditions when two agents may want to add or delete a link, and provide an algorithm that checks if a bilaterally stable network is possible or not. Finally, we take some special Social Range Matrices and prove that under certain conditions on network parameters, a bilaterally stable network is unique. Index Terms -- Social Storage, F2F Backup System, Endoge- nous and Heterogeneous Network Formation, Bilateral Stability. I. INTRODUCTION AND MOTIVATION In recent years, social storage (friend-to-friend) is emerging as an alternative to local (e.g., hard disc), online (e.g., cloud), and Peer-to-Peer data backup systems. Social storage allows users to store their data on their social relatives' (e.g., friends, colleagues, family, etc.) storage devices. Researchers believe that social relationships (which are at the core of social storage) help to mitigate issues like data availability, reliability, and security. Initial work in this field has primarily focused on developing techniques to exogenously build social storage systems, and performing Quality of Services (QoS) analysis in terms of data reliability and availability in these systems. A most recent study in [4] focuses on explicit data backup partner selection, where agents themselves select their partners. This selection is studied in a strategic setting, and eventually builds a social storage network. They model a utility function, which reveals the benefit an individual receives in a social storage network. Further, they analyze the network by using bilateral stability as a solution concept, where no pair of agents add or delete a link without their mutual consent. There are several advantages of this approach. First, this approach makes it possible to incorporate user's strategic behavior (in terms of with whom user wants to form social connections and with whom it does not). Second, this approach aAuthors are with the IIT Indore. Corresponding author, Kapil Ahuja's, email: {kahuja}@iiti.ac.in bAuthor is with the IIM Indore. helps us to predict the following: which network is likely to emerge; which one is stable (in which no individual has incentives to alter the structure of the network either by forming new or deleting existing social connections); and which one is the best (contended and/ or efficient) from all the participants point of view. However, the above strategic setting does not consider het- erogeneous behavior (e.g., selfless, selfish, etc.) in the network formation. In this paper, we focus on this aspect. This way, we make the model close to a real-world scenario. Although, doing so makes it challenging to deal with the model and as well as predict its outcome. To achieve the above, we incorporate the concept of Social Range Matrix introduced in [5] while exploring different social relationships between agents. We modify the utility of agents in the social storage model discussed in [4]. Further, we revisit the results regarding bilateral stability of such a model. II. MODEL Our model is composed of four components. First is sym- metric social storage. Second is the utility (as derived in [4]) of each agent. Third is Social Range Matrix, which captures the social relationship between these agents. Fourth is the perceived utility obtained by combining the second and the third components. A symmetric social network g is a data backup network consisting of N number of agents and a set of links connecting these agents. A link (cid:104)ij(cid:105) ∈ g represents that the agents i and j are data backup partners, who store their data on each other's shared storage space. In g, pairs of agents share an equal amount of storage space. Agents perform two actions, link addition (represented by g + (cid:104)ij(cid:105)) and deletion (represented by g − (cid:104)ij(cid:105)). The utility function in [4] reveals the cost and benefit that each agent i receives in g and is given by ui(g) = β ∗ (1 − λni(g)) − c ∗ ni(g). This utility function ui(g) consists of the following param- eters: the agent i's neighborhood size ni(g); the benefit β associated with data; the cost c that the agent i incurs to maintain its neighbours; and the probability of disk failure λ. Note that c, β, and λ lie between 0 and 1. The utility function is a combination of two objectives for each agent i. The first is to minimize the total cost of the links, which is c ∗ ni(g). The second is to maximize the expected data backup benefit, which is β ∗ (1 − λni(g)). Note that from now onwards we will use ni to represent neighbourhood size of agent i in g. In our model, we consider three type of agents. First, where an agent helps to maximize other's utility (friend). Second, where an agent aims to decrease other's utility (enemy). Third, where an agent does not care about other's utility (neutral). Based upon [5], we represent the above kind of social relationships between pairs of agents in a Social Range Matrix F . Here, each element fij denotes the above discussed social relationship between i and j. That is, > 0 < 0 = 0 fij i and j are friend of each other, i and j are enemy of each other, and i and j do not care about each other. Also, j ∈ the set of all agents including i and fii > 0. Many such interesting matrices are possible, for example, a matrix of all ones mean that all pair of agents are friends, and a matrix of all zeroes except the diagonal elements means weak social links. In our paper, for the sake of simplicity, we use only three values for fij. That is, 1, -1, and 0 indicating friend, enemy, neutral, respectively. We also consider that agents give more importance to other agents utilities than their own utility, i.e. fii < fij for all j. Now, agents have different social relationships with others, and hence, their utility not only depends on the structure of the network but also their social relationships with others. We define the new utility (of agent i in g) as the perceived utility, which is defined as follows: fijuj(g). (1) j In this setting, each agent's objective is to maximize its perceived utility (which takes care of utilities of other agents). Thus, the optimization problem is max ((cid:101)ui(g)). (cid:88) (cid:101)ui(g) = III. CONDITION FOR LINK ADDITION AND DELETION Link addition between an agent i and an agent j occurs only when the perceived utilities of both the agents increases, i.e. (cid:101)ui(g + (cid:104)ij(cid:105)) > (cid:101)ui(g) (cid:101)uj(g + (cid:104)ij(cid:105)) > (cid:101)uj(g). and Similarly, link deletion happens when (cid:101)ui(g − (cid:104)ij(cid:105)) > (cid:101)ui(g) (cid:101)uj(g − (cid:104)ij(cid:105)) > (cid:101)uj(g). and Thus, equivalent to (4) and (5) we get link deletion conditions as below. fiiλni + fijλnj < fiiλnj + fijλni < (fii + fij) ∗ c ∗ λ (fii + fij) ∗ c ∗ λ (1 − λ) ∗ β (1 − λ) ∗ β and (6) (7) . (cid:12)(cid:12)ln(cid:0) IV. SUFFICIENCY CONDITION FOR LINK ADDITION Theorem 1. For any two agents i and j, let t1 = max (ni, , the nj), t2 = min (ni, nj) and fij > 0. If t1 < link addition conditions (4) and (5) will be true, and hence, a link will be formed between i and j. Proof. Case 1: If ni > nj, then t1 = ni and t2 = nj. Thus, (1−λ)∗β ln λ c (cid:1)(cid:12)(cid:12) λni fiiλni fijλni or Also, < λnj < fiiλnj < fijλnj (since 0 < λ < 1) (since fii > 0). (since fij > 0). Combining above two we get (fii + fij)λni < fiiλni + fijλnj < (fii + fij)λnj (fii + fij)λni < fiiλnj + fijλni < (fii + fij)λnj . and (8) (9) Using (4) -- (5) in (8) -- (9) we get sufficiency condition for link addition as below. (fii + fij)λni > . (10) (fii + fij) ∗ c (1 − λ) ∗ β On solving (10), we get that link between i, j will happen if (cid:16) (cid:12)(cid:12)(cid:12)ln ni < c (1−λ)∗β ln λ (cid:17)(cid:12)(cid:12)(cid:12) . Case 2: If ni ≤ nj Since (4) and (5) are symmetric, interchange i and j. (2) (3) Similarly, we can derive sufficiency conditions when fij < 0 above as well as for link deletion. Algorithm 1 lists the steps for reaching a bilaterally stable network. That is, when no agent has any incentive to add or delete a link. For all agents k, except i and j, the neighbourhood size (nk) remains constant so their utility is the same and cancels out. Simplifying (2) and (3) with (1), we get that link addition happens when fiiλni + fijλnj > fiiλnj + fijλni > (fii + fij) ∗ c (1 − λ) ∗ β (fii + fij) ∗ c (1 − λ) ∗ β . and (4) (5) V. CASE STUDY Consider five agents as follows: a, b, c, d, and e. Assume that social relationships between these agents is captured in the Social Range Matrix F given in Table I. As an example, the way to read this matrix is as follows: a is a friend of b and d, while it is an enemy of c and e. Let us also assume that c = 0.01, λ = 0.2,  = 0.1, and β = 0.1. Initially all agents are isolated (i.e., the starting Algorithm 1: Pseudo code to arrive at a bilaterally stable network. Input Comment: i and j are agents, flag = 1 means network is not bilaterally : c, λ, β, F, starting network, f lag = 1 if link is absent between < i, j > then Check link addition conditions (4) and (5) for i, j and add link if they are true. flag = 1 end if link is present between < i, j > then Check link deletion conditions (6) and (7) for i, j and delete link if they are true. flag = 1 stable flag = 0 for i = 1 to n do 1 while flag == 1 do 2 3 4 5 6 7 for j = 1 to n do if i (cid:54)= j then 8 9 10 11 12 13 14 15 16 17 end end end end end TABLE I: Social Range Matrix F a  1 -1 1 -1 b 1  1 -1 -1 c -1 1  -1 1 d 1 -1 -1  1 e -1 -1 1 1  a b c d e network is a null network). We follow the procedure described in Algorithm 1 and obtain the bilaterally stable network g(cid:48) shown in Fig. 1. With the same set of parameters and F , by starting from a random non-null network, we obtain a different bilaterally stable network than in Fig. 1. This implies that bilaterally stable networks are not necessarily unique. By looking at the ratio of c β , where 0 < c, β < 1, λ = 0.2, and above F , we found that for 0.044 < c β < 0.089, Algorithm 1 runs into infinite loop implying that no bilaterally stable network is possible. Interestingly, for all other values of β we found that at least one bilaterally stable network exists. c If c > β, λ = 0.2, and above F , then we get a unique bilaterally stable network in which all pair of agents are enemies. VI. UNIQUE BILATERALLY STABLE NETWORKS β < (1 − λ)λN−2 and if all agents are friends Lemma 1. If c of each other (i.e. fij = 1), then a complete network is the unique bilaterally stable network. Proof. First, consider the link addition conditions stated in (4) and (5). We can observe that, as ni and nj increases, the L.H.S of (4) and (5) decreases. This implies that agents have an incentive to increase their neighborhood size. If the link addition conditions (4) and (5) are true for ni = nj = N − 2 (both agents have the neighborhood size one less than the maximum possible size)1, then they will be true for all values of ni, nj < N-2 (if the smaller value of the L.H.S is greater than the R.H.S., bigger values will be greater). Solving (4) -- (5) with ni = nj = N − 2, i.e. (fii + fij) ∗ c (1 − λ) ∗ β fiiλN−2 + fijλN−2 > gives < (1 − λ)λN−2. c β A similar analysis can be done with the deletion conditions. β > (1 − λ) and if all agents are friends of Lemma 2. If c each other (i.e. fij = 1), then the empty network is the unique bilaterally stable network. Proof. Similar to Lemma 1. (1− λ) and if fij is either 1 or -1, Corollary 1. If c then the bilaterally stable network will be the one where all the pairs of enemies form links. β > 1 1−fii VII. FUTURE WORK In this work, we have extended the social storage model proposed in [4] to include heterogeneous behavior (variety of social relationships). After that, we have analyzed this model using their solution concept of bilateral stability. The preliminary results here give tremendous insight into how a endogenously built social storage system would emerge. Future work involves further analyzing the stability of such networks as well as studying contentment (when everyone has maximized their utility) and efficiency (where the total utility of the network is maximized) in this new heterogeneous agent scenario. REFERENCES [1] N. Tran, F. Chiang, and J. Li, "Efficient cooperative backup with decentralized trust management," ACM Transactions on Storage, vol. 8, no. 3, pp. 8:1 -- 8:25, 2012. [2] R. Gracia-Tinedo, M. S´anchez-Artigas, A. Moreno-Mart´ınez, and P. Garcia-Lopez, "Friendbox: A hybrid F2F personal storage application," in 12th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, 2012, pp. 131 -- 138. [3] R. Sharma, A. Datta, M. DeH'Amico, and P. Michiardi, "An empirical study of availability in friend-to-friend storage systems," in IEEE Interna- tional Conference on Peer-to-Peer Computing (P2P), 2011, pp. 348 -- 351. [4] P. Mane, K. Ahuja, and N. Krishnamurthy, "Unique stability point [Online]. Available: in social storage networks," 2017, 33 Pages. https://arxiv.org/abs/1603.07689 [5] P. Kuznetsov and S. Schmid, "Towards network games with social preferences," in 17th International Colloquium on Structural Information and Communication Complexity (SIROCCO), B. Patt-Shamir and T. Ekim, Eds. Springer: Berlin Heidelberg, 2010, pp. 14 -- 28. Fig. 1: Bilaterally Stable Social Storage Network g(cid:48). 1Neighborhood size of N − 1 is a complete network, and hence, is not included in the analysis here.
1508.02685
1
1508
2015-08-11T18:48:39
Augmenting Agent Platforms to Facilitate Conversation Reasoning
[ "cs.MA" ]
Within Multi Agent Systems, communication by means of Agent Communication Languages (ACLs) has a key role to play in the co-operation, co-ordination and knowledge-sharing between agents. Despite this, complex reasoning about agent messaging, and specifically about conversations between agents, tends not to have widespread support amongst general-purpose agent programming languages. ACRE (Agent Communication Reasoning Engine) aims to complement the existing logical reasoning capabilities of agent programming languages with the capability of reasoning about complex interaction protocols in order to facilitate conversations between agents. This paper outlines the aims of the ACRE project and gives details of the functioning of a prototype implementation within the Agent Factory multi agent framework.
cs.MA
cs
Augmenting Agent Platforms to Facilitate Conversation Reasoning David Lillis and Rem W. Collier School of Computer Science and Informatics University College Dublin david.lillis,[email protected] Abstract. Within Multi Agent Systems, communication by means of Agent Communication Languages (ACLs) has a key role to play in the co-operation, co-ordination and knowledge-sharing between agents. De- spite this, complex reasoning about agent messaging, and specifically about conversations between agents, tends not to have widespread sup- port amongst general-purpose agent programming languages. ACRE (Agent Communication Reasoning Engine) aims to complement the existing logical reasoning capabilities of agent programming lan- guages with the capability of reasoning about complex interaction pro- tocols in order to facilitate conversations between agents. This paper outlines the aims of the ACRE project and gives details of the function- ing of a prototype implementation within the Agent Factory multi agent framework. 1 Introduction Communication is a vital part of a Multi Agent System (MAS). Agents make use of communication in order to aid mutual cooperation towards the achievement of their individual or shared objectives. The sharing of knowledge, objectives and ideas amongst agents is facilitated by the use of Agent Communication Lan- guages (ACLs). The importance of ACLs is reflected by the widespread support for them in agent programming languages and toolkits, many of which have ACL support built-in as core features. In many MASs, communication takes place by way of individual messages without formal links between them. An alternative approach is to group related messages into conversations: "task-oriented, shared sequences of messages that they observe, in order to accomplish specific tasks, such as a negotiation or an auction" [1]. This paper presents the Agent Conversation Reasoning Engine (ACRE). The principal aim of the ACRE project is to integrate interaction protocols into the core of existing agent programming languages. This is done by augmenting their existing reasoning capabilities and support for inter-agent communication by adding the ability to track and reason about conversations. Currently at the stage of an initial prototype, ACRE has been integrated with several agent programming languages running as part of the Common Language Framework 5 1 0 2 g u A 1 1 ] A M . s c [ 1 v 5 8 6 2 0 . 8 0 5 1 : v i X r a of the Agent Factory platform [2]. The longer-term goals of ACRE include its use within other mainstream agent frameworks and languages. The principal aim of this paper is to outline the goals of the ACRE project and to discuss its integration into Agent Factory. This paper is laid out as follows: Section 2 outlines some related work on agent interaction. Section 3 then provides an overview of the aims and scope of the ACRE project. The model used to reason about conversations is presented in Section 4. ACRE protocols are defined in an XML format that is outlined in Section 5, followed by an example of a conversation in execution in Section 6. Details of the integration of ACRE into the Agent Factory framework are given in Section 7. Finally, Section 8 outlines some conclusions along with ideas for future work. 2 Related Work In the context of Agent Communication Languages, two standards have found widespread adoption. The first widely-adopted format for agent communication was the Knowledge Query and Manipulation Language (KQML) [3]. An alterna- tive agent communication standard was later developed by the Foundation for Intelligent Physical Agents (FIPA). FIPA ACL utilises what it considers to be a minimal set of English verbs that are necessary for agent communication. These are used to define a set of performatives that can be used in ACL messages [4]. These performatives, along with their associated semantics, are defined in [5]. Recognising that one-off messages are limited in their power to be used in more complex interactions, FIPA also defined a set of interaction protocols [6]. These are designed to cover a set of common interactions such as one agent requesting information from another, an agent informing others of some event and auction protocols. Support for either KQML or FIPA ACL communication is frequently in- cluded as a core feature in many agent toolkits and frameworks, native support for interaction protocols is less common. The JADE toolkit provides specific im- plementations of a number of the FIPA interaction protocols [7]. It also provides a Finite State Machine (FSM) behaviour to allow interaction protocols to be defined [?]. Jason includes native support for communicative acts, but does not provide specific tools for the development of agent conversations using interac- tion protocols. This is left to the agent programmer [8, p. 130]. A similar level of support is present within the Agent Factory framework [9]. There do exist a number of toolkits, however, that do include support for conversations. For example, the COOrdination Language (COOL) uses FSMs to represent conversations [10]. Here, a conversation is always in some state, with messages causing transitions between conversation states. Jackal [11] and KaOS [12] are other examples of agent systems making use of FSMs to model communications amongst agents. Alternative representations of Interaction Pro- tocols include Coloured Petri Nets [13] and Dooley Graphs [14]. 3 ACRE Overview ACRE is aimed at providing a comprehensive system for modelling, managing and reasoning about complex interactions using protocols and conversations. Here, we distinguish between protocols and conversations. A protocol is defined as a set of rules that dictate the format and ordering of messages that should be passed between agents that are involved in prolonged communication (beyond the passing of a single message). A conversation is defined as a single instance of multiple agents following a protocol in order to engage in communication. It is possible for two agents to engage in multiple conversations that follow the same protocol. Such an aim can only be realised effectively if a number of features are already available. These include: -- Protocol definitions understandable by agents: Interaction protocols must be declared in a language that all agents must be able to understand and share. This also has the advantage that the protocol definition is sep- arated from its implementation in the agent, thus providing a programmer with a greater understanding of the format the communication is expected to take. ACRE uses an XML representation of a finite state machine for this purpose. This representation is further discussed in Section 5. The separation of protocol definitions from agent behaviours also facilitates the development of external tools to monitor communication between agents. -- Shared ontologies: A shared vocabulary is essential to agents understand- ing each other's communications. A shared ontology defines concepts about which agents need to be capable of reasoning. -- Plan repository: With the two above features in place, an agent may reason about the sequence of messages being exchanged, as well as the content of those messages. This reasoning will typically result in an agent deciding to perform some action as a consequence of receiving certain communications. In this case, it is useful to have available a shareable repository of plans that agents may perform so that new capabilities may be learned from others. Clearly, the use of shared plans will be dependent on the agent programming language(s) being used. The presence of these features aid greatly in the realisation of ACRE's aims. The principal aims are as follows: -- External Monitoring of Interaction Protocols: At its simplest level, conversation matching and recognition of interaction protocols allows for a relatively simple tool operating externally to any of the agents. This can intercept and read messages at the middleware level and is suitable for an open MAS in which agents communicate via FIPA ACL. This is a useful tool for debugging purposes, allowing developers to monitor communication to ensure that agents are following protocols correctly. This is particularly important where conversation management has been implemented in an ad- hoc way, with incoming and outgoing messages being treated independently and without a strong notion of conversations. In this case, the protocol def- initions can be formalised after the implementation of the agents without interfering with the agent code itself until errors are identified. -- Internal Conversation Reasoning: On receipt of a FIPA ACL message, it should be possible for an agent to identify the protocol being followed by means of the protocol parameter defined in the message (for the specifica- tion of the parameters available in a FIPA ACL message see [15]). Similarly, the initiator of a conversation should also set the conversation-id param- eter, which is a unique identifier for a conversation. By referring to the the protocol identifier, an agent can make decisions about its response by con- sulting the protocol specification. Similarly, the conversation identifier may be matched against the stored history of ongoing conversations. ACRE provides an agent with access to information about the conversations to which it is a party. This allows the agent to reason about this according to the capabilities of the agent programming language being used. One example of this is the use of this information to analyse the status of conversations and generate appropriate goals for the agent to successfully continue the conversation along the appropriate lines for the protocol that is specified. This has previously been done with the AFAPL2 agent programming lan- guage [16], following the use of goals in [17]. Goals represent the motivations of the participants in a conversation. Thus the agents' engagement in a par- ticular conversation is decoupled from the individual messages that are being exchanged, allowing greater flexibility in reasoning about their reactions and responses. -- Organisation of Incoming Messages: It is possible that an agent com- municating with agents in another system may receive messages that do not specify their protocol and/or conversation identifier. In this case, it is useful for the agent to have access to definitions of the protocols in which it is capable of engaging so as to match these with incoming messages so as to categorise the messages. In this situation, message fields such as the sender, receiver, message content and performative can be compared against currently active conversations to ascertain if it matches the expectations of the next step of the underlying protocol. -- Agent Code Verification: The ultimate aim of ACRE is to facilitate the verification of certain aspects of agent code. In particular, given integration of conversation reasoning into a programming language, it should be possible to verify whether or not an agent is capable of engaging in a conversation following a particular protocol. 4 Conversation Management ACRE models protocols as FSMs, with the transitions between states triggered by the exchange of messages between agents participating in the conversation. Messages, protocols and conversations are represented by tuples. As a FSM, each protocol is made up of states and transitions, which are also represented by tuples. This section presents these representations and also provides an informal description of the conversation management algorithm used within ACRE. A message is represented by the tuple (s, r, c, φ, p, x), where s is the agent identifier of the message's sender, r is the agent identifier of the recipient, c is the conversation identifier, φ identifies the protocol, p is the message performative and x is the message content. Each protocol is represented by a tuple (φ, S, T, i, F ) where φ is the protocol's unique identifier, S and T are sets of states and transitions respectively, i is the name of the initial state and F is a set of names of final (terminal) states. Within these conversations, each state is represented by the tuple (n, s, φ) where n is the name of the state, s is the status of the state (whether it is a start, end or intermediate state) and φ is the identifier of the protocol it belongs to. A transition is represented by (σ, , s, r, p, x). Here, σ and  are the names of the start and end states respectively, s and r are the agent identifiers of the sending and receiving agents respectively, p is the performative of the message triggering the transition and x is the message content. As a FSM, a protocol can easily visualised as shown in Figure 1. This figure shows a FSM for a simple, one-shot Vickrey-style auction. It shows the states and transitions associated with this protocol. Transitions are triggered by comparison with messages exchanged between the participating agents. Fig. 1. FSM representation of the Vickrey Auction protocol Finally, a conversation may be represented by (φ, A, s, c, B, ψ) where φ is the protocol identifier, A is the set of participating agents, s is the name of the conversation's current state, c is the conversation identifier, B is the current set of variable/value bindings and ψ is the conversation status (active, completed or failed). The values permitted in the tuples shown here are based on first-order logic, meaning that all values are constants, variables or functions. When considering whether a message is capable of advancing a conversation, its fields are compared with the corresponding elements of the conversation's available transitions. When comparing values, the following rules apply: -- Constant values match against other identical constant values (e.g. in Fig- ure 1, the first transition can only be triggered by a message with the per- formative cfp). -- Variables match against any value. -- Functions match other functions that have the same functor, have the same number of arguments and whose arguments in turn match. In the pseudocode that follows in Figures 2, 3 and 4, this is encapsulated by the function matches(a,b). The bindings associated with the conversation (B) is a set of key/value pairs that binds variables to constants or functions against which that they have been matched in triggering a transition. Any variables that have been matched against a constant or function in a triggering message are given a binding that is stored in B. In the example from Figure 1, the sender of the initial message will have their agent identifier bound to the ?initiator variable, so any further messages must be sent by/to that same agent, whenever the ?initiator variable is used. This is an example of a variable being used in immutable context. Once the variable has been bound to a value, that value may not change for the duration of the conversation. An alternative approach is to use a variable in a mutable context. In this situation, a variable may acquire a binding to a new value regardless of whether it has been previously bound. Further explanation (and examples) of the different variable contexts is presented in Section 5.2. One special-case variable also exists. The anonymous variable (denoted by "?") may not acquire any binding. Thus it acts as a wildcard match that will match against any values. The following sections outline the three key stages of the conversation man- agement algorithm. By convention, elements of tuples are denoted by using sub- scripts (e.g. the initial state (i) of a protocol (p) is shown as pi). 4.1 Identifying Candidate Conversations The first stage of the conversation management algorithm is carried out whenever a message is exchanged and is shown in Figure 2. This identifies any active conversations that may be advanced by a message that has been exchanged. If the message contains a defined conversation identifier (which are unique), then only a conversation bearing that identifier may be advanced by the message. In the event that a message is exchanged without a conversation identifier being present, any conversation with an available transition that may be triggered by the message will be considered a candidate. A conversation can be advanced by a message if the elements of the message match against the corresponding elements of any available transitions (i.e. that begin at the current state of the conversation). If the message contains a de- fined conversation identifier, but that conversation cannot be advanced by the message, the status of the conversation must be changed to failed. The apply(B,a) function is used to apply a set of bindings (B) to a term (a). If a is a variable used in an immutable context for which a binding exists in B, then the bound value is returned. Otherwise, a is returned unaltered. C ← ∅ to store candidate conversations m ← message sent/received for each active conversation (c) do if mc = cc or mc = ⊥ then for each transition (t) where tσ = cs do if matches(ms, apply(cB, ts)) and matches(mr, apply(cB, tr)) and matches(mx, apply(cB, tx)) and matches(mp, tp) then Add c to C end if end for end if if mc = cc and c /∈ C then cψ ← f ailed end if end for Fig. 2. Identifying candidate conversations 4.2 Identifying Candidates for New Conversations If no active conversations may be advanced by the given message, the second stage is to identify whether the message is capable of initiating a conversation using a known protocol. This procedure is shown in Figure 3. if C = 0 then for each protocol (p) do if mφ = pφ or mφ = ⊥ then for each transition (t) where tσ = pi do if matches(ms, ts) and matches(mr, tr) and matches(mx, tx) then if mc = ⊥ then Add (pφ,{ms, mr}, pi, nextid(),∅, active) to C Add (pφ,{ms, mr}, pi, mc,∅, active) to C else end if end if end for end if end for end if Fig. 3. Identifying candidate protocols for new conversations If the message contains a protocol identifier, then only the protocol with that identifier is considered. Otherwise, the message is compared against the initial transition of each available protocol. On finding a suitable protocol, a new conversation is created and added to the set of candidate conversations (C). If the message contained a conversation identifier, this is used as the identifier for the new conversation. Otherwise, a new unique conversation identifier is generated (by means of the nextid() function). 4.3 Advancing the Conversation Having identified conversations that match against the given message, the system must advance a conversation, as appropriate. This is shown in Figure 4. At this stage, events are raised to the agent layer to inform the agent of the outcome of the process. If the message was not capable of advancing or initiating any conversation, an "unmatched" event is raised. If there were multiple candidate conversations (which cannot be the case if conversation identifiers are defined for all messages), an "ambiguous" event is raised. If one candidate conversation was identified, this is advanced to the next appropriate state. Its bindings must be updated (using the getBindings(m,t) function) to include bindings for variables in the transition that were matched against values in the message. The anonymous variable may not acquire a bind- ing. This function does not discriminate between variables based on the context in which they are used. Both mutable and unbound immutable variables are free to acquire new bindings. If an immutable context variable has previously been bound to a value, it is this value that is used in matching the message to the transition (by means of the apply(B,a) function shown in Figure 2). As the message content is frequently a function of first order logic, any variables within that function that match against corresponding parts of the message content will also acquire bindings in the same way as standalone variables. if C = 1 then c ← the matched conversation in C t ← the transition matched by the message m cs ← t cB ← cB ∪ getBindings(m, t) if cs is an end state then cψ ← completed raiseEvent(completed, c) else raiseEvent(advanced, c) end if else if C = 0 then raiseEvent(unmatched, m) else raiseEvent(ambiguous, m) end if Fig. 4. Advancing the conversation 5 The ACRE XML Format In ACRE, interaction protocols are modelled using an XML file that follows the ACRE XML protocol schema definition 1. A sample of an XML representation of a Vickrey Auction Interaction Protocol is given in Figure 5 (this is the same protocol as the FSM in Figure 1). Each protocol is identified by a name, a name and a version number (contained in the <namespace>, <name> and <version> tags respectively). The version number is intended to prevent multiple agents attempting to communicate using different protocol implementations (e.g. if an error is discovered in an earlier attempt at modelling a particular protocol). The use of a namespace helps to avoid conflicts whereby various developers implement different models of similar protocols using the same name. Each protocol is represented by a number of states and transitions, defined us- ing <state> and <transition> tags respectively. Each state has only a "name" attribute, so that it can be referred to in the transitions. The type of state each represents (i.e. terminal, initial or other) can be found on the fly when the pro- tocol is loaded. A state at which no transition ends is considered a start state. States at which no transitions begin are terminal states. The reason these are not expressly marked in the protocol definition is because of the ability to import other protocols, which is discussed in Section 5.1. Transitions are more complex, as these are required to match messages so as to trigger a change in the state of a conversation. Each <transition> tag contains up to six attributes, many of which attempt to match against one field of a FIPA message. The attributes in this file correspond with the values in the tuple representing a transition in Section 4. In addition to these message fields, the ACRE conversation manager will also examine the protocol-id and conversation-id fields to match messages to particular conversations. The attributes allowable in a <transition> tag are as follows: -- Performative: This is a mandatory field that specifies the performative that a message must have in order to trigger this transition. The attribute value must be exactly equal to the performative contained in the message for this transition to be triggered. Variables are not permitted in this field. -- From State: Another mandatory field, this indicates the state from which this transition may be triggered. If the conversation is in another state then this rule cannot match. In the majority of cases, the attribute value must be the same as the name of a state that is contained either in the protocol itself or in an imported protocol. In addition to exact state names, regular expression matching is also permit- ted. If a regular expression is provided (indicated by beginning and ending the value with a forward slash), then this transition will be triggerable from any state that matches this regular expression. In practice, the protocol in- terpreter will duplicate this transition for each state name that matches, thus fitting with the model outlined in Section 4. 1 http://acre.lill.is/protocol.xsd -- To State: This is another mandatory field and is used to indicate the state that the conversation will be in upon successful triggering of this transition. As with the "From State" attribute, this should match the name of a state that is either part of the protocol or is imported. However, it may not contain a regular expression, as the conversation state after the sending of a message must be clearly defined. -- Sender: This indicates which agent should be the sender of the message. Although it is allowable to use a constant value for this attribute, this is unusual as it specifically restricts the protocol to an agent with a a particular identifier. Generally, this will use a variable to refer to particular agents. The same variable may be used throughout the protocol to indicate that particular messages should be sent by the same agent, as it will have acquired a bound value the first time it matches against an agent identifier. -- Receiver: This attribute functions in a similar way to "Sender", with the exception that it is the recipient of the message that is being matched. -- Content: This attribute relates to the actual content of the message. It may be a constant, a variable or a function that possibly combines the two. Figure 5 illustrates the use of a function in the content field in each of the transitions. The "Sender", "Receiver" and "Content" attributes are optional in a protocol definition. In each case, the default value if one is not supplied is the anonymous "?" variable that matches any value. 5.1 Importing Protocols One other feature of the ACRE XML format is the ability to import from other protocols. When this occurs, all of the states and transitions from the imported protocol are added to those of the protocol containing the <import> tag. This means that transitions in a protocol may refer to states that are not in the protocol itself but rather are in the imported protocol. One example of a use for this is the "Cancel" meta-protocol that is included in all of the standard FIPA Interaction Protocols. This protocol always works in an identical way, regardless of what the main protocol being followed is: at any non-terminal stage of the conversation, the initiator of the original conversation may terminate the interaction by means of a cancel message. This meta-protocol can be extracted into a separate ACRE protocol that is imported by all other protocols that support it. 5.2 Variable Bindings As mentioned in Section 4, the definition of protocols in ACRE allows the use of three types of variable. The anonymous variable "?" is an unnamed variable that is capable of matching against any value. As such, it can be considered to be a wildcard match. A transition whose content attribute is set to "?" can <?xml version="1.0"?> <protocol xmlns="http://acre.lill.is" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://acre.lill.is \protect\vrule width0pt\protect\href{http://acre.lill.is/proto.xsd}{http://acre.lill.is/proto.xsd}"> <namespace>is.lill.acre</name> <name>acre-vickreyauction</name> <version>0.1</version> <states> <state name="start"/> <state name="awaiting_bid" /> <state name="bid" /> <state name="nobid"/> <state name="accepted"/> <state name="rejected"/> </states> <transitions> <transition performative="cfp" from-state="start" to-state="awaiting_bid" sender="?initiator" receiver="?bidder" content="bidfor(?item)" /> <transition performative="propose" from-state="awaiting_bid" to-state="bid" sender="?bidder" receiver="?initiator" content="bid(?item,?amount)" /> <transition performative="propose" from-state="awaiting_bid" to-state="nobid" sender="?bidder" receiver="?initiator" content="nobid(?item)" /> <transition performative="accept-proposal" from-state="bid" to-state="accepted" sender="?initiator" receiver="?bidder" content="bid(?item,?amount)" /> <transition performative="reject-proposal" from-state="bid" to-state="accepted" sender="?initiator" receiver="?bidder" content="bid(?item,?amount)" /> </transitions> </protocol> Fig. 5. ACRE XML Representation of the Vickrey Auction Protocol be triggered by a message with any content (assuming the other fields in the message match the specified transition). Two types of named variable are permitted: immutable named variables, which have "?" as a prefix followed by the variable name (e.g. ?item) and mu- table named variables that are prefixed with "??" (e.g. ??amount). Each named variable is in scope for the duration of a conversation and is associated with values as it is matched against the actual fields in messages that trigger transitions. Whenever a named variable is used in an immutable context, it may match any content if has not already acquired a value. However, once it has been matched to a value, it may only match that value for the duration of the conversation. For example, Figure 5 uses ?initiator to denote the agent that begins the Vickrey Auction with the sending of the initial call for proposals. Initially this variable does not have a value associated with it, so it may match the name of the relevant agent (e.g. "agent1"). However, once this has been done, the variable ?initiator may only match the value "agent1" for the remainder of the conversation. In some situations it is desirable to have variables whose values may change as the conversation progresses. For that reason, mutable named variables are also facilitated. The difference between a mutable and immutable named variable is that a mutable named variable can match against any content, regardless of whether it previously has a value associated with it. When this occurs, the existing value is overwritten with the new value that has been matched. The motivation behind the use of mutable variables can be seen by exam- ining the Vickrey Auction protocol shown above. This is a one-shot auction, so immutable variables are sufficient. However, implementing an iterated auction is made far more complex if all variables are immutable. The second transi- tion shown in Figure 5 would be unsuitable for this, as the ?amount variable is restricted to match only whatever the first value it is matched against. By changing the content field of this transition to bid(?item,??amount), the vari- able relating to the amount is used in mutable context and so its value may change (although the item being bid for must remain the same). Thus each time this transition is triggered, the amount variable acquires a new value: namely the amount of the latest bid that was submitted. This can later be referred to using texttt?amount by the other agent that wishes to accept or reject the bid. A similar usage can be seen in the example presented in Section 6. 6 ACRE Conversation Example This section presents an example of how an ACRE conversation may progress. The example is based on the "Process Documents" protocol shown in Figure 6. This protocol is designed for a system where text documents must undergo some form of processing. The Initiator of the protocol is capable of performing this processing, though it must be made aware of which documents to work on by the Respondent. Fig. 6. Process Documents Protocol Initially, the Initiator informs the Respondent that it is ready to process doc- uments, to which the Respondent replies with a request to process a particular document. The Initiator may either process the document and inform the Re- spondent of this, or refuse to carry out this processing. In the former case, the Respondent will send the next document for processing and continue to do this until the Initiator eventually refuses. Here, the Agent UML description shown to the left of Figure 6 is converted to the FSM shown on the right. The dashed line surrounding the "Start" state indicate that this is the current state initially. The first transition contains constant values for both the performative and the content. This means that any message matching that transition must have those exact values in those fields. The message sender and receiver are variables, and since there are not yet any bindings associated with the conversation, these will match any agent identifiers in those fields in the message. A message that will trigger this initial transition may look as follows (some unimportant fields have been omitted for clarity): (inform processor :sender :receiver manager :content ready ) This results in the state of the conversation changing to "Waiting", as shown in Figure 7. Because the ?initiator and ?respondent matched against the Fig. 7. Process Documents protocol in the "Waiting" state Fig. 8. Process Documents protocol in the "Requested" state constants "processor" and "manager" respectively in the message, these bindings are associated with the conversation. As these variables are used in immutable context throughout, they must match their exact bound values for the remainder of the conversation. This is indicated in Figure 7 by replacing the variables with these values. Angle brackets have been placed around each of the replacement values in order to emphasise this. The transition from the "Waiting" state can now only be triggered by a message sent by the manager agent to the processor agent with the "request" performative. The content must also match the transition, though with the use of the ??docid variable, there is some flexibility in the values that can be matched. In the next stage, the manager asks the processor to process the document with the identifier "doc123". This is done by means of the following message: (request :sender :receiver :content manager processor process(doc123) ) As this message matches the transition, the conversation moves from the "Waiting" state to the "Requested" state, as shown in Figure 8. Fig. 9. Process Documents protocol in the "Waiting" state for the second time. Fig. 10. Process Documents protocol in the "Requested" state for the second time. At this point, the ?docid variable has also acquired a binding, so this is re- placed in all transitions using it in an immutable context. Again, this is indicated by the value being contained within angle brackets in Figure 8. At this point, the processor agent must either inform the manager that document "doc123" has been processed (thus returning the conversation to the "Waiting" state) or refusing to process that document. In each case, it is only the document identifier that has previously been bound to the ?docid variable that may be used. Re- fusing to process a different document identifier would result in the conversation failing as the message could not match an available transition. If the processor agrees to process the document and informs the manager of its completion, the conversation returns to the "Waiting" state, as shown in Figure 9. Unlike the first time the conversation was in this state, this time the ?docid variable has got a binding associated with it. However, the transition between "Waiting" and "Requested" uses this variable in a mutable context, meaning that it can match against any value contained in the next message. Thus the manager can ask the processor to process any document it wishes. In contrast, as noted previously, when moving from the "Requested" state, the processor is restricted to only discussing the identifier of the last document it was asked to process. If the manager requests that the processor processes document "doc124", the conversation returns to the "Requested" state, as shown in Figure 10. The?docid variable has now acquired an updated binding that is now applied to all the tran- sitions using that variable in an immutable context. At this stage, the processor agent may repeat the cycle by processing the document and informing the man- ager of this, or it may end the conversation by refusing to perform the processing, thus entering the "End" state. 7 Language Integration in Agent Factory Agent Factory is an extensible, modular and open framework for the develop- ment of multi agent systems [2]. It supports a number of agent programming languages, including AFAPL/ALPHA [18,19], AFAPL2 [20], AF-TeleoReactive (based on [21]) and AF-AgentSpeak (an implementation of AgentSpeak(L) [8]). The specific use of ACRE from within AFAPL2 agents has been discussed in a previous paper [16]. Agent Factory's implementation of these agent programming languages are based on its Common Language Framework (CLF) whereby the way in which sensors, actions and modules are implemented have been standardised across the various languages. This greatly facilitates the integration of additional services into each language, as the core components will be shared. This is the case for ACRE, where minimal effort is required to add support for further languages once one integration has been completed. The ACRE Architecture consists of a number of components, some of which are platform-independent and some of which require some work to be ported to other platforms and agent programming languages. 7.1 Protocol Manager The Protocol Manager (PM) is a platform-independent component that is tasked with making protocols available to agents. When an agent identifies the URL of an ACRE protocol definition it will send this to the PM, which will load the protocol, verify it against the appropriate schema and make it available for interested agents to use. It is also capable of accessing online ACRE reposito- ries that may contain multiple protocol definitions in a centralised location. A repository definition file lists the protocols that it has available. Typically, one PM will exist on an agent platform, so any protocol located by any agent will be shared amongst all agents on the platform (within Agent Factory, the PM is a shared Platform Service). However, there is no technical barrier to individual agents having their own PMs if desired. Previously loaded protocols are also stored locally so that they can be recovered in the event of a platform failure or restart. 7.2 Conversation Manager Whereas the PM is shared amongst agents, each agent has its own Conversation Manager (CM), which is used to keep track of the conversations the agent is involved in. The CM monitors both incoming and outgoing communication and matches each message to an appropriate conversation, following the algorithm outlined in Section 4. By monitoring the CM, an agent can gain data that can be used to reason about ongoing conversations and the messages it sends and receives. The CM is also platform-independent. 7.3 Agent/ACRE Interface The Agent/ACRE Interface (AAI) is specific to the platform and agent pro- gramming language being used. This is designed to facilitate the interaction between the agents and the ACRE components mentioned above. The AAI has two distinct principal roles: -- To enable an agent to inform the PM and CM of information it holds. -- To provide the agent with information about the status and activity of the CM and PM. In the former case, an agent must be capable of informing the PM of the location of any protocols that it wishes to use. This information may originally come from another agent with which it wishes to communicate. The CM requires access to the inbox and outbox of the agent also, so the AAI must provide this service also. The key role of the AAI is making information about its own communication available to agents. Within Agent Factory, this is done in two complementary ways: knowledge sensors and event sensors. A knowledge sensor is a sensor that runs on each interpreter cycle of the agent, and provides information on the current state of conversations and pro- tocols. This information currently consists of: -- What protocols are already loaded (PM). -- For each conversation in which the agent is a participant: -- The protocol each conversation is following (CM) -- The identity of the other participating agent in each conversation (CM) -- The current state of each conversation (CM) -- The current status of each conversation (CM) In addition to these, event sensors inform the agent whenever events are raised by the PM or the CM. Events currently handled include: -- A new protocol has been loaded (PM) -- A new conversation has begun (CM) -- A conversation has advanced (CM) -- A conversation has ended (CM) -- An error has occurred in a conversation (CM) In addition to the basic role of information passing, an AAI may augment the capabilities of a language by leveraging the data available from the CM or the PM. For instance, the AAI built for the Agent Factory CLF provides an action of the form advance(conversation-id,performative,content) whereby an agent can advance a specific conversation while providing minimal information. The details about the other participating agent (including its address) are taken from the CM, along with the protocol identifier and content language. Further features in this vein are left for future work. 8 Conclusions and Future Work This paper presents an outline of the ACRE conversation reasoning system, how it models protocols and conversations, and how it is integrated into the Agent Factory multi agent framework. Although currently only used with Agent Fac- tory, it is intended that ACRE will be used in conjunction with several other agent programming frameworks and the languages they support. ACRE has been designed to be as language-independent and platform-independent as pos- sible. Despite this, it will be necessary to adapt the system to frameworks and languages other than Agent Factory and the agent programming languages it supports. Aside from the integration of ACRE into other platforms, future focus will be on the reasoning about conversations at the agent deliberative level and the information that ACRE will need to provide in order to facilitate this. One are of focus will be to allow the grouping of conversations into related groups. As ACRE protocols are limited to two participants, it is necessary to allow agents to relate conversations to each other. One such example will be in a situation where an agent is conducting an auction and has issued a call for proposals to multiple agents. At present, each of these initiates a separate conversation that must be managed by the agent using its own existing capabilities. However, grouping conversations at the Conversation Manager level would allow events to be raised to inform the agent that all conversations in the group had reached the state where a proposal had been received, or left the state where a proposal had been solicited. The key point is the provision of sufficient information for agents to use their deliberative reasoning capabilities in conjunction with the information emanating from the Conversation and Protocol Managers. In addition, it is intended to explore the ways in which having access to an ACRE layer will add to the native messaging capabilities of other programming languages. This includes the ability to directly advance a conversation, as alluded to in Section 7, as well as specifically initiating conversations (rather than relying on message matching on the part of the Conversation Manager). The possibilities are likely to vary with different agent programming languages and it is intended to add these features as appropriate. The availability of cross-platform communication tools such as ACRE can only aid interoperability between distinct agent platforms, toolkits and program- ming languages. References 1. Labrou, Y.: Standardizing agent communication. Multi-Agents Systems and Ap- plications (Advanced Course on Artificial Intelligence) (2001) 74 -- 97 2. Collier, R.W., O'Hare, G.M.P., Lowen, T., Rooney, C.: Beyond Prototyping in the Factory of Agents. In: Multi-Agent Systems and Application III: 3rd International Central and Eastern European Conference on Multi-Agent Systems (CEEMAS 2003), Prague, Czech Republic (2003) 3. Finin, T., Fritzson, R., McKay, D., McEntire, R.: KQML as an Agent Com- munication Language. In: Proceedings of the Third International Conference on Information and Knowledge Management, Gaithersburg, MD (1994) 456 -- 463 4. Poslad, S., Buckle, P., Hadingham, R.: The FIPA-OS Agent Platform: Open Source for Open Standards. In: Proceedings of the 5th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (PAAM2000), Manchester (2000) 368 5. Foundation for Intelligent Physical Agents: FIPA Communicative Act Library Specification (2002) 6. Foundation for Intelligent Physical Agents: FIPA Interaction Protocol Library Specification (2000) 7. Bellifemine, F., Caire, G., Trucco, T., Rimass, G.: Jade Programmer's Guide (2007) 8. Bordini, R.H., Hubner, J.F., Wooldridge, M.: Programming multi-agent systems in AgentSpeak using Jason. Wiley-Interscience (2007) 9. Collier, R.W., Ross, R., O'Hare, G.M.P.: A Role-Based Approach to Reuse in Agent-Oriented Programming. In: AAAI Fall Symposium on Roles, an Interdisci- plinary Perspective (Roles 2005), Arlington, VA, USA (2005) 10. Barbuceanu, M., Fox, M.S.: COOL: A language for describing coordination in In: Proceedings of the First International Conference on multi agent systems. Multi-Agent Systems (ICMAS-95). (1995) 17 -- 24 11. Cost, R.S., Finin, T., Labrou, Y., Luan, X., Peng, Y., Soboroff, I., Mayfield, J., Boughannam, A.: Jackal: a Java-based Tool for Agent Development. In: Working Papers of the AAAI-98 Workshop on Software Tools for Developing Agents, AAAI Press (1998) 12. Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: Toward an industrial-strength open agent architecture. Software Agents (1997) 375 -- 418 13. Cost, R.S., Chen, Y., Finin, T., Labrou, Y., Peng, Y.: Modeling agent conversations with colored petri nets. In: In: Workshop on Specifying and Implementing Con- versation Policies, Third International Conference on Autonomous Agents (Agents '99), Seattle. (1999) 59 -- 66 14. Parunak, H.: Visualizing Agent Conversations: Using Enhanced Dooley Graphs for Agent Design and Analysis. In: Proceedings of the Second International Conference on Multi-Agent Systems (ICMAS). (1996) 15. Foundation for Intelligent Physical Agents: FIPA ACL Message Structure Specifi- cation (2002) 16. Lillis, D., Collier, R.W.: ACRE: Agent Communication Reasoning Engine. In: 3rd International Workshop on LAnguages, Methodologies and Development Tools for Multi Agent SystemS (LADS'010), Lyon (2010) 17. Braubach, L., Pokahr, A.: Goal-Oriented Interaction Protocols. In: MATES '07: Proceedings of the 5th German Conference on Multiagent System Technologies. Volume 4687., Leipzig, Germany, Springer (2007) 85 -- 97 18. Collier, R.W.: Agent Factory: A Framework for the Engineering of Agent-Oriented Applications. Phd thesis, University College Dublin (2001) 19. Collier, R.W., Ross, R., O'Hare, G.M.P.: Realising Reusable Agent Behaviours In: Proceedings of the 3rd German Conference on Multi-Agent with ALPHA. System Technologies (MATES 05), Koblenz, Germany (2005) 210 -- 215 20. Muldoon, C., O'Hare, G.M.P., Collier, R.W., O'Grady, M.J.: 6. In: Towards Per- vasive Intelligence: Reflections on the Evolution of the Agent Factory Framework. Springer US, Boston, MA (2009) 187 -- 212 21. Nilsson, N.J.: Teleo-Reactive Programs for Agent Control. Journal of Artificial Intelligence Research 1 (1994) 139 -- 158
cs/0610113
1
0610
2006-10-19T10:41:16
CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield
[ "cs.MA", "cs.CC" ]
In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algorithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone information of both objectives and a second one that is based on the dominance concept of multiobjective optimization problems. These rules have been evaluated in several different situations (maps with different degree of difficulty), and we have found that they yield better results than a greedy algorithm (taken as baseline) in addition to a military behaviour that is also better in the tactical sense. The aggregative function, in general, yields better results than the one based on dominance.
cs.MA
cs
CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield A.M. Mora1, J.J. Merelo1, C. Millan2, J. Torrecillas2, and J.L.J. Laredo1 1 Departamento de Arquitectura y Tecnolog´ıa de Computadores University of Granada (Spain) {amorag,jmerelo,juanlu}@geneura.ugr.es 2 Mando de Adiestramiento y Doctrina Spanish Army {cmillanm, jtorrelo}@et.mde.es Abstract. In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algo- rithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone information of both objectives and a second one that is based on the dom- inance concept of multiobjective optimization problems. These rules have been evaluated in several different situations (maps with different degree of difficulty), and we have found that they yield better results than a greedy algorithm (taken as baseline) in addition to a military behaviour that is also better in the tactical sense. The aggregative function, in general, yields better results than the one based on dominance. 1 Introduction Prior to any combat manoeuvre, the unit commander must plan the best path to get to an position that is advantageous over the enemy in the tactical sense. This decision is conditioned by two criteria, speed and safety, which he must evaluate. The choice of a safe path is made when the enemy forces situation is not known, so the unit must move through hidden zones in order to avoid detection, which may correspond to a very long, and thus slower, path. On the other hand, the choice of a fast path is made when the unit is going to attack the enemy or if there are few hidden (safe) zones in the terrain and going through it may produce a lot of casualties. In any case, the computation of the best itinerary for the unit to reach the objective point is a very important tactical decision. We will try to make this decision in the paper by solving the what we have called the military unit path finding problem. The military unit path finding problem is similar to the common path finding problem with some additional features and restrictions. It intends to find the best path from an origin to a destination point in the battlefield but keeping a balance between route speed and safety. The unit has an energy (health) and a resource level which are consumed when the unit moves through the path depending on the kind of terrain and difference of height, so the problem objectives are adapted to minimize the consumption of resources (which usually means walking as short/fast as possible) and the consumption of energy. In addition, there might be some enemies in the map (battlefield) which could shoot their weapons against the unit. To solve the problem an Ant Colony System (ACS) algorithm has been adapted. It is a type of ACO [1,2], which offers more control over the exploration and exploitation parts of search. In addition, some features to deal with the two objectives of the problem have been added (in [3] it can be found a survey of MO algorithms), so it is a MOACO algorithm (paper [4] presents a review of some of them). This problem had been solved so far using classical techniques like branch and bound or dynamic programming, which do not usually scale well with size, but to the best of our knowledge find no one that treat the problem as a multiobjective and solve it with a MOACO. The rest of the paper is organized as follows: next section is devoted to a presentation of the problem we want to solve, followed in section 3 by a presentation of the CHAC algorithm. Experiments and results are presented in section 4, and conclusions are drawn in section 5, along with the future lines of development of this work. 2 The Problem Our objective in this paper is to give the unit commander, or to a simulated unit in a combat training simulator, a tactical decision capability so that it will be able to calculate the best path to its target point in the battlefield considering the same factors that a commander would. The battlefield has been modeled as a square cell grid, every cell corresponding to a 500x500 meter zone in the real world. The speed in a path is associated with the unit resources consumption because we have assigned a penalization to every cell related to the 'difficulty' of going through it and we have called this penalization resource cost of the cell. So, going through cells with more resource cost is more difficult and so more slow. Due to this justification, we refers to fast paths or paths with small resource cost. Thus, the problem unit has two properties, a number of energy (which represent global health of unit soldiers or status of the unit vehicles) points and a number of resource (which represent unit supplies such as fuel, food and even moral) points. Its objective is to get to a target point with the maximum level in both properties. The unit energy level is decremented in every cell of the path (the company depletes its human resources or vehicles suffer damage), which have a penalization called no combat casualties, depending on its type. In addition there is an extra penalization due to the impact of an enemy weapon in the cell. This value is calculated as combination of three other, the probability of enemy shoots, the probability of impact in the unit, and the damage it would produce to the unit. Moreover every cell has an assigned resources penalty depending on the type of terrain. There is an extra penalty when the unit goes from a cell to other with different height (if it goes down, the penalty is small than if it goes up). Besides cost in energy, and cost in resources, cells have the following properties: • Type: there are four kinds of cells: normal (flat terrain), forest, water and obstacle, three different types of terrain and obstacle which means a cell that the unit cannot going through. There are several subtypes: it can be an enemy unit position, problem unit position, or the target point; it can also be affected by enemy fire (with one hundred levels of impact) or be lethal for the problem unit. • Height : an integer number (between -3 and 3) which represents a level of depth or height of a cell. We have implemented an application in Delphi 7 for Windows XP in order to create the problem scenarios (battlefields) and also to visualize the solutions obtained by CHAC. This application is available under request. Figure 1 shows an example of battlefield. It includes all typical features: enemy unit, obstacles, forest and water filled terrain accidents. Fig. 1. Map Example. It is a 30x30 map which shows some of the types and subtypes above mentioned. In left, and explanation of cells types is showed, because it is difficult to differ between different kinds of cells due to the black and white image. The example includes the problem unit (circle with black border), an enemy unit (square with gray border and mark with 'X'), the zone affected by enemy weapons (in different shades of light gray depending on the associated damage) surrounding the enemy and the objective point for the unit (circle with light gray border). The different shades in the same color models height (light color) and depth (dark color). This implementation includes some constraints: problem and enemy units fill up exactly one cell (which corresponds with their size in real world). The problem unit as well as the target point must be located on the map; the presence of the enemy is optional. The unit can go only once through a cell and cannot go through cells occupied by an enemy or an obstacle, or cells with a cost in resources or energy bigger than what the unit has available. Some rules also apply to the line of sight, so that it behaves as realistically as possible. 3 The CHAC Algorithm CHAC means Compan´ıa de Hormigas Acorazadas or Armoured Ant Company; we have chosen this (admittedly a bit tongue-in-cheek) name to relate the ACO algorithms with the military scope of this application. It is an ACS adapted to deal with several objectives, that is, a MOACO or Multi-objective Ant Colony Optimization algorithm. In order to approach it via an ACO algorithm, the problem must be transformed into a graph with weighted edges. Every cell in the map is considered a node in the graph with 8 edges connect it to every one of its neighbours (except in border cells). To deal with two objectives, there are two weights in every edge related to the cost of energy and resources, that is, a cost related to the energy expenses (cost assigned to the destination node of the edge) and other related to the consumption of resources if the unit moves from one cell to its neighbour following that edge (which depends on the types of both nodes and the height difference between them). The algorithm implemented within CHAC is constructive which means that in every iteration, every ant builds a complete solution, if possible (there are some constraints, for example the unit cannot go through one node twice in the same path), by travelling through the graph. In order to guide this movement, the algorithm uses information of two kinds: pheromone and heuristic, that will be combined. Since it is a multiobjective problem, CHAC uses two pheromone matrices, one per ob- jective, and two heuristics functions (also matrices), following the BicriterionAnt algorithm designed by Iredi et al. in [5]. However, we decided to use an Ant Colony System (ACS) instead of an Ant System to have better control in the balance between exploration and exploitation by using the parameter q0. We have implemented two state transition rules (which means two different algorithms), first one similar to the Iredi's proposal and second one based on dominance of neighbours. The local and global updating formulas are based in the MACS-VRPTW algorithm proposed by Bar´an et al. in [6], with some changes due to the use of two pheromone matrices. The objectives are named f , minimization the resources consumed in the path (speed maximization) and s, minimization the energy consumed in the path (safety). The Heuristic Functions try to guide search between the start and the target point consid- ering the most important factors for every objective. So, for edge (i,j) they are: ηf (i, j) = ηs(i, j) = ωf r Cr(i, j) ωse Ce(i, j) + + ωf d Dist(j, T ) ωsd Dist(j, T ) + (ωf o · ZO(j)) + (ωso · ZO(j)) (1) (2) In Equation 1, Cr is the resource cost when moving from node i to node j, Dist is the Euclidean distance between two nodes (T is the target node of the problem) and ZO is a score (between 0 and 1) to a cell being 1 when the cell is hidden to all the enemies (or to all the cells in a radius when there are no enemies) and decreasing exponentially when it is seen. ωf r , ωf d and ωf o are weights to assign relative importance to the terms in the formula. In this case, the most important term is the distance to target point because it searches for the fastest path. In second place is important the resources cost and only a little the hidden of the cell (it almost does not mind in a fast path). In Equation 2, Ce is the energy cost of moving to node j, Dist and ZO is the same as the previous formula. ωse , ωsd and ωso are again weights to assign relative importance to the terms in the formula, but in this case the most important are energy cost and hidden (both are to be considered in a safe path) and a little the distance to target point. The Combined State Transition Rule (CSTR) is a formula used to decided which node j is the next in the construction of a solution (path) when the ant is at the node i, it is the pseudo-random-proportional rule used in ACS, but adapted to deal with a two objectives problem by combining the heuristic and pheromone information of both of them: If (q ≤ q0) j = arg max j∈Ni nτf (i, j)α·λ · τs(i, j)α·(1−λ) · ηf (i, j)β·λ · ηs(i, j)β·(1−λ)o (3) (4) Else P (i, j) =   τf (i, j)α·λ · τs(i, j)α·(1−λ) · ηf (i, j)β·λ · ηs(i, j)β·(1−λ) τf (i, u)α·λ · τs(i, u)α·(1−λ) · ηf (i, u)β·λ · ηs(i, u)β·(1−λ) Xu∈Ni 0 if j ∈ Ni otherwise Where q 0 ∈ [0,1] is the standard ACS parameter, q is a random value in [0,1]. τf and τs are the pheromone matrices and ηf and ηs are the heuristic functions for the objectives (Equations 1 and 2). All these matrices have a value for every edge (i,j). α and β are the usual weighting parameters and Ni is the current feasible neighbourhood for the node i. λ ∈ (0,1) is a user-defined parameter which sets the importance of the objectives in the search (this is an application created for a military user who decides which objective has more priority), so for instance, if the user decides to search for the fastest path, λ will take a value close to 1 if he wants the safest path, it has to be close to 0. This value is kept during all the algorithm and for all the ants, unlike other bi-criterion implementations in which the parameter takes value 0 for first ant and it was growing for every ant until it takes a value 1 for the last one. When an ant is building a solution path and it is placed at one node i, if q ≤ q 0 the best neighbour j is selected as the next (Equation 3). Otherwise, the algorithm decides which node is the next by using a roulette considering P(i,j) as probability for every feasible neighbour j (Equation 4). The Dominance State Transition Rule (DSTR) is based on the dominance concept (see reference [3]), which is defined as follows (a dominates b): a ≻ b if : ∀i ∈ 1, 2, ..., k Ci(a) ≤ Ci(b) ∧ ∃j ∈ 1, 2, ...kCj(a) < Cj (b) (5) Where a and b are two different vectors of k values (one per objective) and C is a cost function for every component in the vector. If it intends to minimize the cost and Equation 5 is true, then b is dominated by a. So, in our problem there are two cost functions to evaluate the dominance between nodes. Actually these functions consider edges because they have assigned pheromone and heuristic information and combine them: Cf (i, j) = τf (i, j)α·λ · ηf (i, j)β·λ Cs(i, j) = τs(i, j)α·(1−λ) · ηs(i, j)β·(1−λ) (6) (7) In addition there is a function which uses Equations 6 and 7: D(i, j, u) =  1 0 if (i, j) ≻ (i, u) otherwise At last, the dominance state transition rule is as follows: If (q ≤ q0) Else P (i, j) =   (8) (9) (10) j = arg max j∈Ni (Xu∈Ni D(i, j, u) ∀j 6= u) Xu∈Ni Xk∈Ni Xu∈Ni D(i, j, u)! + 1 D(i, k, u)! + 1! if j ∈ Ni ∧ j 6= u ∧ k 6= u 0 otherwise where all the parameters are the same as in Equations 3 and 4. This rule chooses the next node j in the path (when an ant is placed at node i) considering the number of neighbours dominated for every one. So if q ≤ q0, the node which dominates more of the other neighbours is chosen, otherwise the probability roulette wheel is used. In Equation 10 we add 1 to avoid a 0 probability if no one dominates other neighbour. There are two Evaluation Functions (one per objective, again): Ff (P sol) = Xn∈P sol Fs(P sol) = Xn∈P sol [Cr(n − 1, n) + ωF f o · (1 − ZO(n))] [Ce(n − 1, n) + ωF so · (1 − ZO(n))] (11) (12) Where Psol is the solution path to evaluate and ωF f o and ωF so are weights related to the importance of visibility of the cells in the path. In Equation 11 its importance will be small, it is less important to hide in a fast path and it will be high in Equation 12 for the opposite reason. The other terms are the same that in Equations 1 and 2. Since CHAC is an ACS, there are two levels of pheromone updating, local and global, which update two matrices at each level. The equations for Local Pheromone Updating (performed when a new node j is added to the path an ant is building) are: τf (i, j) = (1 − ρ) · τf (i, j) + ρ · τ0f τs(i, j) = (1 − ρ) · τs(i, j) + ρ · τ0s (13) (14) Where ρ in [0,1] is the common evaporation factor and τ0f , τ0s are the initial amount of pheromone in every edge for every objective, respectively: τ0f = τ0s = 1 (numc · M AXR) 1 (numc · M AXE) (15) (16) With numc as the number of cells in the map to solve, MAXR is the maximum amount of resources going through a cell may require, and MAXE is the maximum energy cost going through a cell may produce (in the worst case). The equations for Global Pheromone Updating are: τf (i, j) = (1 − ρ) · τf (i, j) + ρ/Ff τs(i, j) = (1 − ρ) · τs(i, j) + ρ/Fs (17) (18) Only the solutions inside the Pareto set will make the global pheromone updating once all the ants have finished of building paths in every iteration. The pseudocode for CHAC is as follows: Initialization of pheromone matrices with T0f and T0s For i=1 to NUM_iterations For a=1 to NUM_ants ps=build_path(a) /* Equations 1,2, [(3,4) or (6,7,8,9,10)] , 13,14 */ evaluate(ps) /* Equations 11,12 */ if ps is non-dominated insert ps in Pareto_Set remove from Pareto_Set dominated solutions endif EndFor global_pheromone_updating /* Equation 17,18 */ EndFor 4 Experiments and Results We would like to first emphasize that the values for the parameters and weights affect the results because parameters guide the search and balance the exploration and exploitation of the algorithm, and weights set the importance of every term in the heuristics and evaluation function. We fine-tuned both in order to obtain a good behaviour in almost all the maps; the values found were α = 1, β = 2, ρ = 0.1 and q0 = 0.4, in the three experiments we show in this section. The last value establishes a balance between exploration and exploitation, tending to exploration (but without abandoning exploitation altogether). The weights described in Equations 1, 2, 11 and 12 are set to give more importance to minimizing distance to target point and consumption of resources in the speed objective, and to give more importance to minimizing visibility and consumption of energy in the safety objective. The user can only decide the value for λ parameter, which gives relative importance to one objective over the other, so if it is near 1, finding fastest path would be more important and if it is near 0, the other way round. As every MO algorithm, CHAC yields a set of non-dominated solutions from which the user chooses using his own criteria, since, usually he only wants one solution. But in this algorithm the resulting Pareto set is small (about five to ten different solutions on average, depending on the map size) because it only searches in the region of the ideal Pareto front delimited by the λ parameter. We are going to represent in the results only 'the best' solution inside all the Pareto sets of 30 executions, considering better the solution with the smallest cost in the most significant criteria (depending on λ value). In order to clarify this concept, there is not a best path, but paths enough good from the military point of view. These paths have been selected by the military participation of the project taking into account tactical considerations and the features of every battlefield. CHAC have been implemented using the two state transition rules as two different al- gorithms. We are going to compare the results between both CHAC implementations (with the same parameter values), and both of them with a greedy approach which uses the same heuristic functions as cost functions (the pheromones has no equivalent in this algorithm), but using a dominance criterion to select the next node of the actual cell neighbourhood (it selects as next the node which dominates most of the others neighbours considering their cost in both objectives). This algorithm is quite simple, and sometimes does not even reach a solution because it gets into a loop situation (back and forth between a set of cells consuming all the resources or energy). We have performed experiments on three different maps; two of them have cells of a single type of terrain (with different heights) in order to avoid problems of visualization due to the black and white figures. We executed every CHAC implementation 30 times with each extreme value for λ parameter (0.9 and 0.1) in order to search for the fastest and the safest path (they cannot be 1 and 0 because always the two objectives must be considered). In every execution we chose the best solution (enough good from a military point of view) considering the objective we are minimizing and we make mean and standard deviation of them. 4.1 River and Forest Map The first scenario is a 15x15 map with a river flowing between the start and the target point and a patch of forest. There is no enemy. The best of fast paths found and the best of safe paths found are shown in Figure 2, marked by circles. As it can be seen in Table 1, the cost of the solutions for the fastest path have a small standard deviation which means possibly CHAC has reach a quasi-optimal solution (small search space and enough iterations and ants to solve it). Mean and standard deviation in the objective which is not being minimized are logically worse, because it has little importance. Fig. 2. River and Forest map (forest cells in dark gray and water cells in light gray). Fastest (left) and safest (right) paths found. Both use forest cells to avoid being seen, but the latter goes through them to optimize safety. Combined State Transition Rule Dominance State Transition Rule Fastest (λ = 0.9) Safest (λ = 0.1) Fastest (λ = 0.9) Safest (λ = 0.1) Greedy Ff Fs Ff Fs Ff Fs Ff Fs Best 22.198 85.768 25.704 61.189 22.214 80.075 27.274 61.833 Mean 22.207 85.941 28.505 67.296 22.595 88.405 28.724 66.365 ±0.022 ±0.436 ±1.993 ±3.360 ±0.555 ±3.127 ±2.637 ±2.881 NO SOLUTION Table 1. Results for River and Forest map. (500 iterations, 20 ants) DSTR implementation yields similar results even improving sometimes mean and standard deviation values in main objectives so, its solutions are more similar between executions (the algorithm has robustness). Figure 2 (left) shows the fastest path found, which goes zigzagging, because the algorithm usually moves to the most hidden cells when there are no enemies (in a radius that can be set up by the user and which is 10 in this experiment), even in the search for the fastest path, but with less relevance. Forest cells obstruct the line of sight so the unit tends to move near them while goes rather directly to the target point. Figure 2 (right) shows the safest path found which moves in a less straightforward way and hides by moving near, and even inside forest cells (hidden is very important in safe paths) although it mean bigger resource cost (forest cells have more resource cost assigned than flat terrain). 4.2 Flat Terrain with Walls Map The second map contains 30x30 cells, and represents a flat terrain with some 'walls', there is one enemy unit protecting the target cell (there are some cells affected by its weapons fire). The best of fast paths found and the best of safe paths found are shown in Figure 3. Cells with light gray border in the path are hidden to enemy. Fig. 3. Flat Terrain with Walls, and one enemy shooting in a zone near the target point (the enemy is marked with 'X', the cells surrounding it in light shades of gray are the zone of weapons impact and the other cells in light gray are the walls). Fastest (left) and safest (right) paths found by CHAC. Combined State Transition Rule Dominance State Transition Rule Fastest (λ = 0.9) Safest (λ = 0.1) Fastest (λ = 0.9) Safest (λ = 0.1) Greedy Ff Fs Ff Fs Ff Fs Ff Fs Ff Fs Best 36.500 133.000 38.000 112.700 39.000 133.100 Mean 37.220 141.973 45.650 121.210 43.350 240.660 48.500 113.400 59.530 123.980 ±1.216 ±2.904 ±3.681 ±10.425 ±1.592 ±85.254 ±10.174 ±8.119 46.7 322.9 Table 2. Results for the Flat Terrain with Walls map. (1000 iterations, 30 ants) As it can be seen in Table 2, CHAC (in the two implementations) outperforms the greedy algorithm by almost 25% in resource cost and 75% in safety costs. The reason for this is that the greedy path is rather straight, which means low resource expenses; but, at the same time, it means the enemy sees the unit all the time (it moves through uncovered cells) and the safety cost is dramatically increased (it depends too much on cell visibility). The cost for fast path, which also depends on visibility, is increased too. The standard deviation is small in CSTR, but it grows a little in values of safest paths which could mean a bigger exploitation factor is needed. Again, in the DSTR implementation, results are similar to those obtained with CSTR, but with better standard deviation; however, its performance is poorer (even quite bad in one case) for the objectives it is not minimizing, which supports the theory that a higher exploitation level is needed in this scenario. In Figure 3 (left), we can see the fastest path found; the unit moves in a curve mode in order to hide from enemy behind the walls (it consider the hidden of cells from the enemy cell). It surrounds this terrain elevations because resource cost of going through them is big. On the other hand, in Figure 3 (right) we can see the safest path found which moves surrounding the left side walls but remaining during more cells hide for the enemy. In both cases, the unit moves inside the zone affected by weapons choosing the less damaging cells, even in the safe case it arrives by a flank of the enemy unit where they have less fire power and this inflict less damage. It represents a good behaviour, very tactical in the case of safest path because attack to an enemy by the flank is one principle of military tactics. 4.3 Valleys and Mountains Map This 45x45 map represents some big terrain accidents, with clear zones representing peaks (the more higher the more clearer) and dark zones representing valleys or cliffs. There are two enemies located in both peaks and the target point is behind one of them. The best of fast paths found and the best of safe paths found are shown in Figure 4. Circle cells mark the paths, those with light gray border in the path are hidden to both enemies. Fig. 4. Valleys and Mountains, with 2 enemy units (marked with 'X') on watch. Fastest (left) and safest (right) path found. Combined State Transition Rule Dominance State Transition Rule Fastest (λ = 0.9) Safest (λ = 0.1) Fastest (λ = 0.9) Safest (λ = 0.1) Greedy Ff Fs Ff Fs Ff Fs Ff Fs Best 70.500 334.600 84.500 285.800 73.500 374.300 76.000 354.600 Mean 75.133 357.800 105.517 311.390 77.950 397.280 88.780 371.890 ±2.206 ±9.726 ±17.138 ±19.541 ±1.724 ±11.591 ±13.865 ±7.522 NO SOLUTION Table 3. Results for Valleys and Mountains map. (2000 iterations, 70 ants) As Table 3 shows, both implementations yield a low standard deviation, which means the algorithm is robust with respecto to initialization. CSTR implementation results may be nearer an optimal path, but in the DSTR case, the solutions have big costs (compared with the others), which means it needs more iterations or a greater exploitation factor to improve them. As in previous experiments, mean and standard deviation in the objectives that the algorithm is not minimizing are worse, because they have little importance. In this case, the differences between the cost of an objective when search minimizing this objective and when search minimizing the other are bigger than in the previous maps because the search space is bigger too. In Figure 4 (left) we can see the fastest path found, the unit goes in a rather straight way to the target point, but without considering the hidden of cells (from the position of both enemies) so the safety cost increases dramatically. On the other hand, in Figure 4 (right) we can see the safest path found which represents a curve (distance to target point has little importance) which increases speed cost, but the unit goes through many hidden cells. This behaviour is excellent from military tactical point of view. 5 Conclusions and Future Work In this paper we have described a MOACO algorithm called CHAC which tries to find the fastest and safest path, whose relative importance is set by the user, for a simulated military unit. This algorithm can use different state transition rules, and, in this papeer, two of them have been presented and tested. The first one combines heuristic and pheromone information of two objectives (Combined State Transition Rule, CSTR) and the second one is based on dominance over neighbours (Dominance State Transition Rule, DSTR). The algorithm using both state transition rules has been tested in several different sce- narios yielding very good results in a subjective assessment by the military staff of the project (Mr. Mill´an and Torrecillas) and being perfectly compatible with military tactics. They even offer good solutions in complicated maps in less time than a human expert would need. Moreover it is possible to observe an inherent emergent behaviour studying the solu- tions because it tends to be similar to those a real commander would, in many cases, take. In addition CHAC (using any state transition rule of the ones tested so far) outperforms a greedy algorithm. In the comparison between them, CHAC with CSTR yields better results in the same conditions, but CHAC with DSTR is more robust, yielding solutions that per- form similarly, independently of the random initial conditions. If we increase exploitation level or iterations of algorithm, DSTR approach offers similar results to CSTR. As future work, we will compare CHAC with path finding algorithms better than the simple greedy we have used here. From the algorithmic point of view, we will try to ap- proach more systematically parameter setting, and investigate its performance in dynamic environments where, for instance, the enemy can move and shoot on sight. We will also try to evaluate its performance in environments with a hard time constraint, that is, in envi- ronments where the algorithm cannot run for an unlimited amount of time, but a limited and small one, which is usually the case in real combat situations. From the implementa- tion point of view, it would be interesting to implement it within a real combat training simulator, that includes realistic values for most variables in this algorithm, including fuel consumption and casualties caused by projectile impact. We will also try to approach scenario design more systematically, trying to describe its difficulty by looking at different aspects. This will allow us to assess different aspects of the algorithm and relate them to scenario difficulty, finding out which parameter combination is better for each scenario. Acknowledgements This work has been developed within the SIMAUTAVA Project, which is supported by Universidad de Granada and MADOC-JCISAT of Ej´ercito de Tierra de Espana. Mr. Mill´an is a Lieutenant Colonel and Mr. Torrecillas is a Major of the Spanish Army Infantry Corps. References 1. M. Dorigo and G. Di Caro. The ant colony optimization meta-heuristic. In D. Corne, M. Dorigo, and F. Glover, editors, New Ideas in Optimization, pages 11 -- 32. McGraw-Hill, 1999. 2. M. Dorigo and T. Stutzle. The ant colony optimization metaheuristic: Algorithms, applications, and advances. In G.A. Kochenberger F. Glover, editor, Handbook of Metaheuristics, pages 251 -- 285. Kluwer, 2002. 3. Carlos A. Coello Coello, David A. Van Veldhuizen, and Gary B. Lamont. Evolutionary Algorithms for Solving Multi-Objective Problems. Kluwer Academic Publishers, 2002. 4. C. Garc´ıa-Mart´ınez, O. Cord´on, and F.Herrera. An empirical analysis of multiple objective ant colony optimization algorithms for the bi-criteria TSP. In ANTS 2004. Fourth International Workshop on. Ant Colony Optimization and Swarm Intelligence, number 3172 in LNCS, pages 61 -- 72. Springer, 2004. 5. Steffen Iredi, Daniel Merkle, and Martin Middendorf. Bi-criterion optimization with multi colony ant algorithms. In E. Zitzler, K. Deb, L. Thiele, C. A. Coello Coello, and D. Corne, editors, Proceedings of the First International Conference on Evolutionary Multi-Criterion Optimization (EMO 2001), volume 1993 of Lecture Notes in Computer Science, pages 359 -- 372, Berlin, 2001. Springer-Verlag. 6. B. Bar´an and M. Schaerer. ing on Applied http://www.scopus.com/scopus/inward/record.url?eid=2-s2.0-1442302509&partner=40&rel=R4.5.0. A multiobjective ant colony system for vehicle rout- IASTED International Multi-Conference 2003. problem with time windows. IASTED IMCAI, 97 -- 102, In Informatics, number 21 in pages
1810.06918
1
1810
2018-10-16T10:28:21
MoCaNA, un agent de n{\'e}gociation automatique utilisant la recherche arborescente de Monte-Carlo
[ "cs.MA" ]
Automated negotiation is a rising topic in Artificial Intelligence research. Monte Carlo methods have got increasing interest, in particular since they have been used with success on games with high branching factor such as go.In this paper, we describe an Monte Carlo Negotiating Agent (MoCaNA) whose bidding strategy relies on Monte Carlo Tree Search. We provide our agent with opponent modeling tehcniques for bidding strtaegy and utility. MoCaNA can negotiate on continuous negotiating domains and in a context where no bound has been specified. We confront MoCaNA and the finalists of ANAC 2014 and a RandomWalker on different negotiation domains. Our agent ouperforms the RandomWalker in a domain without bound and the majority of the ANAC finalists in a domain with a bound.
cs.MA
cs
MoCaNA, un agent de n´egociation automatique utilisant la recherche arborescente de Monte-Carlo C´edric L.R. Buron∗1,2, Zahia Guessoum†1,3, Sylvain Ductor‡4, and Olivier Roussel§5 1LIP6, Sorbonne Universit´e, Paris, France 2Thales Research and Technology, Palaiseau, France 3CReSTIC, Universit´e de Reims, Reims, France 4Universidade Estadual do Cear´a, Fortaleza, Br´esil 5Kyriba Corp, San Diego, USA 11 octobre 2018 R´esum´e La n´egociation automatique est un sujet qui suscite un int´eret croissant dans la recherche en IA. Les m´ethodes de Monte-Carlo ont quant `a elles v´ecu un grand essor, notamment suite `a leur utilisation sur les jeux `a haut facteur de branchement tel que le go. Dans cet article, nous d´ecrivons un agent de n´egociation automatique, Monte- Carlo Negotiating Agent (MoCaNA) dont la strat´egie d'offre s'appuie sur la recherche arborescente de Monte Carlo. Nous munissons cet agent de m´ethodes de mod´elisation de la strat´egie et de l'utilit´e adverse. MoCaNA est capable de n´egocier sur des do- maines de n´egociation continus et dans un contexte o`u aucune borne n'est sp´ecifi´ee. Nous confrontons MoCaNA aux agents de l'ANAC 2014 et `a un RandomWalker sur des domaines de n´egociation diff´erents. Il se montre capable de surpasser le Random- Walker dans un domaine sans borne et la majorit´e des finalistes de l'ANAC dans un domaine avec borne. Mots-cl´es : Monte-Carlo, N´egociation automatique, Agent ∗[email protected][email protected][email protected] §[email protected] Vingt-sixi`emes Journ´ees Francophones sur les Syst`emes Multi-Agents (JFSMA'18), M´etabief, France, p. 85 -- 94, oct. 2018 1 Abstract Automated negotiation is a rising topic in Artificial Intelligence research. Monte Carlo methods have got increasing interest, in particular since they have been used with success on games with high branching factor such as go. In this paper, we describe an Monte Carlo Negotiating Agent (MoCaNA) whose bidding strategy relies on Monte Carlo Tree Search. We provide our agent with op- ponent modeling tehcniques for bidding strtaegy and utility. MoCaNA can negotiate on continuous negotiating domains and in a context where no bound has been spec- ified. We confront MoCaNA and the finalists of ANAC 2014 and a RandomWalker on different negotiation domains. Our agent ouperforms the RandomWalker in a domain without bound and the majority of the ANAC finalists in a domain with a bound. Keywords: Monte Carlo, Automated Negotiation, Agent 1 Introduction La n´egociation est une forme d'interaction dans laquelle un groupe d'agents ayant des conflits d'int´eret et un d´esir de coop´erer essaient de trouver un accord mutuellement acceptable sur un objet de n´egociation. Ils explorent `a cette fin les solutions selon un protocole pr´ed´efini. La question de l'automatisation de la n´egociation, bien connue dans les domaines ´economiques depuis l'av`enement des applications de e-commerce, a re¸cu une attention toute particuli`ere dans le champ de l'intelligence artificielle et des syst`emes multi-agents. De nombreux frameworks ont ´et´e propos´es [17] : ench`eres, r´eseaux contractuels, ´equilibres g´en´eraux ; ils permettent de n´egocier selon plusieurs modalit´es. Les n´egociations peuvent etre caract´eris´ees selon divers aspects portant notamment sur l'ensemble des participants (bilat´eral ou multilat´eral), les pr´ef´erences des agents (lin´eaires ou non), les attributs sur lesquels la n´egociation porte (discrets ou continus), ou encore les caract´eristiques du proto- cole (born´e ou non par le temps ou le nombre de tours). Chaque agent utilise une strat´egie pour ´evaluer l'information re¸cue et faire des offres. Plusieurs strat´egies ont ´et´e propos´ees comme [8, 5, 19]. Elles peuvent etre fixes ou adaptatives. Cependant, la plupart de ces strat´egies reposent sur une borne connue (en temps ou en tours). Dans les applications quotidiennes, par exemple lorsque nous cherchons `a acqu´erir un bien de consommation non critique, il est commun que le protocole ne propose aucune borne, et que chaque agent ignore le moment o`u il coupera court `a la n´egociation. Dans cet article, nous ´etudions MoCaNA (Monte-Carlo Negotiating Agent), un agent de n´egociation automatique con¸cu pour le protocole de bargaining (ou marchandage). Dans ce protocole, deux agents s'´echangent des offres de mani`ere `a trouver un accord. La n´egociation s'interrompt lorsqu'un des deux adversaires accepte l'offre qui lui est faite par son adversaire ou qu'il la rejette. MoCaNA a pour particularit´e de ne faire aucune pr´esupposition sur : 1) la lin´earit´e des pr´ef´erences, 2) le caract`ere continu ou discret de 2 l'espace de n´egociation ni 3) l'imposition d'une borne par le protocole. Il exploite pour cela des connaissances issues des domaines du General Game Playing et de l'Apprentissage Automatique. Afin de d´ecider de la valeur d'une offre, notre agent s'appuie sur la recherche arborescente de Monte-Carlo (MCTS), une heuristique qui a ´et´e utilis´ee avec succ`es dans de nombreux jeux comme le go, qu'il combine avec de la mod´elisation d'adversaires pour plus d'efficacit´e. Le choix de cette heuristique est guid´e par deux ´el´ements. D'abord, MCTS s'est montr´e efficace dans des jeux tr`es diff´erents, ce qui lui a valu de nombreux succ`es en General Game Playing. Il est aussi adapt´e aux jeux `a haut facteur de branchement. Il constitue donc une bonne alternative pour les domaines de n´egociation complexes dont le facteur de branchement `a chaque proposition est l'ensemble des propositions possibles. Cet article est oorganis´e comme suit : la section 2 introduit les travaux de la litt´erature traitant de n´egociation automatique et des m´ethodes de Monte-Carlo. Nous proposons ensuite une mod´elisation de la n´egociation comme un jeu dans la section 3. La section 4 pr´esente les fonctionnalit´es de MoCaNA. Nous pr´esentons les r´esultats de la confrontation de MoCaNA aux finalistes de l'ANAC 2014 et au RandomWalker dans la section 5. Nous r´esumons ces contributions et donnons des pistes d'am´elioration de notre travail dans la section 6. 2 Travaux connexes MoCaNA se trouve au croisement des domaines de la n´egociation automatique et des techniques de Monte-Carlo appliqu´ees aux jeux. Nous donnons dans cette section une introduction `a ces deux domaines. 2.1 N´egociation automatique Les architectures des agents de n´egociation automatique impliquent trois fonctionnalit´es [1] : la strat´egie d'offres d´efinit les offres que l'agent fait `a son adversaire ; la strat´egie d'acceptation d´efinit si l'agent accepte la proposition qui lui a ´et´e faite ou s'il fait une contre-offre ; la mod´elisation d'adversaires permet de mod´eliser certains aspects de l'adversaire, comme sa strat´egie d'offre, son utilit´e ou sa strat´egie d'acceptation et est utilis´e pour am´eliorer l'efficacit´e de la strat´egie d'offres de l'agent et parfois celle de sa strat´egie d'acceptation. 2.1.1 Strat´egie d'offres Les strat´egies d'offres utilis´ees dans le cadre de n´egociations complexes s'appuient sur deux familles de techniques, que nous pr´esentons par la suite : les heuristiques coupl´ees au domaine et les algorithmes g´en´etiques. Les heuristiques s'appuient g´en´eralement sur des tactiques [8], qui consistent `a faire des concessions selon un ´el´ement de la n´egociation comme le temps ´ecoul´e, la raret´e de 3 la denr´ee n´egoci´ee, ou les concessions faites par l'adversaire. Il est possible d'adapter ces tactiques ou de s´electionner une offre ayant une utilit´e gagnant-gagnant s'il en existe une. La majorit´e de ces strat´egies [8] reposent sur la connaissance de la borne, ce qui les rend inapplicables dans notre contexte. Les algorithmes g´en´etiques [5] s´electionnent les offres qui maximisent une fonction ob- jectif d´etermin´ee, les croisent et les modifient de mani`ere `a les am´eliorer. Ces strat´egies g´en`erent un certain nombre d'offres parmi lesquelles l'agent doit choisir celle qui sera en- voy´ee `a l'adversaire. Elles ont obtenu de bons r´esultats, sans toutefois vaincre les agents utilisant des heuristiques. 2.1.2 Strat´egies d'acceptation On distingue deux principales cat´egories de strat´egies d'acceptation [3] : les strat´egies myopes et les strat´egies optimales. Les strat´egies myopes reposent sur les offres de l'ad- versaire et celles de l'agent. Il peut s'agir d'accepter toute offre d´epassant un certain seuil, toute offre meilleure que la derni`ere faite par l'agent lui-meme ou que la prochaine g´en´er´ee par strat´egie d'offre. Il est aussi possible de combiner ces strat´egies. Les strat´egies opti- males [3] exploitent un mod`ele de la strat´egie adverse afin de d´eterminer la probabilit´e d'obtenir une meilleure offre. 2.1.3 Mod´elisation de l'adversaire La majorit´e des m´ethodes de mod´elisation d'adversaire utilis´ees en n´egociation auto- matique ont ´et´e analys´ees par Baarslag et ses coll`egues [2]. Elles permettent de mod´eliser la strat´egie d'offre, la strat´egie d'acceptation, l'utilit´e de l'adversaire, la borne qu'il s'est fix´e, et son prix de r´eserve le cas ´ech´eant. Deux familles de techniques sont adapt´ees `a la mod´elisation de strat´egies d'offres adaptatives et non born´ees : les r´eseaux de neurones et les techniques reposant sur l'ana- lyse de s´eries temporelles. Les approches bas´ees sur l'analyse de s´eries temporelles sont diverses. Parmi elles, la r´egression de processus gaussien est stochastique. Elle s'appuie sur les mouvements pr´ec´edents pour pr´edire une densit´e de probabilit´e pour le tour suivant. Introduite par Rasmussen et Williams [15], elle a ´et´e utilis´ee avec succ`es par Williams et al. [20]. L'aspect stochastique de cette m´ethode permet de g´en´erer des propositions diff´erentes `a chaque ´etape de simulation de Monte Carlo Tree Search (MCTS), selon la gaussienne pr´edite par la r´egression. C'est cette m´ethode que nous adoptons. L'utilit´e d'un adversaire est g´en´eralement consid´er´ee comme la somme pond´er´ee de fonctions pour chaque attribut `a valeurs dans [0, 1] [2]. Deux familles de m´ethodes sont utilis´ees. La premi`ere s'appuie sur la fr´equence d'apparition de chaque valeur parmi les propositions de l'adversaire. Elle suppose que les valeurs propos´ees le plus r´eguli`erement par l'adversaire sont celles qu'il pr´ef`ere, et que les attributs variant le plus souvent sont ceux qui ont le moins d'importance pour lui. Ces approches ne sont cependant valables que dans le cas o`u le domaine de n´egociation est discret. En effet, l'extension au cas continu requiert la d´efinition d'une fonction de distance d´ependant du domaine. La seconde famille de 4 m´ethodes repose sur l'apprentissage bay´esien. Elle est adapt´ee au cas continu. La m´ethode pr´esent´ee par Hindriks et Tykhonov [10] repose sur la g´en´eration d'hypoth`eses. Chaque hypoth`ese est constitu´ee d'un ordonnancement des attributs, et d'une fonction d'utilit´e simple (lin´eaire ou lin´eaire par morceaux) pour chacun d'entre eux. Le poids associ´e `a chaque attribut est calcul´e en fonction de l'ordre qui lui est attribu´e. La fonction d'utilit´e estim´ee est la somme des hypoth`eses pond´er´ee par leur probabilit´e. La strat´egie d'acceptation d'un adversaire peut etre apprise de deux mani`eres. On peut d'abord faire la supposition que l'adversaire acceptera une offre sous certaines condi- tions d´ependant de sa strat´egie d'offre et/ou de sa fonction d'utilit´e [2]. Dans ce cas, il est possible de la d´eduire des mod`eles ci-dessus sans faire de calcul suppl´ementaire. Dans le cas o`u l'agent ne mod´elise pas les ´el´ements pr´ec´edemment d´ecrits, il est aussi possible d'utiliser des r´eseaux de neurones [7]. Cela demande cependant un calcul suppl´ementaire, potentiellement couteux. 2.2 M´ethodes de Monte Carlo Les m´ethodes de Monte-Carlo sont utilis´ees comme heuristiques pour les jeux. Elles attribuent `a chaque mouvement possible un score calcul´e au terme d'une ou de plusieurs simulations. Kocsis et Szepevsv´ari [12] proposent une m´ethode hybridant la construction d'un arbre de jeu, m´ethode qui a fait ses preuves, et les m´ethodes de Monte-Carlo. Chaque noeud de l'arbre de jeu garde en m´emoire les scores obtenus lors des simulations o`u il a ´et´e jou´e, ainsi que le nombre de simulations faites dans la branche partant du noeud. Pendant l'exploration de cet arbre, les branches privil´egi´ees sont celles qui ont ´et´e peu explor´ees et celles qui ont le plus haut score dans les simulations. Cette m´ethode, nomm´ee recherche arborescente de Monte-Carlo (MCTS 1) s'est vue am´elior´ee au moyen de nombreuses ex- tensions [4]. MCTS se d´ecompose en quatre parties. (1) La premi`ere ´etape consiste `a parcourir l'arbre d´ej`a constitu´e selon une strat´egie pr´ed´efinie. `A chaque noeud, on d´ecide s'il faut s´electionner une branche de niveau inf´erieur ou en explorer une nouvelle. (2) Dans le second cas, l'arbre se voit pourvu d'un nouveau noeud, g´en´er´e selon une strat´egie d'expansion. (3) Ensuite, on simule le jeu jusqu'`a un ´etat final. (4) On calcule les scores et on les r´etropropage sur les noeuds de l'arbre ayant ´et´e explor´es. Les m´ethodes de Monte-Carlo ont gagn´e en popularit´e suite `a leur succ`es dans les jeux `a fort facteur de branchement, notamment le Go. En particulier, AlphaGo [18], qui a vaincu l'un des meilleurs joueurs au monde, utilise les m´ethodes de Monte-Carlo coupl´ees `a de l'apprentissage profond. `A notre connaissance, seuls de Jonge et Zhang [6] ont utilis´e MCTS dans le cadre de la n´egociation automatique. Ils se sont concentr´es sur des domaines de n´egociations petits, et o`u la fonction d'utilit´e adverse est facilement inf´erable, comme la r´epartition d'un dollar entre deux joueurs. Nous nous concentrons sur des domaines plus complexes, o`u la fonction d'utilit´e adverse ne peut etre facilement inf´er´ee et o`u l'espace de n´egociation peut etre grand, voire infini. 1. Monte Carlo Tree Search 5 D´efinition 1 (Bargaining) Un bargaining est un triplet B = H, A, (ui)i∈(cid:74)1,2(cid:75) v´erifiant : (cid:16) (cid:17) 3 Jeu et n´egociation La recherche arborescente de Monte-Carlo est une m´ethode appliqu´ee aux jeux extensifs. Dans cette section, nous montrons comment il est possible d'assimiler la n´egociation `a un tel jeu. Nous commen¸cons par associer chaque aspect de la n´egociation `a un ´el´ement d'un jeu. Nous d´ecrivons ensuite les particularit´es de la n´egociation, qui empechent l'utilisation des strat´egies les plus r´epandues dans MCTS. Nous concluons cette section en donnant d'autres formalismes possibles pour la n´egociation et en expliquant les relations qu'ils entretiennent avec celui que nous avons choisi. 3.1 Notre formalisme Un jeu extensif [14] est compos´e d'un ensemble de joueurs, de la description des histo- riques de jeu possibles, d'une fonction indiquant le tour de chaque joueur et d'un profil de pr´ef´erence. En s'appuyant sur cette d´efinition, il est possible de d´efinir un bargaining B comme un jeu sous forme extensive. 1. joueurs : il y a deux joueurs : un acheteur (joueur 1) et un vendeur (joueur 2), 2. historique : l'historique de la n´egociation est compos´e des messages que les agents s'envoient : les propositions faites par les agents, et les accept et reject. Les historiques terminaux sont les historiques infinis et les historiques se terminant par accept ou par reject. Chaque message est compos´e d'une paire (α, c) o`u α est l'acte de langage (performatif) du message et, c est le contenu du message, i.e. une liste de couples (k, v) o`u k est la cl´e d'un attribut du domaine de n´egociation et v la valeur correspondante. On s´epare tout historique en deux, chacun correspondant aux actions d'un joueur : hi = (α, c)i 3. tour de jeu : la fonction tour fonctionne selon la parit´e. On suppose que c'est l'acheteur (le joueur 1) qui commence. Ainsi, ∀h ∈ H, joueur(h) = 2− (h mod 2) o`u h est la taille de h, 4. pr´ef´erence : l'ordre sur les situations terminales de chaque joueur est induit par une fonction d'utilit´e ui qui associe son utilit´e pour chaque historique terminal. Cette fonction associe une utilit´e `a chaque accord possible trouv´e, ainsi qu'au cas de rejet et au cas d'historique infini 2. La n´egociation n'est pas un jeu combinatoire classique, comme peuvent l'etre les ´echecs ou le go. La premi`ere diff´erence entre ces jeux et la n´egociation tient au fait que cette derni`ere est un jeu `a somme non nulle. Les agents cherchent `a trouver un accord mutuel qui soit profitable `a chacun. Cela est particuli`erement vrai dans des domaines complexes, 2. Notons que ces deux derni`eres valeurs peuvent etre diff´erentes, par exemple si l'agent consid`ere qu'il alloue des ressources `a la n´egociation. 6 ayant de nombreux attributs, o`u une solution peut etre bien meilleure que la solution par d´efaut o`u chaque agent re¸coit son utilit´e de r´eserve, i.e. quand les agents ne trouvent pas d'accord. Ensuite, la n´egociation est un jeu `a information incompl`ete, c'est `a dire que le type des joueurs, ici leur profil de pr´ef´erence, est inconnu et fait meme g´en´eralement l'objet d'une mod´elisation. Ces deux particularit´es rendent inutilisable l'Upper Confidence Tree [12] utilis´e pour les jeux combinatoires comme le go car il est fait pour les jeux combina- toires. Enfin, le domaine de la n´egociation est tr`es particulier. Il peut etre cat´egoriel (e.g. couleur) mais ´egalement num´erique voire continu. Cela a des cons´equences sur l'explora- tion de l'arbre, en particulier sur le crit`ere d´ecidant de l'expansion d'un nouveau noeud. Malgr´e ces difficult´es d'adaptation, les succ`es qu'a remport´e MCTS dans les jeux complexes semblent indiquer qu'il pourrait s'av´erer etre une bonne strat´egie pour la n´egociation dans un contexte complexe. 3.2 Autres formalismes Bien que nous utilisions le formalisme des jeux extensifs pour mod´eliser la n´egociation, d'autres mod´elisations sont possibles, notamment en utilisant les jeux bay´esiens et les jeux stochastiques. Les jeux `a information incompl`ete peuvent etre mod´elis´es en utilisant le formalisme des jeux bay´esiens [16]. Ces jeux sont traditionnellement utilis´es pour mod´eliser les jeux `a information incompl`ete, mais supposent en g´en´eral la connaissance d'une probabilit´e a priori sur les types possibles de l'adversaire. Notons que dans le cadre que nous nous sommes fix´es, il n'existe pas de telle distribution a priori. La prise en compte de l'information r´ev´el´ee par l'adversaire au cours de la n´egociation, qui permet d'´etablir des probabilit´es sur le profil de pr´ef´erence, se fait au cours de la n´egociation en utilisant la mod´elisation de l'adversaire. Un autre formalisme possible est la mod´elisation par un jeu stochastique [11]. Les jeux stochastiques sont une g´en´eralisation des processus markoviens. Le bargaining peut etre vu comme un processus de d´ecision markovien (MDP), o`u chaque action de l'agent g´en`ere une r´eaction de son adversaire, amenant une transition vers un autre ´etat du jeu. Dans ce nouvel ´etat, les actions possibles restent les memes, mais l'utilit´e induite par l'acceptation de la proposition de l'adversaire change. L'exploitation de ce formalisme se fait par une exploration des transitions possibles et une pond´eration par leur probabilit´e. MoCaNA cherche `a ´evaluer ces probabilit´es en utilisant la mod´elisation de l'adversaire et estime l'utilit´e attendue pour les diff´erentes transitions possibles, i.e. les choix de l'adversaire, au moyen de MCTS. Notons que cette m´ethode s'est montr´ee particuli`erement efficace pour la planification dans les MDP, comme le montre notamment [12]. 4 MoCaNA Comme nous l'avons expliqu´e dans la section pr´ec´edente, la n´egociation est un jeu particulier. Il est donc n´ecessaire d'ajuster les heuristiques pour les jeux `a ces particularit´es. 7 Dans cette section, nous pr´esentons notre agent de n´egociation automatique exploitant MCTS. L'architecture g´en´erale des diff´erents modules de notre agent est pr´esent´ee dans la Figure 1. La strat´egie d'offre impl´emente MCTS et utilise le module de mod´elisation d'adversaire, qui comporte deux sous-modules : l'un pour l'utilit´e de l'adversaire, l'autre pour sa strat´egie d'offre. Le dernier module, celui de strat´egie d'acceptation, effectue une comparaison entre la proposition de l'adversaire et la proposition g´en´er´ee par la strat´egie d'offre. Les diff´erents sous-modules de l'agent ainsi que les interactions entre eux sont d´ecrits dans la suite de cette section. Strat´egie d'offres S´election Expansion Simulation R´etropropagation Strategie (R´egression de processus gaussien) Utilit´e (Appren- tissage Bayesien) Mod´elisation d'adversaire S t r a t e g i e d ' a c c e p t a t i o n Figure 1 -- Interaction entre les modules de MoCaNA 4.1 Mod´elisation d'adversaire Afin de d'am´eliorer l'efficacit´e de MCTS, il est n´ecessaire de disposer d'un mod`ele de sa strat´egie d'offre ainsi qu'un mod`ele de son profil de pr´ef´erence. 4.1.1 Mod´elisation de la strat´egie d'offre Le but est de pr´edire une future proposition faites par l'adversaire au tour x∗ de la n´egociation. Nous utilisons la r´egression de processus gaussiens [15] qui permet de g´en´erer une gaussienne centr´ee en la valeur pr´edite par l'algorithme et dont l'´ecart type repr´esente l'incertitude du mod`ele. On commence par calculer la matrice de covariance K, qui repr´esente la proximit´e entre les tours (xi)i∈(cid:74)1,n(cid:75) de la s´equence, en nous reposant sur une fonction de covariance, aussi on calcule ensuite la distance entre le tour dont on veut estimer la proposition x∗ et les tours pr´ec´edents : k(xn, x1) . . . k(xn, xn) K∗ = (k(x∗, x1), . . . , k(x∗, xn)) (2) 8 (1) appel´ee kernel k. Soit K =  k(x1, x1) ...  . . . k(x1, xn) ... La r´egression de processus gaussien fait la supposition que chacune de ces valeurs est la composante d'une gaussienne multivari´ee. On en d´eduit : y∗ = K∗K−1y σ2∗ = Var(y∗) = K∗∗ − K∗K−1K(cid:62) ∗ (3) (4) o`u K∗∗ = k(x∗, x∗). Nous identifions y∗ `a une variable al´eatoire gaussienne de moyenne y∗ et d'´ecart type σ∗. Une des composantes les plus importantes de la r´egression de processus gaussien est la d´etermination du kernel. Les plus communs sont les fonctions `a base radiale, les fonctions rational quadratic, le kernel de Mat´ern et le kernel exponential sine squared. Ces kernels servent `a d´eterminer la distance entre deux tours de n´egociation. Nous avons test´e ces quatre kernels sur plusieurs n´egociations entre agents. La Table 1 donne les r´esultats de la r´egression de processus gaussien pour chacun de ces kernels. Nous avons fait ces tests dans le contexte de l'ANAC 2014, o`u les pr´ef´erences ne sont pas lin´eaires, et avec les finalistes de l'ANAC. Nous avons g´en´er´e al´eatoirement 25 sessions, et avons mod´elis´e les deux agents, obtenant ainsi 50 mod´elisations au total. Chaque offre de chaque s´erie est pr´edite en fonction des pr´ec´edentes et sert `a pr´edire les suivantes. La table montre la distance euclidienne moyenne entre les propositions faites et le r´esultat de l'apprentissage. Plus la valeur est basse, plus la pr´ediction est proche de la v´eritable s´erie. Kernel Fonction `a base radiale Rational quadratic Mat´ern Exp. sine squared Dist. moyenne 43.288 17.766 43.228 22.292 Table 1 -- Distance moyenne entre les propositions et les pr´edictions de la r´egression de processus gaussien selon le kernel Le kernel donnant le meilleur r´esultat est le Rational quadratic. C'est donc celui-ci que notre agent utilise. 4.1.2 Mod`ele du profil de pr´ef´erence L'apprentissage bay´esien d´ecrit dans [10] suppose seulement que l'agent fait une conces- sion `a un rythme constant, une supposition faible par rapport aux autres m´ethodes. laires. Une fonction t de [a, b] ⊂ R dans [0, 1] est dite triangulaire si et seulement si : On approxime l'utilit´e de l'adversaire par une somme pond´er´ee de fonctions triangu- -- t est affine, et t(a) = 0 et t(b) = 1 ou t(a) = 1 et t(b) = 0 ou -- il existe c dans [a, b] tel que t est affine sur [a, c] et sur [c, b], t(a) = 0, t(b) = 0, t(c) = 1. 9 La m´ethode se divise en deux ´etapes. D'abord, un certain nombre d'hypoth`eses sont g´en´er´ees. Ces hypoth`eses sont compos´ees d'une somme pond´er´ee de fonctions triangulaires. Chaque attribut se voit attribuer un poids et une fonction triangulaire. L'utilit´e estim´ee d'un adversaire est la somme de ces hypoth`eses pond´er´ee par la pro- babilit´e de chacune. Cette m´ethode a pour avantage de ne pas faire de supposition sur la strat´egie de l'adversaire, mais elle suppose qu'il fait des concessions `a un rythme globale- ment lin´eaire. 4.1.3 Mod`ele de strat´egie d'acceptation La strat´egie d'acceptation des agents est mod´elis´ee de mani`ere tr`es simple : on consid`ere qu'un agent accepte la derni`ere proposition faite par son adversaire si et seulement si son utilit´e est meilleure que l'utilit´e g´en´er´ee par la strat´egie d'offre. Cette mod´elisation, ´evoqu´ee par [2], est peu couteuse et permet de ne pas alourdir les calculs d´ej`a nombreux de l'agent. 4.2 Strat´egie d'offres bas´ee sur MCTS Les m´ethodes de Monte-Carlo sont tr`es adaptatives, et ont obtenu de bons r´esultats dans diff´erents jeux, y compris des jeux `a grand facteur de branchement. Dans cette section, nous introduisons une strat´egie d'offres bas´ee sur MCTS. 4.2.1 MCTS sans ´elagage Comme nous l'avons expliqu´e, MCTS est un algorithme g´en´eral, qui repose sur un certain nombre de strat´egies. `A chaque fois que l'agent doit prendre une d´ecision, il g´en`ere un nouvel arbre et l'explore en utilisant MCTS. L'impl´ementation la plus commune de MCTS est l'Upper Confidence Tree (UCT). Cette m´ethode a notamment donn´e de tr`es bons r´esultats pour le Go. N´eanmoins, lors de la phase de s´election, cette impl´ementation ´etend un nouveau noeud d`es lors que tous les enfants d'un arbre n'ont pas ´et´e ´etendus. Or, dans le cas d'un domaine de n´egociation contenant un attribut infini, le nombre de fils possibles pour un noeud est infini, puisqu'il peut prendre toutes les valeurs possibles pour cet attribut. L'algorithme ´etendra donc ind´efiniment de nouveaux noeuds sans jamais explorer l'arbre en profondeur. Si l'arbre est tr`es large, si le nombre de noeuds possibles est plus grand que nombre de simulations, la meme situation apparaıtra. Dans le contexte de la n´egociation, il est donc n´ecessaire de d´efinir une impl´ementation de MCTS diff´erente : S´election Pour cette ´etape, nous utilisons le progressive widening. Le crit`ere du pro- gressive widening peut s'exprimer ainsi : un nouveau noeud est ´etendu si et seulement si : p ≥ nc nα (5) o`u np est le nombre de fois o`u le parent a ´et´e simul´e, nc est le nombre de fils qu'il a, et α est un param`etre du mod`ele. S'il n'y a pas d'expansion, nous s´electionnons 10 le noeud i qui maximise : (cid:115) ln(n) ni + 1 Wi = si ni + 1 + C × nα (6) o`u n est le nombre total de simulations faites jusqu'alors, si est le score du noeud i et C est ´egalement un param`etre du mod`ele. Expansion La valeur d'un noeud ´etendu est quant `a elle choisie de mani`ere al´eatoire, avec une distribution uniforme sur le domaine de n´egociation. Simulation Nous utilisons le mod`ele de strat´egie de l'adversaire, afin de rendre les simulations plus pertinentes. Nous utilisons la r´egression de processus gaussien et l'apprentissage bay´esien. R´etropropagation L'´etape de r´etropropagation utilise aussi le mod`ele de l'utilit´e de l'adversaire, et r´epercute sur les noeuds l'utilit´e de l'agent et l'utilit´e de son adver- saire selon la mod´elisation d'utilit´e. Enfin, MCTS fait des simulations et calcule l'utilit´e attendue de toute la n´egociation. Il a tendance `a sous-estimer la valeur de la proposition qu'il ressort, et la probabilit´e que l'adversaire l'accepte. Nous renvoyons donc l'offre b∗ parmi les fils de la racine maximisant : (cid:18) utility(b) + score(b) (cid:19) b∗ = argmaxb∈racine.f ils 4.2.2 ´Elagage 2 (7) Afin de n'explorer que les noeuds donnant une utilit´e importante `a l'agent, il est possible d'utiliser des connaissances sur le jeu pour ´elaguer certaines parties de l'arbre et ne pas les d´evelopper. Nous consid´erons deux cas, un ´elagage dit (cid:28) fixe (cid:29) et un ´elagage dit (cid:28) variable (cid:29). Dans le cas de l'´elagage fixe, nous fixons `a notre agent une utilit´e minimale attendue, i.e. une utilit´e de r´eserve. Au sein de la simulation, lorsque MoCaNA produit une propo- sition, l'utilit´e de cette proposition est calcul´ee en utilisant le profil d'utilit´e de MoCaNA. Si cette utilit´e est inf´erieure `a la valeur seuil, la branche est supprim´ee. Lorsque l'agent n'est pas capable de d´eterminer un prix de r´eserve, il est possible de proc´eder `a un ´elagage variable d´ependant des propositions de l'adversaire. Dans ce cas, l'agent garde en m´emoire la proposition de l'adversaire ayant pour lui la meilleure utilit´e. Toute proposition g´en´er´ee par MoCaNA dans une simulation ayant une utilit´e inf´erieure est ´elagu´ee. Avec cette politique, l'agent ne fait que des propositions meilleures que celles que son adversaire a faites. 4.3 Architecture logicielle Notre agent a ´et´e d´evelopp´e en java. Nous l'avons con¸cu de fa¸con `a ce qu'il soit mo- dulaire, et `a ce qu'il soit d´ecoupl´e du framework sur lequel les exp´erimentations ont ´et´e 11 Mod´elisation ǡ Strat´egie Lj  Connecteur Donn´ees Genius Mod´elisation (cid:255) Utilit´e R Strat´egie 3 d'offre (MCTS) Agent R R Figure 2 -- Architecture logicielle des modules de MoCaNA r´ealis´ees. Nous avons pour cela construit un module permettant `a notre agent de s'in- terfacer avec Genius. L'agent est organis´e sous la forme d'interfaces impl´ement´ees par les classes de chaque module, et qui sont traduites pour Genius le cas ´ech´eant. On re- trouve dans l'architecture de MoCaNA les diff´erents ´el´ements d´ecrits ci-dessus : la strat´egie d'offre incluant MCTS et les concepts allant avec (e.g. notions d'arbre, de noeud), un mo- dule de mod´elisation de la strat´egie adverse et un mod`ele de l'utilit´e. Nous n'avons pas impl´ement´e de module pour la mod´elisation de la strat´egie d'acceptation. Cette architec- ture est repr´esent´ee dans la Figure 2. Les R repr´esentent les messages envoy´es et re¸cus par l'agent. Les simulations de MCTS ´etant tr`es gourmandes en terme de puissance de calcul, nous les avons parall´elis´e. L'aspect stochastique de notre mod´elisation de strat´egie d'offre assure que deus simulations lanc´ees du meme point n'auront pas le meme r´esultat, tout en privil´egiant les valeurs les plus probables. La r´egression de processus gaussien, qui repose sur le calcul matriciel, a ´et´e d´evelopp´ee en utilisant la librairie JAMA. Les param`etres du kernel de cette m´ethodes sont quant `a eux optimis´es en utilisant la librairie Apache Commons Math. 5 Exp´erimentations Pour ´evaluer notre agent, nous utilisons le framework Genius [13], qui permet de cr´eer des sessions de n´egociation et des tournois. Nous confrontons MoCaNA au RandomWalker ainsi qu'aux agents de l'ANAC 2014. 5.1 Protocole exp´erimental Genius permet de n´egocier sur des attributs entiers ou discrets, mais pas encore continus. Nous utilisons le domaine de n´egociation de l'ANAC 2014 d´ecrit par [9]. Les comp´etitions de 2015 et de 2016 se sont concentr´ees respectivement sur la n´egociation mul- tilat´erale, et sur les smart grids. `A notre connaissance, les agents de n´egociation de l'ANAC 2017 n'ont pas encore ´et´e mis `a disposition. Les attributs sont entiers, et varient de 0 `a 10. Plusieurs variantes ont ´et´e propos´ees allant de 10 attributs `a 50 attributs. Nous nous 12 focalisons sur le contexte `a 10 attributs. Le contexte utilis´e n'a aucun taux de r´eduction. L'utilit´e est une somme pond´er´ee de fonctions non lin´eaires sur chaque attribut. L'utilit´e de r´eserve des agents (dans le cas o`u ils ne trouvent pas d'accord) est 0, c'est `a dire la valeur minimale. Nous fixons en outre la borne de chaque session de n´egociation `a 1 heure. Apr`es ce temps, la n´egociation s'interrompt et les agents obtiennent leur utilit´e de r´eserve, c'est-`a- dire 0. Nous calibrons notre mod`ele de mani`ere empirique. Lorsque notre agent peut choisir parmi 200 propositions, il s'en trouve g´en´eralement une qui procure `a la fois une haute utilit´e pour lui et son adversaire. Afin que l'arbre soit ´egalement explor´e en profondeur, nous lui laissons assez de temps pour qu'il g´en`ere en moyenne 50.000 simulations. Ainsi, chaque pour faire une proposition, notre agent prend 3 minutes. Nous obtenons α = 0.489. 5.2 R´esultats Nous distinguons deux contextes de n´egociation : un contexte o`u la borne est pr´esente et connue des adversaires, face aux agents de l'ANAC 2014, et un o`u elle est assez loin pour etre consid´er´ee comme inexistante, face au RandomWalker. 5.2.1 ANAC 2014 La Table 2 montre les r´esultats de notre agent face aux finalistes de l'ANAC 2014, d´ecrits par [9], ordonn´es selon leur r´esultats `a l'ANAC 2014 dans la cat´egorie utilit´e individuelle. Les scores repr´esentent l'utilit´e moyenne de notre agent et de son adversaire moyenn´e sur 20 n´egociations, 10 avec chaque profil. Plus le score est haut, plus l'utilit´e de l'agent est ´elev´ee et mieux l'agent a r´eussi la n´egociation. Le nombre suivant le score pr´ec´ed´e du signe ± est l'´ecart type de la s´erie. L'utilit´e moyenne est calcul´ee en ne prenant en compte que les n´egociations qui ont r´eussi. La derni`ere colonne repr´esente le taux d'accord atteint par les agents, c'est `a dire le nombre de fois o`u les agents parviennent `a un accord divis´e par le nombre total de n´egociations. Le taux d'accord tr`es faible peut etre expliqu´e par notre strat´egie, qui ne s'accorde pas du tout `a la distance `a la borne, puisqu'elle ne la prend pas en compte. Cette caract´eristique l'empeche de ressentir la pression du temps (en anglais time pressure) qui est utilis´ee par les autres agents pour d´ecider s'ils conc`edent beaucoup ou non. Plus de 50% des n´egociations se soldent par un ´echec (contre 45% pour les autres agents). Les deux versions de l'´elagage am`enent une am´elioration significative. Avec l'´elagage par une valeur fixe, notre agent ne fait et n'accepte que des propositions pour lesquelles il recevrait une utilit´e de 0.8 au moins. Cela a un effet important sur le r´esultat des n´egociations. Celles qui se terminent permettent `a notre d'agent d'obtenir une bonne utilit´e, mais elles sont moins nombreuses que dans le cas pr´ec´edent, en particulier en ce qui concerne les agents avec lesquels notre agent avait d´ej`a un taux d'accord faible. L'autre m´ethode d'´elagage est moins dure pour les adversaires, puisque l'´elagage repose sur les propositions qu'ils font tout au long de la n´egociation. L'utilit´e de l'agent, en 13 ) e l b a i r a v e g a g a l ´e / e x fi e g a g a l ´e / e g a g a l ´e s n a s ( 4 1 0 2 C A N A ' l e d s e t s i l a n fi x u a e c a f A N a C o M e d s t a t l u s ´e R -- 2 e l b a T d r o c c a ' d x u a T 0 1 . 0 / 5 1 . 0 / 5 3 . 0 0 1 . 0 / 0 / 5 0 . 0 5 5 . 0 / 5 5 . 0 / 5 4 . 0 5 2 . 0 / 5 4 . 0 / 5 4 . 0 5 4 . 0 / 5 4 . 0 / 5 4 . 0 5 0 . 0 / 0 / 0 2 . 0 5 1 . 0 / 0 1 . 0 / 5 1 . 0 1 / 5 9 . 0 / 5 9 . 0 ) 8 0 . 0 ± ( 6 6 . 0 / ) 2 0 . 0 ± ( 5 8 . 0 / ) 8 0 . 0 ± ) 6 0 . 0 ± ( 5 5 . 0 / A N / ) 0 . 0 ± . ) 0 1 . 0 ± ( 7 7 . 0 / ) 2 0 . 0 ± ) 0 1 . 0 ± ( 9 7 . 0 / ) 4 0 . 0 ± ) 6 1 . 0 ± ( 0 7 . 0 / ) 5 0 . 0 ± ( 3 8 . 0 / ) 1 1 . 0 ± ( 7 8 . 0 / ) 9 1 . 0 ± ( 5 8 . 0 / ) 4 1 . 0 ± ( 7 5 . 0 ( ( ( A N a C o M e r o c S ) 0 ± ( 9 4 . 0 / A N / ) 5 0 . 0 ± . ( ) 1 1 . 0 ± ( 4 6 . 0 / ) 3 0 . 0 ± ( 4 8 . 0 / ) 5 1 . 0 ± ) 2 1 . 0 ± ( 6 6 . 0 / ) 7 0 . 0 ± ( 6 8 . 0 / ) 0 1 . 0 ± ( ( 5 5 . 0 ( 6 6 . 0 4 . 0 0 7 . 0 2 8 . 0 2 5 7 . 0 5 7 . 0 ) 1 1 . 0 ± ) 2 2 . 0 ± ) 9 0 . 0 ± ) 8 0 . 0 ± e r i a s r e v d a e r o c S . ) 0 ± ( 1 / A N / ) 5 8 0 . 0 ± ) 1 0 . 0 ± ( 6 8 . 0 / A N / ) 0 . 0 ± ( 1 . ( 7 7 . 0 / ) 8 0 . 0 ± ( 0 7 . 0 / ) 7 0 . 0 ± ( 6 5 . 0 / ) 9 1 . 0 ± ( 4 6 . 0 / ) 6 0 . 0 ± ( 3 5 . 0 / ) 6 0 . 0 ± ( 3 5 . 0 / ) 3 1 . 0 ± ( 1 7 . 0 / ) 6 1 . 0 ± ( 3 5 . 0 / ) 1 2 . 0 ± 8 9 . 0 ( ( ( ( 1 8 . 0 7 7 . 0 8 6 . 0 ) 3 1 . 0 ± ) 3 2 . 0 ± ( 7 7 . 0 / ) 7 0 . 0 ± ( 1 7 . 0 / ) 7 1 . 0 ± ( 2 5 . 0 / ) 0 2 . 0 ± ( 9 4 . 0 / ) 7 1 . 0 ± ( 2 6 . 0 1 8 . 0 ( ( 8 8 . 0 M t n e g A e r i a s r e v d A A N o D r e t s g n a G e l a h W 2 p u o r G t n e g A G k k Y t n e g A t a C e v a r B 14 revanche, est bien meilleure que dans le cas sans ´elagage. Elle l'est moins, en revanche, que dans le cas avec un ´elagage fixe de 0.8. Notre agent bat la majorit´e de ses comp´etiteurs. Quelle que soit la technique d'´elagage, elle permet aux agents de ne pas explorer les branches inint´eressantes, et donc de rechercher les meilleures solutions parmi les solutions acceptables. Elles sont en cela meilleure que la pond´eration a posteriori. 5.2.2 Contexte sans borne En ce qui concerne la n´egociation avec le Random Walker, MoCaNA semble beaucoup mieux s'en sortir, meme sans ´elagage. Il obtient un score ´elev´e, 0.703(±0.062) contrairement au Random Walker 3, qui obtient un score moyen de 0.378(±0.077). ce qui confirme que notre agent est gen´e par la pr´esence de la borne, et le fait qu'il ne s'appuie pas dessus. Notre agent est donc un bon n´egociateur d`es lors qu'on ne lui impose pas de borne. La pr´esence de cette derni`ere coupe la n´egociation avant qu'il ne puisse arriver `a un accord avantageux pour lui. Les n´egociation r´eussissant (moins de 50%), sont donc celles pour lesquelles il a fait le plus de concessions, ce qui a pour effet de lui conf´erer une utilit´e moindre que celle de son adversaire. 6 Conclusion Dans cet article, nous avons pr´esent´e un agent de n´egociation automatique capable de n´egocier dans un contexte o`u les agents ne se fixent pas de borne, ni temporelle ni en termes de nombre de tours et o`u le domaine de n´egociation peut etre continu. Apr`es avoir d´ecrit la n´egociation sous forme de jeu extensif, nous avons d´ecrit une strat´egie d'offres s'appuyant sur une version de MCTS et sur deux m´ethodes de mod´elisation de l'adversaire. Pour l'une d'entre elles, la r´egression de processus gaussiens, dont nous avons test´e plusieurs kernels et retenu le meilleur. Nous avons propos´e deux variantes `a notre strat´egie d'offre s'appuyant sur des ´elagages des branches. Aucun agent n'est con¸cu pour n´egocier dans un contexte aussi r´ealiste que celui pour lequel MoCaNA a ´et´e con¸cu. Nous l'avons donc compar´e aux finalistes de l'ANAC 2014, dont le contexte est le plus proche de celui pour lequel notre agent est con¸cu et `a un RandomWalker. Les exp´erimentations ont montr´e qu'il est difficile d'obtenir un haut taux d'accord pour un agent n'ayant pas conscience de la time pressure. Dans les cas o`u un accord est trouv´e, l'´elagage am´eliore grandement la performance de MoCaNA et lui permet de battre la majorit´e de ses adversaires, au prix d'une baisse du taux d'acceptation. Les perspectives de ces travaux comprennent l'´elargissement du spectre de domaines sur lequel MoCaNA est capable de n´egocier, notamment `a tester des domaines de n´egociations form´es d'attributs cat´egoriels uniquement, continus uniquement, et mixtes. Un autre type de protocoles `a tester r´eside dans les protocoles multilat´eraux, notamment des protocoles 1:n de type ench`eres ou n:m de type many-to-many bargaining. Une autre perspective consisterait `a concevoir une version de l'ANAC sans borne. Il serait enfin int´eressant de 3. Cet agent est d´ecrit dans [3] et fait des propositions al´eatoires. 15 voir dans quelle mesure MoCaNA pourrait int´egrer des informations suppl´ementaires telles que la borne, des connaissances sur la nature des attributs afin d'en tirer parti lorsque cela est possible. Il est aussi possible d'am´eliorer MoCaNA en se concentrant sur MCTS. Il serait par exemple int´eressant de voir comment un double ´elagage, par une valeur fixe et selon les propositions de l'adversaire, influerait sur l'utilit´e et le taux d'accord de MoCaNA. Une autre am´elioration, qui permettrait d'augmenter le nombre de simulations de MoCaNA et donc de diminuer le temps de calcul ou d'augmenter la performance de notre agent serait d'impl´ementer des algorithmes comme All Moves As First ou la Rapid Action Value Estimation. R´ef´erences [1] Tim Baarslag. Exploring the Strategy Space of Negotiating Agents : A Framework for Bidding, Learning and Accepting in Automated Negotiation. PhD thesis, Delft University of Technology, 2016. [2] Tim Baarslag, Mark J C Hendrikx, Koen V Hindriks, and Catholijn M Jonker. Lear- ning about the opponent in automated bilateral negotiation : a comprehensive sur- vey of opponent modeling techniques. Autonomous Agents and Multi-Agent Systems, 20(1) :1 -- 50, 2015. [3] Tim Baarslag and Koen V. Hindriks. Accepting optimally in automated negotiation In AAMAS '13, pages 715 -- 722, Richland, SC, 2013. with incomplete information. International Foundation for Autonomous Agents and Multiagent Systems. [4] Cameron C Browne, Edward Powley, Daniel Whitehouse, Simon M. Lucas, Peter I Cowling, Philipp Rohlfshagen, Stephen Taverner, Diego Perez, Spyridon Samothrakis, and Simon Colton. A survey of Monte Carlo tree search methods. IEEE Transactions on Computational Intelligence and AI in games, 4(1) :1 -- 43, 2012. [5] Dave de Jonge and Carles Sierra. Recent Advances in Agent-based Complex Au- tomated Negotiation, volume 638 of Studies in Computational Intelligence, chapter GANGSTER : An Automated Negotiator Applying Genetic Algorithms, pages 225 -- 234. Springer International Publishing, 2016. [6] Dave de Jonge and Dongmo Zhang. Automated negotiations for general game playing. In AAMAS '17, pages 371 -- 379, Richland, SC, 2017. [7] Fang Fang, Ye Xin, Yun Xia, and Xu Haitao. An opponent's negotiation behavior In 2008 model to facilitate buyer-seller negotiations in supply chain management. International Symposium on Electronic Commerce and Security, 2008. [8] Peyman Faratin, Nicholas R Jennings, and Carles Sierra. Negotiation decision func- tions for autonomous agents. Robotics and Autonomous Systems, 24(3-4) :159 -- 182, 1998. 16 [9] Naoki Fukuta, Takayuki Ito, Minjie Zhang, Katsuhide Fujita, and Valentin Robu, editors. Recent Advances in Agent-based Complex Automated Negotiation, volume 638 of Studies in Computational Intelligence. Springer International Publishing, 2016. [10] Koen Hindriks and Dmytro Tykhonov. Opponent modelling in automated multi-issue In Proceedings of the 7th International Joint negotiation using bayesian learning. Conference on Autonomous Agents and Multiagent Systems, volume 1, pages 331 -- 338, 2008. [11] Anna Ja´skiewicz and Andrzej S. Nowak. Non-Zero-Sum Stochastic Games, pages 1 -- 64. Springer International Publishing, Cham, 2016. [12] Levente Kocsis and Csaba Szepesv´ari. Bandit based monte-carlo planning. In Jo- hannes Furnkranz, Tobias Scheffer, and Myra Spiliopoulou, editors, Machine Lear- ning : ECML 2006, pages 282 -- 293, Berlin, Heidelberg, 2006. Springer Berlin Heidel- berg. [13] Raz Lin, Sarit Kraus, Tim Baarslag, Dmytro Tykhonov, Koen Hindriks, and Catho- lijn M Jonker. Genius : an integrated environment for supporting the design of generic automated negotiators. Computational Intelligence, 30(1) :48 -- 70, 2014. [14] Martin J Osborne and Ariel Rubinstein. A course in game theory. MIT press, 12 edition, 1994. [15] Carl E Rasmussen and Christopher K I Williams. Gaussian processes for machine learning. MIT Press, 2006. [16] Daniel M Reeves and Michael P Wellman. Computing best-response strategies in infinite games of incomplete information. In Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, UAI '04, pages 470 -- 478, Arlington, Virginia, United States, 2004. AUAI Press. [17] Tuomas W Sandholm. Distributed rational decision making. Multiagent systems : a modern approach to distributed artificial intelligence, pages 201 -- 258, 1999. [18] David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George Van Den Driessche, Julian Schrittwieser, and al. Mastering the game of go with deep neural networks and tree search. Nature, 529(7587) :484 -- 489, 2016. [19] B´alint Szollosi-Nagy, David Festen, and Marta M Skarzy´nska. Recent Advances in Agent-based Complex Automated Negotiation, volume 638 of Studies in Computational Intelligence, chapter A Greedy Coordinate Descent Algorithm for High-Dimensional Nonlinear Negotiation, pages 249 -- 260. Springer International Publishing, 2016. [20] Colin R Williams, Valentin Robu, Enrico H Gerding, and Nicholas R Jennings. Using gaussian processes to optimise concession in complex negotiations against unknown opponents. In IJCAI'11, pages 432 -- 438, 2011. 17
1909.02396
1
1909
2019-08-25T18:55:10
Modelling transport provision in a polycentric mega city region
[ "cs.MA" ]
The aim of this paper is to present a model of interaction between transport and land use which aims at endogenously integrates the provision of transportation infrastructure and its effects on land use, with a long term perspective (Lowry, 1964, Wegener, 2004, Levinson, 2011, Bretagnolle, 2014, Mimeur et al., 2015). LUTECIA (Land Use, Transport, Evaluation of Cooperation, Infrastructure provision and Agglomeration effects) model puts emphasis on multiscale processes of urban growth, in the context of the emergence of Mega-City Regions (MCR, Hall & Pain, 2006). It allows us, in this exploratory phase, to characterize via simulation the conditions of development of polycentric metropolises. Nevertheless, we argue that such approaches are all the more necessary that we are in a period of multiple transitions that classical modelling tools have difficulty to capture.
cs.MA
cs
Modelling transport provision in a polycentric mega city region. Florent Le Néchet Université Paris-Est, Laboratoire Ville Mobilité Transport, UPEMLV : 5 boulevard Copernic, Cité Descartes F 77454 Marne-la-Vallée cedex 2 France [email protected] This article was written in the context of the Rochebrune conference (Le Néchet, 2010). Some elements are published in Le Néchet (2017). Abstract The aim of this paper is to present a model of interaction between transport and land use which aims at endogenously integrates the provision of transportation infrastructure and its effects on land use, with a long term perspective (Lowry, 1964, Wegener, 2004, Levinson, 2011, Bretagnolle, 2014, Mimeur et al., 2015). LUTECIA (Land Use, Transport, Evaluation of Cooperation, Infrastructure provision and Agglomeration effects) model puts emphasis on multiscale processes of urban growth, in the context of the emergence of Mega-City Regions (MCR, Hall & Pain, 2006). It allows us, in this exploratory phase, to characterize via simulation the conditions of development of polycentric metropolises. Nevertheless, we argue that such approaches are all the more necessary that we are in a period of multiple transitions that classical modelling tools have difficulty to capture. Keywords Mega-City Regions, agent-based modelling, polycentricity, urban dynamics, LUTI model Introduction The aim of this paper is to present a model of interaction between transport and land use which aims at endogenously integrates the provision of transportation infrastructure and its effects on land use, with a long term perspective (Lowry, 1964, Wegener, 2004, Levinson, 2011, Bretagnolle, 2014, Mimeur et al., 2015). LUTECIA (Land Use, Transport, Evaluation of Cooperation, Infrastructure provision and Agglomeration effects) model puts emphasis on multiscale processes of urban growth, in the context of the emergence of Mega-City Regions (MCR, Hall & Pain, 2006). It allows us, in this exploratory phase, to characterize via simulation the conditions of development of polycentric metropolises. Cities are said to be complex (Benenson & Torrens, 2004; Batty et al., 2012), in the sense that the modification of a component of one of the subsystems would potentially induce changes to all the components of all the subsystems. LUTECIA model focus on the coevolution of location system 1 and transportation system (Raimbault, 2018).As an illustration of such interactions, let us mention the rebound effect of travel speed on trip distances (Litman, 2017a). At metropolitan level, gains in accessibility due to highway construction and thus improved speeds overall resulted in unforeseen urban sprawl (Banister, 2011). Complex imbrication also occurs between multiple spatial scales of planning: decisions of transport provision made at a local scale can have repercussions at a wider scale, and vice versa. For instance, Appert (2004) showed how the Green Belt policy in London (belt of restricted urbanization located circa 30 km from the city center), a measure which was dedicated to limit urban sprawl, created in fact leapfrog sprawl and increased travel distance for new residents located outside the green belt and commuting to London. Conversely, the spatial organization at a metropolitan level can influence the need for transport provision: the proximity of two cities and increase of commuting flows can over time create needs for the development of efficient transportation links linking the two cities (Le Néchet, 2012) This article focuses on the complex coevolution between decision making of transport infrastructure provision operated by local and metropolitan stakeholders and urban dynamics hence changes in the spatial organization of population and activities densities. Land use and transport infrastructure networks come from planning decisions made over a long period of time by a diversity of actors at individual and collective levels (Venables, 2007; Vickerman, 2017). Individuals make location choices based on several criteria (for instance, housing affordability, accessibility to workplaces). At the collective level, urban actors play a role in the development of cities, such as national or supra- national bodies and private actors, capable of making heavy investments. The contribution of this article lies in the exploration of paths of urban dynamics with evolving transportation network, and of the conditions of the emergence of governance at MCR level. We start be a short discussion on the emergence of Mega-City Regions (Hall & Pain, 2006), then raising the question of the level of governance most fitted to transportation issues. In the last section, we introduce the theoretical agent-based model used to explore such questions. Emergence of Mega-City Regions This section describes the emergence of MCR, in Europe and the United States. Many examples are studies in Europe (PolyNet research network for instance), including the well-known Randstad Hol- land (Lambregt & Kloosterman, 2012). During the second part of the twentieth century, the reduc- tion in transport costs has been accompanied by a double dynamic of urban sprawl (Le Néchet, 2015) and hierarchization of the system of cities (Bretagnolle et al., 2007; Pumain et al., 2015). In- tra-urban and inter-urban dynamics tend to overlap: (Champion, 2001; Pumain et al., 2006). As stat- 2 ed by Soja (2011) « The urban, the metropolitan, and the subnational-regional scales seem to be blending together ». Mega City Regions (Hall & Pain, 2006) are geographical objects lying some- where between cities and system of cities, structured by flows and networks of communication. Territories of several thousands of square kilometers of discontinuous urbanization are now func- tionally integrated, with various kind of flows (business & leisure trips, Scott, 1997, logistics supply chains, Heitz & Dablanc, 2015, long-distance commuting trips, Conti, 2015). Several geographical levels are now de facto interrelated in the fabric of cities (what Soja, 2011 call "multilevel urbaniza- tion processes"). In particular, these evolutions the questions of which type of governance are more adequate to such geographical objects to achieve social, economic or environmental goals. The links between the reconfiguration of flows within territories and reconfiguration of governance at the metropolitan or regional level are though at different scales, and constitute an open and difficult question (Lefèvre, 2009; Cowell, 2010; Le Néchet, 2017). The literature does not offer a consensus over the evaluation of the resulting synergies (Meijers, 2004, Davoudi, 2007) of such metropolitan integration policies, but the question of the main scale of decision is little raised by the literature. As an example, let us compare Paris (France) and Rhine- Two research questions are treated at this stage: what is the impact of the spatial organization of densities (polycentric versus monocentric) on the emergence of Mega-City Regions? What is the influence of governance system (centralized ver- sus noncentralized) on the level of polycentricity of the Mega-City Region? Urban sprawl, functional integration and governance levels Ruhr area (Germany), two European metropolitan areas of relatively similar total population (12M) and size (12,000 km²), with very contrasted spatial organization. Figure 1 illustrates how different these networks are, that have emerged over the long term. In Paris, the local network ("métro") is of small spatial scope, which arises from the scale of deci- sion before the construction of the network : in 1900, the municipality has been able to impose its project to the national level (Larroque et al., 2002). Thus, two scales of network emerged, still visi- ble today, which is not the case for example in another monocentric city like London. As the cities of the Rhine-Ruhr region (Köln, Düsseldorf, Essen, Dortmund, Duisburg) have developed in rela- tive independence over time, before a gradual and incomplete functional integration (Blotevogel, 2001, Le Néchet, 2012), it is logical to observe here also two scales in the transportation network, the regional network "S- Bahn" having been organized since 1967. 3 Figure 1: Transit networks, at several spatial scales, in Paris Metropolitan Area "Ile-de-France-Paris", France (left) and in the Rhine-Ruhr region, Germany (right). Research question : multilevel governance and coevolution transport and land use In this article, we start from this very simple question: why are transport networks organized the way they are? Since the time scales involved are long (railway networks back from the beginning of the 19th century, the motorway networks of the early 20th century), this question invites us to think more generally about the interactions between transportation networks on one hand, and demographic evolution on the other hand. Kasraian et al. (2016) provide an extensive meta-analysis which highlights the complexity of these links. Most of the studies in this field use the notion of accessibility (Hansen, 1959) to understand and predict the effects of a transport infrastructure on territorial development, and in a more systemic approach, as an operative concept for studying the coevolution dynamics between transport and territories (Raimbault, 2018). To add to this complexity, transport infrastructures are decided and financed by a multiplicity of territorial stakeholders, since they potentially affect multiple territorial scales, from local to national or even international scale for fast networks such as high-speed railways or airports. Due to the polycentric nature of the MCR, our research question is thus transformed into the following one : what is the impact of a type of governance, hence giving the advantage to the local or to the whole region, on the dynamics of coevolution between transport and spatial distribution of the demography? This question takes place in the current debates about the formation of governance bodies at metropolitan level (Heeg et al., 2003 ; Douay, 2010) or at MCR level (Le Néchet, 2017). In this article, we tackle these questions via simulation. 4 According to our hypotheses, local stakeholders will tend to favor the accessibility of workers living within their governance area. Conversely, a regional stakeholder would aim at better global accessibility of the whole territory, which would often lead to different choices. Overall, one would expect MCR governance integration to occur when regional planning significantly outpaces the sum of local planning outcomes in terms of total accessibility (even if other factors might affect integration of governance, such as cultural differences, Blotevogel, 2001). Within the framework of simulation, to account for the rationality of territorial stakeholders at various spatial scales (cities, region), we are inspired by the paradigm Belief Desire Intention (Taillandier et al. 2011): actions of a territorial stakeholder will be driven by the perception of the elements of the system that he is likely to act on. However, most models of literature do not raise the issue of multiple territorial stakeholders. In most cases, choices are made only at the level of economic agents (individuals, real estate developers, etc.), or they are made according to a global rationality, implicitly assuming that one single actor has ability to take all decisions for a whole region. The reality is more complex: individual rationalities and the concept of global rationality come up against the rationalities of multiple territorial actors operating on multiple scales (Trigalo, 2000). Adopting a modelling framework separating individual mobility and migration choices on one hand (micro scale) and stakeholder long-term investments such as transport provision on the other hand (macro scale), the following section focus on the literature review to understand agents choices at each scale. Transport provision, accessibility, and residential location models Indeed, transport infrastructure provision follows various logics, for instance supporting land development (the Transit-Oriented Development Literature, Litman, 2017b) or improved accessibility for deprived neighborhoods (Desjardins & Drevelle, 2014). Acknowledging this complexity, a part of the literature focus on the possible effects of transport provision on to the spatial organization of densities (Banister, 2001; Litman, 2017b). LUTI (Land Use Transport Interaction) models extend classical four-stage model of transportation demand to take into account residential mobility. A key hypothesis of the model is that an increase in accessibility due to a new transportation link is likely to bring opportunities for new urban developments and/or an increase in residential or employment density around the new modes of transportation (Wegener, 2004). Most of such research are focused at the metropolitan level, only a few studies trying to assess the effects 5 of a variation of boundaries on the residential choice model output (see Thomas, 2018 for a complete analysis on LUTI models). Based on economic hypotheses such as monocentric model by Alonso (1964) and Lowry dynamic model (1964), some models link individual choices, whose determinants are synthesized by sophisticated mathematical functions via utility functions that result from these choices. Based on elements identified as exogenous (transport cost, available infrastructure, existing housing stock), and a finite number of selection criteria, it is possible to study the Pareto equilibrium configurations of the system (Delons et al., 2008). Some other have an agent-based approaches (Tannier et al., 2015). Scenarios can then be made to assess how a system would react in response to exogenous modifications such as an increase in the cost of mobility or a change in transport supply) This type of approach has proven useful in operational contexts to assess the socio-economic benefit of transport provision (Vickerman, 2017). However, data on the supply side are considered as exogenous: the model cannot predict the growth of infrastructure or other major structural changes (Raimbault, 2018). This constitutes the main limitation of this approach in the perspective of modeling the dynamics of cities in a longer term. To understand the long-term evolution of urban systems, it is useful to have other tools. Literature on transport network evolution is scarce (Raimbault, 2018), and existing models often focus on the geometric aspects (for instance percolation models) and are rarely explicitely with the socio- demographic aspects of the territory. Articles by Zhang and Levinson (2007), Xie & Levinson (2009), or Cavailhès et al. (2010) are notable exceptions that endogenously account for the changing transportation networks in relation to the changes of land use and commuting flows. Our approach is comparable but extends to the case of multiple actors. Overview of the LUTECIA model This paper introduces a LUTI model, developed and implemented on the Netlogo platform (Wilenski, 1999) and presented in Le Néchet (2010, 2017) and then Raimbault (2018) aimed at exploring the complex multiscale evolution of transportation networks and spatial structure, in the context of polycentric Mega City-Regions (MCR, Hall & Pain, 2006). The model combines a classical discrete choice LUTI model and a module that predicts endogenously the evolution of transportation network, given a configuration of territorial stakeholders respective powers. In order to explore the formation of governance at MCR level over several decades. Two main 6 hypotheses are used in the formalization of the model: firstly, the development of transport infrastructures affects the spatial organization of population and jobs; secondly, planning stakeholders are in interaction to decide for heavy transport provision investment. A stylized city is proposed which consists of the following elements: - The cells are the elementary zones which support housing and jobs - The metropolis: set of cells constituting the closed environment in which population (only workers in this version) and workplaces take place. - The workers are located on the cells and differentiated by socio-occupational categories. - Jobs are also located on the cells; the types of jobs are associated with socio-professional categories (we used a simple typology) - Planners are agents responsible for providing transport infrastructure. Two type of actors are implemented in the model: local stakeholders called "mayors", who divide the metropolis into M disjointed areas, and a metropolitan "governor". These (M + 1) agents have their own objective function when provisioning transport infrastructures. The model is articulated around three sub-modules, ran successively during a time step: - A transport module, which computes the demand for travel according to a given configuration of the internal distribution of workers and jobs, as well as the supply of transport infrastructure. - A land use module that reallocate workers and jobs based on metropolitan accessibility via transportation network - A governance module, which settles the decision making of transport infrastructure provision according to differentiated development rules at several scales. To account for the hypothesis stated, the underlying principle of the model is as follows: a spatial configuration of transport infrastructures being given, workers and jobs relocate in space, according to the transport possibilities offered by the city. In return, depending on the location of workers and jobs, a new transportation infrastructure is built in order to improve the overall accessibility level. This growth of accessibility is non-linear: some infrastructures simply extend an existing line and reinforce an ongoing process of urban sprawl; conversely, when an infrastructure connects two major centers, a structural change occurs, with possible further integration towards a polycentric metropolis as described by Champion (2001). In the initial configuration, workers and jobs, are spatially distributed exogenously. Workers are distributed according to Clark's (1951) empirical law: the monocentric model. The population density ρ(c) in cell c, distant from from center Ci by a distance di is according to polycentric model 7 of Heikkila et al. (1989): with M centers. This section details the equations used in the model, for each of the three modules presented. The model relies on a classical four-stage transport demand model, discrete choices model of location choices of households and jobs. The originality of the model is the inclusion of a model accounting for the construction of new transport infrastructures. Transport submodel The four-stage model of transportation demand is commonly used in transportation engineering to model the demand for travel, once given location-based attributes (workers and jobs per municipality generating transport demand) and the attributes of transport infrastructure (travel time, capacity) summarizing the transport offer. In detail, the four stages conventionally implemented, with varying degrees of sophistication, are as described as suggested by Bonnel (2001): 1. Generation of the travel demand. The aim is to estimate, trips at origin and at destination, by travel zone, for various trip purposes. In this model, only commuting is taken into account, differentiated by socio-professional category. 2. Distribution of commuting flows, carried out according to the gravity model: If and are respectively the number of workers of zone i, and the number of jobs of zone j, the number of displacements between the two zones is obtained by solving the system of coupled equations (Furness algorithm): under constraints : et given et and are temporary parameters; λ can be interpreted aversion to the distance of individuals; here represents the travel time between the two zones, depending on the transport infrastructure present (if the "as the crow flies" -- AFC - route induces a lower time, it is retained). 8 iidbieA−==M1i(c)iAjEijijdjijiijeEAqpNji−==,..1,===NkjkjENj1,..1===NljilANi1,..1=−==NldlliileEqpNi11,..1=−==NkdklkjkjeApqNj11,..1ipjqijd 3. Modal choice. Here, only car use is implemented; therefore, this submodule is disabled. 4. Traffic assignment will compute the frequentation of the different sections of the transport networks. This step is performed by calculations of shortest paths, taking into account congestion, via an implementation of a static Dijkstra algorithm. Note that LUTECIA model differentiate "local" and "regional" roads: local roads are not represented in the model but correspond to AFC distance, they are no subject to congestion. Regional roads are the transportation links that are built throughout the model: they are subject to possible congestion (travel speeds depend on flow- capacity ratio according to the classical BPR 1964 function). Location choice submodel The literature on residential mobility is mainly based on the idea that individuals and firms, in the choice of their location, promote greater accessibility to the desired resources as well as attributes of the place (Tannier et al., 2015). In LUTECIA model, no land auction is implemented but the local distribution of densities are accounted for in the relocation submodule, making it possible to implement the two opposite forces: density aversion and desire for accessibility. This utility function depends on the position of the cell relative to its environment (Accessibility, noted Xc), and its own attributes (Urban Form, noted Fc). The implementation adopted is as follows: a Cobb-Douglas function makes it possible to synthesize the utility function of the workers (and jobs) for each cell c, Uc. In a detailed way, the functions are calculated as follow (for the workers, the formalizations are symmetrical for the jobs): The parameter ν accounts for the cost of energy in the sense that greater distances can be more or less difficult to achieve on a daily basis depending on the city wealth and the technology of vehicles; this parameter is common to all agents of the model. Note that it is a strong assumption which can be relaxed in further versions of the model. A proximity matrix between socioprofessional categories allows to account for the preference 9 −=1cccFXU−=jdsjssicijeEAX',','''',)()())((ssssmsimsisssisicEAEAF= between workers and jobs in location choice model; three possibilities are implemented: categories s and s' are indifferent to their mutual presence (ms, s' = 0), avoid each other (ms, s' <0) or appreciate their mutual presence (ms, s'> 0). Once these utility functions have been determined, the workers and jobs are distributed on the grid, so that the best locations are the most chosen; a discrete choice model has been implemented: the probability for a worker (respectively a job) to move into cell c is as follows, where μ is the sensitivity of workers (respectively jobs) towards a differential of accessibility. NB : il manque toute une partie sur l'évaluation socio-économique des infrastructures Governance submodel Growth of a transportation network through coordination between several territorial stakeholders Finally, a last step is implemented to allow for endogeneous modification of the transportation network. As stated earlier, we wish to include in the model the evaluations of transport provision needs from both local and regional stakeholder. Our modelling choices lie on three main hypothesis : (i) in general stakeholders will seek maximization of accessibility to jobs for its residents given a level of new transport resources ; (ii) due to historical pathways (Paasi, 1986), there is an external and somehow constant level of concentration of governance within the region, between two extreme cases : all decisions are taken at regional level, with no role to local stakeholders and all decision are taken at local city level, with no role for regional stakeholders ; a parameter can account for the proximity towards such extreme configurations ; (iii) : in case of local stakeholder having a say in transportation provision, the relative power of local stakeholder will be a function a their relative economic wealth. Thus, due to hypothesis (iii) a local city has an implicit interest in developing urban amenities. In addition, the territories are in a situation of cooperation: the workers of each territory can use the infrastructures created, independently of the stakeholder that made the investment; this concurrence / cooperation processes appear realistic in a context where there are increasing interactions between spatial scales as mentioned by Parr (2004) and Cowell (2010). The infrastructures are here developed one by one, by investments made 100% by one of the 10 ='')(cUUcceecP administrative authorities: local mayor or regional autorithy. This hypothesis indeed neglects part of the complexity of the political decision-making process, which often leads, in the case of transport infrastructure, to compromises carried by multiple actors (Ollivier-Trigalo, 2000), and to joint financing by different stakeholders. However, we argue that over the course of several iterations of the model, the various stakeholders will have had chance to develop infrastructure according to their utility function, proportionally to their respective importance. Transport provision is implemented using a two-step approach: (i) The choice of stakeholders that will develop the infrastructure network: local decision (one of the mayors) or metropolitan decision? (ii)The choice of infrastructure: which criteria? which method is chosen? (i) Firstly, randomly chosen decision will be at the local or metropolitan level, according to an exogeneous parameter, the share of local decisions ξ. Note that the determination of mayor is set exogenously, and do not vary during the simulation (there is no feedback loop from land use to the administrative division between stakeholders). If the decision is local, another random step is achieved to determine which mayor will have the opportunity to decide on the construction of the new infrastructure. This random choice is conducted according to a probabilistic model taking into account the relative power of mayors through number of jobs in the mayor's territory (in order to take into account the relative wealth of each territory); In other words, there is a feedback loop of the distribution of employment on the propensity of each mayor to make a development decision. In detail, if Yi is the total number of jobs in Mayor i's territory, the probability that this mayor will make the decision is: . (ii) Once a territory T has been chosen on which the decision to build an infrastructure is based, the choice of infrastructure is made with a view to maximizing the accessibility of the T territory's workers to all metropolitan jobs. This choice is, of course, debatable, but it allows us to give a synthetic account of the desire usually expressed by planners and urban planners to encourage social exchanges between individuals and economic functioning of the territory. The current configuration is associated with a "current" accessibility , where X (c) is the accessibility of the cell c, belonging to T. If a new infrastructure, Z, is built, the accessibility function will, after application of the transport module, be modified: XZ (T). It's about retaining the infrastructure that maximizes new accessibility: 11 ==MjjiiYY1)()(cXTXTc= .. This research is carried out here for all the infrastructures connecting two neighboring zones, which implies substantial computing times, explaining why a small grid is used at this exploratory stage. Choice of stakeholder Local decision Metropolitan level decision ξε1 ξε2 … ξεM 1-ξ Figure 2 : Probability for each territorial stakeholder to obtain the decision at each time step. As such, the metropolitan dynamic is the result of a stochastic process, which we explore in the next section. Results In this last section, first applications of the model are proposed. Note that in this archive version of the paper, the validation roadmap is not detailed ; parameters used here derive from a "expert" validation in the sense that they were chosen to produce realistic urban dynamics (for instance, the speed of sprawl has to be controlled to ensure realistic response to provision of transport infrastructure). The following section describes the dynamics of the transportation network in absence of land use change, but with varying type of governance and different initial configurations in term of land use. Growth of transportation network, no land use change Figure 3 shows the state of a simulation after a small number of steps; Mayor 0 (gray, bottom right) 12 )(*maxargTXZZZ= and Mayor 1 (red, top left) develop the territory. The population density, in green, shows a city more populated than the other. It is a rather monocentric city, with a short distance between the two centers. Hence, Mayor 1 is more likely to apply its utility function to the transport infrastructure provision, compared to Mayor 0. Figure 3 : Simulation outputs after 3 timesteps : exclusively local decisions (left); exclusively metropolitan (right). Each simulation (construction of six infrastructures) is reproduced 30 times to account for the stochastic variability of the model. Figure 4 shows the mean values (and the variation ellipse) of the following indicators: - Total accessibility, - Total travel time of individuals Given the spatial configuration, high accessibility level corresponds to a well-meshed network (facilitating exchanges between the two cities of the metropolis), and low travel times illustrate either a lower territorial integration, or an absence of congestion. The results indicate equivalent accessibility in the case where decisions are taken at the metropolitan level only or by the mayor of greatest importance, the mayor 1. However, when decisions are made by the other, the total time of travel is lower which indicates a lower degree of congestion. Conversely, when decisions are mainly made at Mayor level 0, total accessibility is lower. It is not a question of determining here an "optimal" governance system means, these two indicators having been retained among many others conceivable, but of exploring the articulation between scales in this model transport / land use 13 Figure 4 : Outputs of the simulations : links between accessibility level and average travel times under different governance regimes. Sensitivity analysis Figure 5 shows the average accessibilities at the end of the simulation for four different initial configurations, making it possible to explore the most appropriate decision-making structures for a given urban form. Total accessibility is again taken as an output indicator; on the X-axis, the proportion of decisions taken locally shows, in the case of monocentric cities (the two cities are of unequal demographic importance), a clear tendency for centralized governance systems to offer better accessibility to the city. . Such a result is not reproduced in monocentric metropolises, where the two cities are of the same weight: the variable ξ seems independent of total accessibility even if it probably has an impact on the unequal spatial distribution of this accessibility. 14 Figure 5 : Sensitivity study: influence of urban form and type of governance on total accessibility level. Discussion The results presented constitute a first exploration of a model of interaction between transport and land use, proposing simultaneously to take into account the individual interests of location and displacement, and the collective interests of development. Of course, in its current simplistic configuration, and leave aside important aspects of the complexity of urban dynamics; the criteria with which transport infrastructures are built endogenously leave little room for the complex reality of the terrain. In addition, the evolution of land use has presented here only theoretically, because there is a challenge to adjust the temporalities of joint evolutions of the transport system and the settlement system. So-called "complex systems" approaches aim at taking into account the succession of non- equilibrium states occurring in urban systems, for which neither individual nor global objective functions are available (Batty & Xie, 1999, Xie & Levinson, 2009, Cavailhes et al., 2010, Demare et al., 2017). Organized spatial configurations can emerge from a set of elementary rules, at the local level (as showed by Schelling's segregation model in the urban context (Gauvin et al., 2009). With such models, it is possible to obtain abrupt transitions as a result of the modification of one or a very small number of initial parameters. This is at the same time more realistic and more difficult to use in operational context for technical reasons such as the difficulty to calibrate such a model. Nevertheless we argue that such approaches are all the more necessary that we are in a period of multiple transitions that classical modelling tools have difficulty to capture. 15 References Alonso, William (1964). Location and land use: Towards a general theory of rent. Cambridge, MA: Harvard University Press. Appert, M. (2004). Métropolisation, mobilités quotidiennes et forme urbaine: le cas de Londres. Géocarre- four, 79(2), 109-118. Banister, D., & Berechman, Y. (2001). Transport investment and the promotion of economic growth. Journal of transport geography, 9(3), 209-218. Banister, D. (2011). The trilogy of distance, speed and time. Journal of Transport Geography, 19(4), 950- 959. Batty, M., & Xie, Y. (1999). Self-organized criticality and urban development. Discrete Dynamics in Nature and Society, 3(2-3), 109-124. Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A., Bazzani, A., Wachowicz, M., Ouzounis, G., Por- tugali, Y. (2012). Smart cities of the future. The European Physical Journal Special Topics, 214(1), 481-518. Benenson, I. & Torrens, P. (2004), Chapter 4: Modeling Urban Land-Use with Cellular Automata, John Wiley and Sons Ltd, pp. 287. Blotevogel, H. H. (2001). Regionalbewusstsein und Landesidentität am Beispiel von Nordrhein-Westfalen. Gerhard-Mercator Universität. Bonnel, P. (2001), 'Prévision de la demande de transport', Rapport HDR, Décembre 2001, 409. Bretagnolle, A., Pumain, D., & Vacchiani-Marcuzzo, C. (2009). The organization of urban systems. In Com- plexity perspectives in innovation and social change (pp. 197-220). Springer, Dordrecht. Bretagnolle, A. (2014). Les effets structurants des transports, une question d'échelles?. L'Espace géogra- phique, 43(1), 63-65. Bretagnolle, A.; Pumain, D. & Vacchiani-Marcuzzo, C. (2007), Les formes des systèmes de villes dans le monde, Economica, Anthropos, pp. 301-314. Cavailhès, J.; Peeters, D.; Caruso, G.; Frankhauser, P.; Thomas, I. & Vuidel, G. (2010), 'The S-Ghosts' City Self-Generating Housing, Open Space and Transportation in a Sprawling City', Champion, A. (2001), 'A Changing Demographic Regime and Evolving Poly centric Urban Regions: Conse- quences for the Size, Composition and Distribution of City Populations', Urban Studies 38(4), 657-677. Clark, C. (1951), 'Urban Population Densities', Journal of the Royal Statistical Society A 114, 490-496. 16 Conti, B. (2019). Daily inter-urban mobility in France: heterogeneous commuters and commuting. Flux, (1), 14-32. Cowell, M. (2010), 'Polycentric Regions: Comparing Complementarity and Institutional Governance in the San Francisco Bay Area, the Randstad and Emilia-Romagna', Urban Studies 47(5), 945-965. Davoudi, S. (2007), Polycentricity: Panacea or pipedream?, John Libbey Eurotext, pp. 209. Delons, J., Coulombel, N., & Leurent, F. (2008), « an integrated transport and land-use model for the Paris area », HAL archive, https://hal.archives-ouvertes.fr/hal-00319087/ Démare, T., Bertelle, C., Dutot, A., & Lévêque, L. (2017). Modeling logistic systems with an agent-based model and dynamic graphs. Journal of Transport Geography, 62, 51-65. Desjardins, X., & Drevelle, M. (2014). Trends in the social disparities in access to jobs by train in the Paris region since 1975. Town Planning Review, 85(2), 155-170. Douay, N. (2010). Collaborative planning and the challenge of urbanization: Issues, actors and strategies in Marseilles and Montreal metropolitan areas. Canadian Journal of Urban Research, 19(1), 50-69. Gauvin, L., Vannimenus, J., & Nadal, J. P. (2009). Phase diagram of a Schelling segregation model. The Euro- pean Physical Journal B, 70(2), 293-304. Hall, P. G., & Pain, K. (Eds.). (2006). The polycentric metropolis: learning from mega-city regions in Europe. Routledge. Hansen, W. G. (1959). How accessibility shapes land use. Journal of the American Institute of planners, 25(2), 73-76. Heeg, S.; Klagge, B. & Ossenbruuumlgge, J. (2003), 'Metropolitan cooperation in Europe: Theoretical issues and perspectives for urban networking 1', European Planning Studies 11(2), 139-153. Heitz, A., & Dablanc, L. (2015). Logistics spatial patterns in Paris: rise of Paris Basin as Logistics Megaregion. Transportation Research Record, 2477(1), 76-84. Heikkila, E.; Gordon, P.; Kim, J.; Peiser, R. & Richardson, H. (1989), 'What happened to the CBD-Distance Gradient? Land Values in a Policentric City.', Environment and Planning A 21, 221-232. Kasraian, D., Maat, K., Stead, D., & van Wee, B. (2016). Long-term impacts of transport infrastructure net- works on land-use change: An international review of empirical studies. Transport Reviews, 36(6), 772-792. Lambregts, B., & Kloosterman, R. (2012). Randstad Holland: Probing hierarchies and interdependencies in a polycentric world city region. International Handbook of Globalization and World Cities. Cheltenham, UK: Edward Elgar, 476-486. 17 Larroque, D., Margairaz, M., & Zembri, P. (2002). Paris et ses transports: XIXe-XXe siècles, deux siècles de décisions pour la ville et sa région. Recherches/Ipraus. Le Néchet, F. (2010). Approche multiscalaire des liens entre mobilité quotidienne, morphologie et soutena- bilité des métropoles européennes: cas de Paris et de la région Rhin-Ruhr(Doctoral dissertation, Université Paris-Est). Le Néchet, F. (2012). Approche multiscalaire de la mobilité domicile-travail en Île-de-France et dans la ré- gion Rhin-Ruhr. Cahiers de géographie du Québec, 56(158), 405-426. Le Néchet, F. (2015). De la forme urbaine à la structure métropolitaine: une typologie de la configuration interne des densités pour les principales métropoles européennes de l'Audit Urbain. Cybergeo: European Journal of Geography. Le Néchet, F. (2017). De l'étalement urbain aux régions métropolitaines polycentriques: formes de fonc- tionnement et formes de gouvernance. Peupler la terre-De la préhistoire à l'ère des métropoles. Presses Universitaires Francois Rabelais. Lefèvre, C. (2009). Gouverner les métropoles. LGDJ/Lextenso Editions. Levinson, David M (2011). The coevolution of transport and land use : An introduction to the Special Issue and an outline of a research agenda. Journal of Transport and Land Use 4.2. Litman, T. (2017a). Generated traffic and induced travel. Victoria Transport Policy Institute. Litman, T. (2017b). Evaluating accessibility for transport planning. Victoria Transport Policy Institute. Lowry, I. S. (1964). A model of metropolis. Meijers, E. (2004), 'Polycentric urban regions and the quest for synergy: is a network of cities more than the sum of the parts?', Urban Studies 42(4), 765-781. Mimeur, C., Thévenin, T., Vuidel, G., Granjon, L., & Schwartz, R. (2015, May). Géohistoire du lien ré- seau/territoire en France entre 1830 et 1930: une approche géographiquement pondérée. In Douzièmes Rencontres de Théo Quant. Ollivier-Trigalo, M. (2000). Les grands projets de transport transeuropéens: multiplicité des acteurs, conflits et coordination de l'action. Les Cahiers scientifiques du transport, (37), 3-30. Paasi, A. (1986). The institutionalization of regions: a theoretical framework for understanding the emer- gence of regions and the constitution of regional identity. Fennia-International Journal of Geography, 164(1), 105-146. Parr, J. (2004). The polycentric urban region: a closer inspection. Regional studies, 38(3), 231-240. 18 Pumain, D.; Bretagnolle, A. & Glisse, B. (2006), Modelling the future of cities, in 'European Conference of Complex Systems, Oxford University'. Pumain, D., Swerts, E., Cottineau, Céline Vacchiani-Marcuzzo, Cosmo Antonio Ignazzi, Anne Bretagnolle, François Delisle, Robin Cura, Liliane Lizzi et Solène Baffi. (2015). Multilevel comparison of large urban sys- tems. Cybergeo: European Journal of Geography. Raimbault, J. (2018). Caractérisation et modélisation de la co-évolution des réseaux de transport et des territoires (Doctoral dissertation, Université Paris 7 Denis Diderot). Scott, A. J. (1997). The cultural economy of cities. International journal of urban and regional research, 21(2), 323-339. Soja E. (2011), «Beyond Postmetropolis», Urban Geography, 32:4, p. 451-469, DOI: 10.2747/0272- 3638.32.4.451 Taillandier, P., Therond, O., & Gaudou, B. (2012). A new BDI agent architecture based on the belief theory. Application to the modelling of cropping plan decision-making. In International environmental modelling and software society (iEMSs). Thomas, I., Jones, J., Caruso, G., & Gerber, P. (2018). City delineation in European applications of LUTI mod- els: review and tests. Transport Reviews, 38(1), 6-32. Venables, A. J. (2007). Evaluating urban transport improvements: cost -- benefit analysis in the presence of agglomeration and income taxation. Journal of Transport Economics and Policy (JTEP), 41(2), 173-188. Vickerman, R. (2017). Beyond cost-benefit analysis: the search for a comprehensive evaluation of transport investment. Research in Transportation Economics, 63, 5-12. Wegener, M. (2004). Overview of land-use transport models. Handbook of transport geography and spatial systems, 5, 127-146. Wilensky U., (1999), Netlogo, http://ccl.northwestern.edu/netlogo/ Xie, F., & Levinson, D. (2009). Modeling the growth of transportation networks: A comprehensive review. Networks and Spatial Economics, 9(3), 291-307. Zhang, L., & Levinson, D. (2007). The economics of transportation network growth. In Essays on transport economics (pp. 317-339). Physica-Verlag HD. 19
1801.07140
5
1801
2019-05-08T13:41:00
Courtesy as a Means to Coordinate
[ "cs.MA" ]
We investigate the problem of multi-agent coordination under rationality constraints. Specifically, role allocation, task assignment, resource allocation, etc. Inspired by human behavior, we propose a framework (CA^3NONY) that enables fast convergence to efficient and fair allocations based on a simple convention of courtesy. We prove that following such convention induces a strategy which constitutes an $\epsilon$-subgame-perfect equilibrium of the repeated allocation game with discounting. Simulation results highlight the effectiveness of CA^3NONY as compared to state-of-the-art bandit algorithms, since it achieves more than two orders of magnitude faster convergence, higher efficiency, fairness, and average payoff.
cs.MA
cs
Courtesy as a Means to Coordinate Panayiotis Danassis École Polytechnique Fédérale de Lausanne (EPFL) Artificial Intelligence Laboratory Lausanne, Switzerland [email protected] Boi Faltings École Polytechnique Fédérale de Lausanne (EPFL) Artificial Intelligence Laboratory Lausanne, Switzerland [email protected] 9 1 0 2 y a M 8 ] A M . s c [ 5 v 0 4 1 7 0 . 1 0 8 1 : v i X r a ABSTRACT We investigate the problem of multi-agent coordination under ra- tionality constraints. Specifically, role allocation, task assignment, resource allocation, etc. Inspired by human behavior, we propose a framework (CA3NONY) that enables fast convergence to efficient and fair allocations based on a simple convention of courtesy. We prove that following such convention induces a strategy which constitutes an ϵ-subgame-perfect equilibrium of the repeated al- location game with discounting. Simulation results highlight the effectiveness of CA3NONY as compared to state-of-the-art bandit algorithms, since it achieves more than two orders of magnitude faster convergence, higher efficiency, fairness, and average payoff. KEYWORDS [Learning and Adaptation] Multiagent learning; [Economic Paradigms] Noncooperative games: theory & analysis ACM Reference Format: Panayiotis Danassis and Boi Faltings. 2019. Courtesy as a Means to Coor- dinate. In Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 13 -- 17, 2019, IFAAMAS, 9 pages. 1 INTRODUCTION In multi-agent systems (MAS), agents are often called upon to im- plement a joint plan in order to maximize their rewards. Typically, coordination in a joint plan incorporates (possibly a combination of) two distinct elements: agents may be required to take the same action [14, 31], or agents may be required to take distinct actions [13, 19]. The latter is ubiquitous in everyday life, e.g. managing common-pool resources, or deciding on car/ship/airplane routes in traffic management. This paper studies coordination in repeated allocation games. Consider for example the problem of channel allocation in wireless networks [36]. In such a problem, N wireless devices contend for R transmission slots (i.e. particular frequency band in a certain period of time), where N ≫ R. If more than one agent access a slot simultaneously, a collision occurs and the col- liding parties incur a cost ζ < 0. The goal then for the agents is to transmit on different slots to minimize collisions over time. Other scenarios include role allocation (e.g. teammates during a game), task assignment (e.g. employees of a factory), resource allocation (e.g. parking spaces and/or charging stations for autonomous ve- hicles), etc. What follows is applicable to any such scenario. For simplicity hereafter we will refer only to indivisible resources (i.e. Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019, Montreal, Canada. © 2019 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. resources which can not be shared). Beyond the scope of repeated games, the proposed framework can also be applied as a negoti- ation protocol in one-shot interactions. E.g. self-driving vehicles attempting to get a parking space can utilize such a protocol in a simulated environment with message exchange. Conforming to the relevant literature, in what follows we refer to the coordina- tion problem of selecting distinct actions as the anti-coordination problem [9, 13, 16, 19, 23]. The most straightforward solution would be to have a central coordinator with complete information recommend an action to each agent. This, though, would require the agents to communicate their preferences/plans, which creates high overhead and raises incentive compatibility and truthfulness issues. Moreover, in real- world applications with partial observability, agents might not be willing to trust such recommendations. On the other hand, agents can learn to anti-coordinate their actions in a completely decentral- ized manner. However, in a fully decentralized scheme, agents have an incentive to 'bully' others (stick to your action until you drive out the competition) [25], which makes it impossible to converge to solutions that are both efficient and fair. As such, a mechanism is needed that employs some sort of external authority. In this paper, we employ simple monitoring authorities (MA), with the primary goal to keep track of successful accesses. We do not require any planning capabilities by the MAs, nor any knowledge of the plans and preferences of the participants; only the ability to monitor successful accesses on their respective resource. Such MAs already exist naturally in many domains (e.g. the port authority in maritime traffic management [1], or the access point in wireless networks, etc.), and can be easily introduced in the rest (e.g. an agent mon- itoring each charging / parking station, etc.). At the end, agents learn to anti-coordinate their actions in a decentralized manner, while the introduced MAs allow us to impose quotas to the use of resources and punishments upon violating them to align individual incentives with an efficient and fair correlated equilibrium. A second aspect of anti-coordination problems involves conver- gence speed. Inter-agent interactions often need to take place in an ad-hoc fashion. Typical approaches (e.g. Monte Carlo algorithms, Bayesian learning, bandit algorithms, etc.) tend to require too many rounds to converge to be feasible in dynamic environments and real-life applications. Yet, humans are able to routinely coordinate in such an ad-hoc fashion. One key concept that facilitates human ad-hoc (anti-)coordination is the use of conventions [24]. Behavioral conventions are a fundamental part of human societies, yet they have not appeared meaningfully in empirical modeling of MAS. Inspired by human behavior, we propose the adoption of a simple convention of courtesy. Courtesy arises by the social nature of hu- mans. Society demands that an individual should conduct himself in consideration of others. This allows for fast convergence, albeit it is not game theoretically sound; people adhere to it due to social pressure. Such problems become even more severe in situations with scarcity of resources. Under such conditions, courtesy breaks down and in the name of self-preservation people exhibit urgency and competitive behavior [20]. Thus, to satisfy our rationality con- straint (no incentive to deviate for self-interested agents) in an artificial system, we need a deterrent mechanism. In this paper we present a framework (CA3NONY: Contextual Anti-coordination in Ad-hoc Anonymous games) for repeated al- location games with discounting. CA3NONY reproduces courtesy based on the allocation algorithm of [13], and uses monitoring and punishments as a deterrent mechanism. It exhibits fast convergence, and high efficiency and fairness, while relying only on occupancy feedback which facilitates scalability and does not require any inter- agent communication. The main contributions are: • Introduction of an anti-coordination framework (CA3NONY) which consists of a courteous convention and a monitoring scheme. • Proof that under such a framework, the use of the courteous convention induces strategies that constitute an approximate subgame-perfect equilibrium. • Comparison to state-of-the-art bandit algorithms. 2 RELATED WORK In ad-hoc multi-agent (anti-)coordination the goal is to design au- tonomous agents that achieve high flexibility and efficiency in a setting that admits no prior coordination between the participants [33]. Typical scenarios include the use of Monte Carlo algorithms [6], Bayesian learning [2], or bandit algorithms [7, 11]. Tradition- ally, pure ad-hoc approaches suffer from slow learning [15], which makes pure ad-hoc coordination a very ambitious goal for real- life applications. In this paper we propose a middle-ground ap- proach. Inspired by human ad-hoc coordination, we incorporate prior knowledge in the form of simple conventions. The coordination can still be considered ad-hoc as it is not pre-programmed, rather it involves learning. This allows for faster convergence compared to pure ad-hoc approaches. A convention is defined as a customary, expected and self-enforcing behavioral pattern [24, 37]. In MAS, there are two scopes through which we study conventions. First, a convention can be consid- ered as a behavioral rule, designed and agreed upon ahead of time or decided by a central authority [32, 35]. Second, a convention may emerge from within the system itself through repeated inter- actions [26, 35]. The proposed courteous convention falls on the first category. It is incorporated as prior knowledge, and it is self- enforcing since the induced strategies constitute an approximate subgame-perfect equilibrium of the repeated allocation game. An alternative way to model the anti-coordination problem is as a multi-armed bandit (MAB) problem [3]. In MAB problems an agent is given a number of arms and at each time-step has to decide which arm to pull to get the maximum expected reward. Bandit (or no-regret) algorithms typically minimize the total regret of each agent, which is the difference between the expected received payoff and the payoff of the best strategy in hindsight. As such, they sat- isfy our rationality constraint since they constitute an approximate correlated or coarse correlated equilibrium [21, 27, 30]. However, the studied problem presents many challenges: there is no station- ary distribution (adversarial rewards), all agents are able to learn (similar to recursive modeling) which results to a moving-target problem, and yielding gives a reward of 0 (desirable option for minimizing regret, but not in respect to fairness). Moreover, regret minimization does not necessarily lead to payoff maximization [15]. Nevertheless, due to their ability to learn from partial feedback, bandit algorithms constitute the natural choice for a pure ad-hoc approach. The latter motivates our choice to use them as a baseline, since our agents only receive binary feedback of success or failure upon taking their action. Game theoretic equilibria are desirable (since they satisfy the rationality constraint), but hard to obtain. Deciding whether an anti-coordination (anonymous) game has a pure Nash equilibrium (NE) is NP-complete [10]. Furthermore, allocation games often ad- mit undesirable equilibria: pure NE which are efficient but not fair, or mixed-strategy NE which are fair but not efficient [13]. Hence, iterative best-response algorithms are not satisfactory. On the other hand, correlated equilibria (CE) [5] can be both efficient & fair, while from a practical perspective they constitute perhaps the most relevant non-cooperative solution concept [21]. An optimal CE of an anonymous game may be found in polynomial time [29]. More- over, it is possible to achieve a CE without a correlation device (central agent) [18, 21], using the history of the actions taken by the opponents. However, we are interested in information-restrictive learning rules (i.e. completely uncoupled [34]), where each agent is only aware of his own history of action/reward pairs. Such an approach was applied in [13] to design a decentralized algorithm for reaching efficient & fair CE in wireless channel allocation games. Yet, while the algorithm reaches an equilibrium in a polynomial number of steps, cooperation to achieve this state is not rational. A self-interested agent could keep accessing a resource forever, until everyone else backs off (also known as 'bully' strategy [25]). In this paper, we build upon the ideas of Cigler and Faltings and de- velop an anti-coordination strategy that constitutes an approximate subgame-perfect equilibrium, i.e. cooperation with the algorithm is a best-response strategy at each sub-game of the original stage game, given any history of the play. A generalization of anti-coordination games, called dispersion games, was described in [19]. In a dispersion game, agents are able to choose from several actions, favoring the one that was chosen by the smallest number of agents (analogous to minority games [12]). The authors in [19] define a maximal dispersion outcome as an outcome where no agent can switch to an action chosen by fewer agents. The agents themselves do not have any particular preference for the attained equilibrium. Contrary to that, we are interested in achieving an efficient and fair outcome. Besides, in many real world applications, the agents are indifferent to which role/task/resource they attain, as long as they receive one (e.g. wireless frequencies). Tackling dispersion games, and therefore non-binary utilities, remains open for future research. A similar approach to ours was introduced for weighted match- ing in [17]. The authors propose a heuristic which is decentralized, requires only partial feedback, and has constant in the total problem size running time, under reasonable assumptions on the preference domain of the agents. However, it is applicable in cooperative sce- narios, and not in the presence of strategic agents. 3 THE CA3NONY FRAMEWORK 3.1 The Repeated Allocation Game Let a 'resource' be any element that can be successfully assigned to only one agent at a time. At each time-step, N = {1, . . . , N} agents try to access R = {1, . . . , R} identical and indivisible resources, where possibly N ≫ R. The set of available actions is denoted as A = {Y , A1, . . . , AR}, where Y refers to yielding and Ar refers to accessing resource r. We assume that access to a resource is slotted and of equal duration 1. A successful access yields a positive payoff, while no access has a payoff of 0. If more than one agent access a resource simultaneously, a collision occurs and the colliding parties incur a cost ζ < 0. Thus, the agents only receive a binary feedback of success or failure. Let an denote agent n's action, and a−n = ×∀n′∈N\{n}an′ the joint action for the rest of the agents. The payoff function is defined as: un(an, a−n) = if an = Y if an (cid:44) Y ∧ ai (cid:44) an,∀i (cid:44) n 0, 1, ζ , otherwise (1)  We assume that rewards are discounted by δ ∈ (0, 1), and, con- forming to real-world scenarios, that each agent n is only aware of his own history of action/reward pairs. Finally, we assume that the agents can observe side information from their environment at each time-step t. We call this side infor- mation context (e.g. time, date etc.). The agents utilize this context as a common signal in their decision-making process, a means to learn and anti-coordinate their actions. Let K = {1, . . . , K} de- note the context space. The rationale behind the introduction of the common context is that, under completely uncoupled learning rules, having positive probability mass on undesirable actions (e.g. collisions) is unavoidable. Moreover, from a practical perspective, common environmental signals are amply available to the agents [21]. We do not assume any a priori relation between the context space and the problem. The only constraints are that the values should repeat periodically, and satisfy K = ⌈N/R⌉. The context signals could be produced either on the resource side (e.g. by the port authority in maritime traffic management, or the access point in wireless networks), or in a decentralized manner (e.g. in distributed networks with no authorities the senders can attach identifier signals to data traffic [36]). Finally, in situations where communication is possible, the agents can agree upon the signal themselves by solving the distributed consensus problem. 3.2 Adopted Convention The adopted convention is based on the cooperative allocation algorithm of [13]. Each agent n has a strategy дn : K → A that determines a resource to access at time-step t after having observed context kt . The strategy is initialized uniformly at random in A. If дn(kt) = Ar , then agent n accesses resource r. Otherwise, if дn(kt) = Y, the agent does not access a resource but instead chooses uniformly at random a resource r to monitor for activity. If it is free, then the agent updates дn(kt) ← Ar (see Alg. 1). 1This is done to facilitate the proofs. Real world problems have this property anyway (e.g. access to radio channels, role allocation in a plan, etc.), and the algorithms we compare to all work for slotted resources. else Agent n accesses resource r if Collision(r) then Set дn(kt) ← Y with probability pbackof f > 0 Set accessedn ← True Agents observe context kt if дn(kt) = Ar & accessedn = False then Algorithm 1 Learning rule. Require: Initialize дn u.a.r. in A. Set accessedn ← False. 1: for kt ∈ K do 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: end for 17: Set accessedn ← False end if Agent n monitors random resource r ∈ R if Free(r) then else if дn(kt) = Y then Set дn(kt) ← Ar end if end if In [13], agents back-off probabilistically in case of a collision (set дn(kt) ← Y with probability pnbackof f ). In such a setting, it is possible to reach a symmetric subgame-perfect equilibrium. But in order to actually play it, the agents need to be able to calculate it. It is not always possible to obtain the closed form of the back- off probability distribution of each resource. Furthermore, a self- interested agent could stubbornly keep accessing a resource forever, until everyone else backs off ('bully' strategy [25]). Instead, we adopted a simple convention where agents are being courteous, i.e. if there is a collision, the colliding agents will back-off = p > 0,∀n ∈ N. with some constant positive probability: pnbackof f Being courteous, though, does not satisfy the rationality constraint. However, a uniform distribution of resources is socially optimal (i.e. fair allocations maximize the social welfare). Hence, if we introduce quotas to the resources and punishments upon violating them, courtesy induces rational strategies. In the following sections we introduce a monitoring scheme and prove that the resulting strategy constitutes an ϵ-subgame-perfect equilibrium. 3.3 Rationality In order to ensure the proposed convention's rationality, the agents must be assured that they will eventually be successful, i.e. we must provide safeguards against the monopolization of resources. The proposed framework employs simple Monitoring Authorities (MA). The MAs do not require any planning capabilities, nor any knowl- edge of the agents' plans and preferences. Their primary goal is to keep track of successful accesses. Depending on the domain, MAs may already exist naturally, or can easily be introduced. Examples include centralized MAs like the port authority in maritime traf- fic management, or a set of decentralized MAs (one per resource) like the access points in wireless networks, or agents monitoring a charging / parking station. Their function is twofold. First, they could provide occupancy signals. Agents (e.g. CA3NONY , bandit, or Q-learning agents) must be able to receive some form of feed- back from their environment to inform collisions and detect free resources. This could be achieved (if possible) by the use of various sensors, or by receiving occupancy signals (e.g. 0, 1) from the MAs. Second, (which is their principal purpose) MAs deter agents from monopolizing resources to the point that each agent can access a resource only for one context value out of K. To achieve the latter, MAs must be able to keep track of successful accesses. Upon the violation of the imposed quotas, the framework is responsible to enforce the necessary punishments. Punishments are application specific. They can be individual (e.g. in a wireless scenario, if an agent transmits to some other than the designated channel, then his packets will no longer be relayed), or group punishments (e.g. if quotas are exceeded, access is denied for everyone). The imposed punishments make exceeding the quotas an irrational strategy (sim- ulated in Alg. 1 by the accessedn flag), which in turn aligns the individual incentives with an efficient & fair correlated equilibrium. 3.3.1 Access Monitoring. The primary function of the employed MAs is the tracking of successful accesses by the agents. The latter can be achieved in various ways, depending on the domain. The simplest one would be to maintain a log with successful accesses per episode (period of context values), whether we are dealing with a centralized MA or set of decentralized MAs that are able to communicate to ensure coherence. For more involved scenarios (e.g. if we require agent anonymity per access) we may employ more complex schemes, e.g. using tokens, or artificial currency (solely as an internal mechanism). Note that the latter does not fence the resources (i.e. punishments are still required). In what follows, we present such a self-regulated monitoring scheme. Initially all the agents that 'buy-in' are issued the same amount m ∈ R of artificial cash (AC). This amount also corresponds to the initial fee for every resource fr ← m. To allow access to resource r, the MA of r charges fr units of AC, and monitors the event. If there was a successful access, the MA reimburses the amount of (1 − ξ)fr AC to the accessing agent, where ξ → 0 ∈ R is a commission fee. Otherwise, the MA reimburses the full amount of fr AC to the colliding agents, so that they are able to try again for a different context value. Finally, after each episode, the MAs r ← (1 − ξ)fr ,∀r ∈ R. After every successful lower the fee to f ′ access, the amount of AC that an agent possesses drops below the access fee of a resource. Waiting for the fee to drop to the point that fr = m/2 is not rational since, assuming ξ → 0, the number of iterations required to allow accessing two resources at the same time will reach ∞. At that point the rest of the agents will have reached a correlated equilibrium and the adversarial agent will not have an incentive to access an additional resource, besides the one that corresponds to him, since it would result in a collision. If, due to implementation constraints, we can not select a small ξ, the MAs can change the artificial currency every I episodes, invalidating the old one and again making such strategy irrational. 3.4 Rate of convergence Theorem 3.1. In a repeated allocation game with N agents and R resources, the expected number of steps before Alg. 1 converges to a correlated equilibrium is bounded by: (cid:18) (cid:18) (cid:19) (cid:25) (cid:24) N R O N log + 1 (log N + R) (cid:19) (2) 2Slightly tighter bound on the convergence speed of the adopted learning rule, based on Theorems 12 and 13 of [13]. See the appendix for the proof. (cid:18) Proof. The adopted learning rule is based on the allocation algorithm of [13]. For N , R, K ≥ 1, and back-off probability 0 < p < 1, the expected number of steps before the algorithm converges is bounded by (3) 2, which for a constant back-off probability and K = ⌈N/R⌉ gives the required bound. 2 − p 2(1 − p) (K log K + 2K) R log N + R (cid:18) 1 (cid:19)(cid:19) □ Corollary 3.2. Under a common, constant back-off probability assumption, p∗ = 2 − √2 minimizes the convergence time of Alg. 1 in high congestion scenarios, i.e. N ≫ R. (3) O p Proof. According to bound (3), in high congestion scenarios = K → ∞), the common, constant back-off probability that (i.e. N R minimizes the convergence time is: (cid:19) (cid:18) 2 − p 2(1 − p) 1 p ∗ = arg min p = 2 − √ 2 (4) □ 3.5 Courtesy Pays Off In this section we prove that if the agents back-off with a constant positive probability pbackof f > 0, then Alg. 1 induces a strategy that is an ϵ-equilibrium. Suppose that in a repeated allocation game with discounting (δ ∈ (0, 1)) the agents who collide back-off with a constant prob- ability pbackof f > 0. Let σp denote the aforementioned strategy (courteous strategy), and σ∗ denote the optimal (best-response) strategy under the monitoring authorities (possibly better than a n, at−n) denote the cumulative payoff of agent n following strategy σ, as- suming the rest of the agents follow the strategy σ−n. The following theorem proves that starting at any time-step, agent n does not gain more than ϵ by deviating to the optimal strategy σ∗. stage game NE). Moreover, let Un(σ , σ−n, δ) =∞ t =0 δ tun(at p n , σ E[Un(σ Proof. Note that E[Un(σ∗ Theorem 3.3. Under a high enough discount factor, the courteous strategy σp constitutes an approximate subgame-perfect equilibrium, i.e. ∀ϵ > 0, ∃δ0 ∈ (0, 1) such that ∀δ, δ0 ≤ δ < 1: ∗ p−n, δ)] > (1 − ϵ)E[Un(σ n, σ n, σ∗−n, δ)] ≥ E[Un(σ∗ p−n, δ)], since n, σ p−n the rest of the agents can potentially introduce addi- by playing σ p−n, δ)] > tional collisions. Thus, it suffices to prove that E[Un(σ n, σ∗−n, δ)]. (1 − ϵ)E[Un(σ∗ The introduced monitoring scheme prohibits the monopolization of resources, i.e. each agent can only access a resource for his corresponding context value. Thus, the best-response strategy's (σ∗) payoff for some δ is bounded by: p−n, δ)] p n , σ E[Un(σ ∗ n, σ ∗−n, δ)] ≤ 1 + δ K + δ 2K + · · · = δiK = 1 1 − δ K (5) ∞ i =0 When agents adopt the courteous convention, in each round until the system converges to a correlated equilibrium, the agents receive a payoff between ζ < 0 (collision cost) and 1. Thus, until conver- 1−δ τ K gence, the expected payoff is lower bounded by ζ 1−δ K , where τ is the number of steps to converge. After convergence, their expected payoff is 1−δ K . Hence, the convention induced strategy's payoff is at least: δτ +iK = δ τ τ−1 δiK = ζ i =0 i =0 ∞ ∞ τ =1 (cid:18) ζ(1 − δτ K) + δτ (cid:19) 1 − δ K E[Un(σ p n , σ p−n, δ)] ≥ Pr[conv. in τ steps] · We can define a random variable X such that X = τ if the algorithm converges after exactly τ steps. Since δ x is a convex function we have that E(δ x) ≥ δ E(x), therefore: E[Un(σ p n , σ p−n, δ)] ≥ ζ(1 − δ E(X)K) + δ E(X) 1 − δ K By dividing (6) by (5) we get: (6) p n , σ p−n, δ)] E[Un(σ E[Un(σ∗ n, σ∗−n, δ)] ≥ ζ(1 − δ (7) E(X) does not depend on δ. Moreover, δ E(X) is continuous in δ, δ→1−δ E(X) = 1. Thus, we can take the limit of E(X)K) + δ E(X) monotonous, and lim (7) as δ → 1−, which equals to lim δ→1− E[Un(σ p E[Un(σ ∗ n ,σ p−n,δ)] n,σ ∗−n,δ)] = 1 □ In order to guarantee rationality, the discount factor δ must be close to 1 since, as δ gets closer to 1, the agents do not care whether they access now or in some future round. Since the proposed moni- toring scheme guarantees that every agent will access a resource for his corresponding context value, when δ → 1, the expected payoff for agents who are accessing a resource and for those who have not accessed a resource yet will be the same. In other words, the cost (overhead) of learning the correlated equilibrium decreases. 3.6 Indifference Period In many real world applications, agents are indifferent in claiming a resource in a period of Tind rounds, i.e. δt = 1,∀t ≤ Tind. E.g. data of wireless transmitting devices might remain relevant for a specific time-window, during which the agent is indifferent of transmitting. In such cases, we can use the Markov bound to prove that with high probability the proposed algorithm will converge in under Tind time-steps, thus satisfying the rationality constraint. We assume the agents are willing to accept linear 'delay' with regard to the number of resources R, the number of agents N , and the size of the context space K, specifically: Tind = O (RN K) (8) Theorem 3.4. Under a linear indifference period Tind (i.e. δt = 1,∀t ≤ Tind = O (RN K)) the probability of the system of agents following Alg. 1 not having converged during Tind diminishes as the congestion increases ( N R → ∞). (cid:170)(cid:174)(cid:174)(cid:172) □ Proof. Using the Markov bound, it follows that the probability that the system takes more than the accepted number of steps (Tind) to converge is: Pr[¬conv. after Tind] = O(cid:169)(cid:173)(cid:173)(cid:171) (cid:16)log(cid:6) N R (cid:7) + 1(cid:17) (log N + R) N Taking the limit: lim N R →∞Pr[¬conv. after Tind] = 0. Even though the Markov's inequality generally does not give very good bounds when used directly, Th. 3.4 proves that our al- gorithm converges in the required time with high probability. The latter holds under high congestion, which constitutes the more interesting scenario since for small number of agents the required time to converge is only a few hundreds of time-steps. Moreover, the higher the indifference period, the higher the probability to converge under such time-constraint. For quasilinear indifference period for example, the system converges in the required time- window with high probability even for a small number of agents. We can further strengthen our rationality hypothesis by using a tighter bound (e.g. Chebyshev's inequality), albeit computing the theoretical variance of the convergence time is an arduous task, thus it remains open for future work. 4 EVALUATION In this section we model the resource allocation problem as a multi-armed bandit problem and provide simulation results of CA3NONY's performance in comparison to state-of-the-art, well established bandit algorithms, namely the EXP4 [4], EXP4.P [8], and EXP3 [4]. In every case we report the average value over 128 runs of the same simulation. For the EXP family of algorithms, the input parameters are set to their optimal values, as prescribed in the aforementioned publications. We assume a reward of 1 for a successful access, −1 if there is a collision, and 0 if the agent yielded. 4.0.1 Level of Courtesy. We evaluated different back-off prob- abilities (pbackof f ∈ {0.1, 0.25, 2 − √2, 0.75, 0.9}) for R = K ∈ {2, 4, 8, 16} and N = R × K. There was no significant difference in convergence time, but since pbackof f is directly correlated with the number of collisions, it can have significant impact on the average payoff (see Table 1). It is important to note, though, that agents do not have global nor local knowledge of the level of congestion of the system (they only receive binary occupancy feedback for one resource per time-step). Thus, agents can not select the optimal back-off probability depending on congestion. In what follows, the back-off probability of CA3NONY is set to pbackof f = 2 − √2 of Eq. 4, which is only optimal under high congestion settings (i.e. = K → ∞), yet constitutes a safe option. Note that the provided N R theoretical analysis holds for any constant back-off probability. 4.0.2 Bandits & Monitoring. CA3NONY has three meta actions (Access, Yield, and Monitor {A, Y , M}), while bandit algorithms have only two ({A, Y}), and CA3NONY assumes the existence of monitoring authorities (MAs). For fairness' sake in the reported results, we made the following two modifications. First, we include Table 1: Avg. payoff depending on the level of courtesy (back- off probability), K = R, N = R × K. pbackof f 0.1 0.25 2 − √2 0.75 0.9 R = 2 37.6 43.6 45.7 45.5 44.2 R = 4 -4.7 10.0 15.6 15.7 12.5 R = 8 -39.5 -16.9 -5.2 -3.7 -5.8 R = 16 -63.1 -40.0 -23.0 -20.6 -19.4 a variation of CA3NONY , denoted as CA3NONY*, where we as- sume agents incur a cost (equal to collision cost ζ ) every time they monitor a resource (reflected in Table 3). Second, all the employed bandit algorithms make use of the MAs, which indirectly grants them the the ability to monitor resources as well. More specifically, the accumulated payoff is updated only if they are allowed to access a resource. If not, we consider it a monitoring action, which means the agents still receive occupancy feedback. The latter is important, otherwise the bandit algorithms would require significantly longer time to converge. Note that, contrary to CA3NONY*, monitoring is free for bandit algorithms with respect to the accumulated payoff, i.e. they do not incur a collision cost. 4.1 Employed Bandit Algorithms The reward of each arm does not follow a fixed probability distribu- tion (adversarial setting). Moreover, the agents are able to observe side-information (context) at each time-step t. The arm that yields the highest expected reward can be different depending on the con- text. Hence we focus on adversarial contextual bandit algorithms (see [38] for a survey). A typical approach is to use expert advice. In this method we assume a set of experts M = {1, . . . , M} who generate a probability distribution on which arm to pull depending on the context. A no-regret algorithm performs asymptotically as well as the best expert. Such algorithms are the EXP4 and EXP4.P, the difference being that EXP4 exhibits high variance [38], while EXP4.P achieves the same regret with high probability by combining the confidence bounds of UCB1 [3] and EXP4. The computational complexity and memory requirements of the above algorithms are linear in M, making them intractable for large number of experts. In order to deal with the increased complexity in larger simulations, we gave an edge to these algorithms by restricting the set of experts M to the same uniform correlated equilibria (CE) that CA3NONY converges to. The latter enabled us to perform larger simulations (the unrestricted versions could not handle N ≥ 64), while resulting in the same order of magnitude convergence time, slightly higher average payoff, and significantly higher fairness (> 35% since by design the experts proposed fair CE). Alternatively, we can use non-contextual adversarial bandit algorithms, such as the EXP3. Moreover, we can convert EXP3 to a contextual algorithm by set- ting up a separate instance for all k ∈ K. We call this 'CEXP3'. This results in a contextual bandit algorithm which has the edge over EXP4 from an implementation viewpoint since its running time at each time-step is O(R) and its memory requirement is O(KR) (CA3NONY's is O(1) and O(K) respectively). Figure 1: Utilization: R = 4, N = 16 (x-axis in log scale). 4.2 Simulation Results 4.2.1 Convergence Speed & Efficiency. We know that CA3NONY converges to a CE which is efficient. If all agents follow the cour- teous convention of Alg. 1, the system converges to a state where no resources remain un-utilized and there are no collisions (Th. 13 of [13]). Furthermore, Th. 3.1 argues for fast convergence. The former are both corroborated by Fig. 1 (similar results (> ×102 faster convergence) were acquired for R ∈ {2, 8, 16} as well.). Fig. 1 depicts the total utilization of resources for a simulation period of T = 106 time-steps. Note that the x-axis is in logarithmic scale. CA3NONY converges significantly (> ×102) faster than the bandit algorithms to a state of 100% efficiency. On the other hand, the ban- dit algorithms exhibit high variance, never achieve 100% efficiency, and are not able to handle efficiently the increase in context space size and number of resources. 4.2.2 the Jain index is given by J(x) =  Fairness. The usual predicament of efficient equilibria for allocation games is that they assign the resources only to a fixed sub- set of agents, which leads to an unfair result (e.g. an efficient pure NE (PNE) is for R agents to access and N − R agents to yield). This is not the case for CA3NONY , which converges to an equilibrium that is not just efficient but fair as well. Due to the enforced mon- itoring scheme, all agents acquire the same amount of resources. As a measure of fairness, we will use the Jain index [22]. The Jain index is widely used by economists, and exhibits a lot of desirable properties such as: population size independence, continuity, scale and metric independence, and boundedness. For an allocation game th agent receives an allocation of xn, of N agents, such that the n 2 n. An n∈N x allocation is considered fair, iff J(x) = 1, x = (x1, . . . , xN )⊤. Table 2 presents the expected Jain Index of the evaluated algo- rithms at the end of the time horizon T . CA3NONY converges to a fair equilibrium, achieving a Jain index of 1. The EXP4 and EXP4.P were the fairest amongst the bandit algorithms, achieving a Jain index of close to 1. This is to be expected since the set of experts M is limited to the same set of equilibria that CA3NONY converges to. On the other hand, EXP3 and CEXP3 performed considerably worse, with the EXP3 exhibiting the worst performance in terms of fairness, equal to a PNE's: JP N E(x) = R2 n∈N xn2 / N = 1 K = JEX P3(x). N R 4.2.3 Average Payoff. The average payoff corresponds to the total discounted payoff an agent would receive in the time horizon T . Table 3 presents the average payoff for the studied algorithms. The clustered pairs of bandit algorithms exhibited < 1% difference, hence we included the average value of the pair. The discount factor was set to δ = 0.99. At the top half we do not assume any Table 2: Fairness (Jain Index), K = R, N = R × K. CA3NONY EXP3 CEXP3 EXP4 EXP4.P R = 2 1.0000 0.5000 0.7018 1.0000 1.0000 R = 4 1.0000 0.2500 0.5865 0.9999 0.9999 R = 8 1.0000 0.1250 0.5341 0.9959 0.9798 Table 3: Average Payoff, K = R, N = R × K. CA3NONY CA3NONY* (C)EXP3 EXP4(.P) CA3NONY CA3NONY* (C)EXP3 EXP4(.P) R = 2 45.4 20.0 -72.4 -59.0 53.3 23.8 -84.0 -68.4 R = 4 15.7 -22.4 -93.1 -81.0 79.0 -55.5 -331.0 -288.4 R = 8 -5.3 -50.6 -99.8 -90.7 502.5 -1337.1 -4175.7 -3807.1 R = 16 1.0000 0.0625 0.9638 0.9198 0.7503 R = 16 -23.0 -72.6 -100.0 -95.4 4057.5 -26723.9 -60595.1 -62631.5 indifference period, while at the bottom half we assume linear indifference period (δt = 1,∀t ≤ Tind, where Tind is given by Eq. 8). Recall that CA3NONY and the bandit algorithms do not incur any cost for monitoring resources, while CA3NONY* incurs a cost equal to the collision cost ζ . Once more, CA3NONY (and even CA3NONY*) significantly out- performs all the bandit algorithms. The latter have relatively similar performance, with EXP4 and EXP4.P being the best amongst them. It is worth noting that adding an indifference period has a dramatic effect on the results. Comparing CA3NONY to bandit algorithms we observe that CA3NONY achieves a large increase on average payoff, while the opposite happens for the bandit algorithms. This is because the learning rule of Alg. 1 prohibits from accessing an al- ready claimed resource, thus minimizing collisions. On the contrary, bandit algorithms constantly explore (they assign a positive proba- bility mass to every arm) which leads to collisions. In a multi-agent system where every agent learns this can have a cascading effect. The latter becomes apparent when fixing δ = 1 for Tind steps. The collision cost remains high for longer which, as seen by Table 3, has a significant impact on the bandit algorithms' performance. 4.2.4 Large Scale Systems. The innovation of CA3NONY stems from the adoption of a simple convention, which allows its applica- bility to large scale MAS. To evaluate the latter, Fig. 2 and 3 depict the convergence time for increasing number of resources R, and increasing system congestion ( N = K) respectively. Both graphs R are in a double logarithmic scale, and the error bars represent one standard deviation of uncertainty. The total number of agents is given by N = R × K. Thus, the largest simulations involve 16.384 agents. Along with CA3NONY, we depict the fastest (based on the previous simulations) of the bandit algorithms, namely EXP3. In both cases we acquire ×103 − ×105 faster convergence. The above validate CA3NONY's performance in both scenarios with abun- dance (N ≈ R or small K), and scarcity of resources (N ≫ R or large K). As depicted, CA3NONY is significantly faster than the Figure 2: Convergence time: increasing #resources R, vary- ing context space size K, N = R × K (double log scale). Figure 3: Convergence time: increasing congestion ( N R varying #resources R, N = R × K (double log scale). = K), EXP3 and can gracefully handle increasing number of resources, and high congestion. Finally note that, in several of the simulations, EXP3 was unable to reach its convergence goal of 90% efficiency (utilization of resources) in a reasonable amount of computation time (1.5× 108 time-steps), hence the resulting gaps in EXP3's lines in Fig. 2 and 3. Especially in situations with scarcity of resources the utilization was significantly lower. 5 CONCLUSION In this paper we proposed CA3NONY, an anti-coordination frame- work under rationality constraints. It is based on a simple, human- inspired convention of courtesy which prescribes a positive back- off probability in case of a collision. Coupled with a monitoring scheme which deters the monopolization of resources, we proved that the induced strategy constitutes an ϵ-subgame-perfect equilib- rium. We compared CA3NONY to state-of-the-art bandit algorithms, namely EXP3, EXP4, and EXP4.P. Simulation results demonstrated that CA3NONY outperforms these algorithms by achieving more than two orders of magnitude faster convergence, a fair allocation, and higher average payoff. The aforementioned gains suggest that human-inspired conventions may prove beneficial in other ad-hoc coordination scenarios as well. A APPENDIX A.1 Proof of Bound (3) In this section we provide a formal proof of bound (3). The proof is an adaptation of the convergence proof of [13]. We will prove the following theorem: Theorem A.1. For N agents and R ≥ 1, K ≥ 1, 0 < p < 1 the expected number of steps before the learning algorithm converges to an efficient correlated equilibrium of the allocation game for every k ∈ K is O(cid:16)(K log K + 2K) R + 1(cid:17) (cid:17) log N + R . (cid:16) 1 p 2−p 2(1−p) We begin with the case of having multiple agents but only a sin- gle resource (R = 1). We will describe the execution of the proposed learning rule as a discrete time Markov chain (DTMC) 3. In every time-step, each agent performs a Bernoulli trial with probability of 'success' 1 − p (remain in the competition), and failure p (back- off). When N agents compete for a single resource, a state of the system is a vector {0, 1}N denoting the individual agents that still compete for that resource. But, since the back-off probability is the same for everyone, we are only interested in how many agents are competing and not which ones. Thus, in the single resource case (R = 1), we can describe the execution of the proposed algorithm using the following chain: Definition A.2. Let {Xt }t ≥0 be a DTMC on state space S = {0, 1, . . . , N} denoting the number of agents still competing for the resource. The transition probabilities are as follows: Pr(Xt +1 = N Xt = 0) = 1 Pr(Xt +1 = 1Xt = 1) = 1 Pr(Xt +1 = j Xt = i) = (cid:18)i (cid:19) j restart absorbing i > 1, j ≤ i pi−j(1 − p)j (all the other transition probabilities are zero) Intuitively, this Markov chain describes the number of individ- uals in a decreasing population, but with two caveats: The goal (absorbing state) is to reach a point where only one individual remains, and if we reach zero, we restart. Lemma A.3. [13] Let A = {0, 1}. The expected hitting time of the set of states A in the Markov chain described in Definition A.2 is O(cid:16) 1 (cid:17) log N . p Definition A.4. Let {Yt }t ≥0 be a DTMC on state space S = {0, 1, . . . , N} with the following transition probabilities (two ab- sorbing states, 0 and 1): Pr(Yt +1 = 0Yt = 0) = 1 Pr(Yt +1 = 1Yt = 1) = 1 Pr(Yt +1 = j Yt = i) = (cid:18)i j (cid:19) pi−j(1 − p)j absorbing absorbing i > 1, j ≤ i (all the other transition probabilities are zero) Let hA i denote the hitting probability of a set of states A, starting from state i. We will prove the following lemma. Lemma A.5. The hitting probability of the absorbing state {1}, starting from any state i ≥ 1, of the DTMC {Yt } of Definition A.4 is given by Eq. 9. This is a tight lower bound. (9) (cid:18) 2(1 − p) (cid:19) 2 − p {1} i h = Ω , ∀i ≥ 1 {1} i ∆= h Proof. For simplicity we denote hi for p ∈ (0, 1), hi ≥ λ = 3For an introduction on Markov chains see [28] . We will show that 2−p ,∀i ≥ 1 using induction. First note 2(1−p) that since state {0} is an absorbing state, h0 = 0, h1 = 1 ≥ λ and that λ ∈ (0, 1). for a set of states A is the minimal non-negative solution to the system of linear equations 10: The vector of hitting probabilities hA = (hA i : i ∈ S = {0, 1, . . . , N}) =  = 1, j∈S i hA i hA i = 1, = j =0 hA i hA i if i ∈ A if i (cid:60) A pi jhA j , (10) By replacing pij with the probabilities of Definition A.4, the system of equations 10 becomes: (cid:0)i j (cid:1)pi−j(1 − p)jhA j , if i ∈ A if i (cid:60) A (11) Base case: (cid:18)i i−1 (cid:18)i i−1 j =2 j (cid:19) (cid:19) 2p(1 − p) 1 − (1 − p)2 = 2(1 − p) 2 − p h2 = (1 − p)2h2 + 2p(1 − p)h1 + p2h0 = ≥ λ Inductive step: We assume that ∀j ≤ i − 1 ⇒ hj ≥ λ. We will prove that hi ≥ λ,∀i > 2. (cid:19) hi = pi−j(1 − p)jhj i (cid:18)i j j =0 = pi h0 + ipi−1(1 − p)h1 + pi−j(1 − p)jhj + (1 − p)i hi ≥ pi h0 + ipi−1(1 − p)h1 + = ipi−1(1 − p) + [1 − pi − (1 − p)i − ipi−1(1 − p)]λ + (1 − p)i hi pi−j(1 − p)j λ + (1 − p)i hi j =2 j ⇒ hi = λ − pi 1 − (1 − p)i λ + ipi−1(1 − p) 1 − (1 − p)i (1 − λ) We want to prove that hi ≥ λ: pi ipi−1(1 − p) 1 − (1 − p)i (1 − λ) ≥ 1 − (1 − p)i λ ⇒ ipi−1(1 − p) + pi − pi ≥ λ ⇒ pi + ipi−1(1 − p) pi + ipi−1(1 − p) ≥ 2(1 − p) 1 − 2 − p pi + ipi−1(1 − p) ≤ p ⇒ 2 − p ⇒ pi pi pi(2 − p) ≤ p[pi + ipi−1(1 − p)] ⇒ 2 − 2p − i + ip ≤ 0 ⇒ 2 − i − p(2 − i) ≤ 0 ⇒ (2 − i)(1 − p) ≤ 0 ⇒ 2 − i ≤ 0 which holds since i > 2. The above bound is also tight since ∃i ∈ S : hi = λ, specifically h2 = λ. □ Plugging the above hitting probability bound to the convergence proof of [13], results on the required bound. REFERENCES [1] Lucas Agussurja, Akshat Kumar, and Hoong Chuin Lau. 2018. Resource- Constrained Scheduling for Maritime Traffic Management. https://www.aaai. org/ocs/index.php/AAAI/AAAI18/paper/view/17116 [2] Stefano V Albrecht, Jacob W Crandall, and Subramanian Ramamoorthy. 2016. Belief and truth in hypothesised behaviours. Artificial Intelligence 235 (2016), 63 -- 94. [3] Peter Auer, Nicolò Cesa-Bianchi, and Paul Fischer. 2002. Finite-time Analysis of the Multiarmed Bandit Problem. Machine Learning 47, 2 (2002), 235 -- 256. https://doi.org/10.1023/A:1013689704352 [4] Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. 2002. The nonstochastic multiarmed bandit problem. SIAM journal on computing 32, 1 (2002), 48 -- 77. [5] Robert J. Aumann. 1974. Subjectivity and correlation in randomized strategies. Journal of Mathematical Economics 1, 1 (1974), 67 -- 96. https://doi.org/10.1016/ 0304-4068(74)90037-8 [6] Samuel Barrett, Avi Rosenfeld, Sarit Kraus, and Peter Stone. 2017. Making friends on the fly: Cooperating with new teammates. Artificial Intelligence 242 (2017), 132 -- 171. [7] Samuel Barrett and Peter Stone. 2011. Ad hoc teamwork modeled with multi- armed bandits: An extension to discounted infinite rewards. In Proceedings of 2011 AAMAS Workshop on Adaptive and Learning Agents. 9 -- 14. [8] Alina Beygelzimer, John Langford, Lihong Li, Lev Reyzin, and Robert Schapire. 2011. Contextual bandit algorithms with supervised learning guarantees. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. 19 -- 26. [9] Yann Bramoullé, Dunia López-Pintado, Sanjeev Goyal, and Fernando Vega- Redondo. 2004. Network formation and anti-coordination games. International Journal of Game Theory 33, 1 (2004), 1 -- 19. [10] Felix Brandt, Felix Fischer, and Markus Holzer. 2009. Symmetries and the Com- plexity of Pure Nash Equilibrium. J. Comput. Syst. Sci. 75, 3 (May 2009), 163 -- 177. https://doi.org/10.1016/j.jcss.2008.09.001 [11] Mithun Chakraborty, Kai Yee Phoebe Chua, Sanmay Das, and Brendan Juba. 2017. Coordinated Versus Decentralized Exploration In Multi-Agent Multi-Armed Bandits. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI-17. 164 -- 170. https://doi.org/10.24963/ijcai.2017/24 [12] Damien Challet, Matteo Marsili, Yi-Cheng Zhang, et al. 2013. Minority games: interacting agents in financial markets. OUP Catalogue (2013). [13] Ludek Cigler and Boi Faltings. 2013. Decentralized anti-coordination through multi-agent learning. Journal of Artificial Intelligence Research 47 (2013), 441 -- 473. [14] Russell Cooper. 1999. Coordination Games. Cambridge University Press. https: //doi.org/10.1017/CBO9780511609428 [15] Jacob W Crandall. 2014. Towards minimizing disappointment in repeated games. Journal of Artificial Intelligence Research 49 (2014), 111 -- 142. [16] Panayiotis Danassis and Boi Faltings. 2018. Learning in Ad-hoc Anti-coordination Scenarios. AAAI Spring Symposium Series (2018). https://www.aaai.org/ocs/ index.php/SSS/SSS18/paper/view/17485 [17] Panayiotis Danassis, Aris Filos-Ratsikas, and Boi Faltings. 2019. Anytime Heuris- tic for Weighted Matching Through Altruism-Inspired Behavior. arXiv:1902.09359 (2019). https://arxiv.org/abs/1902.09359 [18] Dean P Foster and Rakesh V Vohra. 1997. Calibrated learning and correlated equilibrium. Games and Economic Behavior 21, 1-2 (1997), 40. [19] Trond Grenager, Rob Powers, and Yoav Shoham. 2002. Dispersion games: general definitions and some specific learning results. In AAAI/IAAI. 398 -- 403. [20] Shipra Gupta and James W. Gentry. 2016. The behavioral responses to perceived scarcity âĂŞ the case of fast fashion. The International Review of Retail, Distribution and Consumer Research 26, 3 (2016), 260 -- 271. https://doi.org/10.1080/09593969. 2016.1147476 arXiv:https://doi.org/10.1080/09593969.2016.1147476 [21] Sergiu Hart and Andreu Mas-Colell. 2000. A simple adaptive procedure leading to correlated equilibrium. Econometrica 68, 5 (2000), 1127 -- 1150. [22] Raj Jain, Dah-Ming Chiu, and W. Hawe. 1998. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems. CoRR cs.NI/9809099 (1998). http://arxiv.org/abs/cs.NI/9809099 [23] Jeremy Kun, Brian Powers, and Lev Reyzin. 2013. Anti-coordination games and stable graph colorings. In International Symposium on Algorithmic Game Theory. Springer, 122 -- 133. [24] David Lewis. 2008. Convention: A philosophical study. John Wiley & Sons. [25] Michael L. Littman and Peter Stone. 2002. Implicit Negotiation in Repeated Games. Springer Berlin Heidelberg, Berlin, Heidelberg, 393 -- 404. https://doi.org/10.1007/ 3-540-45448-9_29 [26] Mihail Mihaylov, Karl Tuyls, and Ann Nowé. 2014. A decentralized approach for convention emergence in multi-agent systems. Autonomous Agents and Multi-Agent Systems 28, 5 (2014), 749 -- 778. [27] Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V Vazirani. 2007. Algo- rithmic game theory. Vol. 1. Cambridge University Press Cambridge. [28] James R Norris. 1998. Markov chains. Number 2. Cambridge university press. [29] Christos H. Papadimitriou and Tim Roughgarden. 2008. Computing Correlated Equilibria in Multi-player Games. J. ACM 55, 3, Article 14 (Aug. 2008), 29 pages. https://doi.org/10.1145/1379759.1379762 [30] Tim Roughgarden. 2016. Twenty Lectures on Algorithmic Game Theory (1st ed.). [31] Thomas C Schelling. 1960. The strategy of conflict. Cambridge, Mass (1960). [32] Yoav Shoham and Moshe Tennenholtz. 1995. On social laws for artificial agent societies: off-line design. Artificial Intelligence 73, 1 (1995), 231 -- 252. https: //doi.org/10.1016/0004-3702(94)00007-N Computational Research on Interaction and Agency, Part 2. Cambridge University Press, New York, NY, USA. [33] Peter Stone, Gal A. Kaminka, Sarit Kraus, and Jeffrey S. Rosenschein. 2010. Ad Hoc Autonomous Agent Teams: Collaboration without Pre-Coordination. In Proceedings of the Twenty-Fourth Conference on Artificial Intelligence. [34] Mohammad Sadegh Talebi. 2013. Uncoupled Learning Rules for Seeking Equilibria in Repeated Plays: An Overview. CoRR abs/1310.5660 (2013). http://arxiv.org/ abs/1310.5660 [35] A. Walker and M. J. Wooldridge. 1995. Understanding the Emergence of Conven- tions in Multi-Agent Systems. In ICMAS95. San Francisco, CA, 384 -- 389. http: //groups.lis.illinois.edu/amag/langev/paper/walker95understandingThe.html [36] L. Wang, K. Wu, M. Hamdi, and L. M. Ni. 2013. Attachment-Learning for Multi- Channel Allocation in Distributed OFDMA-Based Networks. IEEE Transactions on Wireless Communications 12, 4 (April 2013), 1712 -- 1721. https://doi.org/10. 1109/TWC.2013.022013.120627 [37] H Peyton Young. 1996. The economics of convention. The Journal of Economic [38] Li Zhou. 2015. A survey on contextual multi-armed bandits. arXiv preprint Perspectives 10, 2 (1996), 105 -- 122. arXiv:1508.03326 (2015).
1912.01629
1
1912
2019-12-03T19:03:57
A Simulation Model for Pedestrian Crowd Evacuation Based on Various AI Techniques
[ "cs.MA", "cs.AI", "physics.soc-ph" ]
This paper attempts to design an intelligent simulation model for pedestrian crowd evacuation. For this purpose, the cellular automata(CA) was fully integrated with fuzzy logic, the kth nearest neighbors (KNN), and some statistical equations. In this model, each pedestrian was assigned a specific speed, according to his/her physical, biological and emotional features. The emergency behavior and evacuation efficiency of each pedestrian were evaluated by coupling his or her speed with various elements, such as environment, pedestrian distribution and familiarity with the exits. These elements all have great impacts on the evacuation process. Several experiments were carried out to verify the performance of the model in different emergency scenarios. The results show that the proposed model can predict the evacuation time and emergency behavior in various types of building interiors and pedestrian distributions. The research provides a good reference to the design of building evacuation systems.
cs.MA
cs
Cite as: Muhammed, D.A., Saeed, S.A.M., Rashid, T.A. (2019). A simulation model for pedestrian crowd evacuation based on various AI techniques. Revue d'Intelligence Artificielle, Vol. 33, No. 4, pp. 283-292. https://doi.org/10.18280/ria.330404 A Simulation Model for Pedestrian Crowd Evacuation Based on Various AI Techniques Danial A. Muhammed1*, Soran A.M. Saeed2, Tarik A. Rashid3 1 Computer Department, College of Science, University of Sulaimani, Sulaymaniyah 46001, Kurdistan, Iraq 2 Sulaimania Polytechnic University, Sulaymaniyah 46001, Kurdistan, Iraq 3 Computer Science and Engineering, University of Kurdistan Hewler, Erbil 44001, Kurdistan, Iraq Corresponding Author Email: [email protected] Keywords: computational evacuation models, modeling, participants' emergency behavior, evacuation time, environment, engineering applications simulation, ABSTRACT This paper attempts to design an intelligent simulation model for pedestrian crowd evacuation. For this purpose, the cellular automata (CA) was fully integrated with fuzzy logic, the kth nearest neighbors (KNN), and some statistical equations. In this model, each pedestrian was assigned a specific speed, according to his/her physical, biological and emotional features. The emergency behavior and evacuation efficiency of each pedestrian were evaluated by coupling his/her speed with various elements, such as environment, pedestrian distribution and familiarity with the exits. These elements all have great impacts on the evacuation process. Several experiments were carried out to verify the performance of the model in different emergency scenarios. The results show that the proposed model can predict the evacuation time and emergency behavior in various types of building interiors and pedestrian distributions. The research provides a good reference to the design of building evacuation systems. 1. INTRODUCTION related to it such as protective, preventive, the physical movement of evacuees; Occurring emergencies in big places makes the evacuation operation difficult due to adding confusion, fear and even vagueness and anxiety to mass residents [1]. Constructed environment, evacuees' communication, and the plans and measures in place to direct the reactions of participants to environmental conditions and characteristics can influence the evacuation system. Therefore, various evacuation methods appear, rescue, and reconstructive evacuations [2]. The problem of evacuation is not solely is multifaceted and the physical and social circumstances, such as the high possibility for hazard, great stage of pressure, and inadequate data. These circumstances illustrate robust communication between environment, danger, egress process, population demographics, and participant behavior [3]. A crowd is a communication of a set of people [4]. Various features belong to crowds; therefore, during an emergency, a number of behaviors would be exposed in community areas [5], and simulation is a means of expecting behaviors via responding to the "what-if" situations [6]. Hence, Crowd evacuation simulation is a method for mimicking the flow of participants for the same goal of evacuation from the same place [4]. In the last two decades, rising dedicated attempts via researchers clearly have been seen to explore crowd evacuation during an emergency. Evacuation dynamics have been widely considered to eliminate deaths and injuries during emergency pedestrian incidences [7-13]. A vast number of models is developed to know individual behaviors, such as how individual react a specific condition and how to deal with varied kind of scenarios in the crowd during an emergency; the entire investigations have been there for creating a foundation of enhancement in managing emergencies [14-20]. Modeling is a way of answering difficulties, thus, a newly developed framework after analyzing and controlling via basic pro-test shows the authenticity of its procedures to be mentioned as a model [4]. Existing models can be separated into three main groups: the first one is classical models, the second one is hybridized models, and the third one is a generic model. Each group comprises some models, the recent past; various applications to investigate crowd evacuation in both normal and emergency situations were done due to these models. in individuals and Microscopic is one of the classical models and the details of the individual behaviors are precisely identified. However, it has a problem in dealing with the large size of participants. In microscopic, cellular automata, lattice gas, social force, agent-based, game theory, and experimental approaches were designed. In the last two decades, cellular automata models have been created to consider an evacuating group of individuals under different circumstances. These models can be categorized into two groups. The first depends on the associations among situations and pedestrians. For example, in 2007, Varas et al. utilized a two-dimensional cellular automaton model to imitate the process of leaving from a single and double door classroom with complete ability. In this study, to each grid, the structure of the room, obstructions spreading, floor field were measured. Moreover, the effect of panic as a counted dimension was calculated which % 5 possibilities of not moving. The model applied random selection to cope with the collision issue. Therefore, the proposed model changed into non-deterministic via these characteristics. From the simulation result, it was clearly observed that the best locations of the door and evacuation efficiency were not enhanced by substituting a double door with two distinct doors. Finally, for the evacuation time, a number of persons and way out width were considered due to 283 suggesting simple scaling law [21]. In 2011, Alizadeh proposed a CA model to analyze process of evacuation in a room contained obstructions and had different configuration of the room, such as exit and obstruction locations, width of the exit, light of the area, evacuee's psychology, and spreading of the crowd, which had a significant impact on the evacuation process. The case study of this model was the restaurant and a classroom. The impact of the distribution of the evacuees, location, and width of the door on time of the evacuation argued and output of the model was com-pared with some static models [22]. In 2014, Guo, Ren-Yong created a model based on CA with better separation of the area and advanced speed of walking to demonstrate moving away of pedestrians from a room with a single exit door. When experiments were simulated, near the exit they noticed the shape of the crowd was affected by both the separation of the area and advanced speed of walking, duration of the individuals at various positions, and efficiency of the evacuees expressed via two-time indicators. Besides, the association between width and flow of the exit was expressed via this model [23]. In 2015, Li and Han recommended a model for simulating pedestrian evacuation based on extended cellular automata to configure different behavioral propensities in people. Familiarity and aggressive were the two chosen behavioral propensities to be examined via this model. During the experimentations of this simulation, behavioral parameters and pedestrian flow arrangements were verified. The output of this study demonstrated that evacuation time de-creases with increasing individuals' familiarity and increases with the increasing individuals' aggressiveness. Thus, it is clearly seen that the best evacuation was based on the familiarity of the individual with avoiding aggressive behavior [24]. In 2018, Kontou et al. created a model of crowd evacuation based on cellular automata (CA) parallel computing tool to simulate and evaluate behaviors and distinct characteristics of the people within the area of evacuation, which comprises disable people. A secondary school in the region of Xanthi, which contained disable children, was chosen for the simulation process. With noticing and existing earthquake, the school controlled safety exercise; the overall time of the evacuation was recorded. Finally, the proposed model via the empirical data authenticated and there was a convenience inference to the special area [25]. Table 1 shows information for future use. The main goals of this paper are: 1) Collecting most of the research works related to various applications applied to pedestrian evacuation using a cellular automata approach in the microscopic classical model. 2) Investigating features, techniques, and implications of the different applications. 3) Learning from 1 and 2 to make a decision to design a new intelligent and reliable model to simulate participants' appearing emergency behaviors and evacuation efficiency during an emergency evacuation. The model is designed based on an amalgamation of cellular automata, fuzzy logic technique, KNN algorithm, and some statistical equations. Consequently, this paper provides details and specifics in the area of pedestrian evacuation and provides opportunities to the researchers to reach the related information easily and determine their future research directions. This research study's contributions are: 1) Utilizing participants' physical, biological, and emotional elements to apply different speeds for each participant. 2) Incorporating the speed with different elements, such as environment, 284 participants' distributions, and familiarity of the participant to the exit doors to the evacuation model to improve their appearing emergency behaviors and evacuation efficiency. The remainder of this paper is organized as follows: Section 2 presents the research method. Section 3 shows the result and analysis of the simulations. Finally, Section 4 concludes the main points and suggests future research studies. 2. RESEARCH METHOD The following structure, which is presented in Figure 1 define subsections of the suggested framework of pedestrian evacuation through the first floor during the existing emergency to record each of the pedestrian evacuation time and emergency behaviors. Figure 1. Proposed model methodology framework 2.1 Gathering data involved The methodology of our framework started with gathering data. Essentially, different procedures are in gathering data. It is obvious direct observing of the situations appears within the evacuation process is vital to acquire reliable data for different forms of environments. However, due to difficulty in performing this method, new methods were applied, such as applying a general database to hold whole parameters' values with lacking information about provided agents [26]. In the crowd evacuation, the interior of the building plays a great role, besides; there isn't sufficient investigation for influences of the geometry inside the researches [27]. During the evacuation, obstructions' locations and size of the area have a great role [28]. Gathering data for our model is done via two common approaches; interviewing and questionnaire. In the interviewing, the participants faced some physical, biological, and emotional properties structured questions. Also, they asked a number of dichotomous questions of the type of closed-ended questions. 2.2 Gathered data specification The collected data consists of 81 participants 35 males and 46 females. Furthermore, age and weight for the male participants were 18 to 50 years old and 68 to 95 k/g. Age and weight for the female participants were 18 to 43 years old and 57 to 83 k/g. This part of the gathering data utilized in defining the agent's speed while the second part of the collecting data was via the questionnaire was utilized in implementing the agent's behaviors, such as failing, waiting, helping, jumping, and others. Results of the 81 participants for the first part and second part with their analyzing results were briefed in Tables 2 and 3. The percentage value in tables 2 and 3 represents the number of people with the behaviour over the number of participants, for example, in Table 2, the wait behaviour is 20, which means 20 people are waiting and the number of participants is 35, thus, 20/35 = %57.14. Table 1. Highlighting the CA method and its features, techniques, and implications of current simulation models References Methods models occupants State of simulation Investigated occurrences and behaviors Cellular Automata Model Applications Homogenous Microscopic Emergency Effect of obstacles Emergency Impact of distribution of the evacuees, location, and width of the door on time of the evacuation argued The shape of the crowd, duration of the individuals at various positions, the Normal efficiency of the evacuees expressed via Heterogeneous Normal two-time indicators, the association between width and flow of the exit Familiarity and aggressive, evacuation time Emergency Disable children, evacuation time proposed New Model Microscopic heterogeneous Emergency Determining heterogeneous speed to evacuees based on their properties, effect of environment, evacuees distribution, number of room exit doors and main exit doors, and familiarity of evacuees to the exit door on evacuation time and appeared emergency behaviors within the evacuation process Type of models Classical Models CAM CAM [21] [22] [23] CAM [24] [25] CAM CAM proposed model proposed model CA (combined with the idea of fuzzy logic technique, KNN algorithm, and some statistical equations) Table 2. Questionnaire of 81 participants for their behaviors during an emergency evacuation Gender Male Female Number of participants 35 46 Behaviors during an emergency evacuation Wait 20 (%57.14) 18 (%39.13) Aside 24 (%68.57) 40 (%86.96) Jump over 13 (%37.14) 5 (%10.86) Help Wai to fail the person 10 (%28.57) 3 (%6.52) 18 (%51.43) 6 (%13.04) Table 3. Interview of 81 participants' for their physical biological and emotional properties Physical and Biological Properties Gender Number of participants Male 35 Age(yrs.) Weight(kg) 65 -- 95 18 -- 50 Female 46 18 -- 43 57 -- 83 Levels V. Low Low Medium High V. High V. Low Low Medium High V. High Disease 25 (%71.43) 5 (%14.29) 2 (%5.71) 2 (%5.71) 1 (%2.86) 35 (%76.09) 5 (%10.87) 3 (%6.52) 2 (%4.35) 1 (%2.17) Emotional Properties Shock Collaboration 18 (%51.43) 8 (%22.86) 4 (%11.43) 3 (%8.57) 2 (%5.71) 5 (%10.87) 5 (%10.87) 18 (%39.13) 15 (%32.61) 3 (%6.52) 26 (%74.29) 5 (%14.29) 2 (%5.71) 1 (%2.86) 1 (%2.86) 21 (%45.65) 13 (%28.26) 7 (%15.22) 3 (%6.52) 2 (%4.35) 2.3 Layout of the first floor First floor layout for our presented framework was the first floor of one of the institutes' in Sulaimaniyah city in the Kurdistan region of Iraq, which was a polytechnic institute. The first floor of this building contains a cafeteria, which different people visit this part of the building such as, employees, students, visitors, and cafeteria staff with various health, weight, age, and different response or behavior throughout the emergency case. Inside the first floor, 540m2 is provided, for the cafeteria with a width of 36 meters and length 15 meters. This area is partitioned into three different subareas; students' area, employees' area, and kitchen and services areas. The area of employees is 10 meters width and 15 meters length, 285 inside the employees' area there are 6 tables, and one exit doors with 2.5 meters width. The area of students is 17 meters width and 15 meters length, inside the students' area, there are 8 tables and two exit doors with 2.5 meters width for each. Area of kitchen and services is 9 meters width and 15 meters length; this part contains some components for cooking, refrigerator, and cooler and it has two exit doors with 2 meters width, one is on the students' area and the other one from the back end of the area. Figure 2 illustrates the outline of a part of the first-floor polytechnic institute building. 2.4 Structure of the model A structure is designed for this framework and within the design, different characteristics, such as environment, individuals, group behaviors, and emergencies are mentioned. For the first characteristic, the size of the area, the boundary of the floor, the size of the exit doors with their locations, and obstacles are determined. For the second characteristic, agent position, group behaviors such as fail, wait, help, and jump is determined and individual proper-ties such as age, weight, gender, and others are specified to define various speeds of agents. Furthermore, the third characteristic is emergency situations such as fire, smoke, and others are mentioned and participated in defining agents speed with the individual properties these determinations, environment components, agent speed, and behavior patterns together are employed to execute the evacuation process and then evacuation time and various appeared behaviors of each agent during the evacuation process would be recorded. Figure 3 shows the structure of the presented model. second characteristic. After in the Figure 2. Illustrate the outline of a part of first-floor polytechnic university's precedency building Figure 3. Illustrates the proposed model structure 2.5 Definition of the model In the definition of this framework, we demonstrate the individuals, individuals' behaviors, case study's geometry, and spreading of individuals throughout the geometry. This framework for the pedestrian evacuation during emergency built based on cellular automata (CA) approach, which is one of the approaches of the microscopic classical model, and combining it with the idea of fuzzy logic technique, some statistical equations, and K-Nearest Neighbor (KNN) algorithm. This floor is divided into grids, while the CA method has many characteristics such as discrete, continues, and dynamic [7]. Size of each cell set with 0.5*0.5m2. Naturally, each cell might or might not be available due to the individual, exit doors, walls or obstacles. A two-dimensional array with the dimensions of the floor is used to separate the area into grids. Inside this framework, males and females with various properties, for instance, emotional, biological, and individuals. Different components physical properties are applied. Spreading of individuals within this floor of the case study inside this framework is either randomly or manually. Expressing an emergency in this study is not visible for the agents through the evacuation, but it is due to a coefficient, which puts an impact on the speed of the to construct this framework, such as individuals with yellow color, obstacles with gray color, and exit doors with dark blue color, rooms' wall with pink color, and main walls with the cyan color, which determine the area of the evacuation. Figure 4 (a) illuminates various implemented components inside the proposed framework. Individuals can move with 8 directions to evacuate the building. Figure 4 (b) is an individuals' movement with 8 directions. implemented During the evacuation process, individuals evacuate with determined speed and due to the strike with other individual dilation occurs for some while. In this framework, some behavior is implemented, for instance, when an individual 286 reaches an obstacle, distance from both ends of the obstacle would be checked by the individual, and then decides to pass the obstacle from the nearest one. Figure 4 (c) is the participant's behavior when faced with an obstacle. Colliding individuals in this framework causes to collider to make a decision to go to another empty location and pass the other collider or wait to the other collider to move from the occupied location. For the passing situation, the framework changes the individual's color from yellow into light green, while for the waiting situation the framework changes color from yellow into dark green. Figure 4 (d) is the participant's behavior when faced with other participants. Figure 4. Model definition: (a) various implemented components inside the proposed framework, (b) Individuals' movement with 8 directions, (c) participant's behavior when a faced obstacle, (d) participant's behavior when faced other participants Figure 5. Model definition: (a) Age membership function, (b) Weight membership function, (c) Disease, shock, collaborate membership function, (d) Speed membership function 2.6 Participant speed determination Inside this framework, determination of individual speed with considering the mentioned individual properties such as physical, biological, and emotional was due to taking benefits from the idea of fuzzy logic technique. By means of accepting 287 the fuzzy logic idea to the fuzziness of each parameter, this framework reaches a realistic solution. Many-valued logic is the output of reality, which managed in fuzzy logic [29]. This framework is designed based on the fuzzy logic idea, thus it examines the individual properties that found from the gathered data and creates fuzzy linguistic variables represent the qualities spanning a particular range. For example, disease {very low, low, medium, high, very high}, weight {very slim, slim, heavy, very heavy}, age {adult, very young, young, old, very old}, collaboration {very low, low, medium, high, very high} and shock {very low, low, medium, high, very high}. Then the framework creates a membership in each assortment. Figures 5 (a, b, c, d) present the membership functions of the age, weight, disease, shock, collaborate separately. The following example clarifies how evacuees speed is determined in our model: After collecting and analyzing individual properties, the designed membership functions (See Figures 5 (b), 5 (c), 5 (d) and 7) are applied to identify the degree of the properties of an individual with its speed range. The degree comprises of two values; lower value and upper value, and then weighted mean equation (See Eq. (1)) is used to work on these values [30]. 𝑤𝑒𝑖𝑔ℎ𝑡𝑝𝑟𝑜𝑝 = 𝑛 ∑ 𝑖=1 𝑝𝑤𝑖∗𝑠𝑟𝑑𝑖 (1) ∑ 𝑛 𝑖=1 𝑝𝑤𝑖 𝑝𝑤𝑖 is the degree of the given property's weight and 𝑠𝑟𝑑𝑖 is the speed range for the degree. In this study, equation (1) has different forms (see Eq. (2) and Eq. (3)) to make heterogeneity inside a single class interval. An individual with age and weight properties, their properties' weights defined separately with applying Eq. (2) and Eq. (3). 𝑤𝑒𝑖𝑔ℎ𝑡𝑝𝑟𝑜𝑝 = 𝑤𝑒𝑖𝑔ℎ𝑡𝑒𝑑 𝑚𝑒𝑎𝑛 = (𝑙𝑜 ∗ 𝑚𝑖𝑛𝑖𝑠𝑟𝑑 + 𝑢𝑝 ∗ (2) 𝑚𝑎𝑥𝑖𝑠𝑟𝑑)/(𝑙𝑜 + 𝑢𝑝) 𝑤𝑒𝑖𝑔ℎ𝑡𝑝𝑟𝑜𝑝 = 𝑤𝑒𝑖𝑔ℎ𝑡𝑒𝑑 𝑚𝑒𝑎𝑛 = (𝑢𝑝 ∗ 𝑚𝑖𝑛𝑖𝑠𝑟𝑑 + 𝑙𝑜 ∗ (3) 𝑚𝑎𝑥𝑖𝑠𝑟𝑑)/(𝑙𝑜 + 𝑢𝑝) From Eq. (2) and Eq. (3), 𝑙𝑜 is lower value and 𝑢𝑝 is upper value, 𝑚𝑖𝑛𝑖𝑠𝑟𝑑 is minimum interval speed range, and 𝑚𝑎𝑥𝑖𝑠𝑟𝑑 is maximum interval speed range of the mentioned properties. Before using these two equations, designed memberships (See Figure 5 (a) and 5 (b)) need to be used to find the degree of the given properties. For example, if the individual is 38 years old, designed membership for age property is used to find the degree of that given age property (lower value and upper value of the age). To find the right class interval, the model checks the intervals and finds the right one (See Figure 7). Hence, the framework determines the desired value for 38 years old is 0.35 adult and 0.65 very young. On the other hand, to find the property at which speed range is, the designed membership function of speed is used (See Figure 5 (d)). The specified range for speed in this framework is between 2k/h and 7k/h. This framework breaks down the speed range into several class intervals. This separation is for making logical heterogeneity in values of property's weight for various individuals within the speed range. For example, for an individual with 38 years old class interval of speed is 5k/h - 6k/h, whereas for an individual with 46 years old is 4k/h - 5k/h (See Figure 7). The aim of this diversity in the class interval for speed is associated with logic; younger persons are faster than elder persons. Additionally, finding the middle of 288 the chosen class interval is necessary for finding mid value, Midvalue equation (See Eq. (4)) [30] would be utilized. Midvalue = lov + upv/2 (4) From Eq. (4), for the chosen class, the lower limit is denoted with 𝑙𝑜𝑣 and the upper limit is denoted with𝑢𝑝𝑣. The class interval would be divided into two distinct parts via Midvalue; first half of the interval and second half of the interval (See Figure 7). This division makes the values of given properties' weight different in the two distinct halves of the interval, which leads to remove weight redundancy and arrange different properties weights in both halves of the interval. The result of the Midvalue equation and the given property's value make the framework decide to use Eq. (2) or Eq. (3). For example, when the given property value is greater than the Midvalue result, the framework applies Eq. (3), conversely, when the given property value smaller than the Midvalue result, the framework applies Eq. (2). Both Eq. (2) and Eq. (3) could be used when given value for the property is equal to the Midvalue result. The same operations are done to find the weight of the property of weight. Results of Eq. (2) and Eq. (3) are used to calculate properties' weights as in Eq. (5), which is the mean equation [30] after combination the equation with gender factor 𝑔𝑒𝑛𝑖 and emergency coefficient𝑒𝑚𝑖. desiredSpeed = ( i=1 ∑n pwi ) ∗ geni ∗ emi (5) n Figure 6. Result of determining the desired speed for 81 participants based their properties Figure 7. How weights of participant's properties are identified Finally, gender and emergency factors were counted for the desired speed. From this, the desired speed is affected by those factors, while speeds for male and female is different even both have the same properties. The female speed in our expectation for the simulation was decreased by 0.5. Thus, if the speed of males is 6 kph, it is for female agents decreased to 3 kph. On the other hand, during an emergency, evacuees run as fast as they could. Hence, the speed of the evacuees during an emergency is more than the normal situation. Figure 6 illustrates the conducted desired Speed in kph for the agents. 3. RESULTS AND ANALYSIS In this research work, the model is based on various scenarios, which have been written and executed through various experiments. Concise of experiments' results for the scenarios via the developed intelligent model were briefed inside Table 4. For this simulation process, data gathered for 81individuals. As mentioned in the previous sections within the gathering data, individual properties were recorded for each of them. Therefore, these properties were entered into the model, based on these properties individuals were generated and desired speeds were specified for them. These individuals arbitrarily set through the cafeteria. Figure 8 illustrates the participants' distribution through the first floor. The above-mentioned scenarios could be briefed in the following points: as mentioned in subsection 4.2, 43.21 percent was male and 56.79 percent was female with (1) One main exit for the first floor, two exit doors for students part, only one exit door to each employee part and staff part, and distribution of the individuals in small and large area of the cafeteria. (2) Two main exit doors for the first floor, only one exit door for each of the student part, employee part and staff part, and distribution of the individuals in a small and large area of the cafeteria. (3) Two main exit doors for the first floor, two exit doors for student part, one exit door for employee part and staff part, and distribution of the individuals in a small or large area of the cafeteria. (4) Three main exit doors, two exit or one exit doors for students' part, one exit door for each employee part and staff part, and distribution of the individuals through a large area of the cafeteria. Individuals' familiarity is considered with the points (2), (3) and (4). Figure 8. Illustrates the participants' distribution through the cafeteria Table 4. Experimentations' results from the developed model Experimentations Scenarios Two exit doors for the student part, three main exit doors and evacuees were no familiar with the exits 25.926 Same condition No4A, evacuees familiar with the exits 22.222 7.407 7.407 Aside, wait 0:40:51 Aside, wait 0:31:307 The simulation results of the above-mentioned points via our developed intelligent model were briefed in Table 4. Some abbreviations were used, such as C.W.A is a collision with agents, C.W.O is a collision with obstacles, and O.B.D.E is occurring different behaviors during evacuation. Inside the developed our new model, it was appeared that increasing number of room exit doors, main exit doors with familiarity of the evacuees to the exit doors and distribution in a larger area 289 Evacuees distributed in an average small area in the cafeteria, two main exits, each of the employee part, student part, and staff part has one exit door, evacuees were no familiar with the exits Same as the No1A but evacuees were familiar with the exits Same as the No1A but evacuees distributed in a larger area of the cafeteria Evacuees distributed in an average small area in the cafeteria, two main exits, two exit doors for students part, and each of the employee part, and staff part has one exit door, evacuees were familiar with the exits. Only one main exit door was used, evacuees distributed in a larger area of the cafeteria Same as No2A, but all agents distributed through a very small portion of the floor Same as No2A but agents positions were near the exit door Only one main exit door was used with two exit doors of student part and employees' part and staff part has only one exit door, evacuees distributed in a small area of the cafeteria More than two main exit doors and increase evacuees' distribution area Same condition No3A, they are all familiar with the exit doors Rate of C.W.A (%) Rate of C.W.O (%) Evacuation O.B.D.E time min:sec:ms 61.728 30.864 Aside, wait 1:0:941 51.852 65.432 Aside, wait 0:47:261 27.16 20.988 Aside, wait, help 0:46:711 17.284 33.333 Aside, wait 0:47:130 32.099 13.58 Aside, wait 0:41:635 54.321 20.988 Aside, wait 0:50:682 49.383 4.938 Aside, wait, help, jump over 0:35:373 44.444 17.284 Aside, wait 0:43:487 23.457 13.58 Aside, wait 0:41:241 16.49 16.049 Aside, wait 0:37:976 No1A No1B No1C No1D No2A No2B No2C No2D No3A No3B No4A No4B of the floor are the key factors to minimize the congestion, collision and appearing agent's emergency behaviors that directly have a great influence on improving evacuation efficiency. In the remaining of this section, the result of our model simulation is discussed. For details of simulation results, refer to Supplementary File comprises 36 pages is available in the supplementary Files. for Obviously specifying heterogeneous speed the participants creates jamming due to colliding agents with each other and with obstructions. This situation was clearly seen in the simulation results. Furthermore, changing numbers of main exit doors and cafeteria's distinct parts exit doors create variation in evacuation time and appearing emergency behaviors, such as C.W.A, C.W.O, and O.B.D.E. For example, in experimentation of No1C, No2A, they had different numbers of main exit doors, but they had the same distributions, C.W.A, C.W.O, and O.B.D.E were recorded as 27.66 percent, 33.33 percent, and (aside, wait) for No1C respectively, 45.679 percent, 50.617 per-cent, and (aside, wait, help) for No2A respectively. Besides, it was found that with adding a number of main exit doors C.W.A and C.W.O were decreased and different O.B.D.E appeared. Furthermore, agents' evacuation times were reduced and recorded 0:46:74 for No1C, 0:47:805 for No2A, the time managed as a format of min.sec.ms. When participants distributed through a larger area of the cafeteria great effect would be created on the occurring behaviors and also on the evacuation time. For instance, in the experimentation of No1A and No1C behaviors, such as C.W.A, C.W.O, OBOE were 61.78, 30.64, and (aside, wait) for No1A respectively, while these behaviors were 27.859, 20.988, and (aside, wait, help) for No1C, respectively. Because of the larger distribution in No1C collision behaviors significantly decreased between participants and participants with obstacles. Besides that, evacuation time considerably improved and recorded as 1:0:941 for No1A and 0:46:711 for No1C. On the other hand, participant familiarity with the exits doors had a great impact on changing the participants' evacuation behaviors and evacuation time, for instance, in the experimentations of No1A vs No1B, No3A vs No3B, and No4A vs no4B behaviors and evacuation time, such as, C.W.A and C.W.O changed from 61.728 to 51.852, 65.432 to 30.864, 1:0:941 to 0:47:261 for No1A and No1B, respectively, 23.457 to 16.49, 13.58 to 16.49, 0:41:241 to 0:37:976 for No3A and No3B receptively , and 25.926 to 22.222, 7.407 to 7.407 ,0:40:51 to 0:31:307, for No4A &No4B, respectively. Furthermore, changing the number of exit doors made a great change in participant's evacuation behaviors and evacuation time, for example, in the experimentation of No3A vs No1A could be clearly noticed. In No1A which had two main exits and participants distributed through a small portion of the cafeteria, the appeared behaviors, such as, C.W.A, C.W.O, and O.B.D.E significantly more occurred than in No3A which had three main exits and participants distributed through larger area of the cafeteria, the result of this experimentation for behaviors, such as, C.W.A, C.W.O, OBDE, and evacuation time was recorded as 61.728, 30.864, (aside, wait), and 1:0:941 for No1A, receptively, 23.457, 13.58, (aside, wait), and 0:41:241 for No3A, respectively. The result shows appearing behaviors decreased and also evacuation time considerably improved due to an increase in the number of main exits and area of distribution. From the experimentation result of No1D vs No2D, it appeared that increasing the number of exits is not the only reason to decrease appearing emergency behaviors and improving evacuation efficiency. For example, the experimentation of No1D, there were two main exit doors, and in the experimentation of No2D, there was only one main exit door. However, the C.W.A is better to be compared to C.W.A in No2D, but C.W.O and evacuation time was better in No2D due to larger distribution. in 4. CONCLUSION Despite the fact that developed models based on pedestrian evacuation approaches have been extensively used and confirmed, there is still essential to create models that carefully simulate people's evacuation time and appeared behaviors during an emergency evacuation. It is vital to review many previous works and notice different factors that made an impact on participant behaviors during the evacuation process and also on participants' evacuation time. In this study, an intelligent model built based on analyzing the previous applications of the cellular automata approach which is one of the microscopic model's approaches. Inside this model, cellular automata (CA) employed with a combination of the fuzzy logic idea to define the value of the participant's properties, such as physical, biological, and emotional and then defined values of the participant's properties were used within some statistical equation to define desired speed for that participant. Additionally, the KNN algorithm was applied to find the nearest exit door during the evacuation process. familiarity, environment, This study discusses the impact of the defined desired heterogeneous speed for participants with a combination of participants' behavior, and participants' distribution through the distinct parts of the cafeteria on the appearing emergency behaviors and evocation efficiency. From simulation results appeared different properties of participants caused different speeds for participants. Hence, a collision between participants C.W.A occurred during the evacuation process. Different behaviors, such as C.W.O and O.B.D.E appeared and different evacuation time was recorded for each participant. More experiments presented that environment, such as obstacles, size and number of main and distinct parts of the cafeteria exit doors had a great impact on changing participants' emergency behaviors and evacuation time. This research confirms that participants with different properties, various distributions through the cafeteria, and the presence of obstacles are the key to appearing in various behaviors and congestion. Conversely, it is approved that various designs may decrease the impact of those factors. Firstly, instead of one main exit use two or more main exit doors. Secondly, the distinct part of the cafeteria increase the number of exit doors, meanwhile, changes the distribution of the participants inside the cafeteria into larger distribution. Thirdly, introduce the exit doors to the participants to choose the closest exit to evacuate as these situations simulated with the proposed model. In the future, designing and implementing fire will be examined. Other features, such as: how the fire spread out through the building according to its environment will be added. Additionally, the effect of the fire on the agents' behaviors would be analyzed and discussed. References [31] is very close to our future work while in our work numbers of 290 dead, injured or suffocated agents as a result of fire and smoke will be recorded. Additionally, this model will be enhanced to make a simulation for the second floor and above. Also, it can be seen as a real-world application and will be optimized by different optimizer algorithms, such as fitness dependent optimizer (FDO) [32], WOA-BAT optimization [33], donkey and smuggler optimization [34], and modified grey wolf optimizer [35] to find best location of the main exit door through the area of evacuation in a building. Finally, interested readers can read references [36-38] for the possibility of obtaining future directions. ACKNOWLEDGEMENTS The study is fully funded by the University of Sulaimani (UOS). The authors would like to thank the UOS for providing facilities and equipment for this review work. REFERENCES [1] Emílio Almeida, J., Kokkinogenis, Z., Rossetti, R.J. (2013). NetLogo implementation of an evacuation scenario. arXiv preprint arXiv:1303.4695. [2] Christensen, K.M., Sharifi, M.S., Chen, A. (2013). Considering individuals with disabilities in a building evacuation: An agent-based simulation study. In 92nd Annual Meeting of the Transportation Research Board, Washington, DC, (pp. 11-13). [3] Duives, D.C., Mahmassani, H.S. (2012). Exit choice decisions during pedestrian evacuations of buildings. Transportation Research Record, 2316(1): 84-94. https://doi.org/10.3141/2316-10 [4] Bakar, N.A.A., Majid, M.A., Ismail, K.A. (2017). An overview of crowd evacuation simulation. Advanced Science https://doi.org/10.1166/asl.2017.10298 23(11): 11428-11431. Letters, [5] Liu, H., Liu, B., Zhang, H., Li, L., Qin, X., Zhang, G. (2018). Crowd evacuation simulation approach based on navigation knowledge and two-layer control mechanism. Information 436: 247-267. https://doi.org/10.1016/j.ins.2018.01.023 Sciences, [6] Majid, M.A., Siebers, P.O., Aickelin, U. (2013). Modelling reactive and proactive behaviour in simulation: A case study in a university organisation. arXiv preprint arXiv:1307.1073. http://dx.doi.org/10.2139/ssrn.2829269 [7] Burstedde, C., Klauck, K., Schadschneider, A., Zittartz, J. (2001). Simulation of pedestrian dynamics using a two- dimensional cellular automaton. Physica A: Statistical Mechanics and its Applications, 295(3-4): 507-525. https://doi.org/10.1016/S0378-4371(01)00141- 8 [8] Tajima, Y., Nagatani, T. (2001). Scaling behavior of crowd flow outside a hall. Physica A: Statistical Mechanics and its Applications, 292(1-4): 545-554. https://doi.org/10.1016/S0378-4371(00)00630-0 [9] Kirchner, A., Schadschneider, A. (2002). Simulation of evacuation processes using a bionics-inspired cellular automaton model for pedestrian dynamics. Physica A: Statistical Mechanics and Its Applications, 312(1-2): 260-276. https://doi.org/10.1016/S0378-4371(02)00857- 9 291 [10] Klüpfel , H., Meyer-Konig, M., Wahle, J., Schreckenberg, M. (2000). Microscopic simulation of evacuation processes on passenger ships. Proceedings of the Fourth International Conference on CA for Research and Industry, pp. 63-71. https://doi.org/10.1007/978-1-4471- 0709-5_8 [11] Helbing, D., Farkas, I., Vicsek, T. (2000). Simulating dynamical features of escape panic. Nature, 407(6803): 487. https://doi.org/10.1038/35035023 [12] Helbing, D., Farkas, I.J., Vicsek, T. (2000). Freezing by heating in a driven mesoscopic system. Physical Review Letters, 1240. https://doi.org/10.1103/PhysRevLett.84.1240 84(6): [13] Helbing, D., Isobe, M., Nagatani, T., Takimoto, K. (2003). Lattice gas simulation of experimentally studied evacuation dynamics. Physical Review E, 67(6): 067101. https://doi.org/10.1103/PhysRevE.67.067101 [14] Gwynne, S., Galea, E.R., Owen, M., Lawrence, P.J., Filippidis, L. (1999). A review of the methodologies used in the computer simulation of evacuation from the built environment. Building and Environment, 34(6): 741-749. https://doi.org/10.1016/S0360-1323(98)00057-2 [15] Santos, G., Aguirre, B.E. (2004). A critical review of emergency evacuation simulation models. Disaster Research Center. http://udspace.udel.edu/handle/19716/299 [16] Zhan, B., Monekosso, D.N., Remagnino, P., Velastin, S.A., Xu, L.Q. (2008). Crowd analysis: A survey. Machine Vision and Applications, 19(5-6): 345-357. https://doi.org/10.1007/s00138-008-0132-4 [17] Zheng, X., Zhong, T., Liu, M. (2009). Modeling crowd evacuation of a building based on seven methodological approaches. Building and Environment, 44(3): 437-445. https://doi.org/10.1016/j.buildenv.2008.04.002 [18] Kobes, M., Helsloot, I., De Vries, B., Post, J.G. (2010). Building safety and human behaviour in fire: A literature review. Fire Safety Journal, 45(1): 1-11. https://doi.org/10.1016/j.firesaf.2009.08.005 [19] Zhou, S.P., Chen, D., Cai, W.T., Luo, L.B., Low, M.Y.H., Tian, F., Tay, V.S., Ong, D.W.S., Hamilton, B.D. (2010). Crowd modeling and simulation technologies. ACM Transactions on Modeling and Computer Simulation (TOMACS), http://doi.acm.org/10.1145/1842722.1842725 20(4). [20] Radianti, J., Granmo, O.C., Bouhmala, N., Sarshar, P., Yazidi, A., Gonzalez, J. (2013). Crowd models for emergency evacuation: A review targeting human- centered sensing. In 2013 46th Hawaii International Conference on System Sciences, pp. 156-165. http://doi.org/10.1109/HICSS.2013.155 [21] Varas, A., Cornejo, M.D., Mainemer, D., Toledo, B., Rogan, J., Munoz, V., Valdivia, J.A. (2007). Cellular automaton model for evacuation process with obstacles. Physica A: Statistical Mechanics and its Applications, 382(2): 631-642. https://doi.org/10.1016/j.physa.2007.04.006 [22] Alizadeh, R. (2011). A dynamic cellular automaton model for evacuation process with obstacles. Safety Science, 315-323. https://doi.org/10.1016/j.ssci.2010.09.006 49(2): [23] Guo, R.Y. (2014). New insights into discretization effects in cellular automata models for pedestrian evacuation. Physica A: Statistical Mechanics and its Applications, 1-11. 400: modelling and simulation for evacuation of people from a building in case of fire. Procedia Computer Science, 130: 10-17. https://doi.org/10.1016/j.procs.2018.04.006 [32] Abdullah, J.M., Ahmed, T. (2019). Fitness dependent optimizer: Inspired by the bee swarming reproductive process. 43473-43486. https://doi.org/10.1109/ACCESS.2019.2907012 Access, IEEE 7: [33] Mohammed, H.M., Umar, S.U., Rashid, T.A. (2019). A systematic and meta-analysis survey of whale optimization algorithm. Computational Intelligence and Neuroscience, 25pages. https://doi.org/10.1155/2019/8718571 2019: [34] Shamsaldin, A.S., Rashid, T.A., Agha, R.A.A.R., Al- Salihi, N.K., Mohammadi, M. (2019). Donkey and smuggler optimization algorithm: A collaborative working approach Journal of Computational Design and Engineering, 6(4): 562-583. https://doi.org/10.1016/j.jcde.2019.04.004 to path finding. [35] Rashid, T.A., Abbas, D.K., Turel, Y.K. (2019). A multi hidden recurrent neural network with a modified grey wolf e0213237. https://doi.org/10.1371/journal.pone.0213237 optimizer. PloS One, 14(3): [36] Muhammed, D.A., Saeed, S., Rashid, T.A. (2019). A comprehensive study on pedestrians' evacuation. arXiv preprint arXiv:1911.01165. https://doi.org/10.3991/ijes.v7i4.11767 [37] Arji, G., Ahmadi, H., Nilashi, M., Rashid, T.A., Ahmed, O.H., Aljojo, N., Zainol, A. (2019). Fuzzy logic approach for infectious disease diagnosis: A methodical evaluation, literature and Biomedical Engineering, 39(4): 937-935. https://doi.org/10.1016/j.bbe.2019.09.004 classification. Biocybernetics and [38] Nilashi, M., Samad, S., Manaf, A.A, Ahmadi, H., Rashid, T.A., Munshi, A., Almukadi, W., Ibrahim, O., Ahmed, O.H. (2019). Factors tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach. Computers & Industrial Engineering, 137: 106005. https://doi.org/10.1016/j.cie.2019.106005 influencing medical https://doi.org/10.1016/j.physa.2014.01.001 [24] Li, D., Han, B. (2015). Behavioral effect on pedestrian evacuation simulation using cellular automata. Safety Science, 41-55. https://doi.org/10.1016/j.ssci.2015.07.003 80: [25] Kontou, P., Georgoudas, I.G., Trunfio, G.A., Sirakoulis, G.C. (2018). Cellular automata modelling of the movement of people with disabilities during building evacuation. In 2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing 550-557. http://doi.org/10.1109/PDP2018.2018.00093 (PDP), pp. [26] Shi, L., Xie, Q., Cheng, X., Chen, L., Zhou, Y., Zhang, R. (2009). Developing a database for emergency evacuation model. Building and Environment, 44(8): 1724-1729. https://doi.org/10.1016/j.buildenv.2008.11.008 [27] Zhang, Q., Zhao, G., Liu, J. (2009). Performance-based design for large crowd venue control using a multi-agent model. Tsinghua Science and Technology, 14(3): 352- 359. http://doi.org/10.1016/S1007-0214(09)70051-3 [28] Pan, X., Han, C.S., Dauber, K., Law, K.H. (2006). Human and social behavior in computational modeling and analysis of egress. Automation in Construction, 15(4): 448-461. https://doi.org/10.1016/j.autcon.2005.06.006 [29] Suganthi, L., Iniyan, S., Samuel, A.A. (2015). Applications of fuzzy in renewable energy systems -- a review. Renewable and Sustainable Energy Reviews, 585-607. https://doi.org/10.1016/j.rser.2015.04.037 logic 48: [30] Varalakshmi, V., Suseela, T.N., Sundaram, T.G.G., Ezhilarasi, T.S., Indrani, T.B. (2004). Statistics Higher Secondary -- First Year. https://docplayer.net/3467441- Statistics-higher-secondary-first-year-untouchability-is- a-sin-untouchability-is-a-crime-untouchability-is- inhuman.html, accessed on 2 May 2019. [31] Kasereka, S., Kasoro, N., Kyamakya, K., Goufo, E.F.D., Chokki, A.P., Yengo, M.V. (2018). Agent-based 292
1503.09066
1
1503
2015-03-31T14:39:27
MORE: Merged Opinions Reputation Model
[ "cs.MA" ]
Reputation is generally defined as the opinion of a group on an aspect of a thing. This paper presents a reputation model that follows a probabilistic modelling of opinions based on three main concepts: (1) the value of an opinion decays with time, (2) the reputation of the opinion source impacts the reliability of the opinion, and (3) the certainty of the opinion impacts its weight with respect to other opinions. Furthermore, the model is flexible with its opinion sources: it may use explicit opinions or implicit opinions that can be extracted from agent behavior in domains where explicit opinions are sparse. We illustrate the latter with an approach to extract opinions from behavioral information in the sports domain, focusing on football in particular. One of the uses of a reputation model is predicting behavior. We take up the challenge of predicting the behavior of football teams in football matches, which we argue is a very interesting yet difficult approach for evaluating the model.
cs.MA
cs
MORE: Merged Opinions Reputation Model Nardine Osman1, Alessandro Provetti2 Valerio Riggi2, and Carles Sierra1 1 Artificial Intelligence Research Institute (IIIA-CSIC), Barcelona, Spain 2 Department of Math & Informatics, University of Messina, Italy Abstract. Reputation is generally defined as the opinion of a group on an aspect of a thing. This paper presents a reputation model that fol- lows a probabilistic modelling of opinions based on three main concepts: (1) the value of an opinion decays with time, (2) the reputation of the opinion source impacts the reliability of the opinion, and (3) the cer- tainty of the opinion impacts its weight with respect to other opinions. Furthermore, the model is flexible with its opinion sources: it may use explicit opinions or implicit opinions that can be extracted from agent behaviour in domains where explicit opinions are sparse. We illustrate the latter with an approach to extract opinions from behavioural in- formation in the sports domain, focusing on football in particular. One of the uses of a reputation model is predicting behaviour. We take up the challenge of predicting the behaviour of football teams in football matches, which we argue is a very interesting yet difficult approach for evaluating the model. Keywords: Trust, reliability and reputation 1 Introduction This paper is concerned with the classic, yet crucial, issue of reputation. We propose MORE, the Merged Opinions REputation model, to compute reputation on the basis of opinions collected over time. MORE uses a probabilistic modelling of reputation; adopts the notion of information decay; considers the reliability of an opinion as a function of the reputation of the opinion holder; and assesses the weight of an opinion based on its certainty. This latter feature constitutes the most novel feature of our algorithm. Furthermore, MORE may be applied to fields with varying abundancy of explicit opinions available. In other words, if explicit opinions are available, as it is the case with so-called eMarkets, then those opinions may directly be used by MORE. In other cases, where such opinions are sparse, behavioural infor- mation can be translated into opinions that MORE can then use. For example, if Barcelona beats Real Madrid at football, then this may be translated into mutual opinions where Barcelona expresses Real Madrid's inadequate skills and Real Madrid acknowledges Barcelona's superior skills. This paper also proposes an approach for extracting opinions from behavioural information in the sports domain. 2 MORE's calculated reputation measures may then be used for different ob- jectives, from ranking performance to predicting behaviour and sports results. Evaluating reputation is a notoriously tricky task, since there seldom is an objective measure to compare to. For instance, how can we prove which opinion is correct and which is biased? In this paper, we present an extensive valida- tion effort that has sought to assess MORE's predictive abilities in the football domain, where accurate predictions are notoriously hard to make [4]. The rest of this paper is divided as follows: Section 2 presents the MORE model, Section 3 introduces the necessary approximations, Section 4 summarises the MORE algorithm; Sections 5, 6, and 7 presents our evaluation, before con- cluding with Section 8. 2 The MORE Model condition that(cid:80) We define the opinion that agent β may form about agent α at time t as: ot β(α) = {e1 (cid:55)→ v1, . . . , en (cid:55)→ vn}, where G = {α, β, . . .} is a set of agents; t ∈ T and T represents calendar time; E = {e1, . . . , en} is an ordered evaluation space where the terms ei may account for terms such as bad, good, very good and so on; and vi ∈ [0, 1] represents the value assigned to each element ei ∈ E under the β(α) is specified as a discrete probability distribution over the evaluation space E. We note that the opinion one holds with respect to another may change with time, hence various instances of ot β(α) may exist for the same agents α and β but for distinct time instants t. i∈[1,E] vi = 1. In other words, the opinion ot Now assume that at time t, agent β forms an opinion ot β(α) about agent α. To be able to properly interpret the opinion, we need to consider how reliable β is in giving opinions. We reckon that the overall reliability of any opinion is the reliability of the person holding this opinion, which changes along time. That is the more reliable an opinion is, the closer its reviewed value is to the original one; inversely, the less reliable an opinion is, the closer its reviewed value is to the flat (or uniform) probability distribution F, which represents complete ignorance and is defined as ∀ ei ∈ E · F(ei) = 1/E. This reliability value R is defined later on in Section 2.3. However, in this section, we use this value to assess the reviewed value Ot β(α), which we define accordingly: β(α) of the expressed opinion ot β) × F β(α) + (1 − Rt β(α) = Rt Ot β × ot (1) 2.1 Opinion Decay Information loses its value with time. Opinions are no exception, and their in- tegrity decreases with time as well. Based on the work of [9], we say the value of an opinion should tend to ignorance, which may be represented by the flat created at time t(cid:48), we distribution F. In other words, given a distribution Ot(cid:48) say at time t > t(cid:48), Ot(cid:48) ), where Λ is the decay function satisfying the property limt(cid:48)→∞ Ot(cid:48) would have decayed to Ot = Λ(t, F, Ot(cid:48) = F. One possible definition, used by MORE, for Λ is the following: where ν ∈ [0, 1] is the decay rate, and: Ot(cid:48)→t = ν∆t Ot(cid:48) + (1 − ν∆t) F (cid:40) ∆t = 0 , if t − t(cid:48) < κ 1 + t−t(cid:48) κ , otherwise 3 (2) (3) ∆t serves the purpose of establishing a minimum grace period during which the information does not decay and that once reached the information starts decaying. This period of grace is determined by the parameter κ, which is also used to control the pace of decay. 2.2 Certainty and its Impact on Group Opinion A group opinion on something at some moment is based on the aggregation of all the previously-expressed individual opinions. However, the certainty of each of these individual opinions has a crucial impact on the aggregation. This is a concept that, to our knowledge, has not been used in existing aggregation methods for reputation. We say, the more uncertain an opinion is then the smaller its effect on the final group opinion is. The maximum uncertainty is defined in terms of the flat distribution F. Hence, we define this certainty measure, which we refer to as the opinion's value of information, as follows: I(Ot β(α)) = H(Ot β(α)) − H(F) (4) where, H represents the entropy of a probability distribution, or the value of information of a probability distribution. In other words, the certainty of an opinion is the difference in entropies of the opinion and the flat distribution. Then, when computing the group opinion, we say that any agent can give opinions about another at different moments in time. We define Tβ(α) ⊆ T to describe the set of time points at which β has given opinions about α. The group opinion about α at time t, Ot G(α), is then calculated as follows: (cid:88) (cid:88) (cid:88) β (cid:88) β∈G Ot G(α) = t(cid:48)∈Tβ (α) β∈G t(cid:48)∈Tβ (α) Ot(cid:48)→t (α) · I(Ot(cid:48)→t β (α)) I(Ot(cid:48)→t β (α)) (5) β This equation states that the group opinion is an aggregation of all the de- cayed individual opinions Ot(cid:48)→t (α) that represent the view of every agent β that has expressed an opinion about α at some point t(cid:48) in the past. However, different views are given different weights, depending on the value of their information I(Ot(cid:48)→t β Note that in the proposed approach, one's latest opinion does not override previous opinions. This choice to override previous opinions or not is definitely (α)). 4 context dependent. For example, consider one providing an opinion about a cer- tain product on the market, then changing his opinion after using the product for some time. In such a case, only the latest opinion should be considered and it should override the previous opinion. However, in our experiments, we use the sports domain, where winning football matches are interpreted as opinions formed by the teams about each others strength in football. In such a case, the opinions obtained from the latest match's score should not override opin- ions obtained from previous matches. In such a context, past opinions resulting from previous matches will still need to be considered when assessing a team's reputation. G (α) = F. In other words, in the absence of any information, the group opinion is equivalent to the flat distribution accounting for maximum ignorance. As individual opinions are expressed, the group opinion starts changing following Equation 5. Finally, we note that initially, at time t0, we have ∀ α ∈ G · Ot0 2.3 Reliability and Reputation An essential point in evaluating the opinions held by someone is considering how reliable they are. This is used in the interpretation of the opinions issued by agents (Equation 1). The idea behind the notion of reliability is very simple. A person who is considered very good at solving a certain task, i.e. has a high reputation with respect to that task, is usually considered an expert in assessing issues related to that task. This is a kind of ex-cathedra argument. An example of current practice supported by this argument is the selection of members of committees or advisory boards. But how is reputation calculated? First, given an evaluation space E, it is easy to see what could be the best opinion about someone: the 'ideal' distribution, or the 'target', which is defined as T = {en (cid:55)→ 1}, where en is the top term in the evaluation space. Then, the reputation of β within a group G at time t may be defined as the distance between the current aggregated opinion of the group Ot G(β) and the ideal distribution T, as follows: Rt β = 1 − emd(Ot G(β), T) (6) where emd is the earth movers distance that measures the distance between two probability distributions [7] (although other distance measurements may also be used). The range of the emd function is [0,1], where 0 represents the minimum distance (i.e. both distributions are identical) and 1 represents the maximum distance possible between the two distributions. As time passes and opinions are formed, the reputation measure evolves along with the group opinion. Furthermore, at any moment in time, the measure Rt can be used to rank the different agents as well as assess their reliability. 3 Necessary Approximation As Equation 5 illustrates, the group opinion is calculated by aggregating the decayed individual opinions and normalising the final aggregated distribution by 5 considering the value of the information of each decayed opinion (I(Ot(cid:48)→t (α))). This approach imposes severe efficiency constraints as it demands exceptional computing power: each time the group opinion needs to be calculated, all past opinions need to decay to the time of the request, and the value of the information of these decayed opinions should be recomputed. β We suggest an approximation to Equation 5 that allows us to apply the algorithm over a much longer history of opinions. To achieve this, when a group opinion is requested, its value is calculated by obtaining the latest group opinion and decaying it accordingly. In other words, we assume the group opinion to decay just like any other source of information. Instead of recalculating them over and over again, we simply decay the latest calculated value following Equation 2 as follows: G(α) = ν∆t Ot(cid:48) Ot G(α) + (1 − ν∆t) F When a new opinion is added, the new group opinion is then updated by adding the new opinion to the decayed group opinion. In this case, normalisation is still achieved by considering the value of the information of the opinions being aggregated; however, it also considers the number of opinions used to calculate the latest group opinion. This is because one new opinion should not have the exact weight as all the previous opinions combined. In other words, more weight should be given to the group opinion, and this weight should be based on the number of individual opinions contributing to that group opinion. As such, when a new opinion ot β(α) is added, Equation 5 is replaced with Equation 7: Ot G(α) = nα Ot(cid:48)→t G (α) · I(Ot(cid:48)→t nα I(Ot(cid:48)→t G (α)) + Ot G (α)) + I(Ot β(α) · I(Ot β(α)) β(α)) (7) where nα represents the number of opinions used to calculate the group opinion about α. Of course, this approach provides an approximation that is not equivalent to the exact group opinion calculated following Equation 5. This is mainly because the chosen decay function (Equation 2) is not a linear function since the decay parameter ν is raised to the exponent of ∆t, which is time dependent. In other words, decaying the group opinion as a whole results in a different probability distribution than decaying all the individual opinions separately and aggregating the results following Equation 5. Hence, there is a need to know how close is the approximate group opinion to the exact one. In what follows, we introduce the test used for comparing the two, along with the results of this test. 3.1 The Approximation Test To test the proposed approximation, we generate a number of random opinions Ot (α) over a number of years, where α is fixed, βi is an irrelevant variable βi (although we do count the number of opinion sources every year, the identity of the source itself is irrelevant in this specific experiment), and t varies according to 6 the constraints set by each experiment. For example, if 4 opinions were generated every year for a period of 15 years, then the following is the set of opinion sets that will be generated over the years: {{O1 β1 (α), ..., O1 β4 (α)}, ...,{O15 β1 (α), ..., O15 β4 (α)}} With every generated opinion, the group opinion is calculated following both the exact model (Equation 5) and the approximate model (Equation 7). We then plot the distance between the exact group opinion and the approximate one. The distance between those two distributions is calculated using the earth mover's distance method outlined earlier. We note that a good approximation is an approximation where the earth mover's distance (EMD) is close to 0. Two different experiments were executed. In the first, 10 opinions were being generated every year over a period of 6 years. In the second, 4 opinions where being generated every year over a period of 15 years. Each of these experiments were repeated several times to test a variety of decay parameters. The final results of these experiments are presented in the following section. 3.2 Results of the Approximation Test Figure 1 presents the results of the first experiment introduced above. The results show that the approximation error increases to around 11% in the first few rounds, and after 12 opinions have been introduced. The approximation error then starts to decrease steadily until it reaches 0.3% when 60 opinions have been added. Experiment 2 has the exact same results, although spanning over 15 years instead of 6. For this reason, as well as well as lack of space, we do not present the second experiment's results here. However, we point that both experiments illustrate that it is the number of opinions that affect the increase/decrease in the EMD distance, rather than the number of years and the decay parameters. In fact, undocumented results illustrate that the results of Figure 1 provide a good estimate of the worst case scenarios, since the earth mover's distance does not grow much larger for smaller ν values, but starts decreasing towards 0. When ν = 0 and the decay is maximal (i.e. opinions decay to the flat distribution at every timestep), the EMD distance is 0. However, when the decay is minimal (i.e. opinions never decay), then the results are very close to the case of ν = 0.98 and κ = 5. Fig. 1. Distance between the exact and approximate Ot G 0123456780.020.040.060.080.10.12EMDYearsυ=0.80, κ=1υ=0.90, κ=1υ=0.98, κ=5xDecay Parameters 7 We conclude that the larger the available number of opinions, then the more precise the approximation is. This makes this approximation suitable for appli- cations where more and more opinions are available. 4 The MORE Algorithm The merged opinions reputation model, MORE, is implemented using the ap- proximation of Section 3 and formalised by Algorithm 1. rameter and κ ∈ N is the pace of decay Algorithm 1 The MORE Algorithm Require: E = {e1, . . . , en} to be an evaluation space Require: G = {α, β, . . .} to be a group of agents Require: t ∈ N to be a point in time Require: odb to describe the database of all opinions Require: ot(cid:48) δ(γ) = {(cid:62), if t(cid:48) (cid:22) t;⊥, otherwise} Require: Ot(cid:48)→t β (α) (cid:22) ot X (α) = (Ot(cid:48) P(E) × 2 that calculates the distance between two probability distributions ∀ ei ∈ E · F(ei) = 1/n ∀ ei ∈ E · (i < E ⇒ T(ei) = 0) ∧ (i = E ⇒ T(ei) = 1) H(F) = − log(1/n) ∀ α ∈ G · Ot0 ∀ α ∈ G · nα = 0 while ∃ ot Require: emd : 2 G (α) = F β(α) (cid:22) o) do X (α) − F)ν1+(t−t(cid:48))/κ + F, where ν ∈ [0, 1] is the decay pa- P(E) → [0, 1] to represent the earth mover's distance function β(α) ∈ odb · (∀ o ∈ odb · ot β) × F β(α)(ei) · log Ot Ot Ot(cid:48)→t G (α)(ei) · log Ot(cid:48)→t β = 1 − emd(Ot(cid:48)→t Rt β(α) = Rt Ot I(Ot I(Ot(cid:48)→t β(α)) = − (cid:88) G (α)) =−(cid:88) G (β), T) β(α) + (1 − Rt β × ot ei∈E β(α)(ei) − H(F) G (α)(ei) − H(F) nα Ot(cid:48)→t Ot G(α) = Rt α = 1 − emd(Ot nα = nα + 1 ei∈E G (α)·I(Ot(cid:48)→t nα I(Ot(cid:48)→t G(α), T) G (α)) + Ot G (α)) + I(Ot β (α)·I(Ot β (α)) β (α)) end while In summary, the algorithm is called with a predefined set of opinions, or the opinions database odb. For each opinion in odb, the reviewed value is calculated following Equation 1, the informational value of the opinion as well as that of the decayed latest group opinion are calculated following Equation 4, the updated group opinion is then calculated following Equation 7, and the reputation of the agent is calculated via Equation 6. These steps are repeated for all opinions in odb in an ascending order of time, starting from the earliest given opinion and moving towards the latest given opinion. 8 We note that the complexity of this algorithm is constant (O(1)). Whereas if we were using Equation 5 as opposed to the proposed approximation, then the complexity would have been linear w.r.t. the number of opinions n (O(n)). For very large datasets, such as those used in the experiment of Section 7, the approximation does provide a great advantage. 5 From Raw Scores to Opinions This section describes the extraction of opinions from behavioural information. While we focus on football, we note that these methods may easily be applied to other domains. We say the possible outcomes of a match between teams α and β are as follows: (i) α wins, (ii) α loses, or (iii) the match ends up in a draw. We denote as ng(α) (resp., ng(β)) the number of goals scored by α (resp., β). We then define three methods to convert match results into opinions. Generated opinions belongs to a binary evaluation space consisting of two outcomes, namely bad (B) and good (G): E = {B, G}. 5.1 The Naive Conversion In this first strategy, we simply look for the winner. If α wins, then it receives β(α) = {B (cid:55)→ 0, G(cid:55)→ 1}, and β will get an opinion an opinion from β equal to ot α(β) = {B (cid:55)→ 1, G (cid:55)→ 0}. In case of a draw, they both get the from α equal to ot α(β) = {B (cid:55)→ 0.5, G(cid:55)→ 0.5}. The method is quite simple same opinion: ot and it does not take into account important aspects such as the final score of the match. For instance, losing 0 to 3 is equivalent to losing 2 to 3. β(α) = ot 5.2 Margin-of-Victory Conversion A second strategy we consider is called Margin of Victory -- MV. The margin of victory of a match involving clubs α and β is defined as the difference of goals M = ng(α) − ng(β) scored by α and β. Of course M > 0 if α wins. The main idea here is this: if we know α beats β, this tells us something about the relative strength of α against β. If we know α scored more than 3 goals against β (which is rather unusual in many professional leagues), we could probably have a better picture of the relative strength of the two clubs. We believe that including more data in the process of generating opinions should produce more accurate results and, ultimately, this should help us in better predicting the outcome of a football match. The rules we used to include the number of goals scored by each club are as follows: (cid:40){B(cid:55)→ 0.5, G(cid:55)→ 0.5} (cid:110) ot α(β) = B(cid:55)→ ng(α) ng(α)+ng(β) , G(cid:55)→ ng(β) ng(α)+ng(β) (cid:111) , for a 0-0 tie , otherwise (8) In analogous fashion we can compute the opinion of β on α. Equation 8 tells us that if the margin of victory ng(α)− ng(β) is large, then ng(α) is higher than 9 ng(α) ng(β) and the ratio ng(α)+ng(β) will be closer to 1. As a consequence, the larger the margin of victory between α and β, the more likely α will get an evaluation biased towards good. In case of a 0-0 tie, the terms ng(α)+ng(β) are undefined. To manage such a configuration, we assume that the probability that α (resp., β) gets the evaluation good is equal to the probability it gets the evaluation bad. ng(α)+ng(β) and ng(α) ng(β) A potential drawback of the MV strategy is that different scores may be translated into the same distribution. This happens every time one of the clubs does not score any goal. For instance, the winners in two matches that end with the scores 1−0 and 4−0 would received an opinion {B(cid:55)→ 0, G(cid:55)→ 1}, as calculated by the MV strategy. 5.3 Gifted Margin of Victory The third strategy we propose is called the Gifted Margin of Victory -- GMV. It has been designed to efficiently handle the case of football matches in which one of the clubs does not score any goal. The GMV strategy computes opinions accordingly: (cid:110) (cid:110) ot β(α) = ot α(β) = (cid:111) (cid:111) B(cid:55)→ ng(α)+X B(cid:55)→ ng(β)+X ng(α)+ng(β)+2X , G(cid:55)→ ng(β)+X ng(α)+ng(β)+2X , G(cid:55)→ ng(α)+X ng(α)+ng(β)+2X ng(α)+ng(β)+2X (9) (10) ng(β)+X In other words, we give as a gift both clubs with a bonus of X > 0 goals in order to manage all matches in which one (or possibly both) of the two clubs does not score any goal. Here X is any positive real number. If X → 0, then the GMV strategy would collapse to the MV strategy. On the other hand, if X is extremely large then the constant X would dominate over both ng(α) and ng(β) and the terms ng(α)+ng(β)+2X would converge to 0.5. This result is potentially negative because the probability that any team is evaluated as good is substantially equivalent to the probability that it is evaluated as bad and, therefore, all the opinions would be intrinsically uncertain. An experimental analysis was carried out to identify the value of X guaranteeing the highest prediction accuracy. Due to space limitations we omit the discussion on the experimental tuning of the X parameter and we suffice with the results of our experiment that show that the best value found for X was 1. ng(α)+ng(β)+2X and ng(α)+X A further improvement of the GMV strategy comes from normalization. Nor- malization is motivated by the observation that, since X > 0, term ng(α) + X (resp., ng(β) + X) is strictly less than ng(α) + ng(β) + 2X. Hence, α (resp., β) will never get an opinion where the probability of good comes close to 1, even if it has scored much more goals than β (resp., α). At the same time, since ng(α) + X > 0, there is no chance that α will get an opinion where the probability of bad is close to 0. Let pGM V α,β (G) be the probability of α being evaluated good by β, according to the GM V strategy. We then normalize pGM V (G) to the [0,1] range by con- sidering, for a given set S of teams, the highest and lowest probabilities of being α,β 10 evaluated good according to the calculations of the GMV strategy, which we de- note as M (S) and m(S), respectively. We then define the normalized probability pG(α) of team α being evaluated good by β as follows: (G) − m(S) pGM V α,β M (S) − m(S) pG(α) = (11) And the probability of team α being evaluation bad by β becomes: pB(α) = 1 − pG(α). 6 From Reputation to Predictions This section illustrates how we can use MORE to predict the outcome of a football match. We note that a football match may be depicted as an ordered pair (cid:104)α, β(cid:105), where α and β are opponent clubs. We will follow this convention: we will let α be the 'home club' whereas β will be the 'visiting club'. To compute the reputation of teams α and β, we define the relative strength of α w.r.t. β at time t as follows: rα,β(t) = Rt αRt α + Rt β (12) In what follows, and for simplification, we omit the reference to time t and we use the simplified notation rα,β. Notice that 0 ≤ rα,β ≤ 1 and the higher (resp., lower) rα,β is, the stronger (resp., weaker) the club α is at playing and winning a football match. We shall adopt the following rules to predict the outcome of a match:3 1. If rα,β (cid:39) 1 2. If rα,β ≈ 1 3. If rα,β (cid:47) 1 2 , then the winner will be α. 2 , then the match will end up in a draw. 2 , then the winner will be β. 7 Experimental Results In this section, we test the effectiveness of our approach. In detail, we designed our experiments to answer the following questions: Q1. What is the accuracy of the MORE algorithm in correctly predicting the outcome of a football match? Q2. Which score-to-opinion strategy is reliably the most accurate? Q3. To what extent does information decay impact the accuracy of MORE? 3 We note that we look for values that are approximately greater ((cid:39)), approximately less than ((cid:47)), or approximately equal (≈) to 1 2 . In practice, this is achieved by defining three different intervals to describe this. 11 7.1 Datasets and Experimental Procedure To answer questions Q1 -- Q3, we ran several experiments, drawn on a large dataset of match scores that we collected from public sources.4 Our dataset contains the complete scores of several seasons of the Spanish Primera Divisi´on (Liga), the top football league in Spain. At the moment of writing, 20 clubs play in the Liga. Each club plays every other club twice, once at home and once when visiting the other club. Points are assigned according to the 3/1/0 schema: 3 for win, 1 for draw and 0 for loss. Clubs are ranked by the total number of points they accumulate and the highest-ranked club at the end of the season is crowned champion. The dataset consists of 8182 matches from the 1928-29 season until the 2011-12 season. Overall, the home club won 3920 times and lost 2043 times, and the number of ties amounted to 2119. For the football domain, a major goal of our experimental tests was to check MORE's predicting accuracy. For each match in our database involving clubs α (home club) and β (visiting club) we separately applied the Naive, MV and GMV strategies to convert the outcomes of a football match into opinions. We then applied the MORE algorithm and computed the relative strength rα,β of α against β. We tried various configurations of the decay parameter ν in order to study how the tuning of this parameter influences the overall predictive per- formance of MORE. The usual 3/1/0 scoring system for football rankings (and other games) provided us with a baseline to study the predictive accuracy of MORE. The experimental procedure we followed to compare the predictive accu- racy of MORE and 3/1/0 was as follows. We partitioned the dataset containing football matches into 10 intervals, I1,I2, . . . ,I10, on the basis of the relative strength of opponent clubs. In detail, for an arbitrary pair of clubs α and β, the first interval I1 was formed by the matches such that 0 ≤ rα,β < 0.1, the second interval I2 contained the matches for which 0.1 ≤ rα,β < 0.2 and so on until the tenth interval I10 (consisting of the matches in which 0.9 ≤ rα,β ≤ 1). Observe that the intervals may have different sizes (because, for instance, the number of matches in I1 could differ from those in I2). Given an interval Ik, we have that the larger k, the better the skills of α are and, then, the more likely α should be able to beat β. For different strategies and parameter settings, we computed the percent- age of times (FH (k)) that MORE accurately predicted the outcome of matches in the Ik interval that ended with the victory of the home club. Accordingly, we refer to FH (k) as the home success frequency. In an analogous fashion, we computed the percentage of times (FA(k)) that MORE accurately predicted the outcome of matches in the Ik interval that ended with the victory of the visiting club. Accordingly, we refer to FA(k) as the visiting success frequency. We would expected that the higher rα,β the higher FH (k). In fact, as rα,β → 1 MORE be- comes more and more confident on the ability of α of beating β and, therefore, we expect that FH (k) is consequently large. The situation for rα,β is similar: 4 Data were extracted from http://www.lfp.es/LigaBBVA/Liga_BBVA_Resultados. aspx 12 its increase corresponds to a decrease of rβ,α and, therefore, an increase of rβ,α should correspond to a decrease in the frequency of (home club) α wins. In the following, when it does not generate confusion, we shall use the sim- plified notation FH (resp., FA) in place of FH (k) (resp., FA(k)) because, for a fixed match (cid:104)α, β(cid:105) we can immediately identify the interval Ik to which (cid:104)α, β(cid:105) belongs to and, therefore, the FH (k) (resp., FA(k)) becomes redundant. 7.2 Assessing the Quality of Predictions The first series of experiments we performed aimed at assessing the accuracy of the predictions with respect to the different strategies. The results are plotted in Figures 2 -- 4 for the Naive, MV, and GMV strategies, respectively. In each figure, the plot on the left represents the frequency of successful predictions for the home team winning, and that on the right represents the frequency of successful predictions for the visiting team winning. From the analysis of these results we can draw some relevant conclusions. The Naive strategy, despite its simplicity and independence from the final outcome Fig. 2. Naive strategy: success frequencies for FH and FA (resp.) over relative strength. Fig. 3. MV strategy: success frequencies for FH and FA (resp.) over relative strength. Fig. 4. GMV strategy: success frequencies for FH and FA (resp.) over relative strength. 13 of the match, is able to generate accurate predictions. In fact, Naive is ofter a better forecaster than ranking-based prediction (i.e., using the 3/1/0 point system). For home victories, the maximum value of FH is around 66% whereas the 3/1/0 algorithm peaks at around 59%. For away victories, the values of FA range between 25% and 50% whereas the 3/1/0 algorithm has its success frequency flat around 0.3. It is also interesting to observe that the decay factor ν has little impact on the values of both FH and FA. In particular, the peak value of FH is obtained when ν = 0.7 but the value ν = 0.5 provides more stable results. In contrast, setting ν = 0.5 is the best option for visiting victories, even if the curves describing the evolution of FA tend to coincide when the relative strength (depicted as rs in Figures 2 -- 4) is greater than 0.5. Let us now consider the MV strategy, whose results are reported in Fig- ure 3. This second experiment provides evidence of an increase in the accuracy of MORE, as the highest value of FH is now equal to 64% and the highest value of FA is equal to 46%. This suggests that including the number of goals scored by each team in the process of generating opinions is effective in better com- puting the strength of each club and, ultimately, in producing more accurate predictions. From these figures we can also conclude that for both home and visiting victories, FH and FA achieve their peak when ν = 0.6. But the trends of the curves depicted in Figure3 are quite similar. This implies that information decay has little impact when the MV strategy is chosen. Finally, we consider the GMV strategy. Once again, we computed FH and FA for different values of ν and the corresponding results are graphically reported in Figure 4. This last experiment illustrates that the GMV strategy (with X = 1) provides the highest values of FH and FA. The best value of FH is around 78% (while FH associated with the 3/1/0 algorithm does not exceed 59%). Analogously, in case of visiting victories, the best value of FA is equal to 68% (while the 3/1/0 algorithm is not able to go beyond 37%). The value of ν providing the peak values of FH and FA was 0.6 even though the information decay has little impact, as in the case of MV strategy. We conclude this section by observing that when rα,β is less than 0.3, the value of FH is around 0.5, independently of the adopted strategy. This result is clearly superior to a merely guess-and-check strategy, where choices are chosen uniformly at random and the probability of guessing the correct result is 1 3 (as there are three possible outcomes: α winning, β winning, or neither - having a draw). 8 Conclusion This paper proposed a reputation model based on a probabilistic modelling of opinions, a notion of information decay, an understanding that the reputation of an opinion holder provides an insight on how reliable his/her opinions are, 14 as well as an understanding that the more certain an opinion is, the more its weight, or impact. An interesting aspect of this model is that it may be used in domains rich with explicit opinions, as well as in domains where explicit opinions are sparse. In the latter case, implicit opinions are extracted from the behavioural infor- mation. This paper has also proposed an approach for extracting opinions from behavioural information in the sports domain, focusing on football in particular. In the literature, several ranking algorithms exist that are also based on the notion of implicit opinions. For instance, PageRank [1] and HITS [6] compute the reputation of entities based on the links between these entities. Indirectly, their approach assumes that a link describes a positive opinion: one links to the "good" entities. Both have been applied successfully in the context of web search. In [11], ranking algorithms like PageRank and HITS were applied to the social network to find experts in the network based on who is replying to the posts of whom. In [2], HITS has been used in a similar manner to help find experts based on who is replying to the emails of whom. EigenTrust [5] calculates the reputation of peers in P2P networks by relying on the number of downloads that one peer downloads files from another. In [3], a personalised version of PageRank that also relies on the download history is used to find trustworthy peers in P2P networks. Also, CiteRank [10] and SARA [8] are algorithms that rank research work by interpreting a citation as a positive opinion about the cited work. In comparison, we note that MORE is more generic than existing ranking algorithms, since it has the power to incorporate both explicit and implicit opin- ions in one system. Although built upon previous work, MORE also introduces the novel idea of considering the certainty of an opinion as a measure of its weight, or impact, when aggregating the group members' opinions. Finally, the model is validated by evaluating its performance in predicting the scores of foot- ball matches. We consider the football league scenario particularly interesting because it describes well the opportunities and limitations of the mechanisms by which we would like to evaluate reputation, and thus estimate the true strength of agents in general. Furthermore, we note that unlike the sophisticated predictive models in use today, (e.g., Goldman Sachs' model that was used for World Cup 2014, and relied on around a dozen statistical/historical parameters), MORE relies solely on game scores. In other words, it requires no tuning of complex parameters, and yet its predictions are reasonably accurate. Acknowledgements This work is supported by the Agreement Technologies project (CONSOLIDER CSD2007-0022, INGENIO 2010) and the PRAISE project (EU FP7 grant num- ber 388770). References 1. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems 30(1-7), 107 -- 117 (Apr 1998), http://dx. 15 doi.org/10.1016/S0169-7552(98)00110-X 2. Campbell, C.S., Maglio, P.P., Cozzi, A., Dom, B.: Expertise identification using email communications. In: Proceedings of the twelfth international conference on Information and knowledge management. pp. 528 -- 531. CIKM '03, ACM, New York, NY, USA (2003), http://doi.acm.org/10.1145/956863.956965 3. Chirita, P.A., Nejdl, W., Schlosser, M.T., Scurtu, O.: Personalized reputation man- agement in p2p networks. In: Golbeck, J., Bonatti, P.A., Nejdl, W., Olmedilla, D., Winslett, M. (eds.) ISWC Workshop on Trust, Security, and Reputation on the Semantic Web. CEUR Workshop Proceedings, vol. 127. CEUR-WS.org (2004) 4. Hill, I.: Association football and statistical inference. Applied statistics pp. 203 -- 208 (1974) 5. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web. pp. 640 -- 651. WWW '03, ACM, New York, NY, USA (2003), http://doi.acm.org/10.1145/775152.775242 6. Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. Journal of the ACM 46(5), 604 -- 632 (Sep 1999), http://doi.acm.org/10.1145/324133.324140 7. Peleg, S., Werman, M., Rom, H.: A unified approach to the change of resolution: Space and gray-level. IEEE Transactions on Pattern Analysis and Machine Intel- ligence 11(7), 739 -- 742 (Jul 1989), http://dx.doi.org/10.1109/34.192468 8. Radicchi, F., Fortunato, S., Markines, B., Vespignani, A.: Diffusion of scientific credits and the ranking of scientists. Physical Review E 80, 056103 (Nov 2009), http://link.aps.org/doi/10.1103/PhysRevE.80.056103 9. Sierra, C., Debenham, J.: Information-based reputation. In: First International Conference on Reputation: Theory and Technology (2009) 10. Walker, D., Xie, H., Yan, K.K., Maslov, S.: Ranking scientific publications using a model of network traffic. Journal of Statistical Mechanics: Theory and Exper- iment 2007(06), P06010 (2007), http://stacks.iop.org/1742-5468/2007/i=06/ a=P06010 11. Zhang, J., Ackerman, M.S., Adamic, L.: Expertise networks in online communities: structure and algorithms. In: Proceedings of the 16th international conference on World Wide Web. pp. 221 -- 230. WWW '07, ACM, New York, NY, USA (2007), http://doi.acm.org/10.1145/1242572.1242603
1307.4477
1
1307
2013-07-17T01:43:11
Modularity and Openness in Modeling Multi-Agent Systems
[ "cs.MA", "cs.LO" ]
We revisit the formalism of modular interpreted systems (MIS) which encourages modular and open modeling of synchronous multi-agent systems. The original formulation of MIS did not live entirely up to its promise. In this paper, we propose how to improve modularity and openness of MIS by changing the structure of interference functions. These relatively small changes allow for surprisingly high flexibility when modeling actual multi-agent systems. We demonstrate this on two well-known examples, namely the trains, tunnel and controller, and the dining cryptographers. Perhaps more importantly, we propose how the notions of multi-agency and openness, crucial for multi-agent systems, can be precisely defined based on their MIS representations.
cs.MA
cs
Modularity and Openness in Modeling Multi-Agent Systems Wojciech Jamroga Artur Me¸ski Computer Science and Communication, and Interdisciplinary Centre on Security, Reliability and Trust University of Luxembourg [email protected] Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland, and FMCS, University of Ł´od´z, Poland [email protected] Maciej Szreter Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland [email protected] We revisit the formalism of modular interpreted systems (MIS) which encourages modular and open modeling of synchronous multi-agent systems. The original formulation of MIS did not live entirely up to its promise. In this paper, we propose how to improve modularity and openness of MIS by changing the structure of interference functions. These relatively small changes allow for surprisingly high flexibility when modeling actual multi-agent systems. We demonstrate this on two well-known examples, namely the trains, tunnel and controller, and the dining cryptographers. Perhaps more importantly, we propose how the notions of multi-agency and openness, crucial for multi-agent systems, can be precisely defined based on their MIS representations. 1 Introduction The paradigm of multi-agent systems (MAS) focuses on systems consisting of autonomous entities acting in a common environment. Regardless of whether we deem the entities to be intelligent or not, proactive or reactive, etc., there are two design-level properties that a multi-agent system should satisfy. First, it should be modular in the sense that it is inhabited by loosely coupled components. That is, interaction between agents is crucial for the system, but it should be relatively scarce compared to the intensity of local computation within agents (otherwise the system is in fact a single-agent system in disguise). Secondly, it should be open in the sense that an agent should be able join or leave the system without changing the design of the other components. Models and representations of MAS can be roughly divided into two classes. On one hand, there are models of various agent logics, most notably modal logics of knowledge, action, time, and strategic ability [7, 8, 2]. These models are well suited for theoretical analysis of general properties of agent systems. However, they are too abstract in the sense that: (a) they are based on abstract notions of global state and global transition so the structure of a model does not reflect the structure of a MAS at all, and (b) they come with neither explicit nor implicit methodology for design and analysis of actual agent systems. At the other extreme there are practical-purpose high-level representation languages like Promela [11], Estelle [6], and Reactive Modules (RM) [1]. They are application-oriented, and usually include too many features to be convenient for theoretical analysis. The middle ground consists of formalisms that originate from abstract logical models but try to encapsulate a particular modeling methodology. For instance, interpreted systems [8] support local design of the state space; however, transitions are still global, i.e., they are defined between global rather than local states. Synchronous automata networks [10] and ISPL specifications [17, 19] push the idea further: they are based on local states and semi-local transitions, Gabriele Puppis, Tiziano Villa (Eds.): Fourth International Symposium on Games, Automata, Logics and Formal Verification EPTCS 119, 2013, pp. 224 -- 239, doi:10.4204/EPTCS.119.19 c(cid:13) W. Jamroga, A. Me¸ski & M. Szreter This work is licensed under the Creative Commons Attribution License. W. Jamroga, A. Me¸ski & M. Szreter 225 i.e., the outcome of a transition is local, but its domain global. This makes agents hard to separate from one another in a model, which hampers its modularity. On the other hand, concurrent programs [16] and asynchronous automata networks [10] are fairly modular but they support only systems whose execution can be appropriately modeled by interleaving of local actions and/or events. Modular Interpreted Systems (MIS) are a class of models proposed in [13] to achieve separation of the interference between agents from the local processing within agents. The main idea behind MIS was to encapsulate the way agents' actions interfere by so called interaction tokens from a given alphabet In, together with functions outi,ini that define the interface of agent i. That is, outi specifies how i's actions influence the evolution of the other agents, whereas ini specifies how what rest of the world influences the local transition of i. Modular interpreted systems received relatively little attention, though some work was done on studying computational properties of the related verification problem [12], facilitating verification by abstraction [14], and using MIS to analyze homogeneous multi-agent systems [4]. This possibly stems from the fact that, in their original incarnation, MIS are not as modular and open as one would expect. More precisely, the types of functions used to define interference fix the number of agents in the MIS. Moreover, the assumption that all the functions used in a model are deterministic limit the practical applicability, as modeling of many natural scenarios becomes cumbersome. In this paper, we try to revive MIS as an interesting formalism for modeling multi-agent systems. We propose how to improve modularity and openness of the original class by changing the structure of interference functions out,in. The idea is to use multisets of interference tokens instead of k-tuples. This way, we do not need to "hardwire" information about other modules inside a module. Additionally, we assume that the "manifestation" function out can be nondeterministic. These relatively small changes allow for surprisingly high flexibility when modeling MAS. We demonstrate that on two well-known benchmark examples: trains, tunnel and controller, and the dining cryptographers. Perhaps more importantly, we propose how two important features of multi-agent systems can be formally defined, based on MIS representations. First, we show how to decide if a system is designed in a proper multi-agent way by looking at the relation between the complexity of its interference layer to the complexity of its global unfolding. Moreover, we define the degree of openness of a MIS as the complexity of the minimal transformation that the model must undergo in order to add a new agent to the system, or remove an existing one. We apply the definitions to our benchmark models, and show that different variants of cryptographers grossly differ in the amount of openness that they offer. The paper has the following structure. In Section 2, the new variant of MIS is defined, along with its execution semantics. Section 3 presents MIS representations for two benchmarks: Tunnel, Trains and Controller (TTC) and Dining Cryptographers (DC). A graphical notation is provided to make the exam- ples easier to read. In Sections 4 and 5, we propose formal definitions of multi-agency and openness, respectively, and apply them to several variants of the benchmarks. Section 6 concludes the paper. 1.1 Related Work The modeling structures discussed in this paper share many similarities with existing modeling frame- works, in particular with Reactive Modules [1]. Still, MIS and RMs have different perspectives: Reactive Modules is an application-oriented language, while the focus of modular interpreted systems is more the- oretic. This results in a higher abstraction level of MIS which are based on abstract states and interaction tokens. MIS aim at separating internal activities of modules and interactions between modules, what is not (explicitly) featured in RM. Modularity in models and model checking has been the focus of many papers. Most notably, Hi- erarchical State Machines of Alur et al. [3, 20] and the approach of hierarchical module checking by 226 Modularity and Openness in Modeling Multi-Agent Systems Murano et al. [18] feature both "horizontal" and "vertical" modularity, i.e., a system can be constructed by means of parallel composition as well as nesting of modules. Similarly, dynamic modifications and "true openness" of models has been advocated in [9]. In that paper, Dynamic Reactive Modules (DRM) were proposed, which allow for dynamic reconfiguration of the structure of the system (including adding and removing modules). Our approach differs from the ones cited above in two ways. On one hand, we focus on an abstract formulation of the separation of concerns between modules (and agents), rather than providing concrete mechanisms that implement the separation. On the other, we define indicators that show how good the resulting models is. That is, our measures of agentivity and openness are meant to assess the model "from the outside". In particular, the focus of the DRM is on providing a mechanism for adding and removing agents in the RM representation. We implement these operations on the meta-level, as a basis of the mathematical measure of openness. Our work could in principle be applied to DRMs and other formalisms, but it would require defining the appropriate multi-agent mechanisms which are already present in Interpreted Systems. 2 Modular Interpreted Systems Revisited Modular interpreted systems were proposed in [13] to encourage modular and open design of syn- chronous agent systems. Below, we present an update on the formalism. The new version of MIS differs from the original one [13] as follows. First, a single agent can be now modeled by more than one module to allow for compact design of agents' local state spaces and transition functions. Secondly, the type of function ini is now independent from the structure and cardinality of the set of agents, thus removing the main obstacle to modularity and openness of representation in the previous version. Thirdly, the interac- tion functions ini,outi are nondeterministic in order to enable nondeterministic choice and randomization (needed, e.g., to obtain fair scheduling or secure exchange of information). Fourthly, we separate agents from their names. This way, agents that are not present in the "current" MIS can be referenced in order to facilitate possible future expansion of the MIS. 2.1 New Definition of MIS Let a bag (multiset) over set X be any function X → N. The set of all bags over X will be denoted by B(X), and the union of bags by (cid:93). Definition 1 (Modular interpreted system) We define a modular interpreted system (MIS) as a tuple S = (Agtnames,Act, In,Agt), where Agtnames is a finite set of agent names, Act is a finite set of action names, In is a finite interaction alphabet, and Agt = {a1, . . . ,ak} is a finite set of agents (whose structure is defined in the following paragraph). A set of directed tokens, used to specify the recipients of interactions, is defined as Tok = In× (Agtnames∪{ε}), where ε denotes that the interaction needs to be broadcasted to all the agents in the system. Each agent a j = (id,{m1, . . . ,mn}) consists of a unique name id ∈ Agtnames (also denoted with name(a j)), and one or more modules m j = (St j,Init j,d j,out j,in j,o j,Π j,π j), where: • St j is a set of local states, • Init j ⊆ St j is the set of initial states, • d j : St j → P(Act) defines local availability of actions; for convenience of the notation, we addi- tionally define the set of situated actions as D j = {(q j,α) q j ∈ St j,α ∈ d j(q j)}, W. Jamroga, A. Me¸ski & M. Szreter 227 • out j, in j are interaction (or interference) functions: -- out j : D j → P(P(Tok)) refers to the set of influences (chosen nondeterministically) that a given situated action (of module m j) may possibly have on the recipients of the embedded interaction symbols, and -- in j : St j × B(In) → P(In) translates external manifestations from the other modules into the (nondeterministically chosen) "impression" that they make on module m j depending on the local state of m j; we assume in j(·) (cid:54)= /0; • o j : D j × In → P(St j) is a local transition function (possibly nondeterministic), • Π j is a set of local propositions of module m j (we require that Π j and Πm are disjoint when j (cid:54)= m), • π j : Π j → P(St j) is a valuation of these propositions. Typically, each agent in a MIS consists of exactly one module, and we will use the terms interchange- Additionally, we define the cardinality of S (denoted card(S)) as the number of agents in S. ably. Also, we will omit Init j from the description of a module whenever Init j = St j. Note that function in j is in general infinite. For practical purposes, finite representation of in j is needed. We use decision lists similarly to [15, 19]. Thus, ini will be described as an ordered list of pairs of the form condition (cid:55)→ value. The first pair on the list with a matching condition decides on the value of the function. The conditions are boolean combinations of membership and cardinality tests, and are defined over the variable s for the conditions defined on states, and over H for the conditions on multisets of received interferences. We require that the last condition on the list is (cid:62), so that the function is total. Several examples of MIS's are presented in Sections 3 and 5. 2.2 Execution Semantics for MIS Definition 2 (Explicit models) A nondeterministic concurrent epistemic game structure (NCEGS) is a tuple C = (A , St, St0,PV , V , Act, d,t,∼1, . . . ,∼k), where: A = {1, . . . ,k} is a nonempty set of agents, St is a nonempty set of states, St0 ⊆ St is the set of initial states, PV is a set of atomic propositions, V : PV → P(St) is a valuation function, d : A × St → P(Act) assigns nonempty sets of actions available at each state, and t is a (nondeterministic) transition function that assigns a nonempty set Q = t(q,α1, . . . ,αk) of outcome states to a state q, and a tuple of actions (α1, . . . ,αk) that can be executed in q. We define the semantics of MIS through an unfolding to NCEGS. Definition 3 (Unfolding of MIS) Unfolding of the modular interpreted system S from Definition 1 to a nondeterministic concurrent epistemic game structure NCEGS(S) = (A (cid:48), St(cid:48), St(cid:48)0,PV (cid:48), V (cid:48), Act(cid:48), d(cid:48),t(cid:48)) is defined as follows: i=1 Sti, • PV (cid:48) =(cid:83)k • A (cid:48) = {1, . . . ,k}, and Act(cid:48) = Act, • St(cid:48) = ∏k • St(cid:48)0 = {(q1, . . . ,qk) (∀i ∈ {1, . . . ,k}) qi ∈ Initi}, i=1 Πi, and V (cid:48)(p) = πi(p) when p ∈ Πi, • d(cid:48)(i,q) = di(qi) for global state q = (q1, . . . ,qk), and i ∈ A (cid:48), • The transition function t(cid:48) is constructed as follows. Let q = (q1, . . . ,qk) be a state, and α = (α1, . . . ,αk) be a joint action. We define an auxiliary function oii(qi,αi) of all the possible interfer- ences of agent i, for qi, and αi: γ(cid:48) ∈ oii(qi,αi) iff there exist T1, . . . , Tk such that Tj ∈ out j((q j,α j)), and γ(cid:48) ∈ ini(qi, I1 (cid:93) . . .(cid:93) Ik), where I j = {γ j (∃r ∈ {name(a j),ε}) (γ j,r) ∈ Tj} for all j ∈ A (cid:48). Then (q(cid:48)1, . . . ,q(cid:48)k) ∈ t(q,α1, . . . ,αk) iff q(cid:48)i ∈ oi((qi,αi),γ), where γ ∈ oii(qi,αi); 228 Modularity and Openness in Modeling Multi-Agent Systems • q ∼i q(cid:48) iff q and q(cid:48) agree on the local states of all the modules in agent ai. Definition 3 immediately provides some important logics (such as CTL, LTL, ATL, epistemic logic, and their combinations) with semantics over modular interpreted systems. By the same token, the model checking and satisfiability problems for those logics are well defined in MIS. 3 Modeling with MIS We argue that the revised definition of MIS achieves a high level of separation between components in a model. The interaction between an agent and the rest of the world is encapsulated in the agent's interference functions outi,ini. Of course, the design of the agent must take into account the tokens that can be sent from modules with which the agent is supposed to interact. For instance, the out,in functions of two communicating agents must be prepared to receive communication tokens from the other party. However, the interference functions can be oblivious to the modules with which the agent does not interact. In this section, we demonstrate the advantages on two benchmark scenarios: Trains, Tunnel, and Controller (TTC), and Dining Cryptographers (DC). 3.1 Tunnel, Trains, and Controller (TTC) TTC is a variant of classical mutual exclusion, and models n trains moving over cyclic tracks sharing a single tunnel. Because only one train can be in the tunnel at a time, trains need to get a permission from the controller before entering the tunnel. We model the scenario by MIS T TCn = (Agt,Act,In), where: • Agtnames = {tr1, . . . ,trn,ctrl}, • Act = {nop,approach,request,enter,leave}, • In = {idle, appr, try1, . . . , tryn, retry, granted, left, enter, aw reqs, grant, grant1, . . . , grantn, no reqs, infd, ack release, aw leave}. • Agt = {tr1, . . . ,trn,ctrl}, The system includes n trains tri =(cid:0)tri,{(Sti,Initi,di,outi,ini,oi,Πi,πi)} (cid:1) for i ∈ {0, . . . ,n} such that: Sti = {out,tun needed,granted,in}, and Initi = {out}. di is defined as: outi is defined as: • out (cid:55)→ {nop,approach}, • tun needed (cid:55)→ {request}, • granted (cid:55)→ {enter}, • in (cid:55)→ {nop,leave} oi is defined as: • ((out,nop), idle) (cid:55)→ {out} • ((out,approach), appr) (cid:55)→ {tun needed}, • ((tun needed,request), retry) (cid:55)→ {tun needed}, • ((tun needed,request), granted) (cid:55)→ {granted}, • ((granted,enter), enter) (cid:55)→ {in}, • ((in,nop), idle) (cid:55)→ {in}, • ((in,leave), leave) (cid:55)→ {out} Πi = {in tunnel} • (out,nop) (cid:55)→ {{(idle,tri)}}, • (out,approach) (cid:55)→ {{(appr,tri)}}, • (tun needed,request) (cid:55)→ {{(tryi,ctrl)}}, • (granted,enter) (cid:55)→ {{(enter,tri)}}, • (in,nop) (cid:55)→ {{(idle,tri)}}, • (in,leave) (cid:55)→ {{(left,ctrl), (left,tri)}} ini is defined as: • s = out ∧ appr ∈ H (cid:55)→ {appr}, • s = tun needed ∧ grant ∈ H (cid:55)→ {granted}, • s = tun needed (cid:55)→ {retry}, • s = granted ∧ enter ∈ H (cid:55)→ {granted}, • s = in∧ left ∈ H (cid:55)→ {left}, • (cid:62) (cid:55)→ {idle} πi = {in (cid:55)→ in tunnel} W. Jamroga, A. Me¸ski & M. Szreter Moreover, the agent ctrl =(cid:0)ctrl,{(Stc,Initc,dc,outc,inc,oc,Πc,πc)} as follows: Stc = {tun f ree,in f d,tr1granted, . . . ,trngranted}, and Initc = {tun f ree}. dc is defined as: • tun f ree (cid:55)→ {accepting}, • in f d (cid:55)→ {waiting}, • tr1granted (cid:55)→ {in f orm}, • . . . • trngranted (cid:55)→ {in f orm} oc is defined as: • ((tun f ree,accepting), no reqs) (cid:55)→ {tun f ree}, • ((in f d,waiting), aw leave) (cid:55)→ {in f d}, • ((in f d,waiting), ack release) (cid:55)→ {tun f ree}, • ((tun f ree,accepting), grant1) (cid:55)→ {tr1granted}, • . . . • ((tun f ree,accepting), grantn) (cid:55)→ {trngranted}, • ((tr1granted,in f orm), infd) (cid:55)→ {in f d}, • . . . • ((trngranted,in f orm), infd) (cid:55)→ {in f d} (cid:1) modeling the controller is defined 229 outc is defined as: • (tun f ree,accepting) (cid:55)→ {{(aw reqs,ε)}}, • (in f d,waiting) (cid:55)→ {{(aw leave,ctrl)}}, • (tr1granted,in f orm) (cid:55)→ {{(grant,tr1)}}, • . . . • (trngranted,in f orm) (cid:55)→ {{(grant,trn)}}, inc is defined as: • s = tun f ree∧ try1 ∈ H (cid:55)→ {grant1}, • . . . • s = tun f ree∧ tryn ∈ H (cid:55)→ {grantn}, • s = tun f ree (cid:55)→ {no reqs}, • s = tr1granted ∨ ...∨ s = trngranted (cid:55)→ {infd}, • s = in f d ∧ left ∈ H (cid:55)→ {ack release}, • s = in f d (cid:55)→ {aw leave}, • (cid:62) (cid:55)→ {idle} Πc = {tunnel busy} πc = {in f d (cid:55)→ tunnel busy} The model is illustrated in Figure 1 using the notation introduced in Section 3.2. The protocol focuses on the procedure of gaining a permission to access the tunnel. Before requesting the permission, a train approaches the tunnel, and its state changes to tun needed. In this state it requests the permission from the controller. When the controller grants the permission to one of the nondeterministically chosen trains (trigranted) it informs the train that got access to the tunnel about this fact, and moves to the state in f d. The train enters the tunnel in the next step of the protocol, and changes its state to in, whereas the remaining trains may continue requesting the access (they remain in tun needed). When the train leaves the tunnel, it changes its state to tun f ree. 3.2 Graphical Representation As the definitions of MIS tend to be verbose, we introduce a simple graphical notation, based on networks of communicating automata. Let us explain it, based on Figure 1, which is a graphical representation of the tunnel, trains, and controller model from Section 3.1: • Modules defining different agents and belonging to the same agent are separated by solid and dashed lines, respectively, • Circles correspond to local states. An arrow with loose end pointing into a circle denotes an initial state, • Boxes define local actions associated with a state, • For a local action, dashed lines going out of it define emitted influences, specified with the receiver and the influence at the left and right side of an harpoon arrow pointed left, respectively. When no receiver is specified, the influence is broadcasted, 230 Modularity and Openness in Modeling Multi-Agent Systems Figure 1: Tunnel, trains and controller (TTC) in the graphical representation • Solid lines with arrows, connecting an action with a local state, correspond to a local transition function, • For a local state, guarded commands (possibly in a box) define the translation of external manifes- tations received by an agent into local impressions. A harpoon arrow pointed right corresponds to a sender at the left side and the message at the right side, and if the sender is not specified it means receiving from anyone. For a transition, dotted arrows pointing at it correspond to application of those impressions. The number of interactions x received by an agent is denoted with n(x). The notation ∗ labeling a transition means that it is executed when none of the remaining transitions are enabled. For example, it could be used instead of directly specifying the generation and application of aw leave manifestation in the controller. Some parts can be skipped or abstracted away if it does not lead to confusion. For example, if no influence is emitted and only one transition is associated with an action, this action needs not be In Figure 1, the self-loop from the in state is not accompanied by the associated directly specified. local impression nor the impression. Similarly, a single influence addressed to the very module that issued it can be omitted. For example, we do not show the manifestation idle in the graph. Valuations of approachLEFTrequestenterleavenopnopacceptingwaitinginfdtunfreetrngrantedinformtr1)grantGRANT1+try1NOREQUESTSGRANT1GRANTnACKRELEASEACKRELEASEAWLEAVEinforminformtunneededgrantedinoutctrl)tryitri)enterRETRYapprGRANTEDENTERctrl)lefttri)lefttri)apprtrictrl)awreqsctrl)awleavetrn)grant+trynGRANTn......NOREQUESTS+left>>AWLEAVEtri)idle+grantGRANTED>RETRY+apprappr+leftLEFT+enterENTER W. Jamroga, A. Me¸ski & M. Szreter 231 Figure 2: MIS for dining cryptographers (DC1) propositions can be depicted in a similar way as for networks of automata. We omit them in our examples throughout, as they do not play a role in this paper. 3.3 Dining Cryptographers: Standard Version (DC1) Dining Cryptographers is a well-known benchmark proposed by Chaum [5]. n cryptographers are having dinner, and the bill is to be paid anonymously, either by one of them or by their employer. In order to learn which option is the case without disclosing which cryptographer is paying (if any), they run a two- stage protocol. First, every cryptographer is paired with precisely one other participant (they sit around the table), thus forming a cycle. Every pair shares a one-bit secret, say by tossing a coin behind a menu. In the second stage, each cryptographer publicly announces whether he sees an odd or an even number of coin heads, saying the opposite if being the payer. In the simplest case (DC1) the number of cryptographers is fixed, and each cryptographer is directly CounterevenoddheadtailsaydifferentsayequalCiWhopaysCi−)tailCi−)headCounter)sayequali=falseCounter)sayequali=true∨i∈[1,n]Ci+sayequali=falseαi:((Ci++tail∧n(Whopays+payi)=0)αiβiβiαiSAYEQUALSAYDIFFSAYEQUALSAYDIFFSAYDIFFSAYEQUALISODDISEVENISODDISEVENsaysayC1)pay1)paydecided...pay1paynpaynone∨i∈[1,n]Ci+sayequali=trueCn)payn∨(Ci++head∧Whopays+payi)))paydecided)paydecidedβi:((Ci++head∧n(Whopays+payi)=0)∨(Ci++tail∧Whopays+payi))∧Whopays+paydecided)∧Whopays+paydecided)start 232 Modularity and Openness in Modeling Multi-Agent Systems bound with its neighbours. Cryptographers announce their utterances by broadcasting them. A modular interpreted system modeling this setting is presented in Figure 2. For n cryptographers, the ith cryptogra- pher is modeled by agent Ci (0 ≤ i ≤ n). We introduce notation i+ and i− to refer to the right and the left neighbour of cryptographer i, respectively. The system includes also two additional agents. W ho pays initializes the system by determining who is the payer, and communicating it to the cryptographers. Ac- cording to the protocol definition, either one of the cryptographers is chosen, or none of the participants pays. Agent Counter counts the utterances of the cryptographers, computes the XOR operation (denoted by ∨ and assuming that utterances different and equal correspond to true and false values, respectively, thus the result is true iff the number of different utterances is odd), and determines the outcome of the protocol. Figure 2 shows the modular interpreted system for DC1. 4 How to Measure Multi-Agency In this section, we present our preliminary attempt at defining what it means for a design to be multi- agent. Intuitively, separate agents should have only limited coordination and/or communication capabil- ities. Otherwise, the whole system can be seen as a single agent in disguise. The idea is to measure the complexity of interference between different agents, and relate it to the complexity of the system. The former factor will be captured by the number of directed interaction tokens that a given agent can gener- ate; the latter by the number of global transitions that can occur. We say that the agent is well designed if its interference complexity is reasonably smaller than overall complexity of the system. Definition 4 (Interaction complexity) The interaction complexity of agent i in modular interpreted sys- tem M, denoted IC(i), is defined as follows. Let #outi(qi) be the the maximal number of directed to- kens generated by function outi to modules of other agents in state qi. Furthermore, let #ini(qi) be the maximal number of tokens admitted by function ini from modules of other agents in state qi. Now, IC(i) = ∑qi∈Sti(#outi(qi) + #ini(qi)). The interaction complexity of M is defined as IC(M) = ∑i∈Agt IC(i). Definition 5 (Global complexity) The global complexity of MIS M, denoted GC(M), is the number of transitions in the NCEGS unfolding of M. How can we express that IC(M) is "reasonably smaller" than GC(M)? Such a requirement is rela- tively easy to specify for classes of models, parameterized with values of some parameter (for instance, the number of identical trains in the tunnel-controller scenario). Definition 6 (C -sparse interaction, multi-agent design) Let M be a class of MIS and C a class of complexity functions f : N → R+∪{0}. We say that M is characterized by C -sparse interaction iff there is a function f ∈ C such that IC(M) ≤ f (GC(M)) for every M ∈ M . Furthermore, we say that M has multi-agent design iff M has LOGTIME-sparse interaction, and card(M) ≥ 2 for every M ∈ M . Proposition 1 Classes TTC and DC1 have multi-agent design. The proof is straightforward. It is easy to see that the other variants of Dining Cryptographers, discussed in Section 5, also have multi-agent design. W. Jamroga, A. Me¸ski & M. Szreter 233 5 How Open is an Open System? The idea of open systems is important for several communities: not only MAS, but also verification, software engineering, etc. It is becoming even more important now, with modern technologies enabling dynamic networks of devices, users and services whose nodes can be created and removed according to current needs. Traditionally, the term open system is understood as a process coupled with the environ- ment, which is rather disappointing given the highly distributed nature of MAS nowadays. One would rather like "openness" to mean that components (agents in our case) can freely join and leave the system without the need to redesign the rest of it. Perfectly open systems are seldom in practice; usually, adding/removing components requires some transformation of the remaining part (for instance, if a server is to send personalized information to an arbitrary number of clients then it must add the name of each new client to the appropriate distribution lists). So, it is rather the degree of openness that should be captured. We try to answer the question How open is the system? (or, to be more precise, its model) in the next subsection. 5.1 A Measure of Openness We base the measure on the following intuition: openness of a system is simplicity of adding and remov- ing agents to and from the model. That is, we consider two natural transformations of models: expansion (adding agents) and reduction (removing agents). We note that the simplicity of a transformation is best measured by its algorithmic complexity, i.e., the number of steps needed to complete the transformation. A perfectly open system requires no transformation at all (0 steps) to accommodate new components, whereas at the other extreme we have systems that require redesigning of the model from scratch when- ever a new agent arrives. Note that the openness of a model depends on which agents want to join or leave. For instance, the system with trains and controllers should be able to easily accommodate additional trains, but not necessarily additional controllers. Likewise, departure of a train should be straightforward, but not nec- essarily that of the controller. No less importantly, the context matters. We are usually not interested in an arbitrary expansion or reduction (which are obviously trivial). We want to add or remove agents while keeping the "essence" of the system's behavior intact. The following definitions formalize the idea. Definition 7 (Expansion and reduction of a MIS) Let M = (Agtnames,Act, In,Agt) be a MIS, and aaa an agent (in the sense of Definition 1). By agt(aaa) (resp. act(aaa), in(aaa)) we denote the set of agent names (resp. action symbols, interaction symbols) occurring in aaa. Moreover, ns(aaa,M) will denote the set of aaa's namesakes in M.1 Note that ns(aaa,M) can contain at most 1 agent. where: Agtnames(cid:48) = Agtnames∪agt(aaa), Act(cid:48) = Act∪act(aaa), In(cid:48) = In∪in(aaa), and Agt(cid:48) = Agt\ns(aaa,M)∪ {aaa}. The reduction of M by aaa is defined as M (cid:9)aaa = (Agtnames,Act, In,Agt(cid:48)) where Agt(cid:48) = Agt\{aaa}. Thus, expansion corresponds to "dumb" pasting an agent into a MIS, and reduction corresponds to The expansion of M by aaa is defined as the modular interpreted system M⊕aaa = (Agtnames(cid:48),Act(cid:48), In(cid:48),Agt(cid:48)) simple removal of the agent. The operations are well defined in the following sense. Proposition 2 Expansion/reduction of a MIS is always a MIS.2 It is easy to see that removing an agent and pasting it in again does not change the MIS. The reverse sequence of operations does change the MIS. However, both structures have the same unfoldings: 1 That is, agents in M that have the same id as aaa. 2 The proofs of results in Section 5 are straightforward from the construction of MIS, and we leave them to the reader. 234 Modularity and Openness in Modeling Multi-Agent Systems Proposition 3 Let aaa be an agent in M. Then, (M (cid:9)aaa)⊕aaa = M. Moreover, let aaa be an agent with no namesake in M. Then, NCEGS((M ⊕aaa)(cid:9)aaa) = NCEGS(M). Now we can make our first attempt at a measure of openness. Definition 8 (Degree of openness) Let θ be a property of models,3 M a modular interpreted system, and aaa an agent. The degree of openness of M wrt expansion by aaa under constraint θ is defined as the minimal number of steps that transform M ⊕aaa into a MIS M(cid:48) such that card(M(cid:48)) = card(M ⊕aaa) and M(cid:48) satisfies θ. Likewise, the degree of openness of modular interpreted system M wrt reduction by agent aaa under constraint θ is the minimal number of steps that transform M (cid:9) aaa into an M(cid:48) such that card(M(cid:48)) = card(M (cid:9)aaa) and M(cid:48) satisfies θ. The constraint θ can for example refer to liveness of the system or some of its components, fairness in access to some resources, and/or safety of critical sections. Note that the cardinality check is essential in the definition -- otherwise, a possible transformation would be to simply delete the newly added agent from M ⊕aaa (respectively, to restore aaa in M (cid:9)aaa). Definition 9 (Openness of a class of models) Let M be a class of MIS, aaa an agent, and θ a property of models. Moreover, let C be a class of complexity functions f : N → R+ ∪{0}. M is C -open wrt expansion (resp. reduction) by aaa under constraint θ iff there is a complexity function f ∈ C such that for every M ∈ M the degree of openness of M wrt expansion (resp. reduction) by aaa under θ is no greater than f (M). The most cumbersome part of the above definitions is the constraint θ. How can one capture the "essence" of acceptable expansions and reductions? Note that, semantically, θ can be seen as a subclass of models. We postulate that in most scenarios the class that defines acceptable expansions/reductions is the very class whose openness we want to measure. This leads to the following refinement of the previous definitions. Definition 10 (Openness in a class) The degree of openness of M wrt expansion (resp. reduction) by aaa in class M is the minimal number of steps that transform M ⊕aaa (resp. M (cid:9)aaa) into a MIS M(cid:48) ∈ M such that card(M(cid:48)) = card(M ⊕aaa). Moreover, M is C -open wrt expansion (resp. reduction) by aaa iff there is a complexity function f ∈ C such that for every M ∈ M the degree of openness of M wrt expansion (resp. reduction) by aaa in M is no greater than f (M). We explain the measure in greater detail in the remainder of Section 5. It is important to note that (in contrast to the measure of multi-agentivity proposed in Section 4) our measure of openness is not specific to MIS, and can be applied to other modeling frameworks. Remark 4 Alternatively, we could define the openness of M wrt aaa and θ by the Kolmogorov complexity of an appropriate expansion/reduction, i.e., by the size of the shortest algorithm that transforms M in an appropriate way. We chose time complexity instead, for two reasons. First, Kolmogorov complexity often obscures the level of difficulty of a process (e.g., a two-line algorithm with an infinite while loop can implement infinitely many changes, which gives the same complexity as changing the names of two communication channels for a controller). Secondly, computing Kolmogorov complexity can be cumbersome as it is Turing-equivalent to answering the halting problem. 3 We do not restrict the language in which θ is specified. It can be propositional logic, first-order temporal logic, or even the general language of mathematics. The only requirement is that, for every MIS M, the truth of θ in M is well defined. W. Jamroga, A. Me¸ski & M. Szreter 235 Figure 3: Dining cryptographers version DC2: direct channels instead of broadcast We observe, however, that a Kolmogorov-style measure of openness can be a good alternative for infinite models, especially ones that require infinitely many steps to accommodate changes in the config- uration of components. 5.2 How to Open Up Cryptographers In Section 3.3 we modeled the standard version of the Dining Cryptographers protocol as a modular interpreted system (class DC1). In this section, we will determine the openness of DC1, plus two other classes of MIS modeling other versions of the protocol. To comply with classical rules of composition, we begin with the least open variant. CounterievenoddHEADTAILsaydifferentsayequalCiCi−)tailCi−)headCounterj)sayequali=falseCounterj)sayequali=true∨j∈[1,n],j6=iCj+sayequalj=falseαiβiβiαiSAYEQUALSAYDIFFSAYEQUALSAYDIFFSAYDIFFSAYEQUALISODDISEVENISODDISEVENsaysay∨j∈[1,n],j6=iCj+sayequalj=trueforj∈[1,n],j6=iforj∈[1,n],j6=iWhopaysC1)pay1)paydecided...pay1paynpaynoneCn)payn)paydecided)paydecidedαi:((Ci++tail∧n(Whopays+payi)=0)∨(Ci++head∧Whopays+payi))βi:((Ci++head∧n(Whopays+payi)=0)∨(Ci++tail∧Whopays+payi))∧Whopays+paydecided∧Whopays+paydecidedstart 236 Modularity and Openness in Modeling Multi-Agent Systems 5.2.1 DC-Net, Direct Channels, No Broadcasting (DC2) Let us assume that no broadcast channel is available, or it is too faulty (or insecure) to be of use in multi- party computation. In such case, every pair of cryptographers must use a direct secured channel for communicating the final utterance. The result of the computation is calculated independently by every cryptographer. We denote this class of models by DC2, and construct it as follows. Each cryptographer i is modeled by agent Ci, similar to the cryptographer agents in DC1. Instead of a single global counter of utterances, there is one counter per every cryptographer (Counteri). The final utterance is sent by direct point-to-point channels to the counters of all other participants. The resulting MIS is shown in Figure 3. Adding a new cryptographer Ci to DC1n requires the following changes. First, modifying links among the new neighbours of Ci yields 10 changes. Secondly, every agent Cj in DC1n must be modified in order to establish a communication channel with Ci. This requires 2· 5 changes per cryptographer, thus 10n changes are needed. Thirdly, for the agent W ho pays, we add the state payi(cid:48) with corresponding transitions: a single non-deterministic transition from start to payi(cid:48) (17 steps: 2 for di + 4 for outi + 8 for ini + 3 for oi), and the loop sending payment information (19 steps: 4 for di + 4 for outi + 4 for ini + 3 for oi). Finally, Counter needs to be updated to take into account the new participant. A XOR argument is added with receiving a manifestation, yielding 2· 4 = 8 changes. Thus, the overall openness complexity for DC2n is 10n + 54. Proposition 5 Class DC2 is O(n)-open wrt expansion by a cryptographer. 5.2.2 Dining Cryptographers: Standard Version with Broadcast (DC1) Let us now go back to the standard version of the protocol, presented in Section 3.3 Adding a new cryptographer Ci requires the following changes. First, modifying links for the new neighbors of Ci requires 10 changes. Secondly, changes in W ho pays and Counter are the same as for DC2n, yielding 44 steps. Thus, 54 changes are needed to accommodate the new cryptographer, regardless of the number of agents already present in the system. Proposition 6 Class DC1 is O(1)-open wrt expansion by a cryptographer. 5.2.3 Fully Open System, Cryptographers without Identifiers (DC0) In our most radical variant, cryptographers are not arbitrarily assigned as neighbors. Instead, they es- tablish their neighborhood relation on their own before starting the protocol. Every cryptographer is modeled by two modules Ci and Payi, and there are two additional agents Oracle and Counter, cf. Fig- ure 4. The system proceeds as follows: Setting up the payer. Every cryptographer sends the oracle his declaration whether he is going to pay or not (chosen nondeterministically). This is performed by module Payi. If Oracle receives at most one statement want pay, it confirms to all cryptographers. If more than one statements want pay is sent, the round is repeated until the payment issue becomes resolved. Establishing the neighbourhood relation and tossing coins. Each cryptographer either nondetermin- istically tosses a coin and announces the outcome, or listens to such announcements from the other agents. If there is exactly one cryptographer announcing and one listening, they become paired. They register the value of the announcement, and proceed further. A cryptographer who started with announcing will now listen, and vice versa. This takes several rounds, and completes when every cryptographer has been paired with two neighbors (one to whom he listened, and one to whom he announced). W. Jamroga, A. Me¸ski & M. Szreter 237 Figure 4: Cryptographers without identifiers (DC0) Counter)¬sayequalCounter)sayequalLheadLtailsayequalsaydiff)wait)head)tail)tail)headRtailRheadn(+tail)=0∧n(+head)=1→RHEADn(+wait)=0∧n(+tail)=1∧Payi+ipay→HSEHSEn(+wait)=0∧n(+head)=1∧Payi+inotpay→HSDHSDn(+wait)=1∧n(+head)=n(+tail)=0∧Payi+inotpay→SEn(+wait)=1∧n(+head)=n(+tail)=0∧Payi+ipay→SDSDSEn(tail)=1∧n(head)=0→RTAILRTAILRHEAD∗∗)wait∗CiOraclePayinotdecideddecidednotdecidedwantpayipaynotwantpayinotpayn(+wantpayi)≤1→ACCEPT)CONFIRMEDACCEPTCi)ipayCi)inotpaySDOracle)wantpayOracle)notwantpayRWAITSn(+head)=n(+tail)=0→RWAITSCounter∨(+sayequal)=false∧n(+oo6=sayequal)=0→NOTEQ∨(+sayequal)=true∧n(+oo6=sayequal)=0→EQequalnotequalEQNOTEQ∗+CONFIRMED+CONFIRMED∗∗∗∗)tail)head∗∗∗∗∗n(+wait)=1∧n(+wait)=0∧n(+wait)=0∧ 238 Modularity and Openness in Modeling Multi-Agent Systems Computation. A broadcast channel is used for sending around the utterances (say equal or ¬say equal). Counter counts the utterances and computes their XOR on the spot, in the way described before. DC0 is fully open, as adding a new cryptographer requires no adaptation of DC0n. Proposition 7 Class DC0 is O(0)-open wrt expansion by a cryptographer. By comparing their classes of openness, it is clear that DC1 is significantly more open wrt expansion than DC2 (constant vs. linear openness). On the other hand, it seems that the gap between DC1 and DC0 is rather slight (O(1) vs. O(0)). Is that really the case? We believe that the difference between O(1)- openness and O(0)-openness is larger than one is used to in complexity of algorithms. First, constant openness means that, when expanding the MIS by a set of new agents, the required transformation can be linear in the size of the set. More importantly, non-zero openness signifies the need to come up with a correct procedure of expansion. In contrast, zero openness means zero hassle: the new agents can join the system as they come. There is no need for "maintenance" of the system so that it stays compliant with its (usually implicit) specification. 6 Conclusions In this paper, we propose a new version of modular interpreted systems. The aim is to let modeling and analysis of multi-agent systems benefit from true separation of interference between agents and the "internals" of their processes that go on in a system. Thanks to that, one can strive for a more modular and open design. Even more importantly, one can use the MIS representation of a system to assess its agentivity and openness through application of simple mathematical measures. We emphasize that it was not our aim to create yet another agent programming language or represen- tations that will be used as input to cutting-edge model checkers. Instead, we propose a class of models which enables to expose the internal structure of a multi-agent system, and to define the concepts of openness and multi-agentivity in a precise mathematical sense. While our definition of multi-agentivity is specific to MIS, the measure of openness is in fact generic, and can be applied to models defined in other formalisms (such as Reactive Modules). We plan to look closer at the degree of openness provided by different representation frameworks in the future. We would also like to stress that the focus of this paper regarding the measures of agentivity and openness is on formalizing the concepts and showing how they work on benchmarks. An formal study of the measures and their properties is a matter of future work. Acknowledgements. The authors thank Andrzej Tarlecki for his suggestion to improve modularity of MIS by using multisets, and Thomas Agotnes for discussions. Wojciech Jamroga acknowledges the support of the FNR (National Research Fund) Luxembourg under project GALOT -- INTER/DFG/12/06. Artur Me¸ski acknowledges the support of the European Union, European Social Fund. Project PO KL "Information technologies: Research and their interdisciplinary applications" (UDA-POKL.04.01.01- 00-051/10-00). References [1] R. Alur & T. A. Henzinger (1999): Reactive Modules. Formal Methods in System Design 15(1), pp. 7 -- 48, doi:10.1023/A:1008739929481. W. Jamroga, A. Me¸ski & M. Szreter 239 [2] R. Alur, T. A. Henzinger & O. Kupferman (2002): Alternating-Time Temporal Logic. Journal of the ACM 49, pp. 672 -- 713, doi:10.1145/585265.585270. [3] R. Alur, S. Kannan & M. Yannakakis (1999): Communicating Hierarchical State Machines. In: Proceedings of ICALP, pp. 169 -- 178, doi:10.1007/3-540-48523-6 14. [4] J. Calta (2012): Synthesis of Strategies for Multi-Agent Systems. Ph.D. thesis, Humboldt University Berlin. [5] D. Chaum (1988): The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceabil- ity. Journal of Cryptology 1(1), pp. 65 -- 75, doi:10.1007/BF00206326. [6] P. Dembi´nski, A. Janowska, P. Janowski, W. Penczek, A. P´ołrola, M. Szreter, B. Wo´zna & A. Zbrzezny (2003): Verics: A Tool for Verifying Timed Automata and Estelle Specifications. In: Proceedings of the of the 9th Int. Conf. on Tools and Algorithms for Construction and Analysis of Systems (TACAS'03), LNCS 2619, Springer, pp. 278 -- 283, doi:10.1007/3-540-36577-X 20. [7] E. A. Emerson (1990): Temporal and Modal Logic. In J. van Leeuwen, editor: Handbook of Theoretical Computer Science, B, Elsevier Science Publishers, pp. 995 -- 1072. [8] R. Fagin, J. Y. Halpern, Y. Moses & M. Y. Vardi (1995): Reasoning about Knowledge. MIT Press. [9] J. Fisher, T. A. Henzinger, D. Nickovic, N. Piterman, A. V. Singh & M. Y. Vardi (2011): Dynamic Reactive Modules. In: Proceedings of CONCUR, pp. 404 -- 418, doi:10.1007/978-3-642-23217-6 27. [10] F. Gecseg (1986): Products of Automata. doi:10.1007/978-3-642-61611-2. EATCS Monographs on Theor. Comput. Sci., Springer, [11] G. J. Holzmannn (1997): The Model Checker SPIN. IEEE Transactions on Software Engineering 23(5), pp. 279 -- 295, doi:10.1109/32.588521. [12] W. Jamroga & T. Agotnes (2006): Modular Interpreted Systems: A Preliminary Report. Technical Report IfI-06-15, Clausthal University of Technology. [13] W. Jamroga & T. Agotnes (2007): Modular Interpreted Systems. In: Proceedings of AAMAS'07, pp. 892 -- 899, doi:10.1145/1329125.1329286. [14] M. Koster & P. Lohmann (2011): Abstraction for model checking modular interpreted systems over ATL. In: Proceedings of AAMAS, pp. 1129 -- 1130. [15] F. Laroussinie, N. Markey & G. Oreiby (2008): On the Expressiveness and Complexity of ATL. Logical Methods in Computer Science 4, p. 7, doi:10.2168/LMCS-4(2:7)2008. [16] O. Lichtenstein & A. Pnueli (1985): Checking that finite state concurrent programs satisfy their linear spec- In: POPL '85: Proceedings of the 12th ACM SIGACT-SIGPLAN symposium on Principles of ification. programming languages, ACM, New York, NY, USA, pp. 97 -- 107, doi:10.1145/318593.318622. [17] A. Lomuscio & F. Raimondi (2006): MCMAS : A Model Checker for Multi-agent Systems. In: Proceedings of TACAS, Lecture Notes in Computer Science 4314, pp. 450 -- 454, doi:10.1007/11691372 31. [18] A. Murano, M. Napoli & M. Parente (2008): Program Complexity in Hierarchical Module Checking. In: Proceedings of LPAR, pp. 318 -- 332, doi:10.1007/978-3-540-89439-1 23. [19] F. Raimondi (2006): Model Checking Multi-Agent Systems. Ph.D. thesis, University College London. [20] S. La Torre, M. Napoli, M. Parente & G. Parlato (2008): Verification of scope-dependent hierarchical state machines. Information and Computation 206(9-10), pp. 1161 -- 1177, doi:10.1016/j.ic.2008.03.017.
1606.00799
1
1606
2015-10-02T17:01:17
Multi-Agent Modeling of Dynamical Systems: A Self-organized, Emergent, Homeostatic and Autopoietic Approach
[ "cs.MA", "nlin.AO" ]
This thesis presents the theoretical, conceptual and methodological aspects that support the modeling of dynamical systems (DS) by using several agents. The modeling approach permits the assessment of properties representing order, change, equilibrium, adaptability, and autonomy, in DS. The modeling processes were supported by a conceptual corpus regarding systems dynamics, multi-agent systems, graph theory, and, particularly, the information theory. Besides to the specification of the dynamical systems as a computational network of agents, metrics that allow characterizing and assessing the inherent complexity of such systems were defined. As a result, properties associated with emergence, self-organization, complexity, homeostasis and autopoiesis were defined, formalized and measured. The validation of the underlying DS model was carried out on discrete systems (boolean networks and cellular automata) and ecological systems. The central contribution of this thesis was the development of a methodological approach for DS modeling. This approach includes a larger set of properties than in traditional studies, what allows us to deepen in questioning essential issues associated with the DS field. All this was achieved from a simple base of calculation and interpretation, which does not require advanced mathematical knowledge, and facilitates their application in different fields of science.
cs.MA
cs
Modelado Multi-agentes de Sistemas Dinámicos -Un enfoque Auto-organizado, Emergente, Homeostático y Autopoiético- Nelson Josué Fernández Parada Universidad de los Andes Facultad de Ingeniería, Doctorado en Ciencias Aplicadas Mérida, Venezuela 2015 Modelado Multi-agentes de Sistemas Dinámicos -Un enfoque Auto-organizado, Emergente, Homeostático y Autopoiético- Nelson Josué Fernández Parada Tesis presentada como requisito parcial para optar al título de: Ph.D. en Ciencias Aplicadas Director: Ph.D. José Lizandro Aguilar Co-director: Ph.D. Oswaldo Terán Centro de Microelectrónica y Sistemas Distribuidos Universidad de los Andes Facultad de Ingeniería, Doctorado en Ciencias Aplicadas Mérida, Venezuela 2015 IV Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨- Dedicatoria A quienes conforman mi bello hogar: Yois, Tere y Samito. A quienes conforman mi más amorosa familia: Benji, Chechi, Alix, Dora, Oswaldo, Sonia, Javier, Yamile; Jairo, Andrés, Diego, Santi; Alejandro, Jessica y Camilo Iván. A mis amigos y colegas más cercanos: Carlos Gershenson, Alberto Ramírez, Diego Lizcano, Silvia Álvarez, Carlos Ernesto Maldonado, Adriana Maldonado, Andrés Gonzáles, Alí Coronel, Christopher Stephens, Tom Froese y Mario Cosenza. Y finalmente, a la computadora y a la computación universal… Contenido Agradecimientos V Han pasado cuatro años desde que inicié el gran reto de obtener mi doctorado en una facultad de ingeniería, donde fui el primer biólogo marino en ser admitido. Por ello, quiero agradecer a quienes confiaron en mí la tarea de tender puentes, adicionales a los ya logrados, entre la computación y la biología. A mis mentores: José Aguilar, quien fue mi mayor motivador para no abandonar y mi mayor crítico a la hora de las ideas. A Oswaldo Terán, por su confianza. Agradezco muy especialmente a Carlos Gershenson, quien ha sido mi ejemplo más preciado de dedicación, sapiencia y brillantez. Así lo viví en cada estancia en el Instituto de Matemáticas Aplicadas y en Sistemas, así como en el Centro de Ciencias de la Complejidad de la UNAM. Muchos de mis logros y de la superación de grandes obstáculos, los debo a las interacciones relevantes que se generaron con Carlos. En la UNAM también quiero agradecer al Dr. Domínguez, director del IIMAS, por sus 3 invitaciones como investigador visitante. A Martha Flórez en comunicaciones del IIMAS y a Suyin en la biblioteca. A todos los investigadores del C3 por sus enriquecedoras charlas en los diversos seminarios. Agradezco, en la ULA, a quien me llamó hombre del renacimiento: Mario Cosenza, un físico con el poder de ver siempre "The Big Picture". Un valioso ser humano que siempre me motivó a pensar más allá, a adaptarme, a ser creativo. A Niriaska Perozo en la UCLA, a Tom Froese en el IIMAS-UNAM y Junior Altamiranda en la ULA, a Eduard Puerto en la UFPS por la camaradería, sus aportes y retroalimentación. VI Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨- Resumen y Abstract VII RESUMEN Esta tesis presenta una propuesta de modelado de sistemas dinámicos (SD) usando múltiples agentes. El modelado se desarrolla desde una perspectiva que permite evaluar las propiedades que confiere a los SDC orden, cambio, adaptabilidad, equilibrio y autonomía. La base teórica la constituyen la teoría de sistemas multi-agentes, la teoría de grafos, y en especial, la teoría de la información. Además de la especificación de un SD como una red computacional de agentes, se logró el establecimiento de métricas que permiten caracterizar y evaluar su complejidad inherente. El resultado fue la definición, formalización y medición de las propiedades de emergencia, auto-organización, complejidad, homeostasis y autopoiesis. La valoración del modelo de SD propuesto se hizo en sistemas discretos (Redes Booleanas Aleatorias y Autómatas Celulares) y sistemas ecológicos. En particular, el aporte de esta tesis fue el desarrollo de un enfoque metodológico de modelado de SD con un conjunto mayor de propiedades. Estas propiedades fueron la emergencia, auto-organización, complejidad, homeostasis y autopoiesis, a partir de las cuales se ahondó en los aspectos de cambio, regularidad, adaptabilidad, equilibrio dinámico y autonomía en SD. Lo anterior se logró desde una base sencilla de cálculo e interpretación basada en la teoría de la información, que no requiere de conocimiento matemático avanzado, lo cual hizo más práctica su aplicación en diversos campos como las ciencias computacionales, el urbanismo, y en especial, la ecología. Palabras clave: Ciencias de la complejidad, teoría de la información, caos, criticalidad, autonomía, sistemas ecológicos. VIII Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨- ABSTRACT This thesis presents the theoretical, conceptual and methodological aspects that support the modeling of dynamical systems (DS) by using several agents. The modeling approach permits the assessment of properties representing order, change, equilibrium, adaptability, and autonomy, in DS. The modeling processes were supported by a conceptual corpus regarding systems dynamics, multi-agent systems, graph theory, and, particularly, the information theory. Besides to the specification of the dynamical systems as a computational network of agents, metrics that allow characterizing and assessing the inherent complexity of such systems were defined. As a result, properties associated with emergence, self-organization, complexity, homeostasis and autopoiesis were defined, formalized and measured. The validation of the underlying DS model was carried out on discrete systems (boolean networks and cellular automata) and ecological systems. The central contribution of this thesis was the development of a methodological approach for DS modeling. This approach includes a larger set of properties than in traditional studies, what allows us to go deepen in questioning essential issues associated with the DS field. All this was achieved from a simple base of calculation and interpretation, which does not require advanced mathematical knowledge, and facilitates their application in different fields of science. Keywords: Complex sciences, information theory, chaos, criticality, autonomy, ecological systems. Contenido Contenido IX Pág. Dedicatoria ......................................................................................................................... IV RESUMEN ........................................................................................................................... VII ABSTRACT ......................................................................................................................... VIII Lista de figuras ................................................................................................................. XIII Lista de tablas .................................................................................................................. XVII Introducción ........................................................................................................................ 1 Motivación ........................................................................................................................... 3 Objetivos .............................................................................................................................. 4 Antecedentes ....................................................................................................................... 5 Organización de la tesis ..................................................................................................... 8 1. CAPITULO 1: SISTEMAS DINÁMICOS; AUTO-ORGANIZACIÓN, EMERGENCIA, COMPLEJIDAD, HOMESTASIS Y AUTOPOIESIS. ......................................................... 11 Resumen ............................................................................................................................ 11 Teoría de los Sistemas Dinámicos (TDS) ........................................................... 11 Visión General ........................................................................................ 11 Aspectos Históricos ................................................................................ 12 La Incertidumbre de la Previsibilidad .................................................... 12 Implicaciones Matemáticas .................................................................... 13 Noción General de SD ....................................................................................... 13 La Complejidad en Sistemas Dinámicos: Propiedades de Auto-organización, 1.2 1.3 Emergencia, Complejidad, Homeostasis y Autopoiesis. ............................................... 15 Emergencia ............................................................................................ 16 Auto-organización ................................................................................. 17 Complejidad ........................................................................................... 18 Homeostasis ........................................................................................... 19 Autopoiesis............................................................................................. 20 Síntesis .............................................................................................................. 21 1.4 1.1 1.1.1 1.1.2 1.1.3 1.1.4 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 X Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 2. CAPÍTULO 2: ESPECIFICACIÓN DE SISTEMAS DINÁMICOS COMO REDES COMPLEJAS DE AGENTES ............................................................................................. 23 2.1 Interdependencia Funcional de la Auto-organización, Homeostasis y Resumen ............................................................................................................................ 23 Nociones de SD: de lo Tradicional a la Inclusión de lo Complejo. .................... 23 Noción Tradicional de SD ...................................................................... 24 Una Definición de SD que Considera la Complejidad o Sistemas 2.1.1 2.1.2 Dinámicos Complejos (SDC)................................................................................. 24 2.1.3 Autopoiesis, y la Generación del Espacio Estructural del SDC . ............................ 27 Los SDC cómo Redes Computacionales de Agentes. ........................................ 29 Aportes de la Teoría de SDs ................................................................... 29 Aportes de la Teoría de agentes y de los Sistemas Multi-agentes-SMA .. 31 Aportes de las Teorías de Grafos y Redes ............................................... 32 Aspectos Formales de la Red SDC-Ag. ................................................... 33 La Especificación de Nodo Tipo Ag y SMA ............................................. 35 Síntesis .............................................................................................................. 37 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.2 2.3 3. CAPITULO 3: FORMALISMOS MATEMÁTICOS PARA LA MEDICIÓN DE LA EMERGENCIA, AUTO-ORGANIZACIÓN, COMPLEJIDAD, HOMEOSTASIS Y AUTOPOIESIS EN SISTEMAS DINÁMICOS.................................................................... 39 Resumen ............................................................................................................................ 39 Teoría de la Información cómo Fundamento .................................................... 39 3.1 3.2 Medidas ............................................................................................................. 42 Emergencia ............................................................................................ 42 Auto-organización ................................................................................. 44 Complejidad ........................................................................................... 45 Homeostasis ........................................................................................... 46 Autopoiesis............................................................................................. 54 Síntesis .............................................................................................................. 57 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.3 4. Capítulo 4: APLICACIONES EN SISTEMAS DISCRETOS Y SISTEMAS URBANOS .......................................................................................................................... 61 4.1 Resumen ............................................................................................................................ 61 Sistemas Discretos............................................................................................. 61 Las Redes Booleanas Aleatorias-RBA...................................................... 61 Midiendo la Complejidad en Redes Booleanas con Diferentes Regímenes 4.1.1 4.1.2 y Grados de Conectividad. .................................................................................... 62 Resultados para Redes Booleanas ........................................................... 63 4.1.3 Autómatas Celulares Elementales (ACE) .......................................................... 67 Experimentos con ACE. .......................................................................... 68 Resultados ACE ...................................................................................... 72 4.2.1 4.2.2 4.2 4.3 Medición de la Complejidad en Sistemas Urbanos-Semáforos Auto- organizantes ................................................................................................................. 76 La Movilidad Vehicular en las Ciudades Modernas y los Métodos Auto- 4.3.1 Organizantes para su Solución ............................................................................. 76 4.3.2 Modelo de Tráfico .................................................................................. 77 Contenido XI 4.3.3 Resultados .............................................................................................. 80 4.4 Discusión........................................................................................................... 84 La Aplicación de Las Medidas ................................................................ 84 4.4.1 4.4.2 La Complejidad cómo Balance ............................................................... 84 4.4.3 Múltiples Escalas y Perfiles..................................................................... 85 La Complejidad su Diferencia con el Caos ............................................. 86 4.4.4 Homeostasis ........................................................................................... 87 4.4.5 4.4.6 Autopoiesis y el Requisito de Variedad de Ashby. .................................. 88 Síntesis .............................................................................................................. 89 4.5 5. Capítulo 5: APLICACIONES EN SISTEMAS ECOLÓGICOS .................................. 91 5.1 5.1.1 5.1.2 5.1.3 5.1.4 Resumen ............................................................................................................................ 91 Visiones Tradicionales y Complejidad Ecosistémica ......................................... 91 Fundamentos de Limnología .................................................................. 92 Tipos de Lagos Estudiados ..................................................................... 96 Simulaciones y Cálculo de las Medidas .................................................. 96 Resultados .............................................................................................. 97 Complejidad comparativa en el Gradiente Altitudinal Ártico-Trópico (Ar-T). 103 Complejidad del Número Incremental de Especies de Mamíferos .................. 105 5.2 5.3 5.4 Modelado y Especificación de la Emergencia Acuática a través del uso de programación genética ............................................................................................... 107 5.5 Discusión......................................................................................................... 113 Descripción de los Ecosistemas y la Inclusión de la Complejidad como Sobre los Aspectos Computacionales de la Medición de la Complejidad 5.5.1 Indicador Ecológico ............................................................................................ 113 5.5.2 Ecológica ............................................................................................................. 113 5.5.3 Comparación con otras Medidas de Complejidad. ............................... 115 La Búsqueda de Soluciones analíticas para la Emergencia ................... 116 5.5.4 Síntesis y Comentario Final. ............................................................................ 116 5.6 6. CONCLUSIONES Y TRABAJO FUTURO ............................................................... 119 Logros Generales ............................................................................................. 119 Trabajo Futuro ................................................................................................ 121 6.1 6.2 7. Anexo: Caracterización de los Lagos Estudiados .............................................. 123 Lago Artico (Ar) .............................................................................................. 123 Lago Templado del Norte de Tierras Altas (North Higland Lake-NH). ........... 124 Lago Templado del Norte de Tierras Bajas (North Lowland Lake-NL)............ 125 Lago Tropical (T)............................................................................................. 126 7.1 7.2 7.3 7.4 Bibliografía ...................................................................................................................... 127 XII Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Contenido Lista de figuras XIII Pág.                Figura 2-1 Relación entre los Espacios Funcionales y Estructurales en SDC (Fernández et al., 2012a) ........................................................................................................................................... 27 Figura 2-2 Representación Simplificada de un SDC -Ag sobre la Base de la Teoría de Modelado y Simulación de Zeigler et al. (2000). Las designaciones A1, A2, A3 se refieren a Agentes. ....... 30 Figura 3-1 Información de Shannon a Diferentes Probabilidades para una Cadena Binaria (Gershenson and Fernández, 2012a) ............................................................................................ 41 Figura 3-2 Emergencia, Auto-organización y Complejidad vs Probabilidad en una Cadena Binaria (Gershenson and Fernández, 2012a) ............................................................................... 46 Figura 3-3 Zona de Viabilidad Zv y Zona de Funcionamiento Óptimo (ZFO) de un factor Abi o Bi para una red computacional. Los valores del eje x dependen del dominio del factor i. (Fernández et al., 2012b) .............................................................................................................. 50 Figura 3-4 Detalle de la Respuesta Global y Local en la Red SD-Ag. Los valores de los ejes son simplemente demostrativos (Fernández et al., 2012b) ................................................................ 51 Figura 3-5 Comportamiento de la resiliencia (Rsi) y la persistencia (Pei):) en el tiempo de retorno y el tiempo de estancia en el punto medio respectivamente, en constraste con la capacidad homeostática (Fernández et al., 2012b)..................................................................... 53 Figura 3-6 Comportamiento de la resistencia máxima (Re-Maxi) y la vulnerabilidad (Vui) en cuanto al incremento del rango de viabilidad (RXi) (Fernández et al., 2012b). ......................... 54 Figura 4-1 Diagramas de Cajas para los resultados de 1000 RBA, N=100 con variación de la conectividad K. A. Emergencia B. Auto-organización (S). C. Homeostasis y D. Complejidad (Gershenson and Fernández, 2012a). ........................................................................................... 63 Figura 4-2 E, S, C y H promedio para 1000 RBA, N = 100 nodos variando el promedio de conectividad K (Gershenson y Fernández, 2012). ........................................................................ 64 Figura 4-3 Autopoiesis (A) promedio para 50 conjuntos de redes Ne=96, Ni=32. Valores de A<1 en rojo. Valores en azul para A>1. El tamaño de los círculos indican que tan lejos está A de A=1. Los valores numéricos se muestran en la tabla 4-1 (Fernández et al., 2014b). .......................... 66 Figura 4-4 Evolución para la Regla 30 desde condiciones iniciales para grupos de tres vecinos. http://reference.wolfram.com/language/ref/CellularAutomaton.html ..................................... 67 Figura 4-5 Evolución de la regla 30 en 50 iteraciones http://reference.wolfram.com/language/ref/CellularAutomaton.html ..................................... 67 Figura 4-6 Promedios de 50 ECA para la 19 reglas, N=256, b=1. (Gershenson and Fernández, 2012a) ........................................................................................................................................... 74 Figura 4-7 Promedio de 50 ACE para 19 reglas, N=256, b=2 (Gershenson and Fernández, 2012a). .......................................................................................................................................... 74 XIV Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨                Figura 4-8 Promedio de 50 ACE para 19 reglas, N=256, b=4 (Gershenson and Fernández, 2012a). ...........................................................................................................................................75 Figura 4-9 Promedio de 50 ACE para 19 reglas, N=256, b=8 (Gershenson and Fernández, 2012a). ...........................................................................................................................................75 Figura 4-10 Perfiles de E,S,C y H a Escalas 1,2,4,8. . (Gershenson and Fernández, 2012a) ..........76 Figura 4-11 Reglas de autómatas celulares elementales usadas en el modelo de tráfico y su función cómo interruptores de los semáforos (Zubillaga et al., 2014). .......................................78 Figura 4-12 Fronteras no orientables para una grilla de cuatro por cuatro (Zubillaga et al., 2014)..............................................................................................................................................79 Figura 4-13 Esquema de una intersección y parámetros de medición para la definición de reglas en semáforos auto-organizantes (Zubillaga et al., 2014) ............................................................80 Figura 4-14 Resultado de la simulación para fronteras no-orientables para la ola verde y método auto-organizante: promedio de velocidad v y promedio de flujo J para diferentes densidades de ρ. Las curvas óptimas se muestran con línea punteada discontinua (Zubillaga et al., 2014). .......................................................................................................................................81 Figura 4-15 Emergencia (E), Auto-organización (S) y complejidad para los intervalos de cambio de luz en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) .....................82 Figura 4-16 Emergencia (E), Auto-organización (S) y complejidad para los intervalos en intersecciones en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) ......................................................................................................................................................83 Figura 4-17 Emergencia (E), Auto-organización (S) y complejidad para los intervalos en las calles en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) .....................83 Figura 4-18 Análisis de Componentes Principales. Las propiedades en Azul y las conectividades en Rojo. .........................................................................................................................................88 Figura 5-1 Zonación de Un Lago. La figura muestra las zonas Superficial, planctónica, de macrófitas acuáticas, bentónica y el substrato.(Fernández et al., 2014b). .................................93 Figura 5-2 Cajas de bigotes para las variables físico-químicas (Fernández and Gershenson, 2014; Fernández et al., 2014b). En ella se representan cada uno de los valores de cada variable representados por puntos. Con ello se observa la distribución real de los valores. Las abreviaciones se dan en las tablas 5-1 ..........................................................................................97 Figura 5-3 Distribución de los valores normalizados a base 10 de las variables físico-químicas en las clases 0-9. (Fernández and Gershenson, 2014; Fernández et al., 2014b). Variables con valores distribuidos de manera similar entre las clases 0 a 9, tendrán mayor información. Es decir, alta emergencia pues la variable puede tomar cualquier valor. Variables con puntos distribuidos de manera más concentrada en una u otra clase, producirán menos información. Es decir, alta auto-organización pues tales clases tendrán una probabilidad alta.. ..................98 Figura 5-4 Emergencia para las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) ..................................................................................99 Contenido XV                    Figura 5-5 Auto-organización de las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) ................................................................................. 99 Figura 5-6 Complejidad de las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) ................................................................................. 99 Figura 5-7 Homeostasis del componente físico-químico de un lago ártico en un ciclo anual. (Fernández and Gershenson, 2014; Fernández et al., 2014b) ..................................................... 101 Figura 5-8 Complejidad para los 3 componentes desde las variables elegidas en la tabla 5, para dos zonas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) ....... 102 Figura 5-9 Autopoiesis de la Biomasa Planctónica y Bentónica respecto de los nutrientes limitantes (PB/LN) y las variables fisicoquímicas (PB/PC), escogidas en tabla 5 (Fernández and Gershenson, 2014; Fernández et al., 2014b). Para ambos casos fue superior a uno por lo que se les da el color azul ..................................................................................................................... 103 Figura 5-10 Complejidad Comparativa en cuatro ecosistemas acuáticos- Ártico-Ar, Templado tierras altas-NH, Templado tierras bajas-NL y Tropical-T (Fernández et al., 2014d) .............. 104 Figura 5-11 Tendencia de la complejidad en una comunidad simulada de mamíferos para 10 sitios. Se muestran las primeras 800 especies en 1000 iteraciones (Fernández et al., 2013). ... 107 Figura 5-12 Mejor Solución Obtenido para Nutrientes Limitantes ........................................... 108 Figura 5-13 Mejor Solución Obtenido para Biomasa ................................................................. 109 Figura 5-14 Mejor Solución Obtenido para el Componente Físico-químico ............................. 109 Figura 5-15 Prueba de Ajuste del Modelo PG al Componente de Nutrientes limitantes ........... 110 Figura 5-16 Prueba de Ajuste del Modelo PG a la Biomasa ....................................................... 111 Figura 5-17 Prueba de Ajuste del Modelo PG al componente Físico-químico ........................... 111 Figura 5-18 Emergencia, Auto-organización, Complejidad y Homeostasis para un el Componente Físico-químico de un Lago Ártico ........................................................................ 112 Figura 5-19 Emergencia, Auto-organización, Complejidad y Homeostasis para un el Componente Físico-químico de un Lago Tropical .................................................................... 112 Figura 7-1 Hidroclimatología del lago Ártico (Randerson and Bowker, 2008). A la izquierda la temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. ................................................................................................ 123 Figura 7-2 Hidroclimatología del lago templado del norte-NH (Randerson and Bowker, 2008). A la izquierda temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. ................................................................................. 124 Figura 7-3 Hidroclimatología del lago templado del norte de tierras bajas-NL (Randerson and Bowker, 2008). A la izquierda temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. ........................................................ 125 Figura 7-4 Hidroclimatología del lago tropical. A la izquierda temperatura en las 3 zonas de estudio (Randerson and Bowker, 2008). A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. ................................................................................................ 126 XVI Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Contenido XVII Lista de tablas             Pág. Tabla 1-1 Tipos de Sistemas Dinámicos (SD) .............................................................................. 14 Tabla 4-1 Autopoiesis (A) promedio para 50 conjuntos de redes Ne=96, Ni=32. En rojo: redes acopladas con 𝑨 < 𝟏, en azul redes acopladas con 𝑨 > 𝟏 Los resultados son los mismos que se ven en la fig. 4-3 (Fernández et al., 2014b). ................................................................................. 66 Tabla4-2 Reglas Incluidas de la Clase I. Condiciones de Evolución y Representación de 20 Iteraciones. .................................................................................................................................. 69 Tabla 4-3 Reglas Incluidas de la Clase II. Condiciones de Evolución y Representación de 20 Iteraciones ................................................................................................................................... 70 Tabla 4-4 Reglas Incluidas de la Clase III. Condiciones de Evolución y Representación de 20 Iteraciones ................................................................................................................................... 71 Tabla 4-5 Reglas Incluidas de la Clase IV. Condiciones de Evolución y Representación de 20 Iteraciones ................................................................................................................................... 72 Tabla 4-6 Reglas de Actualización de ACE ................................................................................. 77 Tabla 5-1 Variables del Componente Físico-químico-PC ............................................................ 94 Tabla 5-2 Variables del Componente de ...................................................................................... 95 Tabla 5-3 Variables del Componente de Biomasa-Bio ................................................................ 95 Tabla 5-4 Categorías, Rangos y Colores de Clasificación de las Propiedades E,S y C ................ 97 Tabla 5-5 Componentes tenidos en cuenta para el cálculo de la complejidad y posterior autopoiesis, en las zonas planctónica y bentónica del lago ártico ........................................... 102 Contenido XVIII Introducción Desde una perspectiva amplia, se puede estimar que todo lo que nos rodea presenta algún grado de dinamismo, es decir de cambio. Aunque puede resultar ser una cuestión de escala (nivel de abstracción), el cambio se da incluso en entidades cómo las rocas, que lo hacen a escalas de tiempo geológico. El cambio en los diversos sistemas naturales y artificiales, ha llamado la atención de la comunidad científica durante mucho tiempo. A pesar que cada día la renovada y aumentada capacidad computacional nos ha permitido acercarnos a su entendimiento, los aspectos relativos a su complejidad ha limitado la posibilidad de su predicción. Mucho de ello se debe a que en los sistemas cambiantes, los comportamientos globales vienen de la diversidad de interacciones surgidas cómo resultado de la naturaleza de sus elementos. Por ello, la ciencia tradicional y su enfoque reduccionista necesita hoy en día complementarse, ahondar en las interacciones, para acercarse más al entendimiento de un sistema dinámico con rasgos de complejidad. Si bien conocemos en diferentes áreas y disciplinas mucho acerca de las partes, hoy tenemos la posibilidad de conocer y ahondar más en las interacciones. El panorama que surge se hace muy interesante. Uno donde podemos armonizar diversos aspectos del universo, de la vida y la computación, tales como la materia, la energía, la cultura, la tecnología, entre muchos otros. Sobre esta base se puede llegar a descifrar los aspectos ocultos del comportamiento y dinamismo en los problemas actuales en el campo de la biología, ecología, sociología y economía. Cómo fundamento para el entendimiento de la complejidad, tenemos que el dinamismo surge desde las interacciones auto-organizantes de las partes. Las interacciones permiten mantener la integridad del sistema, gracias a la autonomía y la autorregulación de las partes. Estos rasgos, renombrados cómo: emergencia, auto-organización autopoiesis y homeostasis, son los que le proporcionan a los sistemas dinámicos la suficiente robustez y posibilidad de cambio ante las variaciones internas y externas. Es decir, le dan la complejidad necesaria para mantener su adaptación y evolución en un contexto de variedad requerida (Ross Ashby, 1956). En ese contexto, se hace posible una refinación y redefinición de las propiedades y conceptos necesarios para la descripción apropiada de un sistema dinámico compuesto de múltiples entidades y en diferentes niveles de abstracción. Este enfoque resulta promisorio, por la posibilidad de contribuir al entendimiento de algunos de los retos actuales, conocidos 2 Introducción cómo las 3 principales emergencias en la historia de la humanidad, planteados en (Gershenson, 2013a): (i) la transición entre lo no vivo y lo vivo, (ii) el surgimiento de la conciencia y (iii) la naturaleza del espíritu humano (cómo el máximo nivel de conciencia). Introducción 3 Motivación En el estudio de los sistemas dinámicos con múltiple número de agentes, han sido apreciables los esfuerzos por generar nuevas nociones, formalismos y metodologías que nos permitan describir los conceptos de emergencia, auto-organización y complejidad (Aguilar, 2014; Bar- Yam, 2004a; Gershenson and Heylighen, 2003; Heylighen, 2011; Koza, 1995; Shalizi et al., 2004). Sin embargo, ha surgido la necesidad de valorar otros aspectos complementarios, cómo la homeostasis y la autopoiesis. Es decir, existe la posibilidad de valorar un número mayor de propiedades en los SD, con el fin de lograr un mejor entendimiento del resultado global de las interacciones que dan origen a su estructura y dinámica. Sobre la anterior base, la investigación doctoral aquí desarrollada buscó lograr una mejor interpretación de las dinámicas colectivas en los SD, y ahondar en el entendimiento de los aspectos relativos a su complejidad. Para ello, se enfocó en generar métricas precisas y formales que representaran adecuadamente los conceptos de emergencia, auto-organización, complejidad, homeostasis y autopoiesis (𝐸𝐴𝐶𝐻𝐴), para fines de modelado de SD. En este sentido, se buscó generar una contribución al conocimiento de los SD que permitiera clarificar el significado de los conceptos que 𝐸𝐴𝐶𝐻𝐴 describiesen. Para tal fin, se diseñaron aplicaciones a fenómenos computacionales y naturales que nos posibilitaran estudiar y analizar el sentido práctico de las formalizaciones a desarrollar. El alcance de los resultados obtenidos en esta tesis, se orientó a brindar una visión de los SD que fuese más allá de los límites del reduccionismo. Nuestro esfuerzo estuvo dirigido a ayudar a responder a las preguntas esenciales en cuanto a la complejidad en SD, que la comunidad científica se viene planteando. Todo ello, a través de un enfoque interdisciplinar, soportado por una red científica colaborativa internacional. 4 Objetivos Introducción General Desarrollar un enfoque metodológico para sistemas dinámicos complejos, que considere la exploración, generación y modelado de los aspectos de auto-organización, emergencia, complejidad, homeostasis y autopoiesis. Específicos  Definir formalmente un sistema multi-agente como un sistema dinámico  Proponer nuevas nociones, con sus formalismos, para la caracterización de los sistemas multi-agente como sistemas dinámicos.  Desarrollar casos de estudio inspirados, entre otros, en un sistema socio-ecológico de referencia. Introducción 5 Antecedentes En décadas recientes, el estudio de los sistemas complejos ha incrementado el entendimiento de un amplio número y rango de fenómenos. Sus fundamentos matemáticos se hallan en las teorías del caos, de la información y de la computación. Se han tratado de explicar desde el estudio de los fractales, los mapas iterativos y la termodinámica. Igualmente, se han desarrollado modelos y técnicas de modelado de gran utilidad, que se han basado en técnicas analíticas y simulación computacional. Se incluyen allí, la mecánica estadística, la dinámicas estocástica, los autómatas celulares y el modelado multi-agentes, por mencionar algunos. (Bar-Yam, 2003; Mitchell, 2009). Los conceptos usados para clarificar el estudio de los SD, tales como emergencia, adaptabilidad, auto-organización y complejidad, han sido usados en diferentes contextos con diferentes significados. Los tópicos abordan casos como:  El análisis de la medidas de complejidad (Crutchfield and Young, 1989; Edmonds, 1999; Lloyd, 2001), en donde se inspeccionan desde la filosofía del modelado, hasta las formas de medir la complejidad, su perspectiva estadística, y la clasificación temática de las diferentes medidas.  El análisis de sistemas naturales (incluidos ecosistemas) desde la teoría de la computación y la información, para cuantificar la complejidad estructural. En específico, el estudio del fenómeno de adaptación desde simulaciones computacionales de sistemas naturales, da el entendimiento para el diseño y construcción de sistemas complejos (Crutchfield, 2011; Koza, 1995).  El estudio de la irreductibilidad de la complejidad, explicada desde el contenido de información algorítmica, dada cuando en una cadena de bits la información contenida es igual a su tamaño. En estos casos, la cadena de bits es incompresible y no tiene redundancia (Chaitin, 2007).  El análisis de la estructura y función de redes complejas de ámbitos biológicos o sociales, partiendo de variadas técnicas de modelado y sobre la base de indicadores estadísticos para su caracterización (Newman, 2003). 6 Introducción  El estudio de la auto-organización como la generación de la propia estructura en organismos biológicos (Camazine et al., 2001), considerando que la auto-organización y la emergencia pueden coexistir como fenómenos separados dado que cada una enfatiza en diferentes aspectos del sistema (De Wolf and Holvoet, 2005), la auto-organización de sistemas fuera del equilibrio (Nicolis and Prigogine, 1977), y la apreciación de la complejidad como una condición intermedia entre el caos y el orden, relacionándose así con la auto-organización (Heylighen, 2011).  La caracterización de la dinámica auto-organizante de estructuras complejas en la sociedad y la naturaleza, en aspectos relacionados como la evolución de la complejidad, la evolución de la optimización y el estudio de casos como los medios de transporte (Schweitzer, 1997a).  La evaluación de las complejidades urbanas y ecológicas que surgen de dinámicas locales a globales (Bottom-Up), desde estas perspectivas, las ciudades son observadas como organismos vivos (Batty, 2012; Batty, 1971). Al mismo tiempo, en la ecología se valora la contribución del enfoque de los sistemas complejos a las dinámicas de acoplamiento del habitat, a las fluctuaciones poblacionales, y a las interacciones en redes tróficas. Desde este punto, se ve como el estudio de la complejidad en ecología es un campo naciente (Parrott, 2010).  El modelado individual basado en dinámicas colectivas de sistemas físicos de partículas que siguen el movimiento Browiniano (Schweitzer, 1997b).  Los intentos de unificación desde la teoría de la información del concepto de auto- organización, y no sólo eso, sino la relación de ésta última con la teoría del caos (Haken, 1989). Desde la perspectiva de Haken (1989) y Prokopenko (2009a), se aborda la existencia de 3 aspectos de la auto-organización para la vida artificial: (a) la evolución del sistema desde la interacción de sus componentes a estados de mayor organización, (b) la manifestación de esta organización en una coordinación y manifestación global, (c) la expresión de patrones no impuestos por influencias externas.  Las necesidades de un nuevo paradigma para la complejidad desde varias teorías, que satisfagan diversas aplicaciones en distintos sistemas (Morin, 1992).  El análisis de la universalidad de la complejidad y su irreductibilidad computacional, que limita la predictibilidad del sistema, por cuanto existe gran diversidad de interacciones locales que brindan apreciable riqueza en el comportamiento del mismo (Wolfram and Gad-el-Hak, 2003; Wolfram, 1984). Como punto de coincidencia, muchos de los anteriores autores tocan una diversidad de nociones, en especial de complejidad, emergencia y auto-organización. Se refieren de manera apreciable a la ambigüedad, confusión, e incluso abuso, de la terminología, en discursos no científicos (Edmonds, 1999). En el caso de los sistemas multi-agentes, han existido trabajos seminales que han permitido consolidar su teoría. Entre ellos se destacan los aportes teóricos y prácticos de Wooldridge Introducción 7 and Jennings (1995), para el diseño y construcción de agentes inteligentes. En el marco de la teoría de agentes se define que es uno y el uso de formalismos matemáticos para su representación y la de su razonamiento. Se abordan también las arquitecturas y modelado desde la ingeniería del software, y el caso no menos importantes de los lenguajes y sistemas de programación y experimentación de agentes. Por su parte, Ferber and Gutknecht (1998), proponen un meta-modelo de organización artificial entre agentes llamado AALAADIN. Basados en AALAADIN, proponen la plataforma MADKIT para apoyar el modelado con agentes heterogéneos. Ante el auge tomado por los sistemas multi-agentes, se ha analizado su vinculación con terminos como situabilidad, flexibilidad y autonomía, para clarificar sus nociones y sus aspectos metodológicos de representación ( Jennings et al. 1998; Teran 2001). Ferber et al. (2004) han avanzado en el modelado con la propuesta de principios generales para sistemas multi-agentes de organización centralizada (OCMAS en Inglés). Trabajos más actuales se han esforzado en involucrar las propiedades de complejidad, auto- organización y emergencia en los sistemas multi-agentes. Muchos de ellos han buscado el desarrollo de arquitecturas, plataformas de modelado y modelos específicos, para que sea viable representar, reproducir y medir la auto-organización y la emergencia en sistemas multi-agentes. (Aguilar et al., 2007; Aguilar, José, Besembel, I., Cerrada, M., Hidrobo, F., Narciso, 2008; Perozo, Niriaska, Aguilar, José, Terán, O, Molina, 2012a, 2012b). 8 Introducción Organización de la tesis La tesis tiene una organización preferencialmente secuencial, de manera que los elementos de un capitulo precedente brinda elementos para el entendimiento de los demás. En la siguiente sección se dan los elementos principales de la teoría de los SD, y las nociones básicas de auto-organización, emergencia, complejidad, homeostasis y autopoiesis (𝐴𝐸𝐶𝐻𝐴). Los elementos de los SD incluyen a la complejidad como una mirada complementaria para su estudio, que va más allá del reduccionismo tradicional; por su parte, las nociones 𝐴𝐸𝐶𝐻𝐴 sientan la base conceptual de la formalización. En el capítulo 2 se discute como puede llegarse a la especificación de un sistema dinámico como una red computacional de agentes. Para ello se propone integrar los elementos de 𝐴𝐸𝐶𝐻𝐴, y se finaliza con varios formalismos que también integran la teoría de SD, de multi-agentes y de grafos. En el capítulo 3 se presentan los formalismos desarrollados para cada noción de 𝐴𝐸𝐶𝐻𝐴. Allí se muestra la riqueza de los formalismos, que dio origen a diversos indicadores. En ese capítulo las nociones derivadas de la teoría de la información para 𝐴𝐸𝐶𝐻𝐴, se constituyen como el eje central de la tesis. El capítulo 4 presente aplicaciones en sistemas discretos, como en las redes booleanas aleatorias, y en autómatas celulares elementales; además, contiene una aplicación urbana en un modelo de tráfico que se basa en tres reglas de autómata celular elementales, de gran utilidad para la planeación en ciudades vivas y auto-organizantes. El capítulo 5 discute y analiza el sentido ecológico de la complejidad, a partir de tres aplicaciones a sistemas ecológicos, ecosistemas acuáticos, y el análisis de comunidades de mamíferos. Se destaca que este capítulo presenta importantes consideraciones para incluir a la complejidad como otro indicador ambiental, útil para el de los ecosistemas. El capítulo 6 finaliza la tesis con las conclusiones y trabajos futuros. Introducción 9 1. CAPITULO 1: SISTEMAS DINÁMICOS; AUTO-ORGANIZACIÓN, EMERGENCIA, COMPLEJIDAD, HOMESTASIS Y AUTOPOIESIS. Resumen Este capítulo presenta los aspectos teóricos y conceptuales básicos acerca de los sistemas dinámicos complejos (SD). Desde una perspectiva histórica, se discuten el elemento de su incertidumbre; a partir de allí, se ahonda en la inclusión de la dimensión de la complejidad. Con lo anterior como base, se muestran nuestras consideraciones acerca de las características de complejidad, emergencia, auto- organización, homeostasis y autopoiesis en SD. Este último apartado tiene como fin brindar una visión lo más clara posible de cada una de ellas, con el objeto de contribuir a su desambiguación y sentar las bases para su posterior modelado matemático. 1.1 Teoría de los Sistemas Dinámicos (TDS) En esta tesis observamos la TDS como el área de las matemáticas usadas para describir el comportamiento de sistemas dinámicos complejos (Mitchell, 2009). En consecuencia las generalizaciones y nociones que se presentan en apartados subsiguientes se enfocan en este tipo de descripción. 1.1.1 Visión General La teoría de sistemas dinámicos (TSD), concierne con la descripción y predicción de sistemas que exhiben un comportamiento complejo en un nivel macroscópico, que emerge desde las acciones colectivas de interacciones de sus componentes. La palabra dinámica es referida al cambio, y los sistemas dinámicos (SD), efectivamente, cambian en el tiempo de alguna forma. Existen variados ejemplos de SD, como lo son: el sistema solar, el corazón y el cerebro de las 12 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- criaturas vivas, la población mundial, o el cambio climático. No obstante, ejemplos como las rocas también son un tipo de SD, nada más que sus cambios se dan a escalas de tiempo geológico (Mitchell, 2009). La TSD describe en términos generales las formas en las que el sistema puede cambiar, qué tipo de comportamientos macroscópicos son posibles, y qué tipos de predicciones se pueden hacer acerca de estos comportamientos. Actualmente esta teoría está en boga debido a los fascinantes resultados obtenidos de uno de sus productos intelectuales, el estudio del caos (Crutchfield, 2011). 1.1.2 Aspectos Históricos El origen de la TSD se remonta a tiempos aristotélicos, dado que este filósofo fue autor de varias teorías de movimiento, una de ellas aceptada ampliamente por más de 1.500 años. Esta teoría básicamente definió dos principios (Gyekye, 1974), (i) el movimiento de la tierra difería del movimiento de los cielos y (ii) los objetos terrestres se movían de diferente forma en dependencia de lo que estuvieran hechos. Posteriormente, los aportes de Galileo sobre el movimiento de los planetas desde bases experimentales, contribuyeron a sentar muchos principios que hemos conocido en diversos cursos de física. Después de la muerte de Galileo, en ese mismo año, nació Newton, la persona más importante en la historia de la dinámica, dado que inventó una rama de las matemáticas que describe el movimiento y el cambio (Madhusudan, 2010). Los físicos de la época llamaron al estudio del movimiento Mecánica (Verlinde, 2011), la cual podía explicarse en términos de acciones combinadas de máquinas simples como palancas, poleas, ruedas y ejes. En particular, un trabajo clave en esta área es el de Newton, conocido como Mecánica Clásica. La mecánica clásica se divide en dos ramas (Christianson, 1998): (i) la cinemática o cómo las cosas se mueven, y (ii) la dinámica que se ocupa por explicar el movimiento de las cosas como producto de las leyes de la cinemática. Newton pudo explicar el cambio en el movimiento elíptico de orbitas planetarias en términos de la fuerza, llamada gravedad. Desde la mecánica newtoniana, que produjo una figuración del "mecanismo del universo", Pierre Sión Laplace vio la importancia que tenía esta figuración para la predicción; por lo que mencionó que desde las leyes de Newton, y al tener la velocidad y posición de una partícula, era posible, en principio, predecir todo (Rivas Lado, 2001). 1.1.3 La Incertidumbre de la Previsibilidad Dos descubrimientos en el siglo XX mostraron que esa capacidad predictiva definida por Laplace no era posible. El primero fue el descubrimiento del principio de incertidumbre, en mecánica cuántica, de Werner Heisenber en 1927, que estableció que no se puede hacer medición de la posición y el momentum (masa y velocidad) de una partícula al mismo tiempo. El segundo fue el descubrimiento del Caos; los Sistemas Caóticos son aquellos en que minúsculas incertidumbres en la medición de la posición inicial, resultan en grandes errores en términos de predicción a largo plazo. Esto es conocido como la sensibilidad a las CAPÍTULO 21 13 condiciones iniciales. Comportamientos caóticos han sido observados en desordenes cardiacos, turbulencias de fluidos, circuitos electrónicos, grifos que gotean, entre otros. El matemático Francés Henri Poincaré, fundador de la topología algebraica, demostró la sensibilidad de las condiciones iniciales en el problema de los tres cuerpos, que trataba de predecir las posiciones futuras de varias masas que se atraían arbitrariamente una a la otra bajo las leyes de Newton. Este hecho marcó uno de los momentos importantes en la historia de la TSD, pues puso en duda la presuposición científica de previsibilidad, y demostró los límites de la previsibilidad heredada hasta ese momento y evidenciada en los trabajos de Galileo, Newton y Laplace (Gershenson, 2011). En nuestros días, la conciencia de falta de previsibilidad de muchos de los SD ha llevado a considerar no solo las partes, sujetos de especial interés desde el método científico tradicional, sino también las múltiples interacciones que existen entre ellas. Esta gran cantidad de interacciones son las que crean sistemas entretejidos cuya dinámica es difícil de separar. Son las interacciones la característica más importante de muchos SD, dado que el comportamiento de un elemento depende de otro, y así el de muchos otros, de forma tal que el rasgo que sobresale es la interdependencia entre elementos del sistema. Esto es lo que hace que los SD se tornen difíciles de predecir, que se tornen complejos, y por ende, que se clasifiquen como tal (Bar-Yam, 2003; Gershenson, 2011). 1.1.4 Implicaciones Matemáticas Típicamente, se considera que un sistema está "resuelto" cuando se llega a un conjunto finito de expresiones finitas, que pueden ser usadas para predecir su estado en un tiempo t, dado el estado del sistema en algún tiempo inicial 𝑡0, o anterior 𝑡1. Las soluciones halladas de esta forma, no son generalmente apropiadas o posibles para muchos SD. En este sentido, la contribución central de la TDS a la ciencia moderna es que las soluciones exactas no son necesarias para entender y analizar los procesos no lineales. Así, en lugar de hallar soluciones exactas o descripciones estadísticas ajustadas, el énfasis de la TDS está en describir la geometría y la estructura topológica del conjunto de soluciones. Es decir, la TDS da una visión geométrica de un proceso estructural de elementos, como atractores, cuencas y separatrices; hecho que la distingue del enfoque puramente probabilístico de la mecánica estadística, en la que la estructura geométrica no es considerada. En adición, la TDS también direcciona las preguntas acerca de qué estructuras genéricas se hallan, esto es, qué tipos de comportamientos son típicos a través del espectro de los SD (Mitchell, 2009; Mitchell et al., 1994). 1.2 Noción General de SD A continuación se hace referencia a las descripciones matemáticas que permiten de manera idealizada representar muchos de los fenómenos reales que acontecen a nuestro alrededor y 14 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- que tienen como característica principal su cambio y evolución en el tiempo. Desde esta consideración básica, se han definido dos componentes para un SD (Scheinerman, 1996): (i) un vector de estado que describe su estado actual, y (ii) una función-regla por medio de la cual, dado el estado actual, se puede obtener el estado del sistema en el siguiente instante de tiempo. Desde esta perspectiva, los SD se han definido como: sistemas que cambian o evolucionan su estado (𝑞) en el tiempo (t), en razón a una regla de evolución (𝑅) que lo demarca. Esta regla puede tener la estructura 𝑅: 𝑄 × 𝑇 → 𝑄, donde 𝑄 es el conjunto de estados posibles y 𝑇 el tiempo. Así, 𝑅 conduce a un estado 𝑞 ∈ 𝑄. De acuerdo a como se especifique la regla se pueden dar diferentes tipos de SDs. Desde nuestra perspectiva, un tanto más amplia e inscrita en el marco de la TDS expuesta en el ítem 1.1., un SD puede ser observado como un sistema dependiente del tiempo, tal que las interacciones de sus elementos según sus estados locales, determinan los estados globales del sistema. La tabla 1-1 lista los más conocidos tipos de SD reportados en la literatura, acorde con la variación del tiempo, su linealidad o no, y su naturaleza determinista. Tabla 1-1 Tipos de Sistemas Dinámicos (SD) Tipo de SD Discreto Característica Formalismo/Modelo de Ejemplo El tiempo transcurre en lapsos pequeños, por lo que el cambio se da Ecuación logística * 𝑞𝑡+1 = 𝑟𝑞𝑡(1 − 𝑞𝑡) en instantes separados de tiempo. Ej. Crecimiento poblacional (r), limitado 𝑡 ∈ ℝ Continuo El tiempo transcurre de manera continua, y así el cambio. 𝑡 ∈ ℤ Lineales Efecto proporcional a la causa. Opera el principio de superposición (Si se conocen dos soluciones para un sistema lineal, la suma de ellas es también una solución). 𝑓(𝑥 + 𝑦) = 𝑓(𝑥) + 𝑓(𝑦) No lineales Efecto no proporcional a la causa. por la capacidad de carga (𝐾) del sistema, que corresponde con la cantidad de elementos que puede soportar el mismo. Ecuación diferencial* 𝑑𝑥 𝑑𝑡 = 𝑟𝑞(1 − 𝑥) Ej. Modelo de predador-presa de Lokta-Volterra Ecuación lineal* 𝑞𝑡+1 = 𝑟𝑞𝑡 Ej. Sistema Masa-Resorte (Oscilador Armónico Simple) Opera el principio de no Péndulo doble, movimiento descrito por superposición, es decir: 𝑓(𝑥 + 𝑦) ≠ ecuaciones de Lagrange. Deterministas Regla 𝑅 puede ser funciones 𝑓(𝑥) + 𝑓(𝑦). iterativas. El determinismo en SD permite generar cierta predictibilidad sobre el sistema basado en las relaciones causa-efecto presentes en él, no obstante, dicha predictibilidad tiene sus límites. 𝑅 está dada por 𝑅(𝑞(𝑡), 𝑟) → 𝑞(𝑡 + 𝜏), donde 𝑞 es un estado del conjunto de estados posibles 𝑄, 𝑟 un parámetro de la regla y 𝜏 es un lapso de tiempo. De esta manera, dado un estado 𝑞(0), la evolución estará determinada ∀𝑡. CAPÍTULO 21 15 Estocásticos Abarcan eventos aleatorios; su evolución puede ser estimada de La variable de estado 𝑞(𝑡) es aleatoria, cuyo dominio son los reales, de acuerdo manera probabilística. con una función de probabilidad. Ej. La planificación de una línea de producción. Ej. el tiempo de funcionamiento de una máquina entre avería y avería, su tiempo de reparación, el tiempo que necesita un operador humano para realizar una determinada operación *Donde 𝑡 es tiempo, 𝑞 es la variable de estado y 𝑟 parámetro que afecta la variable 𝑞. 1.3 La Complejidad en Sistemas Dinámicos: Propiedades de Auto-organización, Emergencia, Complejidad, Homeostasis y Autopoiesis. El punto central del estudio de la complejidad en los Sistemas Dinámicos (SD), está en entender las leyes y mecanismos por los cuales un comportamiento coherente global y difícil de entender, emerge desde las actividades colectivas de componentes locales, relativamente simples. Dada la diversidad de sistemas que se incluyen en la categoría de complejos, el descubrimiento de cualquier rasgo común o ley universal se hace valiosa para conformar marcos teóricos generales (Mitchell, 2009). Actualmente, para observar a un SD bajo la óptica de su complejidad, se requiere de mayores conceptos y profundizar en sus aspectos formales. Se requiere, también, de sofisticadas herramientas, tanto analíticas como computacionales. En este sentido, la representación de un SD con un número mayor de propiedades que faciliten su análisis se hace apreciable (Bar- Yam, 2003; Bersini et al., 2010; Luisi, 2007). Propiedades como el caos (sensibilidad a las condiciones iniciales), la no linealidad (no proporcionalidad entre causa y efecto), la criticalidad auto-organizada (orden desde condiciones críticas), la auto-organización en sistemas fuera del equilibrio, han estado entre las más consideradas en este campo (Bak et al., 1988; Langton, 1990; Nicolis and Prigogine, 1989). Ahora bien, tradicionalmente la emergencia y la auto-organización han constituido los fenómenos más utilizados para explicación de la complejidad en SD. Sin embargo, tales propiedades podrían no ser suficientes para entender, entre otros, la adaptabilidad y la evolución espacio-temporal de los SD. Así, se ha observado como pertinente ahondar en otras propiedades referidas al equilibrio y a la autonomía, como lo son las propiedades de homeostasis y de autopoiesis (Fernández et al., 2010a). La homeostasis (equilibrio dinámico, en general) y la autopoiesis (auto-producción, auto-mantenimiento) constituyen propiedades emergentes que dan soporte al proceso de auto-organización. El sustento de ello está en que: (i) la capacidad auto-organizante del SD de adaptarse a ambientes cambiantes, 16 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- acorde con sus necesidades de sobrevivencia y/o mejoramiento de su funcionamiento colectivo al interior del SD, se logra sobre la base del establecimiento de un equilibrio dinámico u homeostasis. Es decir, la auto-organización se respalda en mecanismos de autorregulación (Martius et al., 2007). (ii) Adicionalmente, la capacidad auto-organizante de los SD se apoya en procesos autopoiéticos (Maturana and Varela, 1980) que le confieren la propiedad de autonomía. La autonomía, es inherente a sistemas cerrados que se auto- referencian, se auto-constituyen en una dinámica de continua producción de sí mismos. A través de la homeostasis y la autopoiesis, se puede desarrollar, conservar, producir y sustentar la propia organización en el tiempo (Garciandía, 2005), desde un enfoque de auto- mantenimiento del SD. Desde la anterior perspectiva, es posible definir un SD como un sistema con rasgos de (𝐸𝐴𝐶𝐻𝐴) emergencia, auto-organización, complejidad, homeostasis y autopoiesis (Fernández et al., 2010a). A continuación presentamos una síntesis de las nociones básicas de 𝐸𝐴𝐶𝐻𝐴 que, desde nuestra visión, contienen los elementos para su posterior formalización. 1.3.1 Emergencia La emergencia es uno de los conceptos que más mal entendido y mal usado ha sido en décadas recientes. Las razones para ello son variadas e incluyen: polisemia (múltiples significados), moda o deseo de impresionar (buzzwording), confusión, Platonismo, y aún misticismo. Podemos decir que la controversia de su concepto ha durado décadas. Aun así, el concepto de emergencia puede ser definido desde ciertas miradas (Anderson, 1972) (Aguilar, 2014). Ahora bien, en general las propiedades de un sistema son emergentes, si ellas no están presentes en sus componentes. En otras palabras, propiedades globales que son producidas por las interacciones locales son emergentes. La emergencia se da a una escala dada, y no puede ser descrita sobre la base de las propiedades de una escala inferior (Fernández et al., 2011). Por ejemplo, la temperatura de un gas se puede decir que es emergente (Shalizi, 2001), pues sus moléculas no poseen esta propiedad: la temperatura es una propiedad colectiva. Igualmente, en una pieza de oro emergen propiedades tales como la conductividad, maleabilidad, color, brillo; las cuales no pueden ser descritas a partir de las propiedades de los átomos de oro (Anderson, 1972). De una manera amplia e informal, la emergencia puede ser vista como las diferencias que son observados, en los sistemas, a diferentes escalas (Prokopenko et al., 2009). Se estima que algunas personas podrían percibir dificultades en describir fenómenos a diferentes escalas (Gershenson, 2013b), pero ello puede ser la consecuencia de tratar de encontrar una única "verdadera" descripción de un fenómeno. Dado que los fenómenos no dependen de las descripciones que hacemos de ellos, podemos tener múltiples y diferentes descripciones del mismo fenómeno. Como alternativa, es más informativo manejar diferentes CAPÍTULO 21 17 descripciones a la vez, lo que actualmente es más apropiado y necesario cuando se estudian sistemas complejos. 1.3.2 Auto-organización Desde la mitad del siglo pasado, la auto-organización ha sido vista como un evento de cambio de la propia organización, sin que una entidad externa influya en el proceso (Ross Ashby, 1947a). Su base está en las reglas locales que conducen al sistema a producir una estructura o comportamientos específicos (Georgé et al., 2009). Este proceso viene desde la dinámica interna del sistema, definida por las interacciones entre los elementos. Su resultado es un grado determinado de regularidad, que puede derivar en la expresión de un conjunto de patrones (Ebeling, 1993; Eriksson and Wulf, 1999). La auto- organización es un proceso por el cual se alcanza dinámicamente la función y el comportamiento global del sistema, a partir de las interacciones de sus elementos. Tal función o comportamiento no es impuesta por uno o pocos elementos, ni determinada jerárquicamente. Así, la auto-organización se adquiere autónomamente por la interacción de los elementos que producen, a su vez, retro-alimentaciones que regulan el sistema (Gershenson, 2007). Desde esta perspectiva, se puede ver la auto-organización como un proceso dinámico, adaptativo, que favorece el mantenimiento de la estructura del sistema, en el que se pueden expresar patrones de comportamiento para hacer frente a los cambios ambientales (Perozo, 2011; Perozo, Niriaska, Aguilar, José, Terán, O, Molina, 2012b). En la naturaleza, la auto-organización ha sido usada para describir los procesos básicos por los cuales se forman enjambres, cardúmenes de peces, parvadas de patos o el tráfico vehicular. En general ha sido descrita en muchos sistemas, donde las interacciones locales además de generar un orden, derivan en la manifestación de un comportamiento global (Camazine et al., 2001; Gershenson, 2007). Cabe destacar que la generación de patrones como un fenómeno emergente vía auto- organización, ha constituido un punto de discusión importante. Esto ha llevado a que la auto- organización y la emergencia hayan sido utilizadas de manera intercambiable. Sin embargo, autores como De Wolf and Holvoet (2005) han expresado que se puede dar auto-organización con y sin emergencia; así como la producción de auto-organización y emergencia al mismo tiempo; o de la emergencia sin la auto-organización. En general, casi cualquier sistema dinámico puede ser visto como auto-organizante: sí su dinámica conduce a un atractor, que puede ser visto como u estado más probable. Podemos decidir llamar ese atractor cómo "organizado". Así, los sistemas dinámicos con un atractor (o más) tenderán a él, de tal manera que el sistema incrementará, por sí mismo, su propia organización (Ross Ashby, 1947b). Sobre esta base, y de manera práctica, podríamos describir casi que cualquier sistema como auto-organizante, más que cómo auto-organizado o no 18 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- (Gershenson and Heylighen, 2003). Lo auto-organizante muestra más el rasgo dinámico, activo de la auto-organización. La conveniencia de tener una medida de auto-organización que capture la naturaleza de la dinámica local en una escala determinada, es especialmente relevante para nuestro tiempo (Ay et al., 2012; Prokopenko, 2009b). Esto es especialmente relevante en el naciente campo de la auto-organización guiada u orientada (AOG) (Ay et al., 2012; Prokopenko, 2009b). La AOG puede describir cómo direccionar la dinámica auto-organizante de un sistema hacia una configuración deseada (Gershenson, 2012a). Esta configuración deseada puede no siempre ser el atractor natural de un sistema controlado. El mecanismo para guiar la dinámica, y el diseño de tal mecanismo, se beneficiará desde la medición y caracterización de la dinámica de un sistema en una forma precisa y concisa. 1.3.3 Complejidad Hay docenas de nociones y medidas de complejidad, propuestas en diferentes áreas con diferentes propósitos (Edmonds, 1999; Lloyd, 2001). Etimológicamente, complejidad viene del latín plexus, lo cual significa entrelazado. Algo complejo es algo difícil de separar. Esto significa que los componentes del sistema son interdependientes, de manera que su futuro está parcialmente determinado por sus interacciones (Gershenson, 2013b). Por lo tanto, estudiar los componentes por separado – como se acostumbra desde el enfoque reduccionista- no es suficiente para describir la dinámica de los sistemas dinámicos complejos. Esto, además, dificulta la predictibilidad de los SD. Un ejemplo de complejidad clásico se halla en el conocido "Juego de la Vida" de Jhon Conway (Berlekamp et al., 1982), en el cual, 4 reglas simples generan dinámicas ricas como estructuras estables, móviles y/u oscilatorias, que son difíciles de predecir. Tradicionalmente se ha pensado que la complejidad se refiere a aquella condición que limita al modelista para formular el comportamiento completo del SD, en un lenguaje dado. En realidad, lo complejo se debe a las interacciones en el SD que generan información nueva y relevante-no presente en las condiciones iníciales ni de frontera- y que influyen en el desarrollo del SD. La complejidad, por tanto, puede estar asociada a los aspectos emergentes y auto-organizantes del SD. Dada la dificultad existente en la adecuada interpretación de la noción de complejidad, y más aún en su medición, tener medidas globales de complejidad es una tarea actual, de gran importancia y utilidad. Una medida útil de complejidad debe estar disponible para permitirnos responder preguntas como: ¿Es un desierto más o menos complejos que una paramo? ¿Cuál es la complejidad de diferentes brotes de influenza? ¿Cuáles organismos son más complejos: predadores o presas; parásitos u hospederos; individuos o sociedades? ¿Cuál es la complejidad de situaciones tan CAPÍTULO 21 19 disimiles cómo diferentes como los géneros musicales y los diferentes regímenes de tráfico? ¿Cuál es la complejidad requerida de una compañía para enfrentar la complejidad de un mercado? ¿Cuándo un sistema es más o menos complejo? 1.3.4 Homeostasis Originalmente, el concepto de homeostasis fue desarrollado para describir funciones internas de regulación fisiológica, tales como la temperatura o los niveles de glucosa. Probablemente, la primera persona que reconoció el mantenimiento de un ambiente interno casi constante para la vida fue Bernard (Bernard, 1859). Subsecuentemente, Cannon (Cannon, 1932) acuño el término homeostasis ( del griego hómoios (similar) y estasis (estado, estabilidad). Canon, definió la homeostasis cómo la habilidad de un organismo para mantener estados estacionarios de operación durante cambios internos y externos. Sin embargo, esto no implicaba un estado inmóvil o inactivo. Aunque algunas condiciones pueden variar, las principales propiedades de un organismo pueden ser mantenidas. Más tarde, el cibernético británico William Ross Ashby propuso, en forma alternativa, que la homeostasis implicaba una reacción adaptativa, para mantener "variables esenciales" dentro de un rango (Ross Ashby, 1960a, 1947b). Estas variables son esenciales, porque en ellas se basa gran porcentaje del funcionamiento del sistema, de forma que si fallan, el sistema lo hará igualmente. Dos conceptos relacionados con la homeostasis son los conceptos de ultra-estabilidad y adaptación homeostática (Di Paolo, 2000). En ellos se basó Ashby para explicar la generación de comportamiento y aprendizaje en máquinas y sistemas vivos. La ultra-estabilidad se refiere a la operación normal de un sistema dentro de una "zona de viabilidad" para hacer frente a los cambios ambientales. Esta zona de viabilidad está definida por los rangos entre los valores mínimos y máximos de las variables esenciales del sistema. Sí al operar, un valor de estas variables sobrepasan los límites de esta zona, el sistema cambia, se regula para encontrar nuevos parámetros que hacen estas variables retornen a su zona de viabilidad. Es allí donde nace la expresión equilibrio dinámico, pues el sistema se ajusta constantemente para estar en una zona de funcionamiento óptimo. Un SD tiene una alta capacidad homeostática para mantener su dinámica cerca a cierto estado o estados (atractores). Cuando las perturbaciones ambientales ocurren, el sistema se adapta para enfrentar los cambios dentro de su zona de viabilidad sin que el sistema pierda su integridad (Ross Ashby, 1947a). La homeostasis puede ser vista como un proceso dinámico de auto-regulación y adaptación, por el cual el sistema adapta su comportamiento en el tiempo (Williams, 2006). En este sentido, los procesos de homeostasis, emergencia y auto-organización guardan relación, 20 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- porque corresponden con una respuesta específica a las presiones ambientales, en cuyo caso se puede decir que el sistema muestra adaptación (Prokopenko et al., 2009). Es de resaltar que para a pesar de haberse descrito gran cantidad de procesos donde opera la homeostasis, la profundización en sus aspectos formales para su medición y valoración es un gran y atractivo campo de estudio (Fernández et al., 2012b, 2010a). 1.3.5 Autopoiesis La Autopoiesis (del griego auto-propio- y poiesis-creación, producción-), fue propuesto como un concepto para definir lo vivo y distinguirlo de lo no vivo. Recientemente Maturana (Maturana, 2011), en respuesta a Froese (Froese and Stewart, 2010), aclara que la noción de autopoiesis fue creada para connotar y describir los procesos moleculares que toman lugar en la realización de los seres vivos cómo entidades autónomas. El significado de la palabra fue usada, desde sus inicios, para describir redes cerradas de producción molecular (Maturana and Varela, 1980). La noción de autopoiesis surgió de una serie de preguntas relacionadas con la dinámica interna de los seres vivos, las cuales Maturana comenzó a considerar en los 60s. Entre ellas estaban: ¿Cuál debería ser la constitución de un sistema que veo cómo vivo, cómo resultado de su operación? ¿Qué pasó hace 3.800 billones de años para que podamos decir que la vida comenzó allí? En la autopoiesis, los organismos vivos ocurren cómo entidades dinámicas, moleculares, autónomas y discretas. Estas entidades están en continua realización de su auto-producción. Así, la autopoiesis describe la dinámica interna de un ser vivo en el dominio molecular. Maturana resalta que los seres vivos son sistemas dinámicos en continuo cambio. Las interacciones entre los elementos de un sistema autopoiético, regulan la producción y la regeneración de los componentes del sistema, lo que le da el potencial de desarrollarse, preservarse y producir su propia organización (Varela et al., 1974). Desde la autonomía expresada en la autopoiesis se puede tener que una bacteria puede producir otra bacteria por división celular, mientras que un virus requiere de un hospedero para producir otro virus. La producción de una nueva bacteria, se da por las interacciones entre los elementos de ella. La producción de un nuevo virus, depende de las interacciones de los elementos con un sistema externo. Así, la bacteria es más autopoiético que un virus. En este sentido, la autopoiesis está relacionada estrechamente con la autonomía (Moreno et al., 2008; Ruiz-Mirazo and Moreno, 2004). Por ejemplo, una bacteria puede producir otra bacteria por división celular, mientras que un virus requiere de un hospedero para producir otro virus. La producción de una nueva bacteria, se da por las interacciones entre los elementos de ella. La producción de un nuevo virus, depende de las interacciones de los elementos con un sistema externo. Así, la bacteria es más autopoiética por su mayor autonomía que un virus. En esta comparación es apropiado resaltar que el virus despliega las propiedades de autoreferencia y heteroreferencia al utilizar la maquinaria de las células CAPÍTULO 21 21 eucarióticas para sus fines reproductivos. Esto visiblemente desencadena una red de procesos para la producción de su material constitutivo. Desde la anterior perspectiva, la autopoiesis está más relacionada con la autonomía (Moreno et al., 2008; Ruiz-Mirazo and Moreno, 2004). Consideramos que la autonomía es una condición emergente que surge del proceso autopoiético y lo representa en gran medida. La autonomía, además, está siempre limitada en sistemas abiertos, dado que su estado dependerá de las interacciones con el ambiente. Desde esta perspectiva, se puede observar a la autopoiesis como un proceso con rasgos homeostáticos que contribuye a los procesos auto- organizantes de la estructura del sistema, y que es expresión de la autonomía del sistema. Normalmente, las diferencias en autonomía entre sistemas, cómo en el ejemplo de bacterias y virus, pueden ser claramente identificadas, lo que nos promueve a generar escalas de autonomía al evaluar la respuesta de los organismos frente a los cambios de su medio. El concepto de autopoiesis se ha extendido a otras áreas más allá de la biología (Froese and Stewart, 2010; Froese et al., 2007; Luisi, 2003; Seidl, 2004). Algunos aspectos formales de la autopoiesis fueron abordados por Varela et al. (1974), quienes proponen pruebas operacionales para determinar sistemas autopoiéticos. A pesar de la oposición de Maturana a la formalización de la autopoiesis en términos matemáticos, (Varela, 1979) y (Urrestarazu, 2011) desarrollaron algunos aspectos formales. Recientemente, Gershenson y Fernández (2011) propusieron una medida de autopoiesis sobre la base de la complejidad comparativa del sistema y su ambiente. 1.4 Síntesis Desde una perspectiva histórica, en este capítulo hemos dado una mirada a la teoría de los SD sobre una base más amplia; una que nos permite entender el porqué de su dificultad de predicción. Dificultad que subyace en las interacciones relevantes del sistema, que lo auto- organiza y que nos produce nueva información. Nueva información que emerge también, cuando el sistema afronta los cambios ambientales. Cambios que muestran la respuesta autónoma del sistema y que definen su grado de adaptabilidad. Todo ello ahora queda inmerso en una visión de SD con rasgos de complejidad. La mayoría son sistemas abiertos, donde el control completo es difícilmente alcanzable, debido a la impredictibilidad que generan las interacciones. Ante lo anterior, surge la posibilidad de adaptarnos como solución. Adicionalmente en el capítulo se presentan, las nociones, y sus características, de auto- organización (incremento del orden-regularidad), emergencia (nuevas propiedades a escala global), complejidad (interconexión), homeostasis (auto-regulación, ultra-estabilidad) y autopoiesis (auto-producción, auto-determinación), lo que sientan las bases y la motivación para su posterior formalización. 22 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 2. CAPÍTULO 2: ESPECIFICACIÓN DE SISTEMAS DINÁMICOS COMO REDES COMPLEJAS DE AGENTES Resumen El capítulo 1 consideró la dimensión de la complejidad en SD y la consideración de un número mayor de propiedades para su análisis. Desde esta base, el capítulo 2 parte de la concepción tradicional de SD, para proponer una noción con propiedades que van más allá de la emergencia y la auto-organización. Se incluyen, entonces, la homeostasis y la autopoiesis. La asociación de tales propiedades genera una interdependencia entre los aspectos funcionales y estructurales de los SD que también son abordados. Posteriormente, al considerar las interacciones entre elementos, que pueden ser descritos como agentes, se muestran los formalismos para la representación de los SD como redes computacionales de agentes. Estos formalismos son la base para el estudio de la complejidad en SD, lo que posibilita la fusión de las teorías multi-agentes y de redes. Desde este enfoque hibrido, un sistema multi-agentes es visto como una red computacional con rasgos a determinar, tales como su emergencia y su auto-organización, entre otros. Con este aporte se espera dar un mejor entendimiento de lo que sucede a partir de las interacciones entre los componentes de los SD. 2.1 Nociones de SD: de lo Tradicional a la Inclusión de lo Complejo. A continuación se presentan dos perspectivas para la definición de SD, una tradicional y otra que incluye la complejidad. Esta última está inscrita en el marco de la TDS expuesta en el ítem 1.1., y se proviene de lo expresado en Fernández, Aguilar, et al. (2010). 24 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 2.1.1 Noción Tradicional de SD Como base general se tiene que, los SD cuentan con características básicas como lo son, el cambio o evolución de su estado (q) en el tiempo, en razón a una regla de evolución (𝑅) que lo demarca. Desde una base determinista, se podría estimar que 𝑅 está dada por 𝑅(𝑞(𝑡), 𝑟) → 𝑞(𝑡 + 𝜏), donde q es un estado del conjunto de estados posibles 𝑄, y 𝒓 un parámetro de la regla. Cabe destacar que r tiene uno o más puntos críticos (𝒓𝒄), el cual o los cuales, son entendidos como el valor de r en el que se genera el cambio o transición de estado de 𝑞𝑖 a 𝑞𝑗. Por su parte, 𝑅 puede estar descrita por funciones iterativas, ecuaciones diferenciales o instrucciones iterativas, según sea su naturaleza discreta, continua o algorítmica, respectivamente. Sobre la anterior base, ha sido posible estudiar gran cantidad de SDs existentes en nuestro medio. No obstante, en ciertos SDs con gran cantidad de componentes que presentan alta conectividad, plasticidad en sus interacciones y roles muy fluidos, las reglas de su cambio y evolución pueden ser no bien entendidas por sus estudiosos. Más aún, cuando a partir de estas reglas que evolucionan de simples a complejas y con la auto-organización como método, muchos SD pueden llevar a cabo tareas que tiene un grado de dificultad considerable. Es allí donde el observador puede apreciar la dimensión emergente de su orden y comportamiento global (Aguilar et al., 2007). En las anteriores condiciones, se hace pertinente observar un SD bajo la óptica de su complejidad. Un evento funcionamiento, que requiere de mayores conceptualizaciones y profundizaciones en cuanto a sus aspectos formales, como a continuación se propone. inherente al 2.1.2 Una Definición de SD que Considera la Complejidad o Sistemas Dinámicos Complejos (SDC). La noción base de SD en la que se fundamentará este manuscrito parte de la presentada en (Fernández et al., 2010a). En ella se incluye los rasgos de complejidad, por lo que podemos definir un Sistema Dinámico Complejo (SDC) y expresa lo siguiente: …"Dado un contexto particular de observación1, un SDC corresponde con un fenómeno unitario que presenta un conjunto de componentes homogéneos o heterogéneos 1 Corresponde a los aspectos propios del observador que, influyen en el proceso de modelación y el consecuente modelo. Estos aspectos son: (i) su cultura, entendida como el conjunto de significados a partir de los cuales el sujeto comprende el mundo y (ii) el lingüístico, como aquel lenguaje especializado que se construye sobre la base de la cultura del sujeto. A partir de ellos el observador determi na el sistema unitario a partir de las relaciones de retro-alimentación y de recursividad circular entre la dupla sistema-entorno. Es de anotar que el entorno se refiere, por ejemplo, a otros miembros de la comunidad de conocimientos, modelos de simulación, teorías, o al mundo físico y social. Mayores ampliaciones de estos elementos pueden hallarse en Fernández et al (2010). CAPÍTULO 22 25 interconectados. Estos componentes, pueden observarse a diversas escalas espacio- temporales y generan, a partir de sus interacciones, diferentes tipos de propiedades, organizaciones, patrones y/o comportamientos propios. Todo ello, con el fin de alcanzar el propósito global que el sistema tiene en sí mismo y sobre la base de su complejidad"… Un análisis de mayor profundidad de la anterior noción, lleva a considerar la existencia de características y elementos importantes como:  La interconexión de los elementos define la topología de sus interacciones, que de acuerdo con el caso y eventos de reforzamiento o debilitamiento, conducirán o no al establecimiento de posteriores interrelaciones. Las interacciones, en este sentido, las entendemos como contactos de corta duración y conexión; mientras que las interrelaciones las entendemos como fenómenos de asociación o combinación de elementos de naturaleza más perdurable. La dinámica de las interconexiones es uno de los elementos básicos de la complejidad del SDC, pues es su dinámica la que conduce a cambios en la organización propia no impuesta. Al mismo tiempo, las interconexiones entre las partes están acordes con los cambios ambientales y las propias posibilidades de los elementos para adaptarse a ellas.  Las adaptaciones en el SDC se dan de manera individual y colectiva; en el tiempo y en el espacio, y sobre la base de los rangos de adaptabilidad de las partes. Desde esta visión, el SDC se auto-organiza a partir de la topología de las interacciones e interrelaciones entre los elementos que constituyen una estructura determinada. Los elementos tienen como rasgo, una potencialidad desconocida de establecer relaciones entre sí. Ellas se establecen sobre la base de su adaptabilidad; otra razón más de la complejidad del SDC.  Las escalas espacio-temporales en las que se ocurren los elementos, corresponden a la ventana de observación de espacio y/o tiempo, donde se definen las características de los elementos y los parámetros del entorno que condicionan sus interacciones. En estas escalas es que operan las variables y procesos que explican los patrones observados en determinado nivel. Las escalas espacio-temporales son un rasgo básico de dinamismo y complejidad sistémica, pues requieren del análisis de su cambio, variabilidad y heterogeneidad, para la explicación y posible predicción, o no, de los patrones observados. Ejemplo de este tipo de escala en SDCs son el nivel de observación local de las interacciones, y el nivel superior o global en el que son observables las propiedades emergentes. No obstante, pueden existir otros niveles intermedios en el SDC. Por otra parte, las relaciones entre niveles se da también por mecanismos de retro-alimentación, en el sentido local-global y global-local. De esta última forma, las propiedades emergentes tienen también influencias en las interacciones del nivel local. 26 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴-  La generación de diferentes tipos de organizaciones, patrones y comportamientos propios a partir de las interacciones locales, en los diferentes niveles del SDC a escalas espacio-temporales definidas, determina claramente el carácter emergente del SDC. Desde esta perspectiva, se visualiza que determinado fenómeno considerado como emergente puede ser, además, producto de la auto- organización. Igualmente, los patrones (Pt) definen la unidad global del SDC, pues son producto de cualidades sintetizadoras que representan, en parte, la emergencia del SD.  La propia organización (auto-organización) incluye, a su vez, la capacidad del SDC para regular su comportamiento en términos adaptativos, en busca de un equilibrio dinámico u homeostasis. Un hecho importante, debido a que el flujo de intercambios entre los elementos y el entorno puede llevar a la falta de regularidad en el SDC. La homeostasis abarca, articula e integra estados del SDC que presentan diferentes condiciones complementarias como las dinámicas-estacionarias, las de estabilidad-inestabilidad, las de síntesis-degradación, entre otras. La funcionalidad de la homeostasis es mantener la auto-organización, ante el constante flujo de materia, energía y/o información en el SDC, en límites que posibiliten el mantenimiento de su autonomía, integridad, compatibilidad y demás atributos esenciales (Zona de Viabilidad del SDC). Todo este fenómeno se da en el marco de la adaptabilidad del SDC.  Consecuente con lo anterior, se estima que un mecanismo homeostático de importancia en un SDC complejo es la autopoiesis; un proceso en el que a partir de las interacciones entre los componentes del SDC logra el auto-mantenimiento, en el contexto de la relación síntesis-degradación del SDC. En esta propiedad se refleja parte de la autonomía del SDC. La autopoiesis favorece la auto-organización del SDC, por medio de mecanismos de auto-regulación que mantienen la propia estructura del SDC, en consonancia con un entorno variable. Los elementos develados de emergencia, auto-organización, homeostasis y autopoiesis en la noción propuesta, son un medio por el cual el SDC logra persistir espacial y/o temporalmente situación que no es otra cosa que su propósito esencial. Al mismo tiempo le confieren una complejidad determinada, de acuerdo con el tipo de SDC. Se puede estimar que la persistencia de un SDC en un medio cambiante se da en términos de la conservación, adaptabilidad y evolución de sus elementos, y del SDC como un todo. Estas CAPÍTULO 22 27 últimas propiedades vienen de las interacciones relevantes2 que generan la auto-organización de la estructura, la emergencia de comportamientos, y en definitiva, la complejidad del SDC. Complejidad que le confiere al SDC su robustez (Conservación) ante la variación de su ambiente, pero también la posibilidad de cambiar de forma adaptativa y evolutiva ante condiciones más drásticas. 2.1.3 Interdependencia Funcional de la Auto-organización, Homeostasis y Autopoiesis, y la Generación del Espacio Estructural del SDC. Normalmente, se ha estudiado cómo la estructura de un sistema determina su función. Sin embargo, en muchos sistemas complejos hay una retroalimentación donde la funcionalidad genera ciertas propiedades en el espacio estructural de un SDC. La interdependencia funcional de auto-organización, homeostasis y autopoiesis, se puede observar en la Figura 2- 1. En ella se observa como la auto-organización y la autopoiesis, sobre la base de mecanismos homeostáticos de auto-regulación, son las que desde el espacio funcional generan el SDC en el espacio estructural. Desde este punto de partida se puede estimar que la relación entre el espacio funcional y estructural se hace cíclica, por cuanto la estructuras también determinan la función. Figura 2-1 Relación entre los Espacios Funcionales y Estructurales en SDC (Fernández et al., 2012a) 2 Son relevantes porque producen información adicional que no estaba en las condiciones iniciales o de frontera. 28 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Entre los aspectos de mayor importancia en el espacio estructural, se hallan la estructura y los patrones. La estructura estará referida a los elementos y el tipo de relación entre ellos (𝐸𝑠𝑡𝑟𝑢𝑐𝑡𝑢𝑟𝑎 = {𝑒𝑙𝑒𝑚𝑒𝑛𝑡𝑜𝑠, 𝑟𝑒𝑙𝑎𝑐𝑖ó𝑛}). La estructura puede emerger como resultado de: (i) una acción auto-organizante que define el tipo de relación entre los elementos y (ii) por procesos autopoiéticos, de manera que se procura así misma, en términos de autonomía. Al mismo tiempo, la estructura expresa en patrones, la mayoría de los casos definibles u observables, de manera directa o indirecta (Fernández et al., 2011). Históricamente, la estructura ha tenido un papel preponderante en el estudio y explicación de los SDC, dada su condicional aparentemente "palpable". No obstante, vale la pena realizar algunas precisiones al respecto. La primera es que la estructura, en muchas ocasiones, no aparece de manera explícita, sino que por su carácter emergente, resulta ser una condición a determinar. En este aspecto, suele suceder que lo que el observador percibe del SDC son algunos patrones de orden global. Los patrones se generan a partir de procesos de retroalimentación, entre otros, y sobre la base de la adaptabilidad del SDC. Descifrar la estructura en un SDC requiere, por tanto, determinar y caracterizar los elementos y sus relaciones, a través de indicadores; así como de la aplicación de modelos matemáticos, que pueden dar razón sobre su condición jerárquica, holárquica o heterárquica, por ejemplo. La condición deseable de llegar a estructuras "más estables" en el SDC, para periodos determinados de tiempo, será el producto del alcance de ciertos objetivos globales, como resultado del dinamismo del proceso auto-organizante. La estabilidad de una estructura dependerá, básicamente, del mantenimiento de la misma en una zona de viabilidad (𝑍𝑣), es decir, de la condición homeostática que le proporciona la auto-organización. No obstante, la tendencia auto-organizante de mantener tal estabilidad puede conllevar a que, en caso de la superación de los umbrales máximos y mínimos en una determinada 𝑍𝑣, se dé un cambio importante en la estructura, como respuesta evolutiva del SDC. De allí se generará un nuevo estado inicial para la estructura, que buscará llegar nuevamente a su estado estable, y su desempeño se dará en una nueva 𝑍𝑣.A este respecto vale la pena tener presente la consideración de (Kaufmann, 1993), quien asevera que los cambios de estado dentro de la auto-organización, al no ser graduales y constantes, se dan por la superación de umbrales de complejidad que llevan a nuevas formas estables. Lo expuesto anteriormente toma sentido al considerar que, hipotéticamente en un SDC, pueden existir tantas estructuras como tantas posibles combinaciones de elementos e interacciones puedan haber. En términos prácticos, esta situación puede ser observada como la variación dinámica en una intrincada red de elementos que se relacionan a partir de sus interacciones. En consecuencia, se puede estimar que un SDC puede ser descrito, en términos matemáticos, sobre la base de un grafo o red dinámica, cuyos aspectos formales se explican a continuación (Fernández et al., 2011). CAPÍTULO 22 29 2.2 Los SDC cómo Redes Computacionales de Agentes. Los siguientes apartados se basan en lo expresado en (Fernández et al., 2012a, 2012b, 2011, 2010b). Como se ha venido observando, la consolidación del SDC como un todo se puede establecer a través de las interacciones relevantes entre sus elementos que dan como resultado propiedades cómo la auto-organización, emergencia, homeostasis y autopoiesis. En este aspecto, los SDC pueden ser especificados cómo un grafo o red de interacciones, de manera que se puede representar en una estructura matemática formal que representa a los elementos y sus relaciones. Las redes, particularmente, se han convertido en una herramienta central en el estudio de sistemas complejos (Gershenson and Prokopenko, 2011), donde los nodos son considerados como "agentes". La definición básica de agente que adoptamos corresponde con la de Gershenson (2009), referida a una entidad que está situada en un entorno y que puede afectarse o afectar lo que en él sucede. De acuerdo con su tipo, un agente puede generar un conocimiento apropiado del sistema por la creación de una representación interna de los componentes del sistema externo. Cuando los agentes interactúan dinámicamente para alcanzar una función o comportamiento global, el sistema que los contiene puede ser descrito cómo auto- organizante (Gershenson, 2006). Estas definición general se sintoniza con lo requerido para la construcción de sistemas multi-agentes de acuerdo con lo expresado por Wooldridge and Jennings (1995). Tanto la red en su globalidad, como en sus componentes locales, vistos cómo agentes, pueden ser especificados como SDs tradicionales. Es decir con cambios y/o evolución de estados en el tiempo, a partir de reglas que pueden ser expresadas funcionalmente. Con una red computacional de agentes, se pueden lograr descripciones de SDC más adecuadas, y se tiene la ventaja de poder analizar la información nueva producida por las interacciones entre agentes. Para la especificación de una red computacional de agentes, se requiere integrar diferentes aspectos de la teoría de los SDC, grafos y agentes, como se describirá en el siguiente apartado. 2.2.1 Aportes de la Teoría de SDs La teoría de modelado y simulación (Zeigler et al. 2000), permite considerar los elementos básicos para la especificación de la red computacional de agentes (SDC -Ag), como un sistema 30 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- dinámico tradicional (SD). Para ello se tendrá en cuenta la siguiente estructura (ver Ecuación 2.1): 𝑆𝐷 = (𝑋, 𝑌, Ω, 𝑄, 𝐹, 𝐹, 𝑇) (2.1) Donde: 𝑆𝐷: Sistema Dinámico 𝑋: Conjunto de Entradas. 𝑌: Conjunto de Salidas. Ω: Conjunto total de entradas posibles. 𝑄: Conjunto de Estados. 𝐹: (𝑄 × Ω −> 𝑄): Función de Transición entre estados, que actualiza el estado. 𝐹𝑠: (𝑄 × Ω −> 𝑌): Función de Salida. 𝑇: Posibles valores para el tiempo. En esta estructura, 𝑋, Ω y 𝑌 definen las entradas y salidas del SD, mientras que 𝑄 y 𝐹 representan la estructura interna y el comportamiento. La función de transición de estados 𝐹 debe garantizar que siempre se puede determinar el próximo estado del SD, a partir del estado actual. La representación gráfica de los elementos básicos en una red SDC -Ag, desde la perspectiva de un SD acoplado como lo propone Zeigler et al. (2000), se observa en la figura 2-2. Figura 2-2 Representación Simplificada de un SDC -Ag sobre la Base de la Teoría de Modelado y Simulación de Zeigler et al. (2000). Las designaciones A1, A2, A3 se refieren a Agentes. CAPÍTULO 22 31 2.2.2 Aportes de la Teoría de agentes y de los Sistemas Multi- agentes-SMA La teoría de agentes (Desalles et al., 2008; Ferber and Gutknecht, 1998; Ferber et al., 2004; Jennings and Wooldridge, 1995; Müller and Et Al., 1997; Wooldridge et al., 1996), brinda elementos de interés que han permito establecer una de las principales áreas de la inteligencia artificial distribuida, como lo son los SMA. Desde una base general, un agente puede describirse como una entidad que actúa sobre su ambiente o entorno (Gershenson, 2007). Sobre esta base, y en términos de un SDC, se estima que los Ag son entidades que perciben su ambiente (entradas) y actúan (cambio de estado) en concordancia, deliberando sobre las posibilidades de sus acciones (salidas). Igualmente, se ha considerado que los Ags pueden tener rasgos inspirados en el comportamiento humano como: autonomía, reactividad, iniciativa, habilidad social. Estos rasgos le permiten al Ag compartir el entorno o ambiente, recursos y conocimiento, además de comunicarse y coordinar sus actividades con otros (Aguilar, 2014; Aguilar et al., 2012). Desde la perspectiva de la teoría de Ags los SMA, como sistemas compuestos por diversos Ags, presentan características como la modularidad, redundancia, descentralización, comportamiento emergente, y especialmente, coordinación. Esta última, basada en la compartimentalización de información y resultados, la optimización de acciones y recursos, y el trabajo conjunto independiente de los objetivos individuales. Los mecanismos propios para lograr una coordinación efectiva se sustentan en la sincronización de acciones, vista como la simultaneidad de las mismas; en la planificación, es decir en la subdivisión y distribución de tareas; y en la coordinación reactiva, a partir de la definición de marcas o reglas de comportamiento reactivo general. Bases como éstas, permiten el desarrollo de SMA auto-organizantes emergentes cuyo sustento son mecanismos que consideran las interacciones directas, la estigmergia, el refuerzo, la cooperación y la definición de arquitecturas genéricas (Perozo et al., 2008). Operacionalmente, a cada Ag le puede ser asignado uno o más roles para la consecución de los objetivos del SDC, y ser responsable tanto de coordinar sus interacciones con otros Ags, como de ejecutar las actividades bajo su cargo. En este aspecto, un Ag inteligente es un "tomador de decisiones interactivo", capaz de alcanzar de manera pro-activa sus objetivos, mientras que se adapta a un ambiente dinámico. De allí que los SMA son vistos como sistemas computacionales auto-organizantes con un grado apropiado de autonomía, dada la inexistencia de un control central (Aguilar, 2014). 32 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 2.2.3 Aportes de las Teorías de Grafos y Redes La teoría de redes se remonta al siglo XVIII en la antigua ciudad alemana Königsberg (hoy Kaliningrado, ciudad rusa), donde se planteó un interesante problema matemático, hoy conocido como el de "los puentes de Königsberg". El planteamiento de éste problema consistía en hallar la forma de cruzar los 6 puentes, en un solo sentido, y sin repetir el tránsito por alguno de ellos. El problema fue finalmente resuelto en 1736 por el suizo Leonhard Paul Euler (Kruja et al., 2002), a través de la representación de las rutas posibles como enlaces o ligas, y los puntos de conexión entre ellas como nodos. Este hecho es frecuentemente citado como el nacimiento de la teoría de grafos, actualmente una de las formas más comunes de representación de las redes (Hedrih, 2007). Sí bien el modelado SMA ha constituido una herramienta computacional adecuada para lograr explicaciones o predicciones sobre fenómenos específicos en SDC, existe dificultad en extraer algunos parámetros estadísticos que den razón de su comportamiento global. La teoría de redes, como extensión de la teoría de grafos, cuenta con las posibilidades que no tienen los SMA, tales como la representación del flujo de información y las interacciones topológica entre agentes-Ag. Entre los parámetros topológicos de interés se hallan el grado (Gd en ecuación 2.2) y el coeficiente de agrupación (Ca en ecuación 2), las cuales pueden ser determinados considerando su carácter dinámico (Habiba and Berger-Wolf, n.d.). Gd se entiende como el cambio de vecindad 𝑉(𝑖𝑡) de un nodo 𝑁𝑖 en el tiempo 𝑡. Ca de un nodo 𝑖 es la fracción de sus vecinos, quienes han sido vecinos entre ellos mismos en cualquier tiempo previo 𝑡 (ecuación 2-3). 𝐺𝑑𝑇(𝑖) = ∑ 1<𝑡<𝑇 𝑉(𝑖𝑡−1)−𝑉(𝑖) 𝑉(𝑖𝑡−1)∪𝑉(𝑖𝑡) × 𝑉(𝑖𝑡) (2.2) 𝐶𝑎𝑇(𝑖) = ∑ 𝑖∈𝑉(𝑖𝑇) ⋃ 1<𝑡<𝑇 (2.3) ∩𝑉(𝑖𝑇) 𝑉(𝑖𝑡) 𝑉(𝑖𝑇) La importancia de estos parámetros se halla en que, a partir de ellos, se podrían determinar patrones resultantes, o no, de procesos de auto-organización en la red SDC. Adicionalmente, existe la posibilidad de determinar estados subyacente para la red SDC, que definen su "estado de equilibrio" como resultado de los procesos homeostáticos. Esto se puede lograr a través de la aplicación de algoritmos como el de Kamada-Kawai (Kamada and Kawai, 1989). Dado que desde la teoría de redes, los nodos pueden verse como estructuras excesivamente simplificadas, la hibridación de redes con nodos tipo Ag puede ser una concepción de gran importancia. De esta manera, se hace posible ver un SMA como un conjunto de nodos y aristas interactuantes que conforman una red computacional, es decir una red SDC-Ag. CAPÍTULO 22 33 En términos generales, una red SDC-Ag, se sintoniza con la estructura definida por (Gershenson, 2010) para una red computacional 𝐶(𝑁, 𝐾, 𝑎, 𝑓), que la define como un conjunto de nodos 𝑁, ligados por un conjunto de aristas 𝐾, usadas por un algoritmo a para computar una función 𝑓. A nivel operativo, 𝑁 y 𝐾 tienen variables internas que determinan su estado, y funciones 𝑓 que determinan sus cambios de estado, respectivamente. Se resalta que, esta generalización ha resultado de gran utilidad para comparar las arquitecturas de redes neuronales, colonias de hormiga y partículas colectivas; al tiempo que, puede ser un punto de partida y alternativa interesante para la representación, igualmente, genérica, de un SMA. No obstante, para describir completamente la dinámica de un SMA como red computacional, se requiere ahondar en los detalles de cada componente de la red y sobre su dinámica. Por ejemplo, el flujo de información en una red da como resultado la evolución de los cambios de estado en los nodos (Smith et al., 2008). El comportamiento global de esta dinámica depende de varios factores como el tipo de nodo, su modelo cognitivo, sus funciones de transición interna, el tipo de información que comparte, entre otros. Desde esta perspectiva, se haría posible descifrar la trama de interacciones entre Ags, y profundizar en la forma autónoma como se logran objetivos globales a partir de reglas locales, que podrían evolucionar de simples a complejas (Aguilar et al., 2007). 2.2.4 Aspectos Formales de la Red SDC-Ag. A continuación se muestran los desarrollos logrados hasta el momento, que serán la base para llevar, en el corto y mediano plazo, al plano del modelado los elementos conceptuales hasta ahora expuestos.  La forma general de la red SDC-Ag La red SDC-Ag se define, básicamente, como un grafo (𝑁, 𝐾). Cada nodo 𝒊  𝑁 representa un elemento 𝑁𝑖, y cada arista (𝑖, 𝑗)  𝐾 representa flujo de información entre 𝑁𝑖, 𝑁𝑗. Los vecinos son elementos (𝑁𝑖, 𝑁𝑗) unidos por un enlace de información (𝑖, 𝑗)  𝐾. El grafo (𝑁, 𝐾) determina la estructura del SDC-Ag. La conectividad de la red SDC se puede representar en un nivel básico por una matriz de adyacencia 𝑁 × 𝑁: 𝑀(𝑖, 𝑗) = { 1, 𝑖 → 𝑗 0, 𝑖 ↛ 𝑗 . Se dice que 𝑀 contiene la topología de la red, y puede contener el "peso" del acoplamiento 𝑖, 𝑗, tal que 𝑀𝑖𝑗 ∈ [0,1]. No obstante, en una formalización más general, cada elemento de la matriz 𝑀 puede ser más complejo, conteniendo vectores, etiquetas, y/o funciones. 34 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴-  El sentido dinámico de la red SDC-Ag Se puede estimar que la dinámica de una red SDC-Ag estará dada por 𝑆𝐷 = (𝑄𝑛 𝐹); Donde 𝑄𝑛 es un conjunto no vacío, compuesto en el caso de sistemas discretos de un número finito de estados 𝑞 𝑄𝑛 . 𝑄𝑛 también es llamada espacio de estados, o espacio de todas las configuraciones posibles. El exponente 𝑛 ℕ hace referencia al número de total de elementos en la red SDC. En el caso de sistemas continuos, la dinámica se desenvuelve en un espacio de estados. Por su parte, 𝐹 es una función de transición, o de activación global, tal que 𝐹: 𝑄𝑛 → 𝑄𝑛. Igualmente, 𝐹 corresponde a una familia de funciones, denominadas funciones de activación local de la red (𝑓𝑖), tal que 𝐹 = (𝑓1, 𝑓2, … , 𝑓𝑛). Igualmente, 𝑓𝑖: 𝑞𝑛 → 𝑞𝑛 dado que 𝐹(𝑞) = (𝑓1(𝑞), … , 𝑓𝑛(𝑞)), ∀𝑞 ∈ 𝑄𝑛. 𝐹 puede determinar a un sistema compuesto por funciones puramente locales. Se destaca que cada estado 𝑞𝑄𝑛 hace parte de una configuración global de la red (𝐶), entendida como la descripción completa de la situación en que se encuentra el SDC en un momento dado. Así, 𝐶 estará representada por su estado actual 𝑞𝑡  𝑄, y un evento 𝑒 que genera la transición 𝐹, donde 𝑒 ∈ ∑. ∑ , por su parte, será el conjunto de todos los eventos que generan transición. Entonces, a partir de un evento 𝑒 se dará una 𝐹(𝑞(𝑡), 𝑒), que producirá la configuración global en el tiempo siguiente 𝑡 + 1, (𝑞(𝑡 + 1)). Dependiendo del caso, el evento 𝑒 puede corresponder con el punto crítico (rc) del parámetro r mencionado anteriormente. Consecuente con lo expuesto, para pasar de una configuración 𝑐𝑖 a 𝑐𝑗, cada Ni tendrá su función de transición 𝑓𝑖, tal que 𝐹(𝑞𝑖 → 𝑞𝑖 (𝑡 + 1)) = 𝑓1(𝑞1𝑖), … , 𝑓𝑛(𝑞(𝑡 + 1)) = 𝑞𝑖 … 𝑞𝑖(𝑡 + 1). Para una configuración global 𝑐  𝐶 en el tiempo t de la red (𝑞(𝑡)), 𝐹(𝑞(𝑡, 𝑒)) dará la configuración global siguiente en el tiempo 𝑡 + 1, (𝑐(𝑡 + 1)). Un sistema donde todo estado tiene un sólo sucesor es determinista, mientras que si hay más de un sucesor posible para por lo menos un estado, habrá cierto grado de no determinismo.  El vecindario y el entorno en la red SDC-Ag. En cuanto a 𝑁𝑖, se tiene para cada uno de ellos un 𝑞𝑖 determinado en el tiempo 𝑡, es decir 𝑞𝑖(𝑡). Por poseer 𝑁𝑖 un conjunto de vecinos 𝑉𝑖, la evolución del SDC estará descrito por la regla 𝑞𝑖(𝑡 + 1) = F(𝑞𝑖(𝑡); 𝑉𝑖) , donde 𝑖 = 1, … , 𝑛. Esto es debido a la influencia que pueden tener los nodos vecinos entre sí. De forma complementaria, el estado de la red SDC en un tiempo 𝑡, puede ser representado por un vector de estado, tal que 𝑞⃗(𝑡) = ( 𝑞1(𝑡), … , 𝑞𝑛(𝑡)). Así, la forma vectorial de la red dinámica sería 𝑞⃗(𝑡 + 1) = F⃗⃗(𝑞⃗(𝑡)) + 𝑉𝑞 ⃗⃗⃗⃗(𝑡) + 𝐴𝑏𝑞 ⃗⃗⃗⃗(𝑡)), donde 𝑉𝑞 ⃗⃗⃗⃗(𝑡) es el estado de los vecinos y 𝐴𝑏𝑞 ⃗⃗⃗⃗⃗⃗(𝑡) corresponde al ambiente o entorno. CAPÍTULO 22 35 Se aclara que los componentes de 𝐴𝑏𝑞 ⃗⃗⃗⃗(𝑡), pueden ser exógenos o endógenos a los Ni. Como también, pueden darse de manera conjunta o separada. Al mismo tiempo, pueden tener efecto sobre la totalidad de los 𝑁𝑖 (incidencia global) o sobre 𝑁𝑖 determinados (incidencia parcial). La intensidad relativa de la incidencia, o la probabilidad de interacción, de 𝐴𝑏𝑞 ⃗⃗⃗⃗(𝑡), de manera totalizada, sobre determinado 𝑁𝑖, estaría dada por un parámetro 𝐵 ∈ [0,1] (González-Avella et al., 2007). Se puede asumir que la influencia de 𝐵 sobre los 𝑁𝑖i será uniforme, más no así la respuesta que los 𝑁𝑖 den al mismo. Esto será relativo a la capacidad homeostática de cada 𝑁𝑖 para responder a influencias bajas, intermedias o altas de 𝐴𝑏𝑞 ⃗⃗⃗⃗(𝑡). 2.2.5 La Especificación de Nodo Tipo Ag y SMA Desde la perspectiva de (Zeigler et al. 2000) se puede afirmar que un nodo 𝑁𝑖, cuando representa a un proceso tendrá reglas de comportamiento internas y externas. Las primeras estarán definidas por sus variables de estado, funciones de transición, y funciones de avance en el tiempo; y las segundas estarán dadas por el conjunto de salidas. De la misma manera, se debe caracterizar la naturaleza discreta o continua de los nodos, lo que definirá su forma particular de especificación. Por ejemplo, en el caso de sistemas naturales como los socio-ecológicos, representados como una red de agentes, los procesos como la contaminación o el cambio climático pueden ser representados como nodos. La dinámica de estos nodos puede ser descrita a través de sistemas de ecuaciones diferenciales de primer orden (SEDO), dada su naturaleza continua. Para el caso de procesos, como los de manufactura industrial, como los que se dan en una fábrica de ensamblado, cada operación puede ser representada como un nodo. No obstante, la dinámica será descrita a través de un sistema de eventos discretos SED (DEVS en inglés), o de ecuaciones en diferencia (EED). Nosotros consideraremos a las EED dentro de las SED, ya que las EED están embebidas en los SED según (Zeigler et al. 2000). Ahora bien, en este modelo también puede haber nodos tipos agentes (NAg) que tienen una estructura dinámica dada por la tupla 2.4: 𝑁𝐴𝑔 =< 𝑋, 𝑌, 𝑄𝐴𝑔, 𝑓𝐴𝑔−𝑖𝑛𝑡, 𝑓𝐴𝑔−𝑒𝑥𝑡,𝑓𝑠, 𝑡𝑎, 𝑊, 𝛤,∧, 𝑂𝑝 > (2.4) Donde :  𝑁𝐴𝑔: Nodo tipo Ag  𝑋: conjunto de eventos externos de entrada al Ag. Pueden corresponder a información proveniente desde el Ab (𝐼𝐴𝑏) o desde otros Ag (𝐼𝐴𝑔). En algunos casos, el ambiente puede ser modelado también como un Ag.  𝑄𝐴𝑔: conjunto de estados del Agi : 𝑄𝐴𝑔 ∈ 𝑄𝑛  𝑌: conjunto de eventos de salida desde el Ag 36 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴-     transición función de 𝑓𝐴𝑔−𝑖𝑛𝑡: 𝑄𝐴𝑔 → 𝑄𝐴𝑔 función de transición interna por la que el Ag cambia de estado. Determina el tiempo de vida de un estado 𝑞. 𝑓𝐴𝑔−𝑒𝑥𝑡: 𝑄𝐴𝑔 × 𝑋 → 𝑄𝐴𝑔 externa, donde: 𝑄𝐴𝑔 = {(𝑞, 𝑡𝑞 𝑄𝐴𝑔, 0 𝑡 𝑡𝑎(𝑞) } es el conjunto total de estados, 𝑡 es el tiempo transcurrido desde la última transición. Especifica la respuesta del Ag a los eventos de entrada. 𝑓𝑠 = 𝑄𝐴𝑔 → 𝑌: función de salida. Es una aplicación de 𝑄𝐴𝑔 dentro del conjunto de eventos de salida 𝑌. Se activa cuando el tiempo que se ha permanecido en un estado dado es igual a su tiempo de vida. Consecuentemente 𝑌 es definida solo por estados activos, p.e. ∀𝑞 ⋮ 𝑡𝑎(𝑞) ≠ . 𝑡𝑎: 𝑄𝐴𝑔 → ℜ + 0,  o función de avance en el tiempo, donde ℜ + 0,  es el conjunto de valores positivos reales entre 0 y .  𝐶𝐴𝑔: 𝑓𝐴𝑔−𝑖𝑛𝑡 ∪ 𝑓𝐴𝑔−𝑒𝑥𝑡 comportamiento del Ag  𝑊 es el conjunto de los estados del ambiente que rodea a los Ags, representado por las variables de estado del SDC (𝑊 = {𝑤𝑖, … , 𝑤𝑛}, donde 𝑤: es variable de estado). Estas variables pueden ser útiles en la computación de las funciones de transición.  𝛤 es el conjunto de influencias del Ag para generar nuevos eventos. Corresponden con acciones propias con las que el Ag intenta modificar el curso de los eventos que ocurrirán.  𝛬 descripción del sistema a través de las leyes o reglas de cambio del SDC.  𝑂𝑝 es un conjunto de operadores del Ag para generar influencias. En razón que la red SDC puede contener más de un 𝑁𝐴𝑔, se conformará entonces un SMA. En este aspecto, un SMA se definirá como un sistema informático compuesto por un grupo de Ags que interactúan entre sí. La interacción dará como resultado respuestas que irán más allá de las acciones individuales de cada 𝑁𝐴𝑔. Desde la teoría multi-agentes de Ferber y Müller (1996) y su extensión por Dávila et al (2005), se puede estimar que la dinámica del Ab estará dada por una tupla de la forma < 𝑊, 𝛤, 𝑂𝑝, 𝐴𝑐𝑐𝑖ó𝑛, 𝑅𝑒𝑎𝑐𝑐𝑖ó𝑛 >. Donde Acción, será el intento del Ag por influenciar a la red SDC-Ag tal que: 𝑂𝑝 × 𝑊 × 𝛤 → 𝛤; y Reacción del Ab ante esas influencias será 𝛬 × 𝑊 × 𝛤 → 𝑊. Al mismo tiempo, se tendrá que la evolución del SDC-Ag será una función infinita recursiva tal que 𝐸𝑣𝑜𝑙𝑢𝑐𝑖ó𝑛: 𝑊 × 𝛤 → 𝜏, donde τ será una función que no retorna valor o que retorna valores en un dominio de errores. Cabe resaltar que en la formalización propuesta, 𝛬, 𝑊, 𝛤 y 𝑂𝑝 no se explicitan en cuanto a sus componentes, dado que dependerían del SDC-Ag a modelar. A partir de lo anterior, el SMA será modelado como un conjunto de Ags que interacionan entre ellos y su Ab. La función global del SDC-Ag permitirá relacionar el cambio en las conexiones de los Ags a partir de las funciones locales en los Ags. CAPÍTULO 22 2.3 Síntesis 37 Hemos revisado la descripción y especificación de un sistema dinámico sobre la base de un conjunto mayor de propiedades, más allá de la auto-organización y emergencia. La definición obtenida incluye las propiedades de complejidad requeridos para descifrar cómo un comportamiento global y coherente, puede surgir desde las actividades locales. Con estas propiedades, es posible describir un gran conjunto de sistemas abstraídos del cosmos, de la biosfera, así como sistemas construidos por nosotros. Los elementos conceptuales y formales desarrollados sugieren un enfoque ampliado para el estudio de los SDC, y de sus propiedades emergentes de auto-organización, homeostasis y autopoiesis. Estas propiedades son producto de las interacciones locales que se expresan como una conducta global y sintética observable de todo el sistema. Como respuesta a la tarea de trasladar a aspectos formales las características emergentes mencionadas, se tiene que la teoría de grafos, y su instanciación en la teoría de redes, brindan un soporte adecuado de interpretación. A partir de ellas, los nodos pueden ser observados como agentes que pueden calcular funciones locales, las aristas pueden describir las interacciones, y una función global puede regular las interacciones entre agentes para alcanzar un estado global. El estado global, consecuentemente, se alcanzaría con la auto- organización como método, la cual se soportará en mecanismos de auto-regulación y auto- mantenimiento. De igual manera, la emergencia del sistema tendrá como base la cuantificación de la auto- organización y los patrones, situación que unifica muchas de las visiones hasta ahora analizadas en el campo de la complejidad. En este sentido, el enfoque y las formalizaciones aquí propuestas, enriquecen las aproximaciones hasta ahora desarrolladas para el estudio de los sistemas emergentes como redes computacionales de agentes. Trabajos futuros plantean la necesidad de ejemplificar los desarrollos aquí logrados en diversos casos de estudio, de manera a clarificar su utilidad. Al mismo tiempo, dada la complejidad del modelado, será apropiado desarrollar una herramienta computacional que facilite su uso en dichos casos de estudios. 3. CAPITULO 3: FORMALISMOS MATEMÁTICOS PARA LA MEDICIÓN DE LA EMERGENCIA, AUTO- ORGANIZACIÓN, COMPLEJIDAD, HOMEOSTASIS Y AUTOPOIESIS EN SISTEMAS DINÁMICOS. Resumen Habiendo definido un SDC con rasgos de complejidad (capitulo 1) y habiéndolo especificado como una red computacional de agentes (capitulo 2), surge la necesidad de formalizar las definiciones relativas a la emergencia, auto-organización, complejidad, homeostasis y autopoiesis. El objetivo del establecimiento de estos formalismos, es permitir la valoración de estas propiedades. El fundamento para todos los formalismos fue la teoría de la información, la cual permitió generar definiciones claras, sencillas y consistentes, que pueden relacionar los procesos relativos a la complejidad en SDC. Estos formalismos son de utilidad para descripciones, a diferentes escalas, en el mundo físico y en diversos campos como la biología, la ecología, la sociología, entre muchos otros, como se verá en los capítulos 4 y 5. 3.1 Teoría de la Información cómo Fundamento Creada por Claude Shannon (Shannon, 1948), en el contexto de las telecomunicaciones, la Teoría de la Información analizó la posibilidad de reconstruir los datos trasmitidos, a través de un canal con ruido. En este modelo, la información es representada por una cadena 𝑋 = 𝑥0, 𝑥1 … 𝑥𝑛 donde cada 𝑥𝑖 es un símbolo desde un conjunto finito de símbolos 𝐴, llamado alfabeto. Cada símbolo en el alfabeto 𝐴, tiene una probabilidad de ocurrencia 𝑃(𝑥). En 40 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- consecuencia, símbolos que sean muy comunes tendrán alta 𝑃(𝑥), mientras que símbolos con baja frecuencia de aparición tendrán baja 𝑃(𝑥). Shannon estuvo interesado en hallar una función para medir que tanta información era producida por un proceso. Citándolo textualmente Shannon (1948)3, argumentó: …Suponga que tenemos un conjunto de posibles eventos cuyas probabilidades de ocurrencia son 𝑝1, 𝑝2,…,𝑝𝑛 . Estas probabilidades son conocidas y es todo lo que nosotros conocemos acerca del evento que podría ocurrir. ¿Podemos encontrar una medida de qué tanta "oportunidad" está involucrada en la selección del evento, o cuanta incertidumbre tenemos de la respuesta o salida? Si existe tal medida, se puede decir que sería razonable que (𝑝1, 𝑝2,…,𝑝𝑛) cumpliera con las siguientes propiedades:  Continuidad: 𝐼 debería ser continua en cada 𝑝𝑖  Monotonía: Sí todas las 𝑝𝑖 son iguales, 𝑝𝑖 = 1 𝑛⁄ , entonces 𝐼 debe ser una función de incremento monotónico de 𝑛. Con 𝑛 eventos de igual probabilidad hay más opción, o incertidumbre, que cuando hay eventos de mayor probabilidad.  Recursión: Sí una opción se divide en dos, y se consideran opciones sucesivas, la 𝐼 original debe ser la suma ponderada de los valores individuales de 𝐼… Con estos pocos axiomas, Shannon demostró que la única función 𝐼 que los satisface, tiene la forma: 𝑛 𝐼 = −𝐾 ∑ 𝑝𝑖 log 𝑝𝑖 𝑖=1 (3.1) Donde 𝐾 es una constante positiva La ecuación 3.1 se representa de manera gráfica en la figura 3-1. De allí podemos extractar las siguientes consideraciones para cadenas binarias: (i) si la probabilidad de recibir unos es máxima 𝑝(1) = 1, y la probabilidad de recibir ceros es mínima 𝑝(0) = 0 , la información es mínima. Esto sucede porque conocemos de antemano que el futuro valor de 𝑥 será 1. La información (I) será 0 debido a que futuros valores de 𝑥 no adicionan nada nuevo, es decir, los valores son conocidos de manera anticipada. Ahora, si no conocemos acerca del futuro valor de 𝑥, como con la probabilidad para cara o sello de una moneda 𝑝(0) = 𝑝(1) = 0.5, entonces la información será máxima (𝐼 = 1), debido a que una futura observación nos traerá información relevante que será independiente de los valores previos. Desde esta condición, la información también ha sido vista como una medida de incertidumbre (Gershenson, 2013a). Sí hay absoluta certeza que el futuro de x será cero (𝑃(0) = 1) o uno (𝑃(1) = 1), 3 Se reemplaza H de Shannon por I de información Capítulo 3 41 entonces la información recibida será cero. Si no existe certidumbre debido a la distribución de probabilidad ((𝑃(0) = 𝑃(1) = 0.5)), la información recibida será máxima (Fig. 3-1). Figura 3-1 Información de Shannon a Diferentes Probabilidades para una Cadena Binaria (Gershenson and Fernández, 2012a) Por ejemplo, si tenemos una cadena '0001000100010001. ..', podemos estimar que 𝑃(0) = 0.75 y P(1) = 0.25, entonces 𝐼 = −(0.75 ∗ log 0.75 + 0.25 ∗ 𝑙og 0.25 ). Sí usamos 𝐾 = 1 y logaritmo base 2, entonces 𝐼 ≈ 0.811. Sí transformáramos a escala porcentual, diríamos que el próximo valor que venga nos traerá un 81.1% de información, pues presumimos que tener un cero tendría mayor probabilidad. No obstante, puede llegar un uno. Shannon usó 𝐻 para describir información (nosotros usamos 𝐼), debido a que él cuando desarrolló la teoría estaba pensando en el teorema de Boltzmann. El llamó a la ecuación 3.1, la entropía de un conjunto de probabilidades 𝑝1, 𝑝2, … , 𝑝𝑛. En palabras modernas, 𝐼 es una función de una variable aleatoria 𝑋. La unidad de información es el bit (binary digit). Un bit representa la información ganada cuando una variable binaria aleatoria se vuelve conocida. Sin embargo, desde la ecuación 3.1 es una suma de probabilidades, por lo que resulta ser una medida adimensional. Más detalles sobre la teoría de la información, pueden ser encontrados en (Ash, 2000, 1965). En años recientes, la teoría de la información (𝑇𝐼) ha sido relacionada con la complejidad, auto-organización y emergencia (Prokopenko, 2009b). De ello se destaca que la teoría de la información presenta, en el contexto de la ciencia de los sistemas complejos-𝐶𝑆𝐶, razones importantes cómo:  Un considerable cuerpo de trabajo en 𝐶𝑆𝐶 ha sido desarrollado dentro de la 𝑇𝐼, cómo pioneros tenemos al instituto Santa Fé, el cual ha direccionado la investigación de muchos de ellos.  La 𝑇𝐼 brinda definiciones que pueden ser formuladas matemáticamente 42 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴-  La 𝑇𝐼 brinda herramientas computacionales disponibles al instante; un número de medidas puede ser actualmente computadas. 3.2 Medidas Las medidas presentadas en este capítulo corresponden con las publicadas recientemente en Gershenson and Fernández(2012), y posteriores más refinadas y basadas en axiomas explicitas en Fernández et al. (2014b). El beneficio de usar axiomas está en que permite centrar la discusión en las presunciones o propiedades que estas medidas pueden tener, más que en la medida en sí misma. Adicionalmente, se incluyen medidas adicionales desde los trabajos de Fernández et al. (2012a, 2011, 2010a), que ahondan en las características de la homeostasis y la autopoiesis. 3.2.1 Emergencia Hemos mencionado que la emergencia se refiere a las propiedades de un fenómeno que están presentes en una escala y no en otra. Las escalas pueden ser temporales, espaciales o numéricas. Si describimos un fenómeno en términos de información, para tener nueva información, la información vieja debe haber sido transformada. Esta transformación puede ser dinámica, estática, activa, o estimérgica (Gershenson, 2012a). Por ejemplo, nueva información se produce cuando un sistema dinámico cambia su comportamiento, pero también cuando una descripción del sistema cambia. Concerniente con el primer caso, se han propuesto enfoques de medición de la diferencia pasada y futura (p.e. Shalizi & Crutchfield (2001)). Podemos llamar esta emergencia, emergencia dinámica. Concerniente con el segundo caso, los enfoques de medición se dan entre las escalas que han sido usadas (Holzer and de Meer, 2011; Shalizi, 2001), podemos llamar esta emergencia, emergencia de escala. Aun cuando existan diferencias entre las emergencias dinámicas y de escalas, ambas pueden ser vistas cómo la producción de información nueva. En el primer caso, la dinámica produce nueva información. En el segundo caso, el cambio de descripción produce nueva información. Entonces, una medida de emergencia basada en información 𝐸 incluiría tanto la emergencia dinámica cómo la de escala. Si retomamos, Shannon propuso una cantidad que medía qué tanta información era producida por un proceso. En consecuencia, podemos decir que la emergencia es la misma información de Shannon 𝐼 (Ecuación 3.2.). En lo sucesivo, consideraremos a la emergencia de un proceso 𝐸, cómo la información 𝐼, y usaremos el logaritmo en base 2. 𝐸 = 𝐼 (3.2) Capítulo 3 43 La idea intuitiva de emergencia cumple con las tres nociones básicas (axiomas) que Shannon usó para derivar la 𝐼 (Shannon 𝐻). Para el axioma de continuidad, se espera que una medida no tenga grandes saltos cuando se presentan pequeños cambios. El segundo axioma es más difícil de mostrar. Este establece que si consideramos una función auxiliar 𝑖, la cual es función de 𝐼, cuando existan 𝑛 eventos con la misma probabilidad 1/𝑛, entonces la función 𝑖 tendrá un incremento monotónico. Si tenemos la misma configuración para la emergencia, entonces podríamos pensar que el proceso tendría igual variabilidad en cualquiera de los 𝑛 estados disponibles. Si algo pasa y ahora el proceso puede estar en 𝑛 + 𝑘 estados, igualmente probables, podemos decir que el proceso ha tenido emergencia, dado que ahora necesitamos más información para conocer en cual estado del proceso está. Para el tercer axioma, necesitamos encontrar una forma para resolver cómo se puede dividir el proceso. Recordemos que la tercera propiedad requerida para la 𝐼 de Shannon, es que si una opción puede ser dividida en dos diferentes, la 𝐼 original debe ser promedio de las otras dos 𝐼. En un proceso, podemos pensar en las opciones cómo una fracción del proceso que actualmente observamos. Para este propósito, podemos hacer una partición del dominio. En nuestro caso, podemos tomar dos subconjuntos cuya intersección es el conjunto nulo y cuya unión es el conjunto original completo. Después de ello, computamos la función 𝐼 para cada uno. Dado que observamos dos diferentes partes de un proceso y de cada observación tenemos el promedio de información requerida para describir el proceso (parcial), entonces toma sentido tomar el promedio de ambos cuando se observa el proceso total. Al estar 𝐸 basada en 𝐼, tenemos que es una medida probabilística. 𝐸 = 1 significa que cuando cualquier variable binaria se vuelve conocida, un bit de información emerge. Sí 𝐸 = 0, entonces no emergerá nueva información, incluso variables aleatorias se vuelven "conocidas" (se conocen de manera anticipada, de antemano). Enfatizamos que la emergencia puede tener lugar en un nivel de observación de un fenómeno o en un nivel de descripción del fenómeno. Uno u otro, pueden producir nueva información.  Múltiples Escalas y Normalización. Para medir la emergencia, auto-organización, complejidad y homeostasis a múltiples escalas numéricas, las cadenas binarias pueden ser convertidas a diferentes bases. Si tomamos dos bits, tendremos cadenas de base 4. Si tomamos tres bits tendremos cadenas de base 8. Tomando 𝑏 bits tendremos cadenas de base 2𝑏. Cuando Shannon definió la ecuación 3.1, él incluyó una constante positiva 𝐾. Este hecho es importante debido a que podemos cambiar el valor de 𝐾 para normalizar la medida en el intervalo [0,1]. El valor de 𝐾 puede depender de la longitud del alfabeto finito 𝐴 que usemos. En el caso particular de las redes Booleanas, que tienen un alfabeto 𝐴 = {0, 1}, su longitud es 𝐴 = 2. Entonces, el valor de 𝐾 = 1 normalizará la medida en el intervalo [0,1]. Debido a la relevancia de la notación binaria en ciencias computacionales y otras aplicaciones, en 44 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- este trabajo se usará a menudo el alfabeto booleano. Sin embargo, podemos computar la entropía para alfabetos de diferentes longitudes. Para ello consideramos la ecuación 3.3 𝐾 = 1 ⁄ 𝑙𝑜𝑔2𝑏 (3.3) Donde 𝑏 es la longitud del alfabeto usado. En esta forma 𝐸 y las medidas derivadas de ella son normalizados, teniendo un máximo de 1 y un mínimo de 0. Por ejemplo, consideremos la cadena en base 4 '0133013301330133. ..'. Podemos estimar que 𝑃 (0) = 𝑃 (1) = 0.25, 𝑃 (2) = 0, 𝑦 𝑃 (3) = 0.5. Siguiendo la ecuación (3.1), tenemos que 𝐼 = −𝐾((0.25 × 𝑙𝑜𝑔 0.25 ) + ( 0.25 × 𝑙𝑜𝑔 0.25) + ( 0.5 × 𝑙𝑜𝑔 0.5)), dado que 𝑏 = 4, entonces 𝐾 = 1 𝑙𝑜𝑔24 , y obtenemos una 𝐼 = 0.75 normalizada. ⁄ 3.2.2 Auto-organización La auto-organización ha sido asociada, correlacionada, con el incremento de orden. Por ejemplo, con la reducción de entropía (Gershenson and Heylighen, 2003). Si la emergencia implica un incremento de información, la cual es análoga a la entropía y al desorden, la auto- organización estará anti-correlacionada con la emergencia. Una medida de auto-organización 𝑆 (por self-organization en inglés), será una función 𝑆: ∑ → ℝ D donde ∑ = 𝐴ℕ, con las siguientes propiedades: a. El rango de 𝑆 está en el intervalo de los reales [0,1] b. 𝑆(𝑋) = 1 sí y sólo sí 𝑋 es determinística. P.e. conocemos de antemano el valor del proceso. c. 𝑆(𝑋) = 0 sí y sólo sí 𝑋 tiene una distribución uniforme. P.e. cualquier estado de un proceso tiene la misma probabilidad. d. 𝑆(𝑋) tiene una correlación negativa con la emergencia E Proponemos cómo medida: 𝑆 = 1 − 𝐼 = 1 – 𝐸 (3.4) Es sencillo comprobar que esta función cumple con los axiomas declarados. Sin embargo, no es la única formulación posible. No obstante, es la única función (lineal) ajustada que satisface los axiomas. Por simplicidad, proponemos usar esta expresión cómo medida de la auto-organización. 𝑆 = 1 significa que existe orden máximo. Es decir, no se produce nueva información (𝐼 = 𝐸 = 0). En el otro extremo, cuando 𝑆 = 0, no existe orden en absoluto. Es decir, cuando ninguna variable aleatoria se vuelve conocida se produce/emerge información. Capítulo 3 45 Cuando 𝑆 = 1, el orden es máximo, la dinámica no produce nueva información, entonces el futuro, desde el pasado, es completamente conocido. De otra parte, cuando 𝑆 = 0 el orden es mínimo, la información pasada no nos dice nada acerca de la información futura. Nótese que la ecuación 3.4 no hace distinción entre si el orden es producido por el (mismo) sistema o por su ambiente. Entonces, 𝑆 podría tener un gran valor en sistemas con alta organización, independientemente sí es un producto de las interacciones locales o impuesta externamente. Esta distinción puede hacerse fácilmente por la descripción en detalle del comportamiento de los sistemas, pero es difícil e innecesario de capturar con una medida de probabilidad general cómo 𝑆. Cómo analogía, podemos medir la temperatura de una substancia, pero la temperatura no nos diferencia (y no es necesaria para diferenciar) entre las substancias que están calientes o frías desde el exterior, y substancias cuya temperatura es principalmente dependiente de sus reacciones químicas internas. Resaltamos que con esta medida de auto-organización los patrones y/o dinámicas estáticas pueden ser valorados adecuadamente por su alta S y baja entropía. Por ejemplo, los sistemas vivos reducen su entropía termodinámica para mantenerse, lo cual ha sido descrito con el concepto de auto-organización (Kauffman, 1993). 3.2.3 Complejidad Sobre la base de Lopez-Ruiz et al. (1995), podemos definir complejidad 𝐶, cómo el balance entre el cambio (caos) y estabilidad (orden). Dado que hemos asociado tales aspectos a las medidas de emergencia y auto-organización, la complejidad es una función 𝐶: ∑ → ℝ, que tiene las siguientes propiedades:  Su rango son los reales en el intervalo [0,1]  𝐶 = 1 sí y sólo sí 𝑆 = 𝐸  𝐶 = 0 sí y sólo sí 𝑆 = 0 y 𝐸 = 0 Es natural considerar que el producto de 𝑆 y 𝐸 satisface los dos últimos requerimientos. Por lo tanto, proponemos: 𝐶 = 4 × 𝐸 × 𝑆 (3.5) Donde 4 es adicionada cómo una constante de normalización para cumplir con el primer axioma, tal que 𝐶 pertenecerá al intervalo [0,1]. 𝐶 puede ser representada en términos de 𝐼 cómo: 𝐶 = 4 × 𝐼 × (1 − 𝐼 ) (3.6) 46 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- La Figura 3-2 muestra las medidas propuestas para diferentes valores de 𝑃(𝑥). Allí es notorio que 𝐸 es máxima cuando 𝑃(𝑥) = 0.5 y mínima cuando 𝑃 (𝑥) = 0 or 𝑃 (𝑥) = 1. Lo opuesto es para 𝑆, esto es mínima cuando 𝑃 (𝑥) = 0.5 y máxima cuando 𝑃 (𝑥) = 0 o P (x) = 1. 𝐶 es máxima cuando 𝐸 = 𝑆 = 0.5, lo cual ocurre cuando 𝑃 (𝑥) ≈ 0.11 or 𝑃 (𝑥) ≈ 0.89. La información de Shannon puede ser vista como un balance de ceros y unos (máxima cuando 𝑃 (0) = 𝑃 (1) = 0.5), en tanto que 𝐶 es vista como un balance de 𝐸 y 𝑆 (máxima cuando 𝐸 = 𝑆 = 0.5). Figura 3-2 Emergencia, Auto-organización y Complejidad vs Probabilidad en una Cadena Binaria (Gershenson and Fernández, 2012a) Cabe destacar que históricamente, sí bien Shannon definió la información cómo entropía (Equivalente a nuestra 𝐸), Wiener y von Bertalanfy definieron información como el opuesto, cómo negentropía (Equivalente a nuestra 𝑆). En este sentido, nuestra medida de complejidad 𝐶, reconcilia estos dos puntos de vista al ser producto del balance entre el orden y el caos. Desde esta perspectiva, las ventajas de ésta medida son importantes, pues pueden caracterizar sistemas dinámicos con máxima complejidad en regiones complejas, cómo las redes booleanas y sistemas vivos que requieren un balance de estabilidad (𝑆) y adaptabilidad (𝐸). Casos que ilustran este tipo de situaciones se observarán en el capítulo de aplicaciones. 3.2.4 Homeostasis  Homeostasis del Sistema Total (Homeostasis de los Estados del Sistema en el Tiempo) Las anteriores medidas (𝐸, 𝑆 y 𝐶) estudian cómo variables individuales cambian en el tiempo. Para calcular las medidas para un sistema total, podemos graficar el histograma, o simplemente promediar las medidas para todas las variables del sistema. Para la homeostasis Capítulo 3 47 𝐻𝑚, estamos interesados en cómo todas las variables del sistema cambian, o no, en el tiempo. Se resalta que 𝐸, 𝑆 y 𝐶 se calculan desde las series de tiempo de las variables halladas en las columnas, mientras 𝐻𝑚 se enfoca en los estados del sistema que cambia en el tiempo, y cuya información se halla en las filas. Sí el sistema ha tenido alta homeostasis, se espera que sus estados no cambien mucho en el tiempo. La homeostasis es una función 𝐻: ∑ × ∑ → ℝ que tiene las siguientes propiedades:  Su rango es el intervalo real [0,1]  𝐻 = 1 , Sí y sólo sí, para los estados 𝑞 y 𝑞′, 𝑞 = 𝑞′, esto es: no hay cambio en el tiempo.  𝐻 = 0 , Sí y sólo sí, ∀𝑖 , 𝑞𝑖 ≠ 𝑞′𝑖, esto es: todas las variables en el sistema cambiaron Una función útil para la comparación de cadenas de igual longitud es la distancia de Hamming, considerada también en la teoría de la información (Hamming, 1950). La distancia de Hamming 𝑑 (ecuación 3.7) mide el porcentaje de símbolos diferentes en dos cadenas 𝑋 y 𝑋′. Para cadenas binarias, puede ser calculada con la función 𝑋𝑂𝑅 (⊕). Su normalización lleva al intervalo [0,1]: ∑ 𝑑(𝑋, 𝑋′) = 𝑥𝑖 ⊕ 𝑥′𝑖 𝑖 ∈{0,…,𝑋} 𝑋 (3.7) 𝑑 mide la fracción de símbolos diferentes entre 𝑋 y 𝑋′. Para casos booleanos 𝑑 = 0 ⇔ 𝑋 = ¬𝑋′, mientras 𝑋 y 𝑋′ están no correlacionadas ⇔ 𝑑 ≈ 0.5. Nosotros podemos usar el inverso de 𝑑 para definir ℎ: ℎ(𝑋𝑡, 𝑋𝑡+1) = 1 − 𝑑(𝑋𝑡, 𝑋𝑡+1) (3.8) La ecuación 3.8 de homeostasis, claramente cumple con las propiedades deseadas para la homeostasis entre dos estados. Para medir la homeostasis de un sistema en el tiempo, podemos generalizarlo como se muestra en la ecuación 3.9: 𝐻 = 1 𝑚 − 1 𝑚−1 ∑ ℎ(𝑋𝑡, 𝑋𝑡+1 𝑡=0 ) (3.9) Donde 𝑚 es el número total de sucesos de tiempo que serán evaluados. 𝐻 será el promedio de las diferentes ℎ desde 𝑡 = 0 a 𝑡 = 𝑚 − 1. Cómo las medidas previas basadas en 𝐼, 𝐻 es una medida adimensional. Cuando 𝐻 es medida a grandes escalas, captura dinámicas periódicas. Por ejemplo, sea nuestro sistema con 𝑛 = 2 variables y un ciclo de periodo 2: 11 → 00 → 11. 𝐻 para base 2 será mínima, dado que en todos los pasos de tiempo todas las variables cambian, los unos se 48 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- cambian a ceros o los ceros a unos. Sin embargo, si la medida de 𝐻 se hace en base 4 tomamos dos eventos de tiempo binarios. Así, en base 4 el atractor será 22 → 22 y la 𝐻 = 1. Lo mismo aplica para bases grandes. Ejemplos de éste funcionamiento se demostrará en el capítulo de aplicaciones.  Homeostasis para Una Variable del Sistema (𝐻𝑚𝑉) Cómo se mencionó en el capítulo 1 numeral 1.3.4 (definición de homeostasis), se ha establecido que las variables esenciales de un sistema se mantienen en una zona de viabilidad. Esta zona, está definida por los límites inferiores y superiores (rango) en los que se mueve la variable (Ross Ashby, 1960b). Con esto en mente, desarrollamos una medida que valorara la dispersión de los estados de una variable (desviación), calculada a partir de los valores de probabilidad de tales estados. Se considera que a mayor dispersión- desviación entre estados, el sistema mostrará menor regularidad y menor será la homeostasis. Para complementar la medida de 𝐻𝑚𝑣 tiene en cuenta la equitabilidad entre estados (evenness, en inglés; relativo a uniformidad, regularidad). Más equitabilidad es más homeostasis, dado que las trayectorias del sistema serán más regulares (mayor auto- organización). En el anterior contexto, definimos la homeostasis de una variable 𝐻𝑚𝑉 como una función de la dispersión entre las probabilidades de sus estados, representada en su desviación estándar (𝜎𝑃𝑖) y el inverso de la equitabilidad (Buzas and Gibson's evenness). El cálculo tiene en cuenta la transformación de la variable según la escala elegida. La ecuación 3.10 muestra la relación planteada. 𝐻𝑚𝑉 = 𝜎𝑃𝑖 𝐸𝑣𝑒𝑛𝑛𝑒𝑠𝑠 = 𝜎𝑃𝑖 𝑒𝐼/𝐶𝑠 Donde: 𝐼: Información de Shannon: 𝐼 = − ∑ 𝑃𝑖 ∗ 𝐿𝑜𝑔𝑃𝑖 𝐶𝑠: Número de casos a partir de los que se calculan las probabilidades. Para efectos de normalización en el rango [0,1] se obtiene de la siguiente manera: 𝐻𝑚𝑉𝑁 = 1 − 1 𝐻𝑚 + 1 (3.10) (3.11)  Mecanismos Homeostáticos en Redes Computacionales de Agentes A través de diferentes mecanismos homeostáticos, un sistema multi-agentes puede hacer frente a los cambios, influencias y/o perturbaciones de su ambiente interno o endógeno, y/o Capítulo 3 49 externo o exógeno 𝐴𝑏. Estos mecanismos de auto-regulación promueven la estabilidad y flexibilidad del sistema, en su paso por los múltiples estados de su ciclo adaptativo, sin que se dé su destrucción. La base del mecanismo homeostático está en el desenvolvimiento de la red en una zona de viabilidad (𝑍𝑣), definida por los rangos de viabilidad (RX), de nodos y aristas, a los factores Ab. Como consecuencia de la búsqueda de equilibrio ante la influencia de Ab, la homeostasis puede generar cambios semipermanentes en la red, como respuesta a los cambios semipermanentes de Ab. En una red computacional de agentes, representados por nodos, cómo se explicó en el capítulo 2, los procesos de auto-regulación se pueden dar de manera complementaria, tanto de forma activa como pasiva. Para el primer caso se parte que la función global F es una función de transición, tal que 𝐹: 𝑄 → 𝑄, donde 𝑄 es un conjunto no vacío compuesto de un número finito de estados 𝑞𝑖 𝑄. Al mismo tiempo, F corresponde a una familia de funciones, denominadas funciones de activación local de la red (𝑓𝑖), tal que 𝐹 = (𝑓1, 𝑓2, … , 𝑓𝑛). Por lo tanto, la auto- regulación activa se puede dar, acorde a la forma en que se den las diferentes combinaciones de los 𝑓𝑖. Así, al tener a "𝑜" como operador, tal que 𝐹 = 𝑓1𝑜 𝑓2𝑜, … , 𝑓𝑛, será evidente que 𝐹 = 𝑓1𝑜 𝑓2 ≠ 𝐹 = 𝑓2𝑜 𝑓1. Lo anterior permite observar que según se combinen las funciones parciales, se generará un cambio en la función global. Esta condición será un mecanismo básico que le dará a la red mayor adaptabilidad ante los cambios del entorno Ab. La auto-regulación pasiva, por su parte, estará definida por situaciones como los rangos de viabilidad RX de la red a la influencia de un factor ambiental Ab, como a continuación se aprecia: – Ante la influencia Ab, la red se desenvuelve en una zona de viabilidad 𝑍𝑣. – Tal 𝑍𝑣 está en correspondencia con los valores máximos (𝑋𝑚𝑎𝑥) y mínimos (𝑋𝑚𝑖𝑛) de un factor i de 𝐴𝑏. Este hecho define la respuesta (tolerancia) de la red al factor i de 𝐴𝑏, acorde con sus rangos de viabilidad (𝑅𝑋𝑖). En consecuencia, para cada factor i de 𝐴𝑏, un nodo j de la red tendrá un rango de viabilidad al factor i, resultante de la diferencia de los valores de extremos, tal que 𝑅𝑋𝑖 𝑗 = 𝑋𝑚𝑎𝑥 − 𝑋𝑚𝑖𝑛 . – Para el caso del rango de viabilidad en las aristas, que considerará igualmente los 𝑗. valores máximos y mínimos ante el factor i de Ab, su notación estará dada por 𝑅𝑋′𝑖 – La respuesta global 𝑅𝑋𝑖 se dará por el promedio de 𝑅𝑋𝑖 𝑗. 𝑗 y 𝑅𝑋′𝑖 – Se estima que la respuesta de la red o tolerancia (T) a un factor i Ab, puede coincidir, con una función gaussiana con un valor promedio (𝜇𝑖) de su rango 𝑅𝑋𝑖 (Fig. 3-3). La escogencia de la función normal, se debe a que ella coincide con la respuesta de muchos sistemas complejos, como los sistemas socio-ecológicos. No obstante, en caso de respuestas diferentes se pueden usar otros tipos de distribuciones. 50 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- – El valor de tolerancia para un determinado valor específico 𝑋𝑖 ∈ 𝑅𝑋𝑖 del factor 𝐴𝑏𝑖, deberá considerar como parámetros para su cálculo la desviación estándar 𝜎𝑖, y el promedio μi. La función también cuenta con las constantes 𝜋 y 𝑒, y su formulación se expresa en la ecuación 3.12. – 𝑇(𝐴𝑖) = 1 𝜎𝑖√2𝜋 −(𝑋𝑖−μi)2 2 𝑒 2𝜎𝑖 (3.12) Figura 3-3 Zona de Viabilidad Zv y Zona de Funcionamiento Óptimo (ZFO) de un factor Abi o Bi para una red computacional. Los valores del eje x dependen del dominio del factor i. (Fernández et al., 2012b) – Se destaca que dentro de la zona de viabilidad 𝑍𝑣, definida por la función de tolerancia T(Ab), existe una zona de funcionalidad óptima 𝑍𝐹𝑂, que se corresponde con una zona cercana al promedio, de cada factor 𝜇𝑖 del factor i de Ab. Estadísticamente, esta área se encuentra entre 𝜇𝑖 ∓ 𝜎𝑖. – En general, los niveles más altos de tolerancia serán aquellos en los cuales el nivel de satisfacción de un nodo o agente es máximo. Ello sucede cuando el agente alcanza un objetivo particular, y al mismo tiempo se minimiza la fricción4 con los demás agentes. Los mecanismos de auto-regulación como el descrito, son los que soportan el proceso auto-organizativo que alcanza niveles más altos de tolerancia y satisfacción, y mínimos de fricción. Lo anterior, coincide lo que Gershenson (2010) ha definido como perfil sigma. 4 interacciones negativas que no favorecen el alcance del objetivo global del sistema. Capítulo 3 51 – En caso que los nodos y/o aristas tengan tolerancias individuales heterogéneas, la tolerancia global de la red será producto del acople de las tolerancias individuales. Esta condición se muestra en la función de tolerancia global desde las funciones locales de los nodos y aristas, representada en la figura 3-4. – Figura 3-4 Detalle de la Respuesta Global y Local en la Red SD-Ag. Los valores de los ejes son simplemente demostrativos (Fernández et al., 2012b) – Consecuente con lo anterior, se puede considerar que un factor i de 𝐴𝑏 puede tener efecto sobre la totalidad de los nodos Ni (incidencia global) o sobre determinados Ni (incidencia parcial). No obstante, si se asumiera en algún caso que la influencia de 𝐴𝑏𝑖 sobre los Ni es uniforme, no se podrá asumir que su respuesta sea igual. La respuesta diferencial de los Ni, será relativa a la capacidad de auto-regulación de cada uno de ellos para responder a las influencias de 𝐴𝑏𝑖. – Si el funcionamiento de la red, nodos y/o aristas individuales se diese por fuera de la zona de viabilidad-𝑍𝑣, ellos operarán en zonas definidas como críticas (𝑍𝑐). Estar en 𝑍𝑐, puede generar su fallo extremo o degradación. En términos de la autopoiesis, esto es una limitación para el auto-mantenimiento pues se da la afectación de la estructura y función en la red. No obstante, al hallarse dentro de 𝑍𝑐, la red deberá compensar este efecto tanto en un sentido homeostático (de auto-regulación) como autopoiético (de auto-mantenimiento), con el fin de seguir operando. El mecanismo básico de compensación para ello se presenta en la siguiente sección.  Mecanismo Homeostático General de Compensación ante Factores del Ambiente Ab La siguiente es la secuencia de compensación en la red. – La compensación será parte del mecanismo homeostático, y consistirá en la escogencia de una acción 𝑦 ∈ 𝑌 apropiada de respuesta, ante una influencia 𝐴𝑏𝑖. Para ello, se 52 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- contará con la ejecución de una función objetivo (𝑓𝑜𝑏) que restablecerá el sistema al llevarlo nuevamente a la zona de viabilidad 𝑍𝑣, tal que 𝑦(𝑖, 𝑓𝑜𝑏,𝑋𝑚𝑎𝑥, 𝑋𝑚𝑖𝑛). La ejecución de 𝑓𝑜𝑏 tendrá como parámetros: (i) que la acción relacionada controle efectivamente el desbalance, y (ii) que no se cause desequilibrio en los demás componentes de la red. Por lo tanto, 𝑓𝑜𝑏 causará el mínimo trauma en la red y compensará efectivamente la influencia. – La anterior visión coincide, nuevamente, con la maximización de la satisfacción y la reducción de la fricción en el sistema, como lo propone Gershenson(2010). Se puede estimar que 𝑓𝑜𝑏 podría ser parte del algoritmo que modifica la red computacional. – La formalización del mecanismo homeostático de compensación es extensible a la autopoiesis. Para tal fin, existirá una función 𝑓𝑜𝑏 involucrada en la producción (síntesis- degradación) de los elementos de la red. Esto, debido a que la autopoiesis puede ser observada como un tipo particular de homeostasis.  Otros indicadores del proceso homeostático Hasta ahora la estabilidad y flexibilidad en la red computacional de agentes se han soportado en la función de tolerancia 𝑇(𝐴𝑏𝑖), que involucra al rango (𝑅𝑋), y en los mecanismos de auto- regulación pasiva y activa. Sin embargo, es posible aportar otros elementos que enriquecen la caracterización de esta misma estabilidad, e incluso determinar la "fragilidad" de la red. Como base se tienen los conceptos expresados por (Pimm, 1991) acerca de la resiliencia, persistencia y resistencia, en sistemas ecológicos. A partir de estas definiciones, se establecen nuevos formalismos para su representación matemática que pueden hacer posible la integración de todos ellos, en una medida extendida de homeostasis. – Resiliencia (𝑹𝒔𝒊): tasa (velocidad) a la que se retorna al punto medio 𝜇𝑖en la zona de viabilidad Zv. Esto puede ser definido como 𝑅𝑠𝑖 : = 𝐷𝑖/𝑡, donde 𝐷𝑖 o distancia es el valor absoluto de la diferencia entre el valor 𝑋𝑖 del factor 𝑖 de Ab y su promedio 𝜇𝑖, tal que 𝐷𝑖 = 𝑋𝑖 − 𝜇𝑖 . Entre tanto, 𝑡 es el tiempo que demora en retornar al valor 𝜇𝑖. 𝑅𝑠𝑖 puede ser extendido a la tasa de retorno a un punto determinado de la zona de funcionalidad óptima-𝑍𝐹𝑂. Mayores valores de 𝑅𝑠𝑖 indican mayor capacidad homeostática. – Persistencia (𝑷𝒆𝒊): es la medida del tiempo que se pasa en el punto medio 𝜇𝑖, o en ZFO. 𝑃𝑒𝑖 = 𝑡𝑟, donde 𝑡𝑟 es el tiempo de residencia en esos valores anteriores. Valores grandes de 𝑃𝑒𝑖 indican más capacidad homeostática. Los dos indicadores anteriores (𝑅𝑠𝑖, 𝑃𝑒𝑖) tienen un comportamiento opuesto en el tiempo (Fig. 3-5), dado que a mayores tiempos de retorno la resiliencia se hace menor, y en consecuencia, la capacidad homeostática. Entre tanto, al aumentar el tiempo de Capítulo 3 53 mantenimiento en el punto medio, la persistencia es mayor, y así mismo, la capacidad homeostática de la red. – Figura 3-5 Comportamiento de la resiliencia (𝑹𝒔𝒊) y la persistencia (𝑷𝒆𝒊):) en el tiempo de retorno y el tiempo de estancia en el punto medio respectivamente, en constraste con la capacidad homeostática (Fernández et al., 2012b). – Resistencia Máxima (𝑹𝒆 − 𝑴𝒂𝒙𝒊): es la medida del grado de desplazamiento máximo con referencia al 𝜇𝑖, tal que el grado de desplazamiento máximo se corresponde con el valor absoluto de 𝑅𝑋𝑖 . Es decir, 𝑅𝑒 − 𝑀𝑎𝑥𝑖 = 𝑅𝑋𝑖/𝜇𝑖. Mayores valores de 𝑅𝑒 − 𝑀𝑎𝑥𝑖 indican mayor capacidad homeostática. Cabe notar que, de la misma forma que se obtiene resistencia máxima se puede obtener otras variantes como la Resistencia 𝑍𝐹𝑂, o la resistencia instantánea, acorde con los valores de 𝑋𝑖 que se tengan en cuenta. – Vulnerabilidad (𝑽𝒖𝒊): la susceptibilidad de la red ante el factor i de Ab estará definida por una función inversa con el rango de viabilidad 𝑅𝑋𝑖, tal que 𝑉𝑢𝑖=1/(1+RXi), donde 𝑉𝑢𝑖 ∈ [0,1]. Mayor 𝑉𝑢𝑖 indica menor capacidad homeostática. El comportamiento de la resistencia máxima y la vulnerabilidad a medida que se incrementa el rango, se puede observar en la figura 3-6. En ella es notorio que la resistencia máxima se incrementa con el rango, y así mismo se transfiere mayor capacidad homeostática a la red. En tanto, la vulnerabilidad se hace menor a medida que el rango se incrementa, y por ende, la capacidad homeostática aumenta. Dado que el proceso de auto-regulación es un proceso dinámico, los anteriores indicadores deben ser observados en el tiempo para determinar su cambio. A manera de síntesis, se puede decir que la capacidad de auto-regulación u homeostasis de la red multi-agentes (𝐻𝑆𝐷−𝐴𝑔) a un factor 𝑖 dado de Ab, estará dado por la caracterización de los indicadores. Así, la 𝐻𝑆𝐷−𝐴𝑔 de la red será una función 𝑔 de la tolerancia, resiliencia, 54 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- persistencia, resistencia máxima, y vulnerabilidad, tal que 𝐻𝑆𝐷−𝐴𝑔 = 𝑔(𝑇(𝐴𝑏𝑖), 𝑅𝑠𝑖, 𝑃𝑒𝑖, 𝑅𝑒 − 𝑀𝑎𝑥𝑖, 𝑉𝑢𝑖). Al normalizar por cualquier procedimiento 𝑅𝑠𝑖, 𝑃𝑒𝑖, 𝑅𝑒 − 𝑀𝑎𝑥𝑖𝑖 a una escala [0,1], la función 𝑔 de 𝐻𝑆𝐷−𝐴𝑔 podrá calcular el promedio de los mismos. Figura 3-6 Comportamiento de la resistencia máxima (𝑹𝒆 − 𝑴𝒂𝒙𝒊) y la vulnerabilidad (𝑽𝒖𝒊) en cuanto al incremento del rango de viabilidad (𝑹𝑿𝒊) (Fernández et al., 2012b). 3.2.5 Autopoiesis  Autopoiesis cómo expresión de la Autonomía del Sistema Los siguientes aspectos formales de la autopoiesis se basan en la consideración que los sistemas adaptativos requieren alta complejidad o 𝐶 para enfrentar los cambios ambientales y mantener su integridad (Kaufmann, 1993; Langton, 1990). Desde esta perspectiva, fue posible definir una expresión de autopoiesis desde la autonomía del sistema. A continuación presentamos las consideraciones axiomáticas para ello. Sea 𝑋 las trayectorias de las variables de un sistema y 𝑌 las trayectorias de las variables del ambiente del sistema. Una medida de autopoiesis 𝐴: ∑ × ∑ → ℝ tiene las siguientes propiedades: – 𝐴 ≥ 0 – 𝐴 deberá reflejar la independencia de 𝑋 y 𝑌, lo que implica: o 𝐴 > 𝐴′ ⇔ 𝑋 produce más de su propia información que 𝑋′ para un 𝑌 dado. o 𝐴 > 𝐴′ ⇔ 𝑋 produce más de su propia información en 𝑌 que en 𝑌′ o 𝐴 = 𝐴′ ⇔ 𝑋 produce mucho más de su propia información que 𝑋′ para un 𝑌 dado. o 𝐴 = 𝐴′ ⇔ 𝑋 produce mucha más de su propia información en 𝑌 que en 𝑌′ o 𝐴 = 0 si toda la información en 𝑋 es producida por 𝑌 . Siguiendo la clasificación de tipos de transformación de información propuesta por Gershenson (2012b), las transformaciones dinámicas y estáticas son internas (un sistema Capítulo 3 55 produce más de su propia información), mientras que las transformaciones activas y estimérgicas son externas (información producida por otro sistema). Desde la alta complejidad requerida por un sistema para afrontar el ambiente, tenemos que sí el sistema 𝑋 tiene alta 𝐸, entonces podría pasar que no esté apto para producir los mismos patrones para diferentes 𝑌. Por otra parte, si se tiene alta 𝑆, 𝑋 podría no estar apta o ser capaz para adaptarse a los cambios en 𝑌. Por lo tanto, proponemos la autopoiesis como una relación de las complejidades del sistema 𝐶(𝑋) y su ambiente 𝐶( 𝑌 ), acorde con la ecuación 3-13 𝐴 = 𝐶(𝑋) 𝐶( 𝑌 ) (3.13) Sí 𝐶(𝑋) = 0, entonces 𝑋 es estática (𝐸(𝑋) = 0) o seudoaleatoria (𝑆(𝑋) = 0). Esto implica que cualquier patrón (complejidad) que pueda ser observado en cualquier 𝑋, debe venir de 𝑌. Este caso da una mínima 𝐴. Por otra parte, sí 𝐶( 𝑌 ) = 0, esto implica que cualquier patrón en 𝑋, sí lo hay, debe venir de sí mismo. Este caso da una 𝐴 = ∞. Un caso particular ocurre sí 𝐶( 𝑋 ) = 0 y 𝐶( 𝑌 ) = 0, 𝐴 resulta indefinada. Pero cómo podemos decir algo sobre la autopoiesis si comparamos dos sistemas los cuales son sín variación (𝑆 = 1) o seudoaleatorios (𝐸 = 1), este debe ser un caso indefinido. El resto de las propiedades son evidentemente cumplidas por la ecuación 3.13. Se aclara, que esto no es ciertamente la única función que cumple con los axiomas deseados. La exploración de alternativas requiere más estudios. Dado que 𝐴 representa la proporción de las probabilidades, esta es una medida adimensional. 𝐴 ∈ [0, ∞), sin embargo ella puede ser mapeada a [0,1] usando una función cómo 𝑓(𝐴) = 1+𝐴 No obstante, nosotros no normalizamos 𝐴 debido a que es útil distinguir cuando 𝐴 > 1 y 𝐴 < 1. El primer caso corresponde cuando el sistema es más autónomo y adaptable que su ambiente, y el segundo cuando el sistema, por su menor complejidad, tiene menores posibilidades de adaptación que su medio, hecho que le confiere menor autonomía. Esto se podrá ver claramente en el capítulo de aplicaciones. 𝐴 . 56 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴-  Procesos Autopoiéticos de Auto-Mantenimiento en Redes Computacionales de Agentes Desde el punto de vista del auto-mantenimiento, 𝐴 es la responsable de los procesos de auto- regulación de la síntesis5 y degradación6 de los agentes y sus interacciones (Fernández et al., 2010a). 𝐴 se soporta en mecanismos homeostáticos específicos, enfocados en la constitución de los elementos de la red computacional, y promueve la "producción del sistema" y la "preservación de la estructura" (Iba, 2011). Por medio de 𝐴 se establece la capacidad de la red para desarrollar, mantener, producir y restablecer su unidad e identidad en un nivel dado. Particularmente, este proceso está basado en la hetero y autoreferenciación7, hecho que involucra un grado determinado de cognición. La cognición, según Gershenson (2010), se refiere al conocimiento que el sistema tiene de cómo actuar en su ambiente. Se puede estimar que en una red de agentes, 𝐴 se corresponde con una función f de auto- mantenimiento (𝑓𝑎) que hace parte de la combinación de las funciones de activación local 𝑓𝑖 que regula el "desgaste" natural de la red. El desgaste, en el sentido homeostático, es visto como una variante de un factor i de Ab. En consecuencia, el mecanismo de ejecución de la autopoiesis corresponde con el mecanismo general de auto-regulación, el cual puede estar inmerso en el algoritmo 𝑎 de la red computacional. El auto-mantenimiento, referido a 𝐴, puede ser medible a través del grado de "auto- mantenimiento" de la red en la constitución de nodos N y aristas K. La medida del auto- mantenimiento autopoiético puede ser expresada a través de un balance de masas (Holzbecher, 2007). El balance considera la dinámica de la constitución de los N, a partir de la diferencia de sus tasas de síntesis y de degradación. Para un N de la red, la dinámica de su auto-mantenimiento será igual a su síntesis (Si), o producción local, menos su degradación local (𝐷𝑔), de tal manera que: 𝑑𝑁 𝑑𝑡⁄ = 𝑑𝑆𝑖 𝑑𝑡⁄ − 𝑑𝐷𝑔 ⁄ 𝑑𝑡 (3.14) La síntesis de los nodos N estará dada por 𝑆𝑖 = 𝛾𝑁, donde γ será el coeficiente o la razón promedio de síntesis de N. La degradación o perdida de N, será proporcional a 𝐷 = −𝜆𝑁𝑑, donde 𝜆 corresponde a la constante de degradación promedio de N. El exponente 𝑑, es el orden de la degradación (Holzbecher, 2007). Así, la ecuación 3.14 toma la forma: 5 La síntesis autopoiético se refiere al proceso de constitución y mantenimiento tanto de los N, como de la estructura de que depende la constitución del elemento. Esto se logra a partir del establecimiento de una red de procesos de producción (Luhmann 1995). 6 La degradación, por su parte, se refiere a la perdida de integridad estructural o unidad de los N, y en consecuencia de la estructura que los soporta y de las condiciones para la reproducción (Niklas Luhmann, 1995). 7 Referida a relación, semejanza o dependencia que como producto de la cognición el elemento hace sobre el exterior (hetero-referencia) y sobre sí mismo (auto- referencia). Capítulo 3 57 𝑑𝑁 𝑑𝑡⁄ = 𝛾𝑁 − 𝜆𝑁𝑑 (3.15) Cuando 𝑑 es de orden 1, la diferencia de los promedios de las tasas de Síntesis y Degradación en una red es la siguiente: 𝑑𝑁 𝑑𝑡 = 𝛾𝑁 − 𝜆𝑁1 = 𝑁(𝛾 − 𝜆) = 𝑁𝑟𝑝 (3.16) Ahora podemos definir la tasa de reparabilidad de la red (𝑟𝑝). Acorde con los valores que rp puede tomar, se tiene que sí 𝑟𝑝 > 0, la capacidad auto-regenerativa se incrementará y habrá auto-crecimiento de la red; sí 𝑟𝑝 = 0, la capacidad de regeneración se mantiene estable. Sí 𝑟𝑝 < 0 la capacidad decrecerá y el sistema evidenciará un proceso de desgaste o degradación. El anterior razonamiento puede ser instanciado en la síntesis-degradación de las aristas, de forma que para una arista 𝐾(𝑖, 𝑗), con sus correspondientes tasas de síntesis (𝛾′) y degradación (𝜆′), la ecuación correspondiente será: 𝑑𝐾 𝑑𝑡 = 𝛾𝐾 − 𝜆′𝐾1 = 𝐾(𝛾′ − 𝜆′) = 𝐾𝑟𝑝′ (3.17) El promedio de 𝑟𝑝 y 𝑟𝑝' dará la tasa de reparabilidad de la red-𝑅. Cabe anotar que si bien todos los sistemas autopoiéticos son homeostáticos, todos los sistemas homeostáticos pueden no ser autopoiéticos. Razón por la cual, para los que sí lo son, la formulación de homeostasis incluirá las tasas de reparabilidad 𝑟𝑝 y 𝑟𝑝′. 3.3 Síntesis A partir de la proposición de diversos axiomas, en este capítulo se han propuesto medidas para la emergencia, auto-organización, complejidad, homeostasis y autopoiesis, basadas principalmente, en la teoría de la información. Estas medidas son de tipo simple y general, y básicamente representan de forma adecuada lo que miden. El beneficio potencial de estas medidas y aplicaciones son múltiples. Aún si mejores medidas son halladas, las nuestras alcanzan el objetivo de caracterizar de forma general la complejidad, emergencia, auto- organización, homeostasis y autopoiesis. Adicionalmente, se profundiza en aspectos importantes para la homeostasis y la autopoiesis. Para la primera, el resultado es el poder medir, no sólo cómo el sistema cambia o no su equilibrio en el tiempo, sino cómo varia a través de sus cambios de estado. Se complementa la homeostasis, con la descripción de sus procesos activos y pasivos, fundamentales para el entendimiento como mecanismo de auto-regulación, y se brinda un conjunto de indicadores interesantes que la describen detalladamente. Para la autopoiesis, desde la perspectiva de 58 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- redes computacionales de agentes, se profundiza en su significado como proceso de auto- mantenimiento, y se brinda un formalismo. Cabe destacar que a nivel formal, son carentes las expresiones de Homeostasis, de manera que los formalismos para ella desarrollados, son de especial interés. En este mismo sentido se puede opinar de la autopoiesis, desde la perspectiva de la autonomía del sistema respecto de su ambiente. La importancia de desarrollar una medida de complejidad, está en que ella debe estar disponible para permitirnos responder preguntas como: ¿Es un desierto más o menos complejos que una paramo? ¿Cuál es la complejidad de diferentes brotes de influenza? ¿Cuáles organismos son más complejos: predadores o presas; parásitos u hospederos; individuos o sociedades? ¿Cuál es la complejidad de situaciones tan disimiles cómo diferentes como los géneros musicales y los diferentes regímenes de tráfico? ¿Cuál es la complejidad requerida de una compañía para enfrentar la complejidad de un mercado? ¿Cuándo un sistema es más o menos complejo? Dada la dificultad existente en la noción de complejidad, y más aún en su medición, el desarrollo de medidas generales y simples de ella, es una tarea de gran importancia y utilidad. Como se dijo antes, la conveniencia de tener una medida de auto-organización que capture la naturaleza de la dinámica local en una escala global, es especialmente relevante en el campo de la auto-organización guiada u orientada (AOG) (Ay et al., 2012; Prokopenko, 2009b). Para el caso de la autopoiesis, desde las tasas de síntesis y reparabilidad, futuros trabajos pueden probar su utilidad al aplicarla a modelos dinámicos de autopoiesis. Para ello trabajos como el de Bourgine & Stewart (2004) pueden dar bases para la especificación de las tasas. Capítulo 3 59 4. Capítulo 4: APLICACIONES EN SISTEMAS DISCRETOS Y SISTEMAS URBANOS Resumen Definidos los aspectos teóricos, conceptuales y formales de la complejidad en SDC con múltiples agentes, en este capítulo desarrollamos experimentos y aplicaciones computacionales, para mostrar el significado y la utilidad de nuestras medidas de complejidad, auto-organización, emergencia, homeostasis y autopoiesis. El primer casos de estudio corresponde a redes booleanas y autómatas celulares elementales, los cuales han sido extensamente utilizados en la literatura científica como modelos clásicos para representar dinámicas ordenadas, críticas y caóticas, al igual que para detectar cambios de fase. El segundo caso corresponde a la caracterización de dos tipos de modelos de tráfico urbano, uno con coordinación tradicional y otro con un método auto-organizante y fronteras no orientables, que demuestra la utilidad de nuestras medidas en la identificación y descripción de diferentes fases dinámicas del flujo y de la velocidad vehicular. Los resultados muestran que los formalismos desarrollados, efectivamente, miden lo que representan, y describen regímenes desde ordenados hasta caóticos, pasando por los regímenes complejos. Dado que todo puede ser descrito y medido en términos de información, con nuestras medidas se puede caracterizar las diferentes fases de un SDC. 4.1 Sistemas Discretos 4.1.1 Las Redes Booleanas Aleatorias-RBA Las redes booleanas aleatorias (RBA) son modelos computacionales abstractos, originalmente propuestos para el estudio de redes genéticas de regulación (Kauffman, 1969; Kaufmann, 1993). No obstante, han sido de utilidad para abordar el conocimiento de diversos casos, como en sistemas auto-organizantes, en los que se estudia cómo cambios en los nodos y las conexiones afectan la dinámica global de la red. Igualmente, las RBA han sido de 62 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- utilidad para estudiar la auto-organización guiada, la cual consiste en que, dependiendo de la configuración y régimen del sistema dinámico, se pueden realizar diferentes intervenciones para llevarlo a un punto de mayor o menor auto-organización (Aldana- González et al., 2003; Gershenson, 2012a, 2004a). Básicamente, una RBA está formada por 𝑁 nodos unidos por 𝐾 conexiones. Cada nodo tiene un estado booleano, como por ejemplo cero o uno, vivo o muerto, perdió o ganó, etc. El estado futuro de cada nodo está determinado por los estados actuales de los demás nodos, con los que tiene conexión. Su estructura se determina por la red de los nodos interactuantes. Su funcionamiento se basa en tablas de búsqueda que especifican cómo es la actualización del estado de cada nodo, en dependencia con el estado de sus entradas. La conectividad y la actualización de los estados de los nodos se generan aleatoriamente al iniciar la red, pero permanece fija la conectividad en cuanto inicia la dinámica. Las RBA clásicas se actualizan sincrónicamente (Gershenson, 2004b), lo que define una dinámica determinística. Cómo su espacio de estados es finito (2𝑁 estados), tarde o temprano, uno o más estados se repetirán. Estos estados pueden ser definidos como atractores. Los atractores alcanzados, pueden ser puntuales (un estado único), o cíclicos de diferentes longitudes. En dependencia con sus propiedades estructurales o funcionales, se han definido para las RBA tres tipos de regímenes, que han sido estudiados de forma extensa (Gershenson, 2004a). (i) Ordenado: muchos nodos son estáticos, lo que da robustez a la RBA a perturbaciones. (ii) Caótico: muchos nodos son cambiantes, lo que genera RBA frágiles a perturbaciones. (iii) Crítico: algunos nodos cambian, lo que le da a la RBA un potencial de adaptabilidad por el balance de los regímenes caóticos con ordenados. Dinámicas críticas están relacionadas con alta complejidad. Se puede decir que el régimen crítico es el balance entre la robustez del régimen ordenado y la variabilidad del régimen caótico. Desde los 90s, se ha argumentado que la computación y la vida requieren de este balance para computar y adaptarse (Kaufmann, 1993; Langton, 1990). 4.1.2 Midiendo la Complejidad en Redes Booleanas con Diferentes Regímenes y Grados de Conectividad. A continuación, se aplican las medidas propuesta en el capítulo 3 al caso de estudio de las redes booleanas con diferentes regímenes. Los resultados se obtuvieron desde el promedio de 1000 RBA, después de 1000 iteraciones, que iniciaron en estado aleatorio y que dieron como resultado la información de entrada. Seguidamente, las propiedades de Emergencia (𝐸), Auto-organización (𝑆), Complejidad (𝐶) y Homeostasis (𝐻) fueron calculadas para los datos generados en 1000 iteraciones adicionales. Los paquetes BoolNet (Müssel et al., 2010) y entropy (Hausser and Strimmer, 2012), del proyecto R (www.r-project.org), fueron usados como apoyo. Capítulo 4 63 Las series de tiempo de nodos simples fueron evaluadas, y con ello se obtuvo el promedio de los resultados para la red. Para la medida de homeostasis H, d fue medida entre los estados 𝑡 y 𝑡 − 1, para la serie de tiempo total. 4.1.3 Resultados para Redes Booleanas La figuras 4-1 y 4-2 muestran los resultados de las RBA con 100 nodos y conectividad K variable entre 0 − 5. Se observa que para bajos K, existe alta S y H (𝑆, 𝐻 ≅ 1), y baja E y C (𝐸, 𝐶 ≅ 0). Esto refleja el régimen ordenado de RBA, que tienen alta robustez y pocos cambios. Se puede decir que en esta fase existe poca o ninguna información emergente y que hay alto grado de auto-organización y homeostasis, debido a que los estados de los nodos tienen alta regularidad, de manera que el estado siguiente no trae información nueva, es decir, hay una alta probabilidad que el estado más común se repita. Figura 4-1 Diagramas de Cajas para los resultados de 1000 RBA, N=100 con variación de la conectividad K. A. Emergencia B. Auto-organización (S). C. Homeostasis y D. Complejidad (Gershenson and Fernández, 2012a). Para altos K, existe alta 𝐸, baja 𝑆 y 𝐶, y una homeostasis de 0.5. Esto refleja los rasgos del régimen caótico (alta variabilidad y aleatoreidad) de las RBA, donde existe alta fragilidad en la red y muchos cambios. Casi cada bit (un nuevo estado para muchos nodos) trae 64 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- información emergente nueva. En este sentido, los constantes cambios de estado en la red implican baja organización (𝑆 = 0; 𝐸 = 1) o regularidad, y baja complejidad o capacidad de adaptación. Para conectividades medias (2 ≤ 𝐾 ≤ 3) existe un balance entre 𝐸 y 𝑆 (cercanas a 0.5), lo que conduce a alta 𝐶. Esto corresponde con el régimen crítico de RBN, el cual ha sido asociado con complejidad y la posibilidad de vida (Kauffman, 2000). Figura 4-2 𝑬, 𝑺, 𝑪 y 𝑯 promedio para 𝟏𝟎𝟎𝟎 RBA, 𝑵 = 𝟏𝟎𝟎 nodos variando el promedio de conectividad 𝑲 (Gershenson y Fernández, 2012). En síntesis se puede decir que la emergencia aumenta con la conectividad, mientras que la auto-organización disminuye con ella, y la complejidad se hace máxima a niveles intermedios de 𝐾. El aumento de la conectividad hace que surja mayor probabilidad que el estado de un nodo, por la afección de otros, cambie en una mayor proporción. Los experimentos de RBA también fueron llevados a cabo para múltiples escalas de observación. Si bien existen las escalas espaciales y temporales, también existen las escalas numéricas. El cambio de escala se logra a través de un cambio de la base, cómo se explica en el capítulo de formulaciones matemáticas, en el ítem de "Múltiples Escalas y Normalización". Las escalas en las que se evaluaron las medidas fueron 2, 4, 6, 8, 16,32 y 64. El análisis a múltiples escalas se dio debido a que la información puede cambiar drásticamente con la escala observada. Por ejemplo, una cadena 10101010 tiene 𝐼1 = 1, pero a una escala mayor, por ejemplo base 4, la cadena anterior se vuelve 2222 y su información es 𝐼2 = 0. Sobre la anterior base, se calcularon 𝐸, 𝑆, 𝐶 y 𝐻 a múltiples escalas. Los resultados obtenidos no mostraron cambios importantes entre escalas, excepto por una pequeña elevación del valor máximo de 𝐶, el cual que se incrementó moderadamente con la escala. Para 𝐸, se halló Capítulo 4 65 un pequeño decremento a altas escalas, que puede ser atribuido al pequeño tamaño de las cadenas evaluadas (1000 por nodo). Los valores de 𝐻 decrecieron con la escala. Para el cálculo de autopoiesis (𝐴), que relaciona la complejidad del sistema con el medio ambiente, de manera que se pueda observar su grado de autonomía del primero sobre el segundo, se modeló a través de dos redes acopladas que representaron el sistema y su ambiente. La primera RBA, fue una red interna que simuló el sistema, con 𝑁𝑖 nodos y 𝐾𝑖 conexiones promedio. La segunda, fue una red "externa", con 𝑁𝑒 nodos y 𝐾𝑒 conexiones promedio, que simuló el ambiente. Se considera una RBA acoplada como 𝑁𝑐 = 𝑁𝑖 + 𝑁𝑒 nodos y 𝐾𝑖 conexiones. En cada iteración, la RBA externa evolucionó independientemente. Sin embargo, su estado fue copiado a los 𝑁𝑒 representados en la RBA acoplada, los cuales ahora evolucionan parcialmente dependiendo de la RBA externa. Así, los 𝑁𝑖 nodos en la RBA acoplada representaron la red interna que puede ser afectada por la dinámica de la RBA externa, pero no viceversa. Se simularon 50 redes acopladas con 96 nodos en la externa y 32 en la interna. Como base para el cálculo de la autopoiesis se obtuvo la complejidad 𝐶 de cada nodo, que luego fue promediada para cada red. De allí se obtuvo una complejidad interna 𝐶𝑖 y una externa 𝐶𝑒. La autopoiesis A fue obtenida desde la relación 𝐴 = 𝐶𝑖 ⁄ . 𝐶𝑒 Los valores resultantes de A se reportan en la tabla 4.1 y se ilustran en la figura 4.3. En ellas, la autopoiesis A cambia con la conectividad. Se espera, entonces, tener 𝐴 ≈ 1 cuando 𝐾𝑖 ≈ 𝐾𝑒. Cuando la complejidad externa 𝐶𝑒 es alta (𝐾𝑒 = 2 o 𝐾𝑒 = 3), entonces el ambiente (RBAe) domina los patrones de la red acoplada, conduciendo a 𝐴 < 1. Esto es debido a que el sistema al tener menor complejidad que su ambiente no puede adaptarse a los cambios del mismo por su menor autonomía. Es por ello que los patrones que muestra el ambiente se imponen a los patrones que muestra el sistema. En caso contrario, cuando 𝐶𝑖 > 𝐶𝑒, o sea 𝐶𝑒 es más baja (𝐾𝑒 < 2 o 𝐾𝑒 < 3), los patrones producidos por el sistema no son afectados, de mayor manera, por su ambiente; entonces 𝐴 > 1, siempre que 𝐾𝑖 < 𝐾𝑒 (de otra forma, el sistema es más caótico que su ambiente, y la complejidad de los patrones vienen de fuera). A no trata de medir cuanta información emerge en el sistema o en el ambiente, sino como los patrones que son interna o externamente producidos se afectan entre sí. Alta 𝐸 significa que no hay patrones, pues existe un cambio constante. Alta 𝑆 implica que el patrón es estático. Alta 𝐶 refleja patrones complejos (balance entre la inexistencia de patrones y patrones estáticos). En este trabajo, hemos estado interesados en una medición de A a partir de la razón de la complejidad de los patrones que se producen por un sistema, comparada con la complejidad de los patrones producidos por su ambiente. A en este aspecto, es una expresión de la autonomía del sistema respecto de su ambiente, sobre la base de su 66 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- complejidad que le profiere adaptabilidad. Un sistema más autónomo no será influido por los patrones del ambiente. Tabla 4-1 Autopoiesis (A) promedio para 50 conjuntos de redes Ne=96, Ni=32. En rojo: redes acopladas con 𝑨 < 𝟏, en azul redes acopladas con 𝑨 > 𝟏 Los resultados son los mismos que se ven en la fig. 4-3 (Fernández et al., 2014b). 𝐾𝑖 (𝑁𝑖 = 32) 𝐶𝑖 𝐴 = ⁄ 𝐶𝑒 1 𝑺 = 𝟏; 𝑪 = 𝟎; R.ordenado 2 3 𝑺 = 𝑬; 𝑪 = 𝟏; R. crítico 4 5 𝑬 = 𝟏; 𝑪 = 𝟎; R. caótico 1 𝑺 = 𝟏; 𝑪 = 𝟎; R.ordenado 2 𝐾𝑒 (𝑁𝑒 = 96) 3 𝑺 = 𝑬; 𝑪 = 𝟏; R. crítico 4 5 𝑬 = 𝟏; 𝑪 = 𝟎; R. caótico 0.4464025 0.5151070 0.7526248 1.6460345 3.4081967 1.6043330 0.9586809 1.1379227 2.0669794 3.2473729 2.4965328 0.9999926 0.9355231 1.3604272 2.6283798 2.1476247 0.7249803 0.6151742 0.8055051 1.38900630 1.8969094 0.4760027 0.3871875 0.4755580 0.8648389 En la figura 4-3 el tamaño de los círculos es relativo a su valor negativo (en rojo) o positivo (en azul). Figura 4-3 Autopoiesis (A) promedio para 50 conjuntos de redes Ne=96, Ni=32. Valores de A<1 en rojo. Valores en azul para A>1. El tamaño de los círculos indican que tan lejos está A de A=1. Los valores numéricos se muestran en la tabla 4-1 (Fernández et al., 2014b). Capítulo 4 67 4.2 Autómatas Celulares Elementales (ACE) Los autómatas celulares elementales son modelos matemáticos para representar sistemas dinámicos que evolucionan en pasos discretos. Los ACE han sido estudiados de manera igualmente extensa (Wolfram and Gad-el-Hak, 2003; Wolfram, 1984; Wuensche and Lesser, 1992). Ellos pueden ser vistos como casos particulares de RBA (Carlos Gershenson, 2002; Wuensche, 1998), donde los nodos tienen la misma función (regla) y la estructura es regular. Esto es, cada nodo tiene 𝐾 = 3 entradas: ellos mismos y sus dos vecinos más cercanos. Dado que hay 8 posibles estados binarios para las 3 celdas de vecinos en una célula dada, existen 256 "reglas" posibles. Es decir, las posibles combinaciones de funciones booleanas para tres entradas 22^3=28=256. Cada regla puede ser indexada por un número binario de 8 dígitos (Wolfram and Gad-el-Hak, 2003; Wolfram, 1984; Zenil, 2009). Por ejemplo, la regla 30 en notación binaria es como sigue: 302 = 00011110. Su regla de evolución se ilustra en la figura 4-4. En ella se puede observar los valores de los conjuntos de tres vecinos en la parte superior que resultan en la condición inferior de la celda central en la siguiente generación. Figura 4-4 Evolución para la Regla 30 desde condiciones iniciales para grupos de tres vecinos. http://reference.wolfram.com/language/ref/CellularAutomaton.html La evolución de la regla 30 para dos pasos, a partir del acostumbrado estado inicial que parte de una única celda central en estado 1, será numéricamente así: Inicial: 0,0,0,1,0,0,0   Paso 1: 0,0,1,1,1,0,0  Paso 2: 0,1,1,0,0,1,0 Pasados 50 pasos o iteraciones, su forma gráfica es como se ve en la siguiente figura. Figura 4-5 Evolución de la regla 30 en 50 iteraciones http://reference.wolfram.com/language/ref/CellularAutomaton.html 68 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Entre las reglas existentes hay 88 clases que son inequivalentes (Li and Packard, 1990; Wuensche and Lesser, 1992). Han existido varias clasificaciones para la dinámica de los ACE, la más popular ha sido realizada por Stephen Wolfram, quien distinguió el comportamiento evolutivo cualitativo a través del establecimiento de 4 clases (Wolfram, 1984). Para Wólfram, las clases I y II evolucionan hasta aproximarse a dinámicas ordenadas de configuraciones estables, homogéneas, simples y/o periódicas, que terminan con celdas de un mismo valor. Las reglas de la clase I tienden a atractores puntuales desde todos los estados iniciales (p.e. reglas 0, 248 y 32), mientras que las reglas de la clase II tienden a atractores cíclicos (p.e. reglas 34,1 y 4 definidas cómo periódicas). Las reglas clase III evolucionan a estados caóticos (p.e. reglas 90, 30 y 165). La evolución de las reglas clase IV generan dinámicas críticas (p.e. 54, 110 y 193); algunas de ellas han sido definidas como capaces de realizar computación universal (Cook, 2004). 4.2.1 Experimentos con ACE. Los experimentos de ACE evaluaron 50 instancias de algunas reglas de las cuatro clases de Wolfram. Se consideraron 256 celdas, 212 pasos iniciales y 212 pasos adicionales fueron usados para generar los resultados. Finalmente, 18 reglas de ACE, escogidas como representativas de cada una de las clases, fueron evaluadas. Una relación de ellas se da en las tablas 4-2 a 4-5. Capítulo 4 69 Tabla4-2 Reglas Incluidas de la Clase I. Condiciones de Evolución y Representación de 20 Iteraciones. Regla Cero ACE Clase I Evolución Regla 8 Regla 32 Regla 40 Regla 128 http://reference.wolfram.com/language/ref/CellularAutomaton.html 70 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Tabla 4-3 Reglas Incluidas de la Clase II. Condiciones de Evolución y Representación de 20 Iteraciones ACE Clase II Evolución Regla 1 Regla 2 Regla 3 Regla 4 Regla 5 http://reference.wolfram.com/language/ref/CellularAutomaton.html Capítulo 4 71 Tabla 4-4 Reglas Incluidas de la Clase III. Condiciones de Evolución y Representación de 20 Iteraciones ACE Clase III Evolución Regla 41 Regla 54 Regla 106 Regla 110 http://reference.wolfram.com/language/ref/CellularAutomaton.html 72 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Tabla 4-5 Reglas Incluidas de la Clase IV. Condiciones de Evolución y Representación de 20 Iteraciones ACE Clase IV Evolución Regla 18 Regla 22 Regla 45 Regla 161 http://reference.wolfram.com/language/ref/CellularAutomaton.html Las simulaciones fueron programadas en R con el uso de los paquetes BoolNet (Müssel et al., 2010), CellularAutomaton (Hugues, 2012) y entropy (Hausser and Strimmer, 2012). 4.2.2 Resultados ACE Los resultados para diferentes clases (I1, I2, I4, e I8) se muestran en la figuras 4-6 a 4-9. En ellas se puede observar que las reglas de la clase I tienen 𝐸 = 𝐶 = 0 y 𝑆 = 𝐻 = 1 para todas las escalas. Esto es debido a que en la evolución de los nodos no hay cambio de estado, así que el ACE alcanza un estado estable. El tiempo que toma ello, es el de básicamente una iteración. Capítulo 4 73 Algunas reglas de la clase II se comportaron de manera similar a la clase I, por ejemplo la regla 4. Otras, como la 1 y 5, tuvieron emergencias medianamente altas (𝐸 > 0,5 en 𝑏 = 1). Esto se debío a que la mayoría de las células oscilaron entre cero y uno en cada iteración. Sin embargo, al incrementar la escala (𝑏 ≥ 2), los patrones se tornaron más regulares y se comportaron como las reglas de la clase I (𝐸 = 𝐶 = 0 ; 𝑆 = 𝐻 = 1). Dado que medimos el cambio de la información por nodo, las reglas cómo la 2 y 3 parecen tener alta 𝐶, a pesar de que sus patrones tienden a la regularidad (Gershenson and Fernández, 2012a). Las reglas de la Clase III, tienden a tener alta E. La regla 18 es particular, dado que tiene una proporción mucho mayor de ceros que unos, que se acumulan en triángulos. Su 𝐸 es menor y su 𝑆, 𝐶, y 𝐻 es mayor, comparativamente con las otras de la clase III. Esto es notable aún más a escalas mayores, en razón a que las otras reglas de la clase III tienen un porcentaje más balanceado de ceros y unos. La regla 161 está en el medio, y tiene un porcentaje ligeramente mayor de unos que ceros. Las reglas de la Clase IV se comportan de manera similar a las de la clase III para 𝑏 = 1, con alta 𝐸, baja 𝑆 y 𝐶. La regla 54 es una excepción para 𝐻, donde la alternancia de patrones del entorno (éter) genera una H anti-correlacionada. Es decir que los patrones espaciales en un tiempo determinado comparado con el siguiente, son completamente opuestos. El éter regular de la regla 54, y la regularidad de sus deslizadores (gliders), genera un decremento en E a altas escalas, por razones similares a las de las reglas 2 y 3. Para la regla 41 la 𝐸 decrece y se incrementa su 𝑆 y 𝐶 con la escala, y se mantiene una 𝐻 no correlacionada. Esto revela patrones más regulares en altas escalas, similar a la regla 18. La regla 110 se comporta similar a la regla 41: 𝐸 es baja, 𝑆 y 𝐶 incrementan para escalas altas. La diferencia está en 𝐻. Para la regla 110, 𝐻 es anti-correlacionada para 𝑏 ≥ 4. Esto puede ser nuevamente explicado por lo que pasa en el éter, el cual tiene un periodo de 7 para la regla 110. 74 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Figura 4-6 Promedios de 50 ECA para la 19 reglas, N=256, b=1. (Gershenson and Fernández, 2012a) Figura 4-7 Promedio de 50 ACE para 19 reglas, N=256, b=2 (Gershenson and Fernández, 2012a). Capítulo 4 75 Figura 4-8 Promedio de 50 ACE para 19 reglas, N=256, b=4 (Gershenson and Fernández, 2012a). Figura 4-9 Promedio de 50 ACE para 19 reglas, N=256, b=8 (Gershenson and Fernández, 2012a). El comportamiento de 𝐸, 𝑆, 𝐶 y 𝐻 a múltiples escalas (bits 1,2,4,8) se puede ver en la figura 4-10. La regla 0 no cambia con la escala. La regla 1 tiene alta 𝐸, baja 𝑆 y 𝐻, y media 𝐶 para 𝑏 = 1, pero es similar a la regla 0 para escalas grandes. En la regla 11, la 𝐸 y 𝐻 decrecen y se 76 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- incrementan su 𝑆 y 𝐶 con la escala. La regla 30 tiene alta E, baja 𝑆, 𝐻 y 𝐶, para todas las escalas. Figura 4-10 Perfiles de E,S,C y H a Escalas 1,2,4,8. . (Gershenson and Fernández, 2012a) 4.3 Medición de la Complejidad en Sistemas Urbanos- Semáforos Auto-organizantes 4.3.1 La Movilidad Vehicular en las Ciudades Modernas y los Métodos Auto-Organizantes para su Solución Vivir en un mundo urbanizado ha traído grandes ventajas a sus habitantes, como la solución a muchas necesidades básicas que se deben satisfacer. Se estima que esta satisfacción impulsa a las personas a buscar cada vez más las ciudades, tanto que para el 2050 el 70% de las Capítulo 4 77 personas vivirán en ciudades. En la actualidad, la mitad de las ciudades en el mundo tienen entre 100 y 500 mil personas, y el 10% de la población mundial viven en megalópolis, ciudades con más de 10 millones de habitantes (http://goo.gl/FYoIfP). Ante el gran número de personas que necesitan desplazarse en las ciudades, su planeación ha tenido cómo uno de sus ejes centrales la movilidad vehicular. La movilidad vehicular es un problema complejo en el que el flujo que cambia constantemente, interactúa con transeúntes y la sincronización de los semáforos. Al ser un problema no estacionario, se requiere de un enfoque adaptativo para su solución, como por ejemplo un enfoque auto- organizante propuesto por Gershenson (Gershenson, 2005). Las preguntas que surgen son: ¿Cómo la auto-organización puede ser orientada para lograr flujos eficientes de tráfico? ¿Cuál puede ser su régimen deseado? ¿Cómo puede ser medida en términos de complejidad? En el contexto anterior, se presenta un modelo de auto-organización guiada. Además, se hace una comparación de la complejidad entre los métodos tradicionales de sincronización, comparado con los semáforos auto-organizantes (Gershenson, 2005). Los métodos y resultados presentados son acordes con lo expresado en Zubillaga et al. (2014). 4.3.2 Modelo de Tráfico El modelo de tráfico usado fue desarrollado previamente por (Gershenson and Rosenblueth, 2012), basado en autómatas celulares elementales explicados en la sección 4.2 (Wolfram and Gad-el-Hak, 2003; Wuensche and Lesser, 1992). Este modelo es determinístico, en tiempo y espacio discreto, velocidad uno o cero y aceleración infinita. Su condición sintética permite medir claramente las diferentes fases dinámicas. Se aclara que el modelo es descriptivo, no predictivo. Cada calle es representada por un autómata celular elemental (ACE), acoplado en las intersecciones. Cada ACE contiene un número de celdas que toman valor de cero (vacío) o uno (vehículo). El estado de la celda se actualiza en correspondencia con los estados previos de la celda y de los vecinos más cercanos. Muchas celdas vacías adelante del vehículo permiten su avance. El comportamiento fue modelado con la regla 184, la cual es uno de los modelos más simples de tráficos en autopistas. Sus reglas de actualización según sus dos vecinos se dan en la tabla 4-7. Tabla 4-6 Reglas de Actualización de ACE 𝑡 − 1 000 001 010 011 100 𝑡184 0 0 0 1 1 𝑡252 0 0 1 1 1 𝑡136 0 0 0 1 0 78 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 101 110 111 1 0 1 1 1 1 0 0 1 Los modelos ACE-184 se mueven a la derecha. Otras direcciones son obtenidas cambiando las posiciones de los vecinos con el uso de la misma regla. En las intersecciones se usaron dos reglas más. El no avance de los vehículos antes de una luz roja, se modeló con la regla ACE- 252. La regla ACE-136 se utilizó para modelar los vehículos que cruzaban la intersección después de una luz roja. Las calles con luz verde utilizaron la regla ECA-184. La figura 4-11 muestra detalles de las reglas. Figura 4-11 Reglas de autómatas celulares elementales usadas en el modelo de tráfico y su función cómo interruptores de los semáforos (Zubillaga et al., 2014). El modelo de tráfico es conservativo. Esto es, la densidad de vehículos ρ (proporción de celdas con un valor de 1) es constante en el tiempo. El promedio de velocidad 𝑣 se calcula por el número de celdas que cambian desde cero a uno (movimiento ocurrido entre el tiempo 𝑡 y 𝑡 + 1, dividido por el número total de vehículos (celdas con 1). 𝑣 = 0 sí el vehículo no se mueve, 𝑣 = 1 cuando se mueven. El flujo 𝐽 se define como la velocidad 𝑣 multiplicada por la densidad ρ; 𝐽 = 𝑣 ∗ 𝑝. 𝐽 = 0 cuando no hay flujo. Es decir, no hay vehículos en la simulación (ρ = 0), o los vehículos están parados (𝑣 = 0). Una 𝐽 máxima ocurre cuando todas las intersecciones son cruzadas por vehículos. En el estudio de escenarios 𝐽𝑚𝑎𝑥 = 0.25. Esto es debido a que para una calle única (ACE-184), los vehículos necesitan espacio para avanzar, limitando la 𝐽𝑚𝑎𝑥 = 0.5. Sin embargo, cuando dos calles se intersectan, una de ellas tiene el pare mientras la otra fluye, reduciendo 𝐽𝑚𝑎𝑥 a 0.25. Capítulo 4 79 Teóricamente, la velocidad y flujo óptimos para una proporción dada en un problema de coordinación, deben ser los mismos 𝑣 y 𝐽 para las intersecciones aisladas. Esto es un límite superior. Lo que implica que cada intersección interactúa con sus vecinos si es tan eficiente como cuando está vacía. Esto puede ser visto con curvas de optimización (definidas como el mejor rendimiento para una intersección aislada, para diferentes densidades, menos el rendimiento actual del sistema de tráfico (Gershenson and Rosenblueth, 2012), que visual y analíticamente compara los diferentes resultados con el óptimo teórico. Las fronteras fueron no orientables (como en una banda de Möbius o una botella Klein) por sugerencia de Bedau and Humphreys (2008), lo que mantiene la entrada y la densidad de vehículos. Si bien estos son deterministas, en la práctica se destruyen las correlaciones que se dan en fronteras cíclicas. El resultado es equivalente a una sola calle con 100 intersecciones. Una muestra de la aplicación de las fronteras no orientables se observa en la figura 4-12. Figura 4-12 Fronteras no orientables para una grilla de cuatro por cuatro (Zubillaga et al., 2014) También es posible extender el modelo a una grilla hexagonal para permitir intersecciones más complejas (Gershenson and Rosenblueth, 2012). El problema de coordinación de los semáforos es EXPTIME-Completo (Gershenson, 2005). Esto implica que la optimización de grandes redes de tráfico es inviable. Además es no- estacionario. Aún si se encontrara una solución óptima, sería obsoleta en segundos. Como alternativa se tiene la adaptación, siendo la auto-organización un método útil para construir sistemas adaptativos. La solución común es la "ola verde", donde los semáforos son sincronizados con el mismo periodo y fase se ajusta acorde con la velocidad esperada de vehículos. Esto es bueno para dos direcciones, mientras que las otras quedan detenidas por estar sus semáforos en rojo, es decir en fases anti-correlacionadas. En densidades medias, la ola verde causa largas esperas y 80 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- colas. Igualmente, cuando las densidades cambian, los vehículos no van a la velocidad esperada. Las fases halladas en la ola verde son dos: intermitentes (algunos vehículos detenidos, algunos se mueven) y embotellamiento (todos los vehículos parados). Por su parte el método auto-organizante se basa en 6 reglas, simples y por intersección, con el que se alcanza un óptimo global de coordinación (22,33,38,40). A continuación se esquematiza una intersección y sus parámetros (Fig. 4.13). Figura 4-13 Esquema de una intersección y parámetros de medición para la definición de reglas en semáforos auto-organizantes (Zubillaga et al., 2014) Las reglas son: i. ii. iii. iv. v. vi. En cada tic se adiciona a un contador el número de vehículos que se aproximan o esperan en una luz roja a una distancia 𝑑. Cuando el contador excede el umbral 𝑛, se enciende la luz verde. Cuando la luz verde se enciende el contador se reinicia a cero. La luz se mantiene en verde un tiempo mínimo 𝑢 Si los vehículos son pocos (𝑚 o pocos, pero más que cero) y están a una distancia corta 𝑟, la luz no pasará a verde. Sí no hay ningún vehículo que se aproxime a la luz verde dentro de una distancia 𝑑, y hay por lo menos un vehículo aproximándose, en la otra dirección, a la luz roja dentro de la distancia 𝑑, la luz cambiará a verde para este último. Sí hay un vehículo parado en una calle a una distancia corte 𝑒, ante una luz verde, entonces la luz pasará a roja. Si hay vehículos parados en ambas direcciones, a una distancia corta 𝑒, entonces ambas luces pasan a rojo. Una vez, una de las direcciones esté libre, se restablecerá la luz verde en esa dirección. 4.3.3 Resultados Los resultados de 𝑣 y 𝐽 para fronteras no orientables se muestran en la figura 14, en la que se indica con la línea punteada las transiciones de fase del método auto-organizante, cuando se incrementa la proporción. Estas fases fueron halladas en estudios previos para fronteras cíclicas y se colocan para propósitos ilustrativos. Ellas son: (i) flujo libre (ningún vehículo Capítulo 4 81 detenido 𝑣 = 1), (ii) cuasi-libre (casi ningún vehículo detenido), (iii) subutilizado- intermitente (algunos vehículos detenidos, las intersecciones no alcanzan su flujo máximo), (iv) capacidad completa-intermitente (algunos vehículos detenidos, 𝐽𝑚𝑎𝑥, todas las intersecciones tienen vehículos siempre), (v) sobre-utilizado-intermitente (algunos vehículos parados, las intersecciones tienen que restringir el flujo en ambos sentidos, usando la regla 6), (vi) cuasi-embotellamiento (casi todos los vehículos parados, pero con algunos espacios de "pelotones" o convoys), (vii) embotellamiento (todos los vehículos parados y las intersecciones bloqueadas desde condiciones iniciales; 𝑣 = 0). En fronteras cíclicas, las transiciones de fase se dieron a valores de ρ: 0.15, 0.22, 0.38, 0.63, 0.77 y 0.95. En la figura 4-14 se observa claramente que el método auto-organizante (en azul) se acerca estrechamente con el óptimo teórico y mantiene mayores velocidades y flujos que la ola verde (en verde). Con ello se evidencia la gran ventaja y bondades del método auto-organizante. Entre tanto, para la ola verde la fase de embotellamiento llega rápidamente a bajas densidades. Figura 4-14 Resultado de la simulación para fronteras no-orientables para la ola verde y método auto- organizante: promedio de velocidad 𝒗 y promedio de flujo 𝑱 para diferentes densidades de 𝝆. Las curvas óptimas se muestran con línea punteada discontinua (Zubillaga et al., 2014). Se puede ver que el método auto-organizante está por encima de la curva optima en la fase de capacidad completa-intermitente (𝐽 > 𝐽𝑚𝑎𝑥). Esto es debido a que un vehículo en una calle, puede alcanzar la luz verde para avanzar sin dejar espacio entre él y el último vehículo en la calle que alcanzó la luz roja. Para una clara diferenciación de los métodos en términos de complejidad, las métricas 𝐸, 𝑆, y 𝐶 fueron aplicadas a tres componentes del modelo: (i) los intervalos de cambio de luz en 82 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- los semáforos-ICLS, (ii) los intervalos de autos en la intersección-ICI y (iii) los intervalos de carros en la calle-ICC. Los resultados se presentan en las figuras 4-15 a 4-17 En la figura 4-15 se puede ver que para ICLS el método de la ola verde tiene periodos cíclicos para los semáforos (𝐸 = 𝐶 = 0 y 𝑆 = 1, puntos verdes). Se aclara que nuestra medida de 𝑆 no distingue entre organización interna (auto-organización) o externa, cómo en este caso que el método depende de un control central. Teniendo un extremo de regularidad en los intervalos en los semáforos representado por 𝑆 = 1, se entiende que no puede haber adaptación a los cambios en el flujo de tráfico. Entre tanto, el método auto-organizante se adapta constantemente a los cambios en la demanda (puntos azules), como puede ser visto desde la variación de las medidas para diferentes densidades (𝜌). Los intervalos en el semáforo son más irregulares (muy alta 𝐸, muy baja 𝑆) en las fases de flujo cuasi-libre (𝜌[0 − 0.15]) y cuasi-embotellamiento (𝜌[0.77 − 0.95]), mientras que alcanza regularidad (muy baja 𝐸 y 𝐶, y máxima 𝑆) para la fase de capacidad-completa intermitente, dado que la demanda viene en todas direcciones. 𝐶 es alta para todas las fases, pero en las fases de capacidad- completa intermitente (𝜌[0.22 − 0.38]) y embotellamiento (𝜌[0.95 − 1]) exhibe un comportamiento similar a la ola verde en estas dos fases. Figura 4-15 Emergencia (E), Auto-organización (S) y complejidad para los intervalos de cambio de luz en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) Para ICI (Fig. 4-16), las medidas de 𝐸, 𝑆, y 𝐶 para diferentes densidades 𝜌 se observó que son similares en las fases de capacidad-completa-intermitente y embotellamiento, dado que hay vehículos que constantemente cruzan la intersección o hay vehículos detenidos. 𝐸 y 𝐶 son altas para bajas densidades en ambos métodos, y se hacen más regulares con 𝜌 (incremento de 𝑆), hasta alcanzar un máximo en la fase de capacidad-completa-intermitente para el método auto-organizante y para la fase de embotellamiento en la ola verde. El método auto- organizante nuevamente incrementa 𝐸 y 𝐶 hasta la fase de cuasi-embotellamiento (𝜌 > 0.6; 𝑝 < 0.9), dado que los vehículos cruzando son menos regulares y se forman pelotones espaciados, solo para decrecer de nuevo en la fase de embotellamiento. Capítulo 4 83 Figura 4-16 Emergencia (E), Auto-organización (S) y complejidad para los intervalos en intersecciones en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) En las últimas pruebas (Fig. 4-17), los intervalos de los vehículos en diferentes calles (no intersecciones) se escogieron aleatoriamente en cada simulación. El comportamiento de las medidas fue similar al descrito para las intersecciones. Sin embargo, 𝑆 = 1 se alcanza sólo en la fase de embotellamiento (𝜌 > 0.95). Parece haber un mínimo de 𝐸 ≈ 0.2 para la fase de capacidad-completa-intermitente. A pesar que se forman pelotones grandes, existen espacios grandes entre ellos. 𝐶 es alta para todas las fases, excepto para el embotellamiento para ambos métodos. Figura 4-17 Emergencia (E), Auto-organización (S) y complejidad para los intervalos en las calles en semáforos para fronteras no-orientables (Zubillaga et al., 2014). Las líneas verticales señalan la transición de cada una de las 7 fases del flujo (libre, cuasi-libre, subutilizado, capacidad completa, sobre-utilizado, cuasi-embotellamiento, embotellamiento) Se pudo constatar que el flujo en tráfico urbano es muy complejo. No obstante, se pueden identificar diferencias entre algunas fases del método auto-organizante. En otras palabras, la fase dinámica puede tener un impacto directo sobre 𝐸, 𝑆 y 𝐶, lo cual puede ser potencialmente utilizado para identificar las fases dinámicas en sistemas más reales de tráfico donde las transiciones no son tan fáciles de identificar. 84 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 4.4 Discusión La siguiente discusión abordará los tópicos de la utilidad general de las medidas a partir de lo observado en sistemas discretos. La relación entre complejidad e información. Los resultados de las múltiples escalas y la relación con otras medidas. Algunos tópicos serán abordados de nuevo en las siguientes aplicaciones, con el fin de ahondar en su significado a partir de los resultados obtenidos en cada una de ellas. 4.4.1 La Aplicación de Las Medidas Aunque pueda ser deducible, nuestras medidas no se enfocan en qué elemento interactúa con cual, cómo y cuándo. En contraste, estamos más interesados en las propiedades globales y tendencias de los estados de los elementos. En este sentido, queremos capturar dinámicas globales a través de medidas que la sintetizan en forma adecuada. Igualmente, estamos interesados en su cambio con la escala. Si bien en al emplear E,S,C, A y H se debe considerar la perdida de información subyacente en el fenómeno que se describe, también se debe considerar el tipo de información en el que estemos interesados, ya que la relevancia es también parcialmente dependiente del observador (Gershenson, 2002). Para el caso de semáforos auto-organizantes, se recalca que dada la generalidad y simplicidad de S, ella no puede distinguir entre un sistema auto-organizado (p.e. por un controlador externo) y un sistema auto-organizante, el cual se adapta constantemente a las demandas de cambio. Esto puede ser comparado con el caso de la temperatura, la cual no indica sí el calor es generado externa o internamente en el sistema, pero sería muy útil saberlo. 𝑆, cómo medida, tiene que ser interpretada adecuadamente en el contexto específico para explotar su utilidad. Una vez definido el contexto, el complemento de las medidas de 𝐸 y 𝐶, son de gran utilidad para la caracterización de fases dinámicas en sistemas con y sin control central. Podemos afirmar que actualmente no hay un acuerdo en la comunidad científica sobre como los términos de complejidad, emergencia y auto-organización deben ser definidos y usados, dada la evidente contradicción entre autores. En este aspecto, nuestras medidas muestran desde los resultados obtenidos su potencial y esclarecen su utilidad, por lo que vale la pena emplearlos. No obstante, acatamos las restricciones que puedan tener y que el revisor manifiesta. En este sentido, no nos apartamos que las sugerencias mostradas por el revisor sirvan para motivar el desarrollo de una mejor terminología; situación que también es una contribución. 4.4.2 La Complejidad cómo Balance Cómo ha sido propuesto por varios autores y confirmado en nuestros experimentos en sistemas discretos, la complejidad puede ser vista como balance entre el orden y el desorden (Gershenson and Fernández, 2012; Kaufmann, 1993; Langton, 1990; Lopez-Ruiz et al., 1995). Capítulo 4 85 Desde esta perspectiva, 𝐶 como un balance entre 𝐸 y 𝑆, cumple con esta condición, que ha sido definida también para la llamada criticalidad. Podría sonar cómo contradictorio o contra-intuitivo definir la emergencia cómo el opuesto de auto-organización, dado que ambas están presentes en muchos fenómenos complejos. Sin embargo, cuando se toma un extremo de los dos (𝐸 o 𝑆), la expresión del otro es muy baja. Es decir, si se tiene emergencia muy alta, se tendrá auto-organización muy baja. Es precisamente cuando 𝐸 y 𝑆 están en balance, que la complejidad se maximiza, pero esto no significa que ambos hayan sido máximos. Un punto importante para resaltar es que existen visiones opuestas de información. Shannon definió la información como entropía (Equivalente a nuestra 𝐸). Wiener (1948) y von Bertalanfy (1968), definieron información como lo contrario, negentropía (Equivalente a nuestra 𝑆). En este sentido, nuestra medida de complejidad C reconcilia estas dos visiones opuestas, como balance entre la regularidad u orden (𝑆) y el cambio o caos (𝐸), donde la complejidad es máxima. Los sistemas dinámicos cómo autómatas celulares y redes booleanas, tienen máxima 𝐶 en la región donde su dinámica es considerada cómo más compleja. 4.4.3 Múltiples Escalas y Perfiles En general, para redes booleanas aleatorias-RBA los resultados para 𝐸, 𝑆, 𝐶 y 𝐻 cambian poco con la escala, precisamente por ser generadas de manera aleatoria. Los autómatas celulares elementales-ACE son mucho más regulares en cuanto a estructura y función (expresada en la dinámica). Por ejemplo, ACE con dinámicas ordenadas y caóticas (Clase I y III, respectivamente), no cambian mucho con la escala. En el medio (Clase II), existen reglas de interesantes patrones que demuestran que la escala tiene importancia. Para RBA y ACE con dinámicas caóticas existe una ligera reducción de la emergencia con la escala. Este es un efecto de tamaño finito, debido a que cadenas cortas tienen una emergencia más reducida que las largas. Es interesante, dado que muchos estudios en sistemas dinámicos, especialmente analíticos, están hechos asumiendo sistemas infinitos. Sin embargo, muchos sistemas reales son mejor modelados como finitos, y aquí hemos visto que la longitud de la cadena -no sólo la escala- puede jugar un papel relevante en determinar la emergencia y la complejidad de los sistemas. Una de las implicaciones del efecto finito, es que a grandes escalas se requiere menor información para describirlo. Extrapolando las "escalas mayores" ( 𝑏 → ∞) implica no información (𝐼 → 0): sí todo esta contenido, cuando hay información no necesaria para describirlo (Gershenson, 2012b). Los perfiles de 𝐸, 𝑆, 𝐶 y 𝐻 a múltiples escalas (figura 4-10), dan una mejor percepción que las escalas particulares o por separado (figura 4-6 a 4-9). Esto se pudo ver claramente en las reglas de la clase II, donde la E es alta a una escala, pero mínima a escalas altas. El cambio de las medidas a través de las escalas, es una herramienta de gran utilidad en el estudio de 86 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- sistema dinámicos (Weeks, 2010; Wolpert and Macready, 1999), cómo se ha formalizado por la teoría de Krohn-Rhodes (Egri-Nagy and Nehaniv, 2008; Rhodes, 2009). Por ejemplo, un sistema con alta (pero no máxima) 𝐸, a través de las escalas sería más emergente que un sistema con E muy alta en una escala, pero con 𝐸 muy baja en otra escala. Con soporte en los resultados visuales de ACE, se puede observar como que existe una condición inicial de una única celda "viva" con emergencia muy baja (E). Este es el caso de la regla cero de la clase I. No importaría con cuanta información se alimente al autómata, esta se perdería en una sola iteración. La regla 1 de la clase II produce gran cantidad de información, y emerge un patrón estriado (Tabla 4-3). No obstante, para base 2, este patrón desaparece. La emergencia, entonces, es mínima para escalas base 2 (Figura 4-7). La regla 110 de la clase IV produce estructuras y patrones complejos, con deslizadores que interactúan de manera regular en su éter. Se puede decir, que estos patrones son más emergentes, dado el incremento de información que se produce. La Regla 30 de la clase III produce aún más patrones, dado que su comportamiento seudo-aleatorio produce máxima información. La emergencia muy alta será la que produce mayor información partiendo de una menor a la inicial. La auto-organización (𝑆) definida como reducción de la información de Shannon, es mínima cuando un patrón ordenado es convertido en un patrón desordenado. Los sistemas caóticos, cómo la regla 30, tienen mínima 𝑆. La máxima auto-organización ocurre cuando un patrón altamente desordenado se convierte en altamente ordenado. Sistemas que tienden a estados estacionarios, I de ACE, exhiben máxima auto- organización(Gershenson and Fernández, 2012a; Wolfram, 1984). tales como los de la clase Casos como el perfil de complejidad de Bary-Yam mide la complejidad cómo la cantidad de información requerida para describir un sistema en diferentes escala (Bar-Yam, 2004b). Desde nuestra perspectiva, esta puede ser mejor llamado "perfil de información" o "perfil de emergencia". Inspirados en el perfil de complejidad (Información) de Bar-Yam, el perfil sigma fue propuesto para medir la organización a múltiples escalas (Carlos. Gershenson, 2011). Siguiendo el enfoque de Lopez-Ruiz et al. (1995) que fue usado en nuestros desarrollos, estos dos perfiles pueden ser combinados para desarrollar un nuevo perfil de complejidad. Esto podría ilustrarse por las propiedades de complejidad a diferentes escalas. 4.4.4 La Complejidad su Diferencia con el Caos Algunos enfoques relacionan la complejidad con la alta entropía (para nosotros, alta emergencia), p.e. el contenido de información Bar-Yam 2004; Delahaye and Zenil 2007. Sin embargo, es importante destacar que la complejidad no debe ser confundida con Caos (Gershenson 2013). El Caos es alta entropía (Información de Shanon) (Prokopenko et al., 2009). Una alta entropía (alta emergencia E) implica mucho cambio, lo que genera que Capítulo 4 87 patrones complejos sean destruidos. De otra parte, baja entropía (alta auto-organización S) previene que patrones complejos emerjan. En los experimentos de ACE puede ser visto que las reglas caen generalmente en dos categorías: las que computan algo (𝐸 > 0) o las que no (𝐸 = 0). Esto está relacionado con el principio de equivalencia computacional de Wolfram (Wolfram and Gad-el-Hak, 2003; Zenil, 2009), el cual conjetura que los sistemas dinámicos son capaces (sistemas complejos) o no (sistemas simples) de hacer computación universal8. Desde los ACE, sólo la regla 110 ha sido capaz de producir computación universal (Cook, 2004), pero otras reglas también posiblemente sean capaces. No solo las de la clase IV, también reglas de la clase III; sin embargo, la variabilidad les hace difícil guardar información. Aun así, hay técnicas para lograr dinámicas complejas de sistemas caóticos, por ejemplo, con memoria (Martínez et al., 2012) o con señales externas regulares (Luque and Solé, 1998, 1997) (Control del Caos). La clase II podría ser considerada muy regular para computar universalmente, pero adicionando ruido o una señal compleja podría ser posible que ella llevara a cabo computación universal. La clase I es muy estática, ella podría requerir más de la computación que viniese de fuera del sistema. En general, por medio de diferentes técnicas se puede direcciona un sistema dinámico a la alta complejidad. 4.4.5 Homeostasis En muchos casos, la homeostasis (𝐻) ha sido relacionada con auto-organización. Alta S indica baja variabilidad, lo cual es característico de una alta 𝐻, esto fue visible en RBA con K menores a 2. Por otra parte, baja S, en muchos casos, está acompañada por una 𝐻 no correlacionada 𝐻 ≈ 1 2𝑏⁄ . Esto también es un rasgo de sistemas con dinámicas caóticas (Alta E). Sin embargo, algunos ACE con baja S tienen una 𝐻 correlacionada 𝐻 > 1 2𝑏⁄ o anti-correlacionada 𝐻 < 1 2𝑏⁄ . Esto es característico de estructuras complejas que interactúan en un éter regular. Al respecto, diferentes reglas de ACE pueden tener alta 𝐶 en una escala particular debido a 𝑆 ≈ 0.5. No obstante, reglas con una H que se desvía de 1 2𝑏⁄ muestran un rasgo de estructura compleja sobre un éter. El éter facilita la computación, de manera que la universalidad puede ser explorada más fácilmente. La desviación de 𝐻 ≈ 1 2𝑏⁄ podría ser usada para explorar el inmenso espacio posible de los sistemas dinámicos. Por otra parte, al implementar un análisis de componentes principales, encontramos que para las RBA la desviación estándar de 𝐻 está inversamente correlacionada con 𝐶 (𝐸 × 𝐴𝑜 en 8 Capacidad de realizar cualquier proceso computable que se le pida, sin necesidad de cambiar su estructura, ni su función de transición local. 88 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- fig. 4-18). RBAs en un régimen ordenado tienen consistentemente alta 𝐻. Entre tanto, RBAs en régimen crítico tienen una 𝐻 variable. Figura 4-18 Análisis de Componentes Principales. Las propiedades en Azul y las conectividades en Rojo. 4.4.6 Autopoiesis y el Requisito de Variedad de Ashby. Nuestro enfoque de autopoiesis cómo la razón entre las complejidades del sistema y el ambiente, nos lleva a considerar la ley de la Variedad Requerida de Ashby (Ross Ashby, 1960a). En ella se establece que un controlador activo requiere mucha variedad (número de estados), para que el sistema controlado sea estable. Por ejemplo, si un sistema puede estar entre cuatro estados, su controlador debe discriminar entre los cuatro estados para regular la dinámica del sistema. Desde esta perspectiva, la medida propuesta de autopoiesis está relacionada con el requisito de variedad requerida. Cuando un sistema tiene 𝐴 > 1, tiene una complejidad (variedad) mayor que su ambiente, lo que refleja una mayor autonomía. Es decir, la complejidad del sistema es mayor que la del ambiente, en consecuencia, un controlador exitoso para este sistema debería tener 𝐴 > 1 (a múltiples escalas; (Gershenson, 2011)). Para que un controlador fuese más eficiente debería tener 𝐴 → 1, lo que le daría más variedad que el Capítulo 4 89 sistema. Lo ideal es que el sistema tenga la capacidad de acoplar su complejidad a la del entorno, o sistema que se está tratando de controlar. Si el entorno cambia mucho, el sistema también. En cuanto a los sistemas vivos desde la perspectiva de la variedad requerida, la complejidad y la autopoiesis existen elementos de importancia. Primero los seres vivos requieren de cumplir con la ley de variedad requerida. Segundo, se ha observado que la variedad puede ser vista como un sinónimo de complejidad (Bar-Yam 2004). Tercero, los organismos pueden ser descritos como sistemas de control. Estos elementos nos llevan a afirmar que la ley de variedad requerida también se encuentra en la vida, dado que los organismos deben hacer frente a la complejidad o variedad de su ambiente a diferentes escalas. Sobre las anteriores bases, la relación de la ley de variedad requerida se relaciona con nuestra medida de autopoiesis. Aún más, todo ello ha dado pie para que Gershenson (2014), haya armonizado y generalizado estos elementos en lo que puede ser denominado la ley de complejidad requerida: un activo y eficiente controlador requerirá por lo menos la misma complejidad que la complejidad de lo controlado. Es decir, un controlador para un sistema complejo requiere ser por lo menos tan complejo como el sistema que intenta controlar. Según Gershenson (2014), en la práctica se requiere de un balance entre predictibilidad y adaptabilidad del controlador para enfrentar la emergencia y auto-organización de lo controlado. 4.5 Síntesis Hemos ilustrado a partir de experimentos computacionales, en sistemas dinámicos discretos (RBA y ACE), y en sistemas de tráfico vehicular, la utilidad de la valoración de la regularidad, cambio, adaptabilidad y equilibrio dinámico, a partir de las medidas propuestas de auto- organización, emergencia, complejidad y homeostasis. La complejidad representa un balance entre auto-organización y emergencia, desde la relación establecida entre orden y caos (Kaufmann, 1993; Langton, 1990). Esta relación, es otra expresión de diversos balances hallados en la naturaleza, como por ejemplo el balance de especies obtenido por selección natural. Desde este conocimiento, el balance entre cambio y orden puede ser alcanzado por diseñadores que buscan explotar los beneficios de la complejidad. La homeostasis brindó información sobre la estabilidad de los estados en el tiempo y su transición. La autopoiesis brindó información acerca de la autonomía del sistema respecto de su ambiente, en términos de complejidad-adaptabilidad. Dado que todo puede ser descrito en términos de información, se hace posible la evaluación de la complejidad, emergencia, auto-organización, homeostasis y autopoiesis, en todo lo que nos rodea. En este sentido, existen diferentes tópicos de investigación en los cuales las 90 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- presentes ideas pueden ser extendidas. Se propone la continuidad de su evaluación a través de la aplicación en diferentes sistemas, como por ejemplo: a las máquinas de Turing, a las máquinas 𝜖-psilon, a los sistemas tecnológicos, ecológicos y sociales, entre otros. Desde una mirada compuesta se puede decir que combinaciones de medidas pueden ser usadas para un mejor entendimiento y combinación de sistemas dinámicos. Observando solo 𝐶 o 𝐻, no es posible distinguir la complejidad desde reglas caóticas, pero su combinación revela que el éter es requerido para la interacción de estructuras complejas. Existe también la pregunta de cómo considerar y medir la información usada por las medidas. Por ejemplo, en ECA diferentes reglas son obtenidas si una cadena de bits es considerada verticalmente (cómo lo hicimos), horizontalmente o diagonalmente. 5. Capítulo 5: APLICACIONES EN SISTEMAS ECOLÓGICOS Resumen El estudio de la complejidad en Sistemas Ecológicos es un tópico de gran interés actual. Sin embargo, las interpretaciones que se hacen de ella han demostrado que se requiere de clarificaciones debido a la novedad del tema. En este capítulo, estudiaremos la complejidad ecológica de lagos y mamíferos terrestres. En estos dos casos de estudio, se analizaron las métricas de emergencia, auto-organización, complejidad, homeostasis y autopoiesis, desarrolladas en este trabajo. Adicionalmente, se desarrolla una solución analítica para la emergencia ecológica por medio de la programación genética, y se prueba su confiabilidad en lagos. Nuestros resultados muestran que la dinámica y complejidad ecológica puede ser efectivamente caracterizada en términos de información. Este enfoque, constituye una manera complementaria de entender la dinámica ecológica. 5.1 Visiones Tradicionales y Complejidad Ecosistémica Existen diferentes vías para describir el estado de un ecosistema y su dinámica. En ecología, lo natural es describir el sistema a través de sus atributos de abundancia, diversidad, frecuencia y/o riqueza de especies. Adicionalmente, los estudios ecológicos buscan establecer la estructura jerárquica a través de análisis de clasificación, que parten de medidas de similitud, y dan como resultados arboles de afinidad de especies y de sitios o dendrogramas (Legendre and Legendre, 1998). Igualmente, se tienen opciones de realizar análisis de ordenación de correspondencia canónica en los que las especies, los sitios y los parámetros fisicoquímicos del entorno, son correlacionados y asociados. El resultado de la ordenación son grupos de variables asociadas de manera significativa (Borcard et al., 2011). En el anterior contexto y desde los resultados obtenidos, se sugiere que la medición de la complejidad ecológica (o biológica en general), puede complementar la descripción de 92 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- ecosistemas y la explicación de la dinámica de especies. Sobre esta base, es posible ahondar en la descripción sintética la dinámica de los procesos ecológicos en términos de regularidad, cambio y adaptabilidad. Las anteriores consideraciones, toman mayor importancia si se considera que el campo de la complejidad ecológica está en construcción y el interés por su estudio es creciente. Se destaca que ya se han dado esfuerzos que tratan de relacionar la complejidad con los descriptores ecológicos comunes, o al menos hacer una distinción entre unos y otros (Boschetti, 2010, 2008; Parrott, 2010, 2005; Proulx and Parrott, 2008). Desde un principio, la complejidad biológica se trató de describir desde la caracterización de los componentes estructurales y sus interacciones funcionales (Pond, 2006). No obstante, se observó la dificultad de describir el comportamiento global de organismos y sistemas. Desde inicio de siglo, se estimó que en la asociación y modularidad de componentes podría darse algunas explicaciones al fenómeno de la complejidad. Desde allí, se estimó que la auto- organización juega un papel importante en la evolución de la complejidad biológica (Camazine et al., 2001; Kauffman, 2000). Enfoques desde la teoría de la información, han relacionado la complejidad de la vida como la cantidad de información que tiene o guarda un organismo o sistema en su genómica acerca de su ambiente (Adami et al., 2000). Se podría pensar que un sistema entre más información contenga, más complejo será. En consecuencia, se pensó que un organismo con alta información será muy auto-organizado, cómo lo propone el enfoque de la negentropía de (von Bertalanfy, 1968). Esta visión ha sido más coincidente con el pensamiento biológico, y se ha contrapuesto a la visión física de la entropía como producción de información nueva, como Shannon lo propuso. Por otra parte, desde la teoría de la información se han desarrollado formalismos alternativos que han relacionado la complejidad con el grado de aleatoriedad de los estados de los sistemas ecológicos (Anand et al., 2010; Ulanowicz, 2011, 2004). Sin embargo, esta visión resultaría ser no la más adecuada, pues sería difícil demostrar que la complejidad es igual a la emergencia. Más aún, la complejidad no se podría igualar al caos, cómo ya se discutió en 4.4.4. En el anterior contexto, y basados en que nuestra medida de complejidad puede reconciliar las dos visiones opuestas (entropía equivalente a nuestra 𝐸, y negentropía, equivalente a nuestra 𝑆), este capítulo mide la complejidad de variables y sistemas ecológicos. 5.1.1 Fundamentos de Limnología Los ecosistemas acuáticos continentales superficiales son estudiados por la Limnología (λίμνη, limne, "lago" y λόγος, logos, "conocer"). Entre ellos se hallan dos tipos: los lénticos, como los lagos, lagunas, estuarios, esteros, pantanos embalses; y los lóticos, como quebradas, riachuelos y ríos. Capítulo 5 93 Al ser sistemas abiertos, los lagos interactúan con su cuenca de drenaje y la atmosfera. A raíz de ello, un lago integran las relaciones funcionales de crecimiento, adaptación, ciclado de nutrientes, productividad biológica y composición de especies. En su estudio, se describen y evalúan cómo los ambientes químicos, físicos y biológicos regulan estas interacciones (Wetzel, 2001). Los lagos presentan una zonación particular, que se presenta en la figura 5-1. Relacionada con la porción terrestre, en el litoral, se halla la zona de macrófitas (macrophytes zone). Esta zona está compuesta por plantas acuáticas que pueden estar enraizadas, sumergidas o flotantes, y constituye una frontera entre los sistemas terrestres y la zona planctónica (planktonic zone). Por su función fotosintética, las macrófitas son de gran importancia en la producción primaria. La zona planctónica corresponde con las aguas más allá de la zona de macrófitas, donde los organismos que fotosintetizan (Fitoplancton) flotan pasivamente, y se dejan llevar por corrientes o gradientes horizontales y/o verticales. Entre tanto, los organismos que los pastorean (zooplancton) los siguen en sus migraciones. Figura 5-1 Zonación de Un Lago. La figura muestra las zonas Superficial, planctónica, de macrófitas acuáticas, bentónica y el substrato.(Fernández et al., 2014b). La zona bentónica (Benthic zone) tiene que ver con el fondo litoral y el fondo profundo del lago. Está relacionada con el sedimento (substratum) y la capa subsuperficial (ubicada a 20 centímetros arriba del substrato). Es bentónico todo organismo que esté en las inmediaciones del fondo, bien sea para escarbarlo, penetrarlo, o posarse en él. La zona de mezcla (Mixing zone), es una zona de intercambio entre las aguas de las zonas planctónica y bentónica. En las zonas descritas arriba, uno o más componentes o subsistemas pueden ser valorados para determinar la dinámica ecológica. Para nuestro primer caso de estudio ecológico, se consideraron tres componentes. 94 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- (i) El físico-químico (PC) referido a la composición física y química del agua. El PC es afectado por varias condiciones y procesos de naturaleza geológica, por la disolución y dispersión, por el ciclo hidrológico, por la generación de solutos y sólidos (de la fotosíntesis, por ejemplo) y por la sedimentación. En este componente, se destacan procesos cómo el equilibrio del pH, que afecta, entre otros, el intercambio de elementos entre un organismo y su ambiente. También, la regulación de la temperatura, que se relaciona con el calor específico del agua. (ii) El componente de nutrientes limitantes (LN), que si bien está relacionado con el componente físico-químico (PC), es básico para la fotosíntesis. LN está asociado con los ciclos bio-geoquímicos del nitrógeno, carbono y fósforo, que permiten la adsorción de gases en el agua o la disolución de los nutrientes. (iii) El componente de biomasa (Bio), considera el peso por unidad de volumen de organismos como productores primarios (fotosintéticos), consumidores primarios (que pastorean los primarios), consumidores secundarios (que predan los consumidores primarios), y los descomponedores. Las variables estudiadas de cada componente se relacionan con la zonificación de un lago en las siguientes tablas. Tabla 5-1 Variables del Componente Físico-químico-PC Variable (Español) Acrónimo Luz Superficial Luz Planctónica Luz Bentónica Temperatura Superficial Temperatura Planctónica Temperatura Bentónica Flujo de Entrada (Afluente) y Salida (Efluente) Tiempo de Retención Evaporación Mezclado entre zonas Conductividad del afluente Conductividad planctónica Conductividad bentónica Oxígeno superficial Oxígeno planctónico Oxígeno bentónico Oxígeno de sedimento pH del afluente pH planctónico pH bentónico SL PL BL ST PT BT IO RT Ev ZM ICd PCd BCd SO2 PO2 BO2 SdO2 IpH PpH BpH Unidades MJ/m2/día MJ/m2/día MJ/m2/día °C °C °C m3/sec days m3/día %/día µS/cm µS/cm µS/cm mg/litro mg/litro mg/litro mg/litro Unidades de pH Unidades de pH Unidades de pH Capítulo 5 Tabla 5-2 Variables del Componente de Nutrientes Limitantes-LN (Todas en mg/litro) 95 Variable (Español) Silicatos Afluente Silicatos Planctónico Silicatos Bentónico Nitratos Afluente Nitratos Planctónico Nitratos Bentónico Fosfatos Afluente Fosfatos Planctónico Fosfatos Bentónico Dióxido de Carbono Afluente Dióxido de Carbono Planctónico Dióxido de Carbono Bentónico Detrito Planctónico Detrito Bentónico Acrónimo IS PS BS IN PN BN IP PP BP ICD PCD BCD Pde Bde (Todas en mg/m3) Tabla 5-3 Variables del Componente de Biomasa-Bio Variable (Español) Acrónimo Diatomeas Planctónicas Cianobacterias Planctónicas Algas verdes Planctónicas Planctónicas Diatomeas Bentónicas Cianobacterias Bentónicas Algas verdes Bentónicas Macrófitas de superficie Macrófitas sumergidas Zooplancton Herbívoro Zooplancton Carnívoro Bentónicos Herbívoro Bentónicos Carnívoro Peces Planctonicos Peces Bentónicos Peces Piscivoros PD PCy PGA PCh BD BCy BGA SurM SubM HZ CZ BH BD PlF BF PiF 96 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 5.1.2 Tipos de Lagos Estudiados La escogencia de los cuatro lagos estudiados se dio en razón a su posición en el gradiente latitudinal ártico-trópico. Ellos correspondieron a un lago ártico (Ar), un lago de alta montaña en zona templada (NH), un lago de tierras bajas en zona templada (NL), y un lago tropical (T). El anexo A muestra la descripción ecológica detallada de cada uno de los lagos. El criterio de escogencia de los lagos se dio por su disposición latitudinal, que genera un gradiente de Ar a T, donde las condiciones de luz, temperatura e hidrología tienen amplia variación. 5.1.3 Simulaciones y Cálculo de las Medidas Los datos de los lagos Ar, NH, NL y T fueron obtenidos usando The Aquatic Ecosystem Simulator-AES (Randerson and Bowker, 2008). Las variables consideradas para cada componente fueron definidas en las tablas 5-1 a 5-3. El modelo para la obtención de valores diarios de las variables de los tres componentes, fue determinista, de manera que no hubo variación entre sus diferentes ejecuciones o corridas. Para todas las variables y lagos fueron obtenidos valores diarios. Los datos resultantes de las simulaciones fueron normalizados a base 10, para ello se utilizó la siguiente ecuación para todos los puntos x de todas las variables X. 𝑓(𝑥) = ⌊𝑏. 𝑥 − min 𝑋 max 𝑋 − min 𝑋 ⌋ (5.1) Donde 𝑥 es la función piso de 𝑥. El software de apoyo para este fin fue R: Comin, desarrollado por Villate et al. (2013). Se destaca que en la comparación entre lagos, el rango máximo y mínimo para todas las variables fue tomado como la mayor y menor cantidad de todos los valores de todos los lagos. En casos individuales de comparación, se tomó solamente el máximo y mínimo de cada variable en el respectivo lago. Una vez las variables transformadas en un alfabeto finito (para 𝑏 = 10), se calculó la emergencia, auto-organización, complejidad, homeostasis y autopoiesis (Fernández et al., 2014b; Gershenson and Fernández, 2012a). Para esto se definió una clasificación para las medidas de acuerdo con las categorías, rangos y colores de la tabla 4. Estos rasgos fueron inspirados en los existentes para índices de calidad y contaminación del agua (Fernández et al., 2005; Ramírez et al., 2003). Capítulo 5 97 Tabla 5-4 Categorías, Rangos y Colores de Clasificación de las Propiedades E,S y C (Fernández et al., 2014b) Categoría Rango Color Muy Alta Alta Media Baja [0.8 − 1] Azul [0.6 − 0.8] Verde [0.4 − 0.6] Amarillo [0.2 − 0.4] Naranja Muy Baja [0.0 − 0.2] Rojo 5.1.4 Resultados  Complejidad en un Ecosistema Ártico (Ar) Ar tiene una marcada dinámica de la temperatura e hidrología que ejerce gran influencia en los componentes estudiados (Fig. 6-1 Anexo A). Este comportamiento se resume en la figura 5-2, que muestra la distribución de cada una de las variables del componente físico-químico en su escala original. Allí, es notoria la amplitud de las variables como temperatura y luz, los altos valores y dispersión del tiempo de retención y la evaporación, los cortos rangos de la conductividad y pH. Por razones como estas, que dificultan la visualización, es que se indican procedimientos de estandarización y normalización. Figura 5-2 Cajas de bigotes para las variables físico-químicas (Fernández and Gershenson, 2014; Fernández et al., 2014b). En ella se representan cada uno de los valores de cada variable representados por puntos. Con ello se observa la distribución real de los valores. Las abreviaciones se dan en las tablas 5-1 En anterior figura (Fig. 5-2) se puede observar las variables transformadas a base 10 y la distribución de cada uno de sus 365 valores en las clases 0 a 9. La aglomeración o distribución de los puntos en una u otra categoría, da indicios del comportamiento regular o cambiante de la variable. Basados en esta distribución, algunos rasgos del comportamiento emergente o auto-organizado de cada variable, pueden ser descritos y comparados. Variables con 98 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- distribuciones más homogéneas producirán más información, debido a que puede ubicarse en cualquier clase de la escala. Esto generará altos valores de emergencia. En cambio, variables con distribuciones más heterogéneas serán más regulares en sus estados, y por lo tanto, producirán valores de auto-organización más altos. La complejidad, sin embargo, requiere de una mirada más detallada, y no puede ser fácilmente deducida. Para ello, se requerirá de su cálculo y clasificación en las categorías propuestas en la tabla 5-3. Figura 5-3 Distribución de los valores normalizados a base 10 de las variables físico-químicas en las clases 𝟎 − 𝟗. (Fernández and Gershenson, 2014; Fernández et al., 2014b). Variables con valores distribuidos de manera similar entre las clases 𝟎 a 𝟗, tendrán mayor información. Es decir, alta emergencia pues la variable puede tomar cualquier valor. Variables con puntos distribuidos de manera más concentrada en una u otra clase, producirán menos información. Es decir, alta auto-organización pues tales clases tendrán una probabilidad alta.. Las probabilidades obtenidas para cada clase en cada variable, será la base para calcular la cantidad de información, y por ende, la emergencia, que será el primer cálculo en la aplicación de las medidas desarrolladas, explicadas en el capítulo 3. El resultado de la aplicación de la métrica propuesta se observa en las figuras 5-4 a 5-6, donde se muestran los valores de emergencia 𝐸 (emergence), auto-organización 𝑆 (self- organization) y complejidad 𝐶 (complexity) para el sistema físico-químico (PC). Variables con muy alta complejidad 𝐶 ∈ [0.8 − 1] (según categorías de la tabla 5-4) reflejan un balance entre cambio/caos (emergencia) y regularidad/orden (auto-organización). Este es el caso del pH planctónico y bentónico (BpH;PpH), flujo de entrada y salida (IO) y tiempo de retención hidráulica (RT). Variables con altas emergencias (𝐸 > 0.92), como conductividad (ICd) y zona de mezcla (ZM), cambian constantemente en el tiempo, una condición necesaria que exhibe el caos. Para las demás variables, los valores de auto-organización se clasifican como bajos y muy bajos (𝑆 < 0.32), lo que refleja baja regularidad. Se hace interesante observar que el lago ártico no tiene variables con alta auto-organización o baja emergencia. Esto nos conduce a sugerir que un sistema con periodos climáticos muy marcados, el sistema tenderá Capítulo 5 99 a su cambio periódico, debido a las fuertes transiciones de temperatura e hidrología, y mantendrá cierta estabilidad en los periodos intermedios. Por ende, la complejidad fisicoquímica, y la biológica se verá limitada. Figura 5-4 Emergencia para las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) Figura 5-5 Auto-organización de las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) Figura 5-6 Complejidad de las variables físico-químicas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) 100 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Dado que 𝐸, 𝑆, 𝐶 ∈ [0,1], se puede hacer una clasificación de acuerdo a las categorías presentadas en la tabla 4 y definidas por (Fernández et al., 2014b), como sigue.  Variables con muy alta complejidad: 𝐶 ∈ [0.8 − 1] (En Color Azul). Existen dos grupos de variables con un balance entre S y E: (i) pH del flujo de entrada, planctónico y bentónico (BpH, PpH), flujo de entrada y salida (IO), y tiempo de retención (RT). (ii) El oxígeno en el sedimento y el oxígeno Bentónico. Es interesante ver cómo estos dos grupos se correlacionan de manera inversa. Es decir, el incremento del régimen hidrológico durante el verano genera, por la temperatura, estratificación, y la consecuente depleción del oxígeno disuelto (SO2, BO2). En este sentido, se puede observar cómo el comportamiento complejo de variables que inciden en otras, generan respuestas igualmente complejas por asociación. influencia de  Alta Complejidad: 𝐶 ∈ [0.6 − 0.8] (En Color Verde). Este grupo incluye 11 de las 21 variables que tienen alta E y baja S. Estas 11 variables que muestran un comportamiento preferentemente caótico y baja regularidad, están altamente influenciadas por la radicación solar. Ellas son Oxígeno superficial y planctónico (PO2, SO2), temperatura y luz planctónica y bentónica (ST, PT, BT, PL, BL), y Evaporación (Ev). Por su parte, las conductividades en la zona planctónica y bentónica (PCd, BCd) están influenciadas por el régimen hidrológico que se desprende de la temperatura.  Muy Baja Complejidad: 𝐶 ∈ [0 − 0.2] (En Color Rojo). Variables claramente caóticas o cambiantes caen en esta categoría, como se desprende de su muy alta 𝐸 y muy baja 𝑆. Incluye la conductividad en el flujo de entrada (IO) y el porcentaje de mezcla entre las zonas bentónicas y planctónicas (ZM). Las conductividades se aumentan debido al incremento del flujo de entrada, que genera un arrastre de iones y cationes en temporadas de deshielo. Posteriormente, en temporadas de congelación de la capa superior se ve reducida. El flujo también influencia de manera directa la zona de mezcla. Lo anterior hace que se asocien flujo, conductividades y mezclas, como las variables que mayor cambio tienen producto de la estacionalidad. Desde la clasificación realizada, es notorio que en el ártico, dadas las fuertes condiciones climáticas que marcan los periodos de invierno y verano, el cambio físico-químico prevalece sobre la regularidad. Es decir, existe alta emergencia y baja auto-organización en su ambiente físico y químico. Sin embargo, lo pequeños valores de auto-organización permiten estos espacios altamente emergentes, que son la base de su alta complejidad. Alta complejidad físico-química, marcará la pauta para la adaptabilidad y la evolución biológica. Capítulo 5  Homeostasis (H) 101 La homeostasis fue calculada comparando los valores diarios de todas las variables según la ecuación 3.8. Como resultado se obtuvo la variación diaria, como se ve en la figura 5-7. La escala temporal es importante porque a través de la homeostasis podemos considerar si comparar estados cada minuto, días, semanas, mes o año. El lago ártico tuvo un valor promedio de 0.9574 con una desviación de 0.0649. La homeostasis más baja fue de 0.6 y la más alta de 1. Si bien, se podría apreciar que la homeostasis general es alta, el ciclo anual mostró 4 periodos diferentes, cómo se observa en la figura 5-7, que se soportan en la descripción hecha de los lagos en el Anexo A. Estos periodos muestran valores dispersos de homeostasis como resultados de las transiciones entre invierno y verano, y nuevamente invierno. Para el periodo de invierno (primeros y últimos meses del año), se da una homeostasis alta debido a los valores regulares de todas las variables en el lago. El periodo abarca del día 212 hasta el 365, y del 1 al 87, y se caracteriza por la baja luz, temperatura, máximos periodos de retención debido al cubrimiento de la superficie con hielo, bajo flujo y mezcla, bajas conductividades, bajos pH y altos oxigenos presentes (ver anexo A). Figura 5-7 Homeostasis del componente físico-químico de un lago ártico en un ciclo anual. (Fernández and Gershenson, 2014; Fernández et al., 2014b) El segundo periodo comienza en el día 83, y va hasta el 154. Se caracteriza por el incremento del pH en la zona béntica, el incremento de la mezcla, el afluente y el efluente. Las fluctuaciones son fuertes debido al incremento de luz y temperatura por el advenimiento del verano. La homeostasis, por tanto, fluctúa y alcanza su mínimo de 0,6 en el día 116. Al final de este segundo periodo se incrementa la evaporación y el oxígeno decae en el fondo del lago. El tercer periodo va entre los días 155 a 162, y refleja la estabilización de las condiciones de verano. Significa que la evaporación, temperatura, luz, mezcla, conductividad y pH son máximos; mientras el oxígeno alcanza su más bajo nivel. El cuarto periodo (días 163 − 211), en el que la homeostasis fluctúa en altos niveles cerca de 0,9, corresponde al periodo de transición entre el verano y el invierno. 102 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Cómo se puede ver, la utilidad de la homeostasis se da en el seguimiento y estudio de la dinámica estacionaria.  Autopoiesis (A) El análisis de 𝐴 estuvo enfocado a observar la autonomía de la biomasa, con respecto a la fisicoquímica (PC) y nutrientes limitantes, en las zonas planctónica cómo bentónica. Para ello, se establecieron las relaciones más estrechas entre organismos fitoplanctónicos y su entorno funcional directo, representadas por las variables listadas en la tabla 5-5, donde también se muestran los organismos escogidos. Como primera condición para calcular A, se calculó la complejidad de cada grupo de variables, y se clasificaron según las categorías propuestas de muy alta a baja complejidad (Tabla 5-4). Tabla 5-5 Componentes tenidos en cuenta para el cálculo de la complejidad y posterior autopoiesis, en las zonas planctónica y bentónica del lago ártico Zona Planctónica Luz, temperatura, conductividad, pH Componente/Zona Físico-químico Zona Bentónica Luz, temperatura, conductividad, Oxígeno, Oxígeno en Sedimento, pH Silicatos, Nitratos, Dióxido de Carbono Diatomeas, Cianobacterias, Algas verdes Fosfatos, Nutrientes Limitantes Biomasa Silicatos, Nitratos, Fosfatos, Dióxido de Carbono Diatomeas, Cianobacterias, Algas verdes, Clorófitas La complejidad calculada fue promediada para cada componente y zona, como se observa en la figura 5-8. Así, los nutrientes limitantes en ambas zonas tuvieron baja complejidad (𝐶 ∈ [0.2 − 0.4]; color naranja). Las variables fisicoquímicas de la zona planctónica son de alta complejidad (𝐶 ∈ [0.6 − 0.8]; color verde). La biomasa y las variables fisicoquímicas de la zona bentónica están en la categoría de muy alta complejidad ( 𝐶 ∈ [0.8 − 1]; color azul). Figura 5-8 Complejidad para los 3 componentes desde las variables elegidas en la tabla 5, para dos zonas de un lago ártico (Fernández and Gershenson, 2014; Fernández et al., 2014b) Capítulo 5 103 A partir de los valores de 𝐶 para los organismos y su ambiente (ecuación 3.5), se calculó 𝐴 según la ecuación 3.13, para los organismos en relación a su ambiente físico-químico y los nutrientes limitantes. Todos los valores resultantes fueron mayores a 1 (Figura 5-9). Esto significa que las diatomeas, cianobacterias, algas verdes y clorófitas que se hallan en el fitoplancton (biomasa planctónica y bentónica), tienen mayor complejidad que las variables de su ambiente, representado en PC y LN. A raíz de ello, se puede sugerir que algunas variables PC, incluidas LN, tienen un efecto pequeño sobre la dinámica biomasa bentónica y planctónica, pues su grado de complejidad, y por tanto adaptabilidad, es mayor que la de su ambiente. De allí se estima que la biomasa ártica es más autónoma (adaptable) comparada con su ambiente físico y químico. Los altos valores de complejidad de la biomasa, implican que estos organismos pueden adaptarse a cambios de su ambiente debido al mayor balance entre su emergencia y auto-organización. Figura 5-9 Autopoiesis de la Biomasa Planctónica y Bentónica respecto de los nutrientes limitantes (PB/LN) y las variables fisicoquímicas (PB/PC), escogidas en tabla 5 (Fernández and Gershenson, 2014; Fernández et al., 2014b). Para ambos casos fue superior a uno por lo que se les da el color azul 5.2 Complejidad comparativa en el Gradiente Altitudinal Ártico-Trópico (Ar-T). Para el análisis de complejidad comparativa se consideraron, para la transformación a base 10 y la definición de los máximos y mínimos, los valores completos de cada variable para los cuatro lagos. En este sentido, el cálculo queda normalizado para todos los lagos. Una vez obtenidos los valores de complejidad de cada variable, se obtuvo el promedio del componente para un ciclo anual, y su dispersión, cómo se observa en la figura 5-10. 104 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Figura 5-10 Complejidad Comparativa en cuatro ecosistemas acuáticos- Ártico-Ar, Templado tierras altas-NH, Templado tierras bajas-NL y Tropical-T (Fernández et al., 2014d) En general, la complejidad fisicoquímica y de nutrientes limitantes se reduce desde el ártico al trópico, al igual que su variación. En tanto la complejidad biológica aumenta desde Ar a NL. Para ambos casos, podemos considerar al Ar y T cómo los extremos de la complejidad ecosistémica en el gradiente latitudinal. En el trópico se nota que la adaptabilidad de la biomasa, deducida de su complejidad comparativa que se requiere para responder al ambiente, se reduce debido a que en el trópico las condiciones son más estables. En general en el ártico, la dinámica es más caótica y emergente, y en el trópico más regular y auto-organizada. La dinámica del ártico, da como resultado especies de más amplia tolerancia ambiental (Euritípicas) que en el trópico (especies más estenotípicas, o de estrecha tolerancia ambiental). Al haber más auto-organización en el trópico, pero con la suficiente emergencia, se hace posible los procesos de especiación. Es por ello que en el trópico hay más diversidad y riqueza de especies. Esto es, las especies contarán con la suficiente posibilidad de cambio (emergencia, aunque sea poca) para que emerja una nueva especie como solución, si el ambiente cambia de forma considerable. La especie original que no pudo adaptarse, tendrá entonces el aislamiento a un lugar determinado donde pueda tolerar las condiciones ambientales, o el fin como destino dado su alta regularidad u auto-organización. En los dos casos, la especie originaria da paso a una nueva con nuevos rangos para poderse adaptar al nuevo ambiente (Rundell and Price, 2009; Schluter, 1996). Desde esta perspectiva, ser muy auto-organizado disminuye la posibilidad de adaptación biológica (Fernández et al., 2014d). En el recuadro de la figura 5-10, se puede observar que los lagos templados de tierras bajas (NL) parecen representar un punto de cambio para la tendencia de la complejidad. A partir de él, la complejidad físico-química se pasa de alta a muy alta en el trópico. La complejidad Capítulo 5 105 de la biomasa va de alta en NL a muy baja en el trópico, y la complejidad de los nutrientes limitantes disminuye ligeramente, pero se mantiene en la categoría de muy alta. Se podría estimar que NL constituyen un punto crítico, o de mayor complejidad, entre dinámicas emergentes del Ar y auto-organizadas del T. Las variables responsables del cambio de la complejidad en el gradiente fueron, las macrófitas, clorofíceas y fósforo planctónico. En promedio, para los cuatro lagos se puede ver la mayor complejidad de los componentes PC y LN, que Bio muestra que la respuesta de los componentes biológicos tiene menor autonomía dada su menor complejidad. Se puede decir que la complejidad fisicoquímica es mayor que la complejidad de los nutrientes, y ellas dos mayores que la complejidad de la biota (𝐶𝑃𝐶 > 𝐶𝐿𝑁 > 𝐶𝐵𝑖𝑜). No obstante, es apropiado ver que la complejidad promedio de la biomasa, siendo más baja, tiene una mayor dispersión. Con ello, la biomasa tiene posibilidad de responder a su ambiente, acorde con la ley de variedad requerida de Ashby, dentro de su rango de complejidad (0.382 ± 0.22). Adicionalmente, análisis estadísticos de comparación de promedios múltiples (Prueba de Tukey) demostraron que la complejidad promedio de PC y LN entre lagos no tuvo diferencias significativas (𝑝 = 0.85; 𝑝 > 0.05), lo que si sucedió para la biomasa con PC y LN. Esto demuestra que en promedio la complejidad de PC y LN es muy diferente de la Bio que es mucho menor. Este hecho ratificaría que la influencia del ambiente fisicoquímico y de nutrientes sobre la biota tiene una incidencia alta, por lo que los organismos deben hacer, en promedio, un esfuerzo mayor para adaptarse a ello. Lo anterior contrasta con lo sucedido en el lago ártico, donde al observar la complejidad de un grupo de organismos no de toda la biota, como fue el caso de la complejidad comparativa, que fue mayor que la del ambiente PC y LN. Este hecho evidenció que grupos de organismos particulares pueden tener más complejidad local que global, y responder mejor dentro de sus condiciones particulares. Estos resultados sugieren dos formas de ver la complejidad, (i) por grupos de organismos (caso del ártico) y (ii) como un componente completo (caso de la complejidad comparativa), situaciones que pueden verse como complementarias. 5.3 Complejidad del Número Incremental de Especies de Mamíferos Un análisis de gran interés en ecología con fines de conservación de especies, es el relativo a los análisis de ocupancia9 de especies en un territorio (Bailey et al., 2014; Mackenzie and Royle, 2005; Royle, 2006), acorde con su detectabilidad10 (Garrard et al., 2013; Tang et al., 9 Uso y ocupación del territorio por una especie. 10 Probabilidad de detección de la especie, que tiene efecto en los registros de ella en los muestreos por diferentes medios como por ejemplo cámaras trampa o registro de rastros (huellas, heces, restos de consumo de alimentos, etc) 106 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 2006). Así, con el fin de ahondar en los aspectos de la dinámica de la presencia-ausencia de especies animales, se realizaron simulaciones computacionales de ocupancia en una comunidad de mamíferos, con número incremental de especies (Fernández et al., 2013). Para ello se diseñó una formulación jerárquica de dos procesos o ecuaciones estocásticas ligadas, como sigue: 𝑜𝑐~𝐵𝑖𝑛𝑜𝑚𝑖𝑎𝑙(𝑛, 𝑝𝑠𝑖) 𝑦~𝐵𝑖𝑛𝑜𝑚𝑖𝑎𝑙(𝑖 , 𝑜𝑐 ∗ 𝑝) (5.2) (5.3) Donde 𝑜𝑐 es la ocurrencia de especies en un sitio dado, 𝑛 es el número de individuos de especies, 𝑝𝑠𝑖 es la ocupancia. 𝑦 es la detectabilidad de las especies donde: 𝑖 es el número de sitios con cámaras trampa, y 𝑝 es la probabilidad de detección. Para los dos casos, se partió de una distribución de probabilidad binomial. La comunidad simulada tuvo 10 sitios de muestreo con cámara-trampa y un ciclo de 1000 iteraciones variando en 𝑝𝑠𝑖y 𝑝 en cada iteración, como números aleatorios entre 0.1 y 0.9. Una vez generadas las poblaciones multi- específicas vía simulación, se aplicaron las medidas de 𝐸, 𝑆 y 𝐶 para el número incremental de especies en cada uno de los sitios. Los resultados se muestran en la figura 5-11. Desde allí se puede establecer que existen para la emergencia niveles altos para la complejidad, niveles medios para la emergencia y bajos para la auto-organización. Lo anterior muestra mucha más variabilidad que regularidad en las apariciones o ausencias de las especies. Esta variabilidad se mantiene con el incremento de especies. Es decir, no es común encontrar a todos los especies de manera constante (alta probabilidad de 1) o no encontrarlos (alta probabilidad de cero). Más bien, existe una combinación entre mediana y altamente variable de su presencia y ausencia, lo que genera su alta complejidad. Se observa, además, que no por incluir más especies en los 10 sitios se eleva la auto- organización, por suponer que se podría incrementar el número de detecciones. Se hace interesante observar cómo al incrementar el número de especies, la complejidad se mantiene prácticamente estable y tiende a mantener y consolidar valores, en la categoría de alta. La línea que representa la dispersión confirma la poca variación entre sitios, al hacerse cada vez más pequeña con el incremento de 1 a 1000 especies. Resultados como los anteriores son muy estimulantes, dado que muestran una tendencia estable en la dinámica de poblaciones de mamíferos. Capítulo 5 107 Figura 5-11 Tendencia de la complejidad en una comunidad simulada de mamíferos para 10 sitios. Se muestran las primeras 𝟖𝟎𝟎 especies en 1000 iteraciones (Fernández et al., 2013). 5.4 Modelado y Especificación de la Emergencia Acuática a través del uso de programación genética Uno de los mayores esfuerzos en ecología está en entender los aspectos de la emergencia asociada a la complejidad. Al respecto, soluciones analíticas son requeridas. Para llegar a ellas, se hace conveniente la integración del conocimiento y teorías desde las ciencias físicas hasta las sociales. En este apartado, utilizamos la programación genética para develar las relaciones entre la emergencia ecológica y los procesos complementarios de auto- organización, homeostasis y autopoiesis. Los métodos y resultados expuestos se presentan acorde con lo desarrollado en (Fernández et al., 2014c). Respecto de la programación genética (PG) y su aplicación en ecología, se puede estimar que la generalidad, realismo y certeza de los modelos desarrollados para ecología hacen de ella una herramienta apropiada para entender y expresar el comportamiento complejo de los ecosistemas. Basada en la forma en que se da el procesamiento de la información biológica, la PG define un algoritmo evolutivo para encontrar programas de computador que busquen soluciones analíticas más apropiadas a través de procesos de entrecruzamiento y evolución de funciones. Esencialmente, la PG tiene un conjunto de instrucciones y una función de ajuste para medir la bondad del resultado de la tarea llevada a cabo (John R Koza, 1994). La PG tiene ventajas comparativas con otras técnicas de aprendizaje de máquina, debido a que necesita un conocimiento pequeño a priori, que se obtiene de un conjunto de datos del sistema en estudio (Koza and Poli, 2003). La literatura revela los beneficios de la PG dentro de un marco de identificación del sistema (Koza 1994), razón por la cual fue escogida para 108 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- llegar a las soluciones analíticas que requirió la determinación de la emergencia ecológica a partir de los fenómenos de auto-organización, homeostasis y autopoiesis. El modelo desarrollado tuvo los siguientes componentes básicos:  Los individuos. Descritos por los árboles que representaron las ecuaciones matemáticas. Los nodos de las hojas son variables o constantes. Los demás, son funciones matemáticas u operadores.  Funciones y terminales. Las funciones fueron operadores matemáticos básicos como: adición, sustracción, multiplicación y división. Para los terminales (u hojas), se usaron la emergencia, auto-organización, homeostasis y autopoiesis. las variables que representan  Los operadores genéticos. Los principales fueron el cruzamiento y la mutación. El primero fue un operador de punto único para dos individuos. El segundo, tomó parte del árbol (rama) de un individuo y generó uno nuevo.  El ajuste del modelo. Se definió una función de evaluación de ajuste del modelo, entre los valores observados de la emergencia del lago ártico comparado con los valores calculados por la programación genética para el mismo lago. La métrica para el ajuste del modelo, fuero el coeficiente de correlación y análisis de residuos; para ello se usó el paquete CAR (Companion to Applied Regression) de R. Las condiciones experimentales tuvieron un número de generaciones de 3000, con excepción de la biomasa en que 2000 generaciones fueron usadas. El tamaño de la población fue de 50 y la probabilidad de uso del operador de cruzamiento fue de 1.0, la probabilidad de mutación 0.08. Los mejores organismos obtenidos se muestran a continuación en las figuras 5-12 a 5-14. Figura 5-12 Mejor Solución Obtenido para Nutrientes Limitantes Capítulo 5 Figura 5-13 Mejor Solución Obtenido para Biomasa Figura 5-14 Mejor Solución Obtenido para el Componente Físico-químico 109 Estos individuos obtuvieron el mínimo error a partir de la función objetivo entre las 𝐸 observadas y calculadas. Las funciones halladas fueron las siguientes: Para biomasa: 𝑓(𝑆, 𝐴, 𝐻) = √1 − ( 𝐻2𝐴(𝐻 − 𝑆) 𝑆 ) − (𝐴4𝑆𝐻) − √𝑆(𝑆 + 𝐻)) Para nutrientes limitantes 𝑓(𝑆, 𝐴, 𝐻) = √ (𝑆𝐻 + 𝐴 𝑆⁄ ) − (𝑆(𝐴 + 𝑆) − 1 1 − 𝑆 (5.4) (5.5) 110 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- Para el componente físico-químico: 𝑓(𝑆, 𝐴, 𝐻) = √ 𝐴 𝐻⁄ + 𝐴 + 2𝐻 √𝐴 𝐻⁄ √((𝐴 − 𝐻 − 𝑆 − 𝐴 𝐻⁄ )) − 𝑆2 √ (5.6) Donde 𝑓(𝑆, 𝐴, 𝐻), 𝐴, 𝑆, 𝐻 son la emergencia, autopoiesis, auto-organización y homeostasis, respectivamente. La robustez del modelo se evalúa al observar las gráficas 5-15 a 5-17, el ajuste de los datos calculados y predichos en la regresión y la desviación de los residuales a la misma. En ellas, la línea roja indica el ajuste perfecto de 1. Cómo se observa, los puntos que representan las parejas entre calculados y predichos se ubican de manera cercana a la línea de regresión. El análisis se complementa con la graficación de los residuales, representados en la línea verde. Para todos los casos los residuales fueron muy pequeños, lo que se puede notar en la escala del eje 𝑌. Esto denota una pequeña diferencia en la predicción del modelo, que no es considerada como significativa, como se confirma en otros indicadores como el error absoluto promedio del modelo que se muestra más adelante. Figura 5-15 Prueba de Ajuste del Modelo PG al Componente de Nutrientes limitantes Capítulo 5 Figura 5-16 Prueba de Ajuste del Modelo PG a la Biomasa Figura 5-17 Prueba de Ajuste del Modelo PG al componente Físico-químico 111 Se puede observar que en las representaciones gráficas, el adecuado ajuste de las soluciones obtenidas por PG a pesar de la gran diferencia de los lagos. Lo anterior puede ser confirmado por los coeficientes de correlación obtenidos que fueron de 2; 0.9995 y 0.9937 para nutrientes, biomasa y físico-químicos. Los errores medios absolutos para los mismos componentes fueron 0.0004169; 0.005368 𝑦 0.007129. Lo anterior demuestra la gran exactitud del modelo En términos ecológicos, los resultados alcanzados son de gran importancia. En particular, debido a las grandes diferencias que tienen los lagos ártico y tropical. Se podría decir que están en verdaderos extremos ecológicos, el ártico con una alta variabilidad lo que conduce 112 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- a mayores emergencias de sus variables, y el tropical con alta regularidad, lo que incrementa su auto-organización. A manera ilustrativa se da el ejemplo entre el comportamiento del componente físico-químico de los dos lagos, en las figuras 5-18 y 5-19, lo que confirma su diferencia, en especial en cuanto a su homeostasis, la cual muestra mayor equilibrio del sistema tropical. Además, para complementar esta ilustración, en el anexo A se pueden ver la descripción de cada uno de los lagos y sus regímenes hidro-climáticos. Figura 5-18 Emergencia, Auto-organización, Complejidad y Homeostasis para un el Componente Físico- químico de un Lago Ártico Figura 5-19 Emergencia, Auto-organización, Complejidad y Homeostasis para un el Componente Físico- químico de un Lago Tropical Las anteriores diferencias entre los lagos ártico y tropical, demuestran por un lado la importancia de la emergencia como una expresión que mide la nueva información, y por el otro la importancia de las expresiones halladas que permiten medirla desde los procesos auto-organizantes, que se dan sobre la base de procesos homeostáticos y autopoiéticos. Capítulo 5 5.5 Discusión 113 5.5.1 Descripción de los Ecosistemas y la Inclusión de la Complejidad como Indicador Ecológico El uso de la complejidad como indicador ecológico nos permite ver cuánto una entidad ecológica es más compleja que otra, como el caso comparativo entre variables fisicoquímicas, o entre lagos en diferentes latitudes. También podemos generar perfiles de complejidad espacial (latitudinal, latitudinal, entre otros). Podemos identificar entidades que representan cambios de complejidad en los gradientes. Por ejemplo, basados en los valores promedios de 𝐶 para los tres componentes, se pudo observar que en el gradiente altitudinal, NL representa un punto intermedio donde la complejidad latitudinal cambia. Sí bien los resultados muestran dinámicas diferenciales por componentes, se requiere de más estudios para determinarlo con precisión. En este mismo sentido, será apropiado definir si existen variables que exhiben gradientes relacionados con este cambio de complejidad. Por ejemplo para la biomasa, podemos estimar que podría haber un cambio en el transecto Ar-T, en NL, para las cianobacterias en la zona planctónica. El uso de la complejidad como indicador ambiental, también permite ver como en los trópicos la alta 𝑆 y baja 𝐶 pueden conducir a baja 𝐴 en el componente de biomasa. La alta regularidad muestra que los organismos son estables a escalas anuales. En estos ambientes, la biomasa reduce su autonomía y adaptabilidad, motivo por lo que se favorece la especiación, por los cortos rangos que soportan las especies. Esto se asocia con el grado de robustez que tienen los organismos, que al ser alta da baja adaptabilidad, por lo que la generación de nuevas especies se promueve. Todas estas apreciaciones, complementan de manera apropiada lo que se sabe de los trópicos en cuanto a su regularidad, con la ventaja que le dan un sustento numérico para su explicación. En adición a lo anterior, podemos usar la complejidad para ver en qué condiciones los organismos pueden tener rasgos de mayor autonomía al ser más complejos que su ambiente. Esto fue explícito en los resultados para el componente fitoplanctónico de los lagos. La medición de la complejidad del número incremental de especies, vía simulación, es un punto interesante de partida para la deducción de relaciones con aspectos como la riqueza y número de especies, con fines de conservación. 5.5.2 Sobre los Aspectos Computacionales de la Medición de la Complejidad Ecológica Entre los aspectos computacionales de la complejidad ecológica se debe considerar que los sistemas complejos como sujeto de estudio, cuentan con el aporte de biólogos, ecólogos, computistas, matemáticos, físicos, economistas y muchos otros científicos. Como resultado, 114 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- existe una mezcla de enfoques que puede generar confusión en los conceptos. En cada campo, un enfoque distinto es tomado. Los biólogos, por ejemplo, están interesados en la auto-organización y la emergencia, debido a que vienen trabajando con estos conceptos desde Darwin y los trabajos de Mendel. Por otra parte, los científicos de la computación quieren relacionar la medida de complejidad para sistemas complejos con la complejidad que ellos ya han definido. Por ejemplo, con la complejidad de Chaitin, donde la complejidad de un objeto/problema es la longitud del programa mínimo que necesita una máquina universal de Turing para reproducirlo/resolverlo. En este contexto, la teoría de la información es muy útil para obtener una medida de 𝐶, comenzando con la noción de 𝐸 cómo un tipo de entropía, descrita por la medida de información de Shannon, que es equivalente a la entropía de Boltzman. Cómo la temperatura, que caracteriza las propiedades de la energía cinética de las moléculas o fotones, una medida global de la complejidad ecológica puede caracterizar la dinámica de las interacciones espacio-temporales (Fernández and Gershenson, 2014). Por ejemplo, a pesar que cada componente de un sistema ecológico tiene diferentes (micro) estados que son afectados por el estado de los demás elementos (interacciones), su dinámica promedio y los diferentes regímenes dinámicos pueden ser representados en forma sintética en nuestra medida de complejidad. Esto se pudo observar en la aplicación de la complejidad comparativa de lagos. Considerando que 𝐸 puede ser entendida cómo la información producida por un proceso o ecosistema, una 𝐸 = 0 nos permite interferir sobre la predictibilidad de los estados, dado que no se produce nueva información. Es decir, dado que los estados presentan alta regularidad (𝑆 = 1), lo más probable es que el estado que viene sea el mismo que los anteriores. Entre tanto, cuando 𝐸 es máxima (𝐸 = 1) los estados son irregulares o seudo-aleatorios, y por lo tanto, el siguiente estado traerá nueva información. Dado que la regularidad es prácticamente nula (𝑆 = 0), será muy difícil predecir el próximo estado. La integración de los aspectos de 𝑆 y 𝐸 en nuestra medida de 𝐶, tiene ventajas como el observar la dinámica compleja de un ecosistema como un balance entre su regularidad y cambio. En este contexto, podemos definir qué variable, componente o proceso, es más complejo-adaptable que otro. Esta pregunta de gran importancia en ecología, nos puede conducir a generar categorías de complejidad de procesos, poblaciones, comunidades y ecosistemas. También nos puede brindar una medida de la adaptabilidad de nuestra biosfera, y en general, de la complejidad biológica. Igualmente, la medida de 𝐶 puede ser útil cuando se desea relacionar el cambio evolutivo y la sostenibilidad de ecosistemas. Es únicamente cuando 𝐶 es máxima y mayor que el ambiente que la evolución potencial en los sistemas puede ser mejorada, dado que los niveles intermedios de 𝐸 y 𝑆 le dan al sistema el suficiente potencial de cambio, pero con la suficiente robustez para perdurar. Para ello se parte de una condición más o menos estable, que para el momento será el estado más probable del sistema. Capítulo 5 115 Cómo los sistemas vivos requieren de un balance entre adaptabilidad-emergencia y estabilidad-auto-organización (Kaufmann, 1993), 𝐶 es útil para caracterizar sistemas vivos. A partir de ella, se puede relacionar la complejidad del sistema con la del ambiente, para obtener su autopoiesis. En este sentido, la caracterización del comportamiento del componente biótico, ante los cambios o disturbios ambientales, en términos de complejidad, puede dar información acerca de la autonomía de los organismos. Desde esta perspectiva, la complejidad, la homeostasis y la autopoiesis, pueden ser de utilidad en estudios de cambio climático global. En ellos podría confirmarse nuestra hipótesis que sistemas con alta complejidad tienen el suficiente grado de robustez y adaptabilidad para enfrentar los cambios ambientales. Esto lo soportamos en los datos de autopoiesis que se dan en ambientes extremos, cómo el lago ártico. 5.5.3 Comparación con otras Medidas de Complejidad. Desde las aplicaciones realizadas hemos hallado diferencias con algunos autores. Por ejemplo, Shalizi et al.(2004) define auto-organización cómo un incremento interno de la complejidad estadística. Esto puede suceder en sistemas con alta 𝐶 y máxima 𝑆. Entre tanto, para nosotros consideramos una máxima 𝑆 para sistemas con mayor regularidad y de patrones más estáticos. Alineados con la termodinámica y la teoría de la información, creemos que un cristal y un estado congelado, son más organizados que complejos. Sin embargo, un sistema con una 𝑆 mínima, lo más probable es que sea no organizado. En este aspecto creemos que la medida de Shalizi es más apropiada para estudiar la dinámica de sistemas auto-organizados, más que emergentes (Camazine et al., 2001; Gershenson, 2007). Se destaca que un sistema de baja auto-organización podría elevarla bajo la influencia de un factor externo, en lo que podemos considerar como auto-organización guiada (Fernández et al., 2014b). Desde la simplicidad de nuestras definiciones, la auto-organización puede ser vista como el opuesto de la emergencia. La auto-organización es alta para sistemas de dinámicas ordenadas, en tanto la emergencia es alta para sistemas altamente caóticos (en todas las escalas). Qué la auto-organización y emergencia sean opuestos puede ser visto como contra- intuitivo, dado que hay muchos sistemas que presentan alta complejidad al parecer por tener alta emergencia y alta auto-organización. Precisamente, estos sistemas, son los más interesantes para la ciencia. Para nosotros estos sistemas son los que tienen alta 𝐶 , a partir de una combinación de alta auto-organización y baja emergencia, o viceversa. Cabe destacar, que en nuestra propuesta en valores opuestos y altos de S y E encontramos el extremo del orden y del desorden, de allí su carácter opuesto. La información (y emergencia) puede ser vista, en una variable binaria, como un balance de ceros y unos (𝑃(0) = 1 − 𝑃(1) ⇔ 𝑃(0) = 𝑃(1) = 0.5). Así, la complejidad puede ser vista como un balance de emergencia y auto-organización (𝐼 = 0, 𝑆 = 1 − 𝐸; 𝑀𝑎𝑥(𝐶) ⇔ 𝑆 = 𝐸 = 0,5). Ya ha sido discutido en la comunidad científica que la complejidad es máxima cuando 116 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- existe una compensación entre persistencia de información (memoria) y su variabilidad (exploración, computación) (Bar-Yam, 2004a; Langton, 1990). También ha sido argumentado, que existe una tendencia de auto-organización o evolución a estados que incrementan su balance y alta complejidad (a múltiples escalas) (Bak et al., 1988; Gershenson, 2012b; Kauffman, 2000). Lo anterior está en acuerdo con el trabajo de Escalona-Moran et al.(2012). Aun cuando nuestra formulación es diferente, 𝐶 está estrechamente relacionada con la complejidad estadística de Crutchfield and Young (1989), que mide cuanta computación es requerida para producir información. Cadenas ordenadas o aleatorias si bien requieren de computación, cadenas complejas requieren más. Esta complejidad estadística, puede también ser definida como información mínima requerida para predecir el futuro de un proceso (Shalizi et al., 2004). Para nuestra 𝐶, baja 𝐼 implica cadenas que son fácilmente predecibles, mientras altas 𝐼 implican cadenas que no tienen mucho que predecir. Alta 𝐶 ocurre cuando 𝐼 es media, lo cual corresponde con más computación requerida para producir o predecir un patrón determinado. Aun cuando 𝐶 y la complejidad estadística, exhiben comportamientos similares, 𝐶 es mucho más simple de calcular y explicar. 5.5.4 La Búsqueda de Soluciones analíticas para la Emergencia El principal aspecto a resaltar de este tipo de modelado y especificación de la emergencia en sistemas acuáticos, producto del uso de la programación genética, es que se obtuvieron tres expresiones generales para la emergencia basada en sus propiedades asociadas de auto- organización, homeostasis y autopoiesis. Si se considera que la emergencia es información nueva, y que por las interacciones se hace difícil de predecir, debido a los cambios ambientales, esta expresión cobra especial interés. El primer punto de partida para la comprobación de la generalización de las expresiones obtenidas por PG en el lago ártico, fue su comprobación de funcionamiento correcto en la estimación la emergencia en el lago tropical, en los componentes de PC, LN y Bio. Este inicio, sienta las bases para la extensión de la generalización de las expresiones a otros lagos. También nos promueve a seguir en la evaluación de otras propiedades sintéticas, cómo la complejidad ecostémica, además de otros componentes ecosistémicos, de manera que se vaya confirmando su generalización. 5.6 Síntesis y Comentario Final. A partir de las medidas desarrolladas de 𝐸, 𝑆, 𝐶, 𝐻 y 𝐴, basadas en la teoría de la información y compuestas por expresiones matemáticas simples, se pudieron capturar aspectos complementarios a los tradicionales estudiados para la dinámica ecológica. Esto es, indicadores cómo la abundancia, diversidad, riqueza de especies, etc. Capítulo 5 117 En contraste con los anteriores indicadores, y otros análisis ecológicos cómo el de estructura jerárquica, nuestro enfoque permite analizar propiedades sintéticas de los ecosistemas, así como sus tendencias, en términos de la información. Esto puede ser aplicado a cualquier variable en diferentes componentes, al componente como tal, o a uno o más ecosistemas. Para ello se requiere que previamente las variables hayan sido transformadas la escala (base) deseada. Con esto, se logra una forma complementaria a la tradicional de observar los sistemas ecológicos sobre la base de su regularidad, cambio y balance. Las aplicaciones en sistemas acuáticos descritas, han considerado: (i) las dinámicas de ecosistemas por separado en cuanto a sus componentes PC, LN y Bio. (ii) Los análisis comparativos entre ecosistemas (Ar, NH, NL y T). (iii) Estudios de la ocupancia y detectabilidad de especies, un tópico de interés en estudios de conservación. Desde estas últimas, se pueden dar otras extensiones, como por ejemplo, estudios de patrones de movimiento. Los resultados obtenidos muestran como las medidas 𝐸, 𝑆, 𝐶, 𝐻 y 𝐴, pueden ser vistas como indicadores ecológicos útiles a diferentes escalas, que permiten describir cómo los ecosistemas se mantienen cerca de ciertos estados (atractores), pero con la suficiente variabilidad para poderse adaptar de manera autónoma al medio. En este aspecto, la regularidad de los estados puede ser observada en la auto-organización como sucedió para la biomasa en el lago tropical, la variabilidad en la emergencia como en el componente fisicoquímico del ártico, la adaptabilidad en la complejidad como todos los componentes del lago ártico, y la autonomía en la autopoiesis como en el fitoplancton ártico. Como se ha demostrado, es posible describir la dinámica ecológica en términos de información, como también ha sucedido en estudios previos (Fernández and Gershenson, 2014; Fernández et al., 2014b, 2014d, 2013), lo que muestra un campo creciente y una visión complementaria en ecología. Ello sienta las bases para inspeccionar el significado ecológico y aplicación de las medidas propuestas, así como buscar su validación progresiva en otros procesos y sistemas ecológicos. Basados en nuestra expresión de complejidad, puede ser posible dar soporte y explicación al porqué los organismos tendiendo al incremento del orden por el almacenamiento de información, tienen la posibilidad de tener un componente aleatorio que les permite explorar e innovar, para persistir. Lo anterior constituye la base de la adaptabilidad de las especies y ecosistemas (Walker, 2005). Por su parte, los resultados obtenidos desde la programación genética, han sentado las bases para la continuación en la búsqueda de soluciones analíticas, que desde los resultados obtenidos para la emergencia, nos invita a continuar en la inspección de expresiones con las que se puedan caracterizar y especificar las propiedades estudiadas. 118 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- 6. CONCLUSIONES Y TRABAJO FUTURO 6.1 Logros Generales Esta tesis logró el desarrollo de un enfoque metodológico para la especificación y estudios de sistemas dinámicos con un gran número de agentes, desde la perspectiva de su auto- organización, emergencia, complejidad, homeostasis y autopoiesis. Para tal fin, se partió de una definición propia de sistema dinámico que expresa la inclusión de múltiples agentes, interacciones, organización propia, emergencias y complejidad. Desde allí se ahondó en la descripción de un sistema multi-agente como un sistema dinámico, que incorporó la teoría de los sistemas dinámicos con el abordaje de los aspectos de su complejidad. De esta manera, fue posible incluir mayores aspectos para la descripción de un sistema dinámico sobre la base de un número mayor de propiedades, más allá de la auto-organización (cómo orden) y la emergencia (como cambio). Es decir, considerando la homeostasis (como equilibrio dinámico) y autopoiesis (como autonomía). Estas propiedades, por su carácter sintético, permitieron capturar diversos aspectos de la dinámica global desde las interacciones locales. Centrados en las interacciones, se logró la formalización de un sistema dinámico como una red de agentes. Con ello, se pudo integrar la teoría de sistemas dinámicos, la teoría multi- agentes y la teoría de grafos. Estos últimos resultados teóricos sientan las bases para posteriores aplicaciones. Como segundo propósito, la tesis propuso nuevas nociones y formalismos de auto- organización, emergencia, complejidad, homeostasis y autopoiesis. El objeto estuvo en la clarificación de estas medidas y sentar las bases para la posterior formalización. Se quiso desde un principio que las nociones y medidas representasen lo que manifestaban. El alcance de estas medidas contribuye a la desambiguación de los conceptos. No obstante, son un enfoque desde la teoría de la información, en el que se debe tener en cuenta su trasfondo probabilístico. De la emergencia resaltamos su carácter de información nueva, pues corresponde con propiedades que surgen desde las interacciones locales en una escala dada. De la auto-organización como una expresión del grado de orden, sin la participación de un control central, resaltamos su carácter opuesto a la emergencia. De la complejidad, resaltamos ser el resultado del balance entre auto-organización y emergencia, o balance entre orden y caos. De la homeostasis resaltamos su capacidad para determinar si el sistema 120 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- mantuvo a través del tiempo los mismos o diferentes estados, como producto de su equilibrio dinámico. Su valor agregado está en que es útil para identificar los ritmos del sistema a través de la dinámica temporal, como muestra de su funcionamiento en su zona óptima. Finalmente, de la autopoiesis, su capacidad para enfrentar los cambios ambientales. En cuanto a las diversas aplicaciones realizadas, es destacable que los formalismos desarrollados permiten describir muchos fenómenos en términos de información a diversas escalas. Las aplicación en redes booleanas y autómatas celulares elementales, definieron y categorizaron dinámicas ordenadas, críticas y caóticas, de forma apropiada. La aplicación en tráfico, permitió determinar de forma comparativa con el sistema tradicional de la ola verde, que el sistema auto-organizante generó para unos casos un comportamiento regular y una mayor complejidad. Lo anterior se expresó en un número mayor de fases, lo que demostró su adaptabilidad a diferentes flujos y demandas de tráfico. Respecto a las aplicaciones en sistemas ecológicos, se puede estimar que la medición de la complejidad en ella dio interesantes resultados. En términos prácticos, las medidas propuestas contribuyen a darle significado e interpretación a la complejidad ecológica. Como hemos argumentado, en la literatura no se ha definido una única medida de complejidad. La discusión se mantiene en las diferentes interpretaciones dadas a la complejidad ecológica (complejidad funcional y estructural). Como clarificación se puede decir que acorde con Heylighen (2011, 2000), la complejidad estructural es el resultado de la diferenciación espacial y de la selección del ajuste de las interacciones entre los componentes. Por otra parte, la complejidad funcional, está relacionada con la variedad de acciones y procesos para enfrentar las perturbaciones ambientales. Ambos procesos producen una jerarquía de sistemas anidados, subsistemas o meta-sistemas, que tienden al auto-refuerzo. Desde nuestro enfoque de la complejidad como balance entre 𝐸 y 𝑆, está asociada con la caracterización de la complejidad funcional, por cuanto es producto de la dinámica de los estados de los elementos del sistema. Estas dinámicas pueden ser ordenadas (auto-organizadas), caóticas (emergentes) o críticas (complejas). Desde esta condición, los lagos en el gradiente latitudinal pueden se clasificados en uno u otro régimen. Igualmente, la medida de autopoiesis está asociada con la complejidad funcional, dado que refleja la adaptabilidad y autonomía ante los cambios ambientales en el tiempo. Un aspecto interesante que se desprende de esta conclusión, es que surgen nuevas oportunidades de contrastar la complejidad funcional con la complejidad estructural. Esta última puede ser definida desde las diversas topologías de redes de interacción propuestas por la teoría de redes. La base para esto lo constituyen los experimentos realizados con redes booleanas aleatorias, donde las dinámicas ordenadas, caóticas y críticas, estuvieron relacionadas con la conectividad. Sobre las anteriores bases, además de los formalismos propuestos, el uso de la programación genética (ítem 5.5.5) permitió obtener expresiones analíticas que complementan el estudio de los sistemas ecológicos. Esto quedó demostrado por la exactitud del modelo desarrollado, que obtuvo valores de emergencia apropiados para un lago tropical a partir de los datos de CONCLUSIONES 121 un lago ártico, un lago con una dinámica muy diferente. Así, el enfoque de programación genética nos permitió hallar expresiones generales para caracterizar ecosistemas ecológicos, y contribuye al entendimiento de las interacciones entre procesos ecológicos de auto- organización, homeostasis y autopoiesis. La utilidad de este enfoque puede ser evaluado gradualmente en otros ecosistemas acuáticos. Se podría pensar que la metodología desarrollada, en especial las métricas propuestas, tienen limitaciones por su generalidad. Sin embargo, vemos que esto también es una virtud, pues puede sintetizar diversos fenómenos, los cuales pueden ser descritos en términos de información. Desde las aplicaciones y los resultados obtenidos, surge la motivación y la posibilidad de hacer extensiones de la metodología a otros casos, e incluso lograr perfeccionamientos y formalizaciones adicionales. 6.2 Trabajo Futuro Existen varias situaciones que sería interesante explorar, por ejemplo:  Nuestras medidas pueden ser generalizadas para redes computacionales (Gershenson, 2010), con potenciales aplicaciones al estudio de redes complejas de agentes (Fernández et al., 2012b; Newman, 2003).  En consecuencia con lo anterior, se puede llegar a la implementación de una plataforma de modelado basada en agentes que explore el surgimiento de las propiedades de auto-organización, emergencia, complejidad, homeostasis y autopoiesis, desde la representación de una red computacional de agentes.  Es necesario continuar la aplicación de los formalismos propuestos, a grandes series de tiempo de sistemas reales, para ahondar más en su significado.  La información de Shannon ha sido recientemente usada como una medida de la complejidad espacial (Batty et al., 2012), con aplicaciones en áreas urbanas. Será interesante comparar este tipo de trabajos con nuestras medidas de complejidad.  Es necesario ahondar en el ajuste de indicadores homeostáticos y su aplicación, debido a que a que hemos notado su asociación directa con el proceso de auto- organización.  Se debe finalizar un paquete de software libre para el cálculo y graficación ágil de las métricas propuestas. La primera versión llegó hasta la programación de una función para R, que hemos llamado Comin (Complexity and Information) (Villate et al., 2013).  Nuevos casos de estudio pueden ser abordados. Por ejemplo, la complejidad biológica desde la genómica, la proteómica, la metabolómica y la enfermedómica. Desde la base de su medición, se pueden explorar los aspectos de modularidad y complejidad a múltiples escalas de organización. Por otra parte, surgen tópicos especiales como la complejidad del ritmo cardiaco en diferentes cohortes de edad, pues hemos notado, 122 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝐴𝐸𝐶𝐻𝐴- en inspecciones preliminares, que el ritmo cardiaco en los niños es más emergente que en los adultos. Nace también el interés por explorar la complejidad de ciertas patologías cardiacas.  Y finalmente, desde la perspectiva de la complejidad como balance, creemos que podemos abordar tópicos relativos a la cognición, la cual puede tener elementos como el balance entre el aprendizaje y la memoria. El flujo, entendido como aquel estado de plenitud y complacencia en que existe felicidad, también puede ser considerado como un balance entre los retos y las habilidades. Este último hecho favorecería el aprendizaje complejo, que puede ser estimado como un nuevo modelo educativo (Fernández et al., 2014a). 7. Anexo: Caracterización de los Lagos Estudiados 7.1 Lago Ártico (Ar) Los lagos árticos están localizados en el círculo polar ártico. Su temperatura superficial (ST) promedio es de 3°, su máxima de 9°C y su mínima de 0°C. En general, los sistemas Ar se clasifican cómo oligotróficos debido a su baja producción primaria, representada en valores de clorofila de 0.8-2.1 mg/m3. Su zona limnética, o columna de agua, está bien mezclada, lo que significa que no tiene estratificaciones (capas con diferentes temperaturas). Durante el invierno (Octubre a Marzo), la superficie del lago está cubierta de hielo. Durante el verano (Abril a Septiembre), el hielo se derrite y el flujo de agua y evaporación se incrementa. Estos dos regímenes climáticos tienen una fuerte influencia en el comportamiento hidrológico de los lagos, que a su vez influencia la físico-química y la biota. Figura 7-1 Hidroclimatología del lago Ártico (Randerson and Bowker, 2008). A la izquierda la temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. Los nutrientes limitantes en las formas de nitratos, silicatos y dióxido de carbono están entre el 90 y 100% de disponibilidad para el fitoplancton en todo el año. El fitoplancton y perifitón están dominados por diatomeas en porcentajes de 38.6 y 45%, respectivamente. En el 124 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨- zooplancton dominan los herbívoros, con un 91.7% de la biomasa. En la zona bentónica, los invertebrados detritívoros alcanzan un 86.8%, y los peces piscívoros el 85.8%. 7.2 Lago Templado del Norte de Tierras Altas (North Higland Lake-NH). NH corresponde a un ecosistema mesotrófico en una latitud templada (T° promedio de 5.3°C). Los niveles de clorofila están entre 2.2-6.2 mg/m3. La superficie está cubierta de hielo en el invierno (final de noviembre a principios de febrero). La cubierta de hielo forma una barrera para el viento, lo que minimiza la pérdida de agua por evaporación, mientras que el fondo del lago permanece sin congelar. La columna de agua no está termo-estratificada, y está permanentemente bien mezclada con niveles del 50% en verano y 90% en invierno. El flujo máximo se da en primavera y otoño (9.6 m3/s). El flujo mínimo en verano (0.6 m3/s). La evaporación se reduce debido a que el agua es más o menos fría y los gradientes de presión de vapor no son grandes (promedio= 9.262 m3/d). El tiempo de retención (RT) es máximo en verano con 100 días. La concentración de oxígeno es superior a 10 mg/lt en las tres capas. El pH ronda las 7 a 7.3 unidades, pero se mueve en rangos de 6.7 a 7.8 unidades desde la superficie al fondo. Figura 7-2 Hidroclimatología del lago templado del norte-NH (Randerson and Bowker, 2008). A la izquierda temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. La correlación entre variables es más estacional en NH que en lagos templados de tierras bajas (North Lowland-NH). Esto significa que el periodo de verano está relacionado con altas RT y altos pH. La estación invernal está relacionada con altos niveles de oxígeno en el flujo de entrada y salida. Sin embargo, existe una correlación más estrecha entre el oxígeno bentónico y el oxígeno del sedimento (BO2, SdO2). Anexo 125 Los nutrientes limitantes, como los nitratos y el dióxido de carbono, están en el 95% de disponibilidad para el fitoplancton. Los fosfatos y silicatos muestran variaciones y porcentajes mejores de disponibilidad. Los primeros alrededor del 80%, y los segundos cerca del 85%. La composición de la biomasa es dominada por las diatomeas planctónicas (46.7%) y bentónicas (41%). La composición del zooplancton es dominada por el zooplancton herbívoro (91%), los carnívoros abarcan el restante 8,6%. Entre los invertebrados bentónicos, los detritívoros dominan con el 87.5%. La comunidad de peces es dominada por los peces bénticos en porcentaje de 88.9. 7.3 Lago Templado del Norte de Tierras Bajas (North Lowland Lake-NL). Este lago prototipo de los lagos templados es un lago eutrófico, localizado en un clima templado del hemisferio norte. Su productividad primaria es de 6.3-19.2. Esta bajo la influencia de las estaciones de invierno, primavera, verano y otoño. En verano, las variaciones de flujo de entrada a salida caen a 3.5 de 25.2 m3/s. El tiempo de retención se incrementa en 100 días. La falta de viento y altas temperaturas (24°C), causan termo-estratificación, que se evidencia en los 24°C en la superficie, 20.6°C en la capa plantónica y 17.3°C en el bentos. Por tal motivo, el agua al ser es más densa en el fondo no se mezcla. En invierno, no se cubre de hielo la superficie, y el flujo es mínimo. En primavera y otoño la columna de agua se mezcla en un 100%, y el tiempo de retención hidráulica baja a 14 días. Esto genera un incremento en la conductividad eléctrica. En verano, las depleciones de oxígeno en las tres capas son más drásticas que en el ártico. El oxígeno está directamente correlacionado con el porcentaje de mezcla y los flujos de entrada a salida, y de forma inversa a otros parámetros cómo el pH y la retención hidráulica. Figura 7-3 Hidroclimatología del lago templado del norte de tierras bajas-NL (Randerson and Bowker, 2008). A la izquierda temperatura en las 3 zonas de estudio. A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. 126 Modelado Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨- Los nutrientes limitantes están por encima del 90% de disponibilidad para el fitoplancton en todas las estaciones. De acuerdo con su disponibilidad, la composición de la biomasa del fitoplancton y perifitón es dominado por diatomeas planctónicas (47%) y bentónicas (34.3%). En consecuencia, el zooplancton es 100% herbívoro. La comunidad de peces es dominada por los peces bentónicos (67%). 7.4 Lago Tropical (T) T es un sistema híper-eutrófico (clorofila > 19.2), localizado en un clima tropical húmedo, en el norte del Ecuador. Su temperatura media es de 25°C en la capa superficial. Está sometido a una estación lluviosa y otra seca que marca los flujos máximos y mínimos, respectivamente. La alta radiación conduce a altas temperaturas en el agua y a bajas diferencias entre zonas. A pesar que se puede dar la estratificación debida al intercambio de calor entre capas, esta es menos estable que en los lagos de latitudes altas (NH y NL). Especialmente, debido a que el viento puede tener gran incidencia en la mezcla de la columna de agua. El flujo de nutrientes y la dinámica planctónica se ven afectados por los episodios de calor y mezcla. Se destaca que la producción primaria entre lagos tropicales es de dos veces la de altas latitudes. También se ha reconocido que en T el factor limitante es el nitrógeno, de manera que cuando se agota los demás procesos no tienen lugar. El equilibrio entre especies dentro del fitoplancton y perifiton es alto (33% para diatomeas, algas verdes y cianobacterias). Las poblaciones de zooplancton están dominadas por los herbívoros (90%), el bentos por invertebrados detritívoros (84%) y los peces (87%). Figura 7-4 Hidroclimatología del lago tropical. A la izquierda temperatura en las 3 zonas de estudio (Randerson and Bowker, 2008). A la derecha los flujos hidrológicos de afluente, efluente, mezcla y evaporación. Bibliografía Adami, C., Ofria, C., Collier, T.C., 2000. Evolution of biological complexity. Proc. Natl. Acad. Sci. U. S. A. 97, 4463–4468. Aguilar, J., 2014. Introducción a los Sistemas Emergentes, 1st ed. Talleres Gráficos, Universidad de Los Andes. Aguilar, J., Cerrada, M., Hidrobo, F., 2007. A Methodology to Specify Multiagent Systems, in: Nguyen, N., Grzech, A., Howlett, R. (Eds.), Agent and Multi-Agent Systems: Technologies and Applications. Springer , Berlin / Heidelberg, pp. 92–11. Aguilar, J., Cerrada, M., Hidrobo, F., 2012. Sistemas Multiagentes y sus aplicaciones en Automatización Industrial, 1st ed. Talleres Gráficos, Universidad de Los Andes, Mérida, Venezuela. Aguilar, José, Besembel, I., Cerrada, M., Hidrobo, F., Narciso, F., 2008. Una Metodología para el Modelado de Sistemas de Ingeniería Orientado a Agentes. Rev. Iberoam. Intel. Artif. 12, 39–60. Aldana-González, M., Coppersmith, S., Kadanoff, L., 2003. Boolean Dynamicswith Random couplings, in: Perspectives and Problems in Nonlinear Science. A Celebratory Volume in Honor of Lawrence Sirovich, E. Kaplan, J. E. Marsden, and K. R. Sreenivasan. Springer Appl. Math. Sci. Ser., pp. 23–89. Anand, M., Gonzalez, A., Guichard, F., Kolasa, J., Parrott, L., 2010. Ecological Systems as Complex Systems: Challenges for an Emerging Science. Diversity. 2,3, 395-410 doi:10.3390/d2030395 Anderson, P.W., 1972. More is different. Science. 177, 393–396. Ash, R.B., 1965. Information Theory. Plant Signal. Behav. 6, 1-27. doi:10.1007/s10827-011-0314- 3 Ash, R.B., 2000. Information Theory 4.1. Entropy 97, 1–5. doi:10.3390/s110605695 128 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Ay, N., Der, R., Prokopenko, M., 2012. Guided self-organization: perception–action loops of embodied systems . Theory Biosci. 131, 125–127. Bailey, L.L., MacKenzie, D.I., Nichols, J.D., 2014. Advances and applications of occupancy models. Methods Ecol. Evol. 5,12, 1269–1279 doi:10.1111/2041-210X.12100 Bak, P., Tang, C., Wiesenfeld, K., 1988. Self-organized criticality. Phys. Rev. A, Lecture notes in Physics 38, 364–374. doi:10.1103/PhysRevA.38.364 Bar-Yam, Y., 2003. Dynamics of complex systems, Computers in Physics, Studies in nonlinearity. Westview Press. 12,4,864. doi:10.1063/1.168724 Bar-Yam, Y., 2004a. A mathematical theory of strong emergence using multiscale variety. Complexity 9, 15–24. Bar-Yam, Y., 2004b. Multiscale Variety in Complex Systems. Complexity 9, 37–45. doi:10.1002/cplx.20014 Batty, M., 1971. Modelling Cities as Dynamic Systems. Nature. 231,303, 425-428. doi:10.1038/231425a0 Batty, M., 2012. Building a science of cities. Cities 29,1. Batty, M., Morphet, R., Massuci, P., Stanilov, K., 2012. Entropy, complexity and spatial information ( No. 185). Bedau, M.A., Humphreys, P., 2008. Emergence: Contemporary Readings in Philosophy and Science. MIT Press, Cambridge, MA, USA. Berlekamp, E.R., Conway, J.H., Guy, R.K., 1982. Winning Ways for Your Mathematical Plays, American Mathematical Monthly, Winning Ways for Your Mathematical Plays. Academic Press. 2,5,411. doi:10.2307/2323620 Bernard, C., 1859. Lecons sur les propri´et´es physiologiques et les alterations pathologiques des liquides de l'organisme. Paris. 2,496. Bersini, H., Stano, P., Luisi, P.L., Bedau, M.A., 2010. Philosophical and scientific perspectives on emergence. Synthese 185, 165–169. doi:10.1007/s11229-010-9718-2 Borcard, D., Gillet, F., Legendre, P., 2011. Numerical Ecology with R, Media, Use R! Springer New York. doi:10.1007/978-1-4419-7976-6 Boschetti, F., 2008. Mapping the complexity of ecological models. Ecol. Complex. 5, 37–47. Boschetti, F., 2010. Detecting behaviours in ecological models. Ecol. Complex. 7, 76–85. Bibliografía 129 Bourgine, P., Stewart, J., 2004. Autopoiesis and cognition. Artif. Life 10, 327–345. Camazine, S., Deneubourg, J.-L., Franks, N.R., Sneyd, J., Theraulaz, G., Bonabeau, E., 2001. Self-Organization in Biological Systems, 1st ed. Princeton University Press, Princeton, New Jersey. Cannon, W.B., 1932. The Wisdom of the Body. WW Norton & Co, New York. Chaitin, G., 2007. The halting probability omega: Irreducible complexity in pure mathematics. Milan J. Math. 75, 291–304. Christianson, G.E., 1998. Isaac Newton and the scientific revolution, Oxford portraits in science. Oxford University Press. Cook, M., 2004. Universality in elementary cellular automata. Complex Syst. 15, 1–40. Crutchfield, J., Young, K., 1989. Inferring statistical complexity. Phys. Rev. Lett. 63, 105–108. doi:10.1103/PhysRevLett.63.105 Crutchfield, J.P., 2011. Between order and chaos. Nat. Phys. 8, 17–24. doi:10.1038/nphys2190 De Wolf, T., Holvoet, T., 2005. Emergence Versus Self-Organisation: Different Concepts but Promising When Combined, in: Brueckner, S., Di Marzo Serugendo, G., Karageorgos, A., Nagpal, R. (Eds.), Engineering Self-Organising Systems. Springer, Berlin / Heidelberg, pp. 77–91. Desalles, J.L., Ferber, J., Phan, D., 2008. Emergence in Agent-Based Computational Social Science: Conceptual, Formal and Diagrammatic Analysis, in: Yang, A., Shan, Y. (Eds.), Intelligent Complex Adaptive Systems. IGI Publishing, Hershey, PA, USA, pp. 1–24. Di Paolo, E., 2000. Homeostatic adaptation to inversion of the visual field and other sensorimotor disruptions. From Anim. to Animat. 6 Proc. 6th Int. Conf. Simul. Adapt. Behav. 440–449. Ebeling, W., 1993. Chaos, order, and information in the evolution of strings. Appl. Math. Comput. 56, 131–151. doi:10.1016/0096-3003(93)90119-Y Edmonds, B., 1999. Syntactic Measures of Complexity. Dep. Philisophy PhD, 245. Egri-Nagy, A., Nehaniv, C.L., 2008. Hierarchical coordinate systems for understanding complexity and its evolution with applications to genetic regulatory networks. Artif. Life 14, 299–312. Eriksson, D.M., Wulf, V., 1999. Self-organizing social systems: a challenge to computer supported cooperative work. Cybern. Hum. Knowing 6, 3–4. 130 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Escalona-Moran, M., Paredes, G., Cosenza, M., 2012. Complexity, information transfer and collective behavior in chaotic dynamical networks. Int. J. Appl. Math. Stat. 26, 58–66. Ferber, J., Gutknecht, O., 1998. A meta-model for the analysis and design of organizations in multi-agent systems, Proceedings International Conference on Multi Agent Systems Cat No98EX160. IEEE Comput. Soc. doi:10.1109/ICMAS.1998.699041 Ferber, J., Gutknecht, O., Michel, F., 2004. From Agents to Organizations : an Organizational View of Multi-Agent Systems. AgentOriented Softw. Eng. IV, Lecture Notes in Computer Science 2935, 214–230. doi:10.1007/978-3-540-24620-6_15 Fernández, N., Aguilar, J., Gershenson, C., Terán, O., 2012a. Sistemas dinámicos como redes computacionales de agentes para la evaluacion de sus propiedades emergentes, in: I Simposio Científico Y Tecnológico En Computación SCTC2012. Universidad Central de Venezuela, Caracas. Fernández, N., Aguilar, J., Terán, O., 2010a. Conceptual modeling of emergent processes in dynamics complex systems, in: Rivas-Echavarria, F., Mousallí-Kayat, G. (Eds.), 9th WSEAS International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics (CIMMACS '10). WSEAS Press, Mérida, Venezuela, pp. 75–82. Fernández, N., Aguilar, J., Terán, O., 2012b. Formalization of Emergent Properties in Computing Agent Networks, in: Ana Julia Viamonte (Ed.), 14 WSEAS International Conference on Mathematical Models and Methods in Modern Science. WSEAS, Porto- Portugal, pp. 189–194. Fernández, N., Carvajal, L., Colina, E., 2010b. Sistema Difuso Tipo Mamdani para la Determinación Genérica de la Calidad del Agua. BISTUA 8. Fernández, N., Gershenson, C., 2014. Measuring Complexity in an Aquatic Ecosystem, in: Castillo, F., Cristancho, M., Isaza, G., Pinzón, A., Corchado, J. (Eds.), Advances in Intelligent Systems and Computing. Springer. Springer Berlin / Heidelberg, pp. 83–89. doi:10.1007/978-3-319-01568-2_12 Fernández, N., Gershenson, C., Aguilar, J., Terán, O., 2011. Introducción a los sistemas dinámicos como redes computacionales basados en agentes (SD-Ag)., in: Coloquio de Sistemas Complejos Como Modelos de Computación. Centro de Ciencias de la Complejidad-C3, Instituto de Ciencias Nucleares. Universidad Nacional Autónoma de México, México, D.F. Fernández, N., Huertas, M., Rodriguez, F., Gershenson, C., 2014a. Complex Learning, Leadership and Flow, in: International Congress on Systems and Cybernetics. WOSC, Ibagué, pp. 263–279. Fernández, N., Lizcano, D., Ahumada, J., Hurtado, J., Gershenson, C., 2013. Complexity of Mammal Presence in a Tropical Forest, in: European Conference in Complex Systems. Bibliografía 131 Fernández, N., Maldonado, C., Gershenson, C., 2014b. Information Measures of Complexity, Emergence, Self-organization, Homeostasis, and Autopoiesis, in: Prokopenko, M. (Ed.), Guided Self-Organization: Inception SE - 2, Emergence, Complexity and Computation. Springer Berlin Heidelberg, pp. 19–51. doi:10.1007/978-3-642-53734-9_2 Fernández, N., Marcano-Valero, G., Terán, O., Aguilar, J., Gershenson, C., 2014c. Modeling and Specification of the Aquatic Ecological Emergence using Genetic Programming, in: XL Conferencia Latinoamerican En Informática. Fernández, N., Ramírez, A., Solano, F., 2005. Physico-Chemical Water Quality Indices. BISTUA 2, 19–30. Fernández, N., Villate, C., Terán, O., Aguilar, J., Gershenson, C., 2014d. Comparative Complexity Among Aquatic Ecosystems in a Latitudinal Gradient, in: European Conference in Complex Systems. Froese, T., Stewart, J., 2010. Life After Ashby: Ultrastability and the Autopoietic Foundations of Biological Autonomy. Cybern. Hum. Knowing 17, 7–50. Froese, T., Virgo, N., Izquierdo, E., 2007. Autonomy : a review and a reappraisal Autonomy : a review and a reappraisal. Differences 455–464. Garciandía, J., 2005. Pensar Sistémico: Una Introducción al pensamiento sistémico. Universidad Javeriana, Bogotá. Garrard, G.E., Mccarthy, M.A., Williams, N.S.G., Bekessy, S.A., Wintle, B.A., 2013. A general model of detectability using species traits. Methods Ecol. Evol. 4, 45–52. Georgé, J.-P., Peyruqueou, S., Régis, C., Glize, P., Demazeau, Y., Pavón, J., Corchado, J., Bajo, J., 2009. Experiencing Self-adaptive MAS for Real-Time Decision Support Systems, in: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (Eds.), 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). Advances in Intelligent and Soft Computing., Advances in Soft Computing. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 302–309. doi:10.1007/978-3-642-00487-2 Gershenson, C., 2002. Classification of Random Boolean Networks, in: Standish, R.K., Bedau, M.A., Abbass, H.A. (Ed.), Artificial Life VIII: Proceedings of the Eight International Conference on Artificial Life. MIT Pres, Cambridge, MA, pp. 1–8. Gershenson, C., 2002. Contextuality: A philosophical paradigm, with applications to philosophy of cognitive science, POCS Essay, COGS. Gershenson, C., 2004a. Introduction to random Boolean networks, in: Bedau, M., Husbands, P., Hutton, T., Kumar, S., Suzuki, H. (Eds.), Workshop and Tutorial 132 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Proceedings, Ninth International Conference on the Simulation and Synthesis of Living Systems (ALife IX). Boston, MA, pp. 160–173. Gershenson, C., 2004b. Updating schemes in random Boolean networks: Do they really matter?, in: Pollack, J., Bedau, M., Husbands, P., Ikegami, T., Watson, R.. (Eds.), Artificial Life IX Proceedings of the Ninth International Conference on the Simulation and Synthesis of Living Systems. MIT Press, pp. 238–243. Gershenson, C., 2005. A General Methodology for Designing Self-Organizing Systems. Gershenson, C., 2007. Design and Control of Self-organizing Systems. CopIt ArXives, Mexico. , México. Gershenson, C., 2010. Computing Networks: A General Framework to Contrast Neural and Swarm Cognitions. Paldyn, J. Behav. Robot. 1, 147–153. Gershenson, C., 2011. Facing Complexity : Prediction vs . Adaptation. Complexity. Gershenson, C., 2011. The sigma profile: A formal tool to study organization and its evolution at multiple scales. Complexity 16, 37–44. Gershenson, C., 2012a. Guiding the self-organization of random Boolean networks. Theory Biosci. 131, 181–191. Gershenson, C., 2012b. The world as evolving information, in: Minai, A., Braha, D., Bar-Yam, Y. (Eds.), Unifying Themes in Complex Systems. Springer Berlin / Heidelberg, Berlin, pp. 100–115. Gershenson, C., 2013a. Information and Computation. Gershenson, C., 2013b. The implications of interactions for science and philosophy. Found. Sci. 18, 781–790. Gershenson, C., 2014. Requisite Variety, Autopoiesis, and Self-organization, in: WOSC (Ed.), 16th Congress of the World Organization of Systems and Cybernetics. WOSC, Ibagué, pp. 45–52. Gershenson, C., Fernández, N., 2012a. Complexity and information: Measuring emergence, self-organization, and homeostasis at multiple scales. Complexity 18, 29–44. Gershenson, C., Fernández, N., 2012b. Complexity and Information: Measuring Emergence, Self-organization, and Homeostasis at Multiple Scales. Arxiv Prepr. arXiv12052026 1– 23. Bibliografía 133 Gershenson, C., Heylighen, F., 2003. When can we call a systems self-organizing?, in: Banzhaf, W., Ziegler, J., Christaller, T., Dittrich, P., Kim, J. (Eds.), Advances in Artificial Life, Lecture Notes in Computer Science. pringer, Berlin / Heidelberg, pp. 606–612. Gershenson, C., Prokopenko, M., 2011. Complex networks. Artif. Life 17, 259–61. doi:10.1162/artl_e_00037 Gershenson, C., Rosenblueth, D.A., 2012. Self-organizing traffic lights at multiple-street intersections. Complexity 17, 23–39. Gyekye, K., 1974. Aristotle and a Modern Notion of Predication. Notre Dame J. Form. Log. Habiba, T., Berger-Wolf, Y., n.d. Theoretic Measures for Idenfying Effective Blockers of Spreading Processes in Dy-namic Networks, in: 6th International Workshop on Mining and Learning with Graphs. Helsinki, Finland. Haken, H., 1989. Information and Self-Organization: A Macroscopic Approach to Complex Systems. Am. J. Phys. doi:10.1119/1.15809 Hamming, R.W., 1950. Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147– 160. doi:10.1002/j.1538-7305.1950.tb00463.x Hausser, J., Strimmer, K., 2012. Entropy . Hedrih, K., 2007. Leonhard Euler (1707-1783) and Rigid Body Dynamics. Sci. Tech. Rev. LVII, 3–11. Heylighen, F., 2000. Evolutionary Transitions: how do levels of complexity emerge? Complexity 6, 53–57. doi:10.1.1.31.8679 Heylighen, F., 2011. Complexity and self-organization. Encycl. Libr. Inf. Sci. 1–20. doi:10.1063/1.871666 Holzbecher, E., 2007. Environmental Modeling Using MATLAB®. Springer, Berlin/Heildelberg. Holzer, R., de Meer, H., 2011. Methods for approximations of quantitative measures in self- organizing systems, in: Bettstetter, C., Gershenson, C. (Eds.), Self-Organizing Systems, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1–15. doi:10.1007/978-3-642-19167-1 Hugues, J., 2012. R package "CellularAutomaton." Iba, T., 2011. An Autopoietic Systems Theory for Creativity . Procedia - Soc. Behav. Sci. 2, 6610–6625. 134 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Jennings, N.R., Sycara, K., Wooldridge, M., 1998. A Roadmap of Agent Research and Development. Auton. Agents MultiAgent Syst. 1, 7–38. Jennings, N.R., Wooldridge, M.J., 1995. Applying Agent Technology. Appl. Artif. Intell., Appl. Artif. Intell. (USA) 9, 357–369. Kamada, T., Kawai, S., 1989. An algorithm for drawing general undirected graphs. Inf. Process. Lett. doi:10.1016/0020-0190(89)90102-6 Kauffman, S.A., 1969. Metabolic stability and epigenesis in randomly constructed genetic nets. J. Theor. Biol. 22, 437–467. doi:10.1016/0022-5193(69)90015-0 Kauffman, S.A., 2000. Investigations. Oxford University Press, USA. Kaufmann, S., 1993. The origins of order, Oxford University Press. Oxford University Press. Koza, J.R., 1994. Introduction to genetic programming, in: Kinnear, Jr., K.E. (Ed.), Advances in Genetic Programming. MIT Press, pp. 21–42. doi:doi:10.1145/1388969.1389057 Koza, J.R., 1994. Genetic programming as a means for programming computers by natural selection. Stat. Comput. 4, 87–112. Koza, J.R., 1995. Hidden Order: How Adaptation Builds Complexity. Artif. Life. doi:10.1162/artl.1995.2.333 Koza, J.R., Poli, R., 2003. A Genetic Programming Tutorial. Introd. Tutorials Optim. Search Decis. Support. Kruja, E., Marks, J., Blair, A., Waters, R., 2002. A Short Note on the History of Graph Drawing. Graph Draw., Lecture Notes in Computer Science 2265, 602–606. doi:10.1007/3-540-45848-4 Langton, C.G., 1990. Computation at the edge of chaos: Phase transitions and emergent computation. Phys. D Nonlinear Phenom. 42, 12–37. doi:10.1016/0167-2789(90)90064-V Legendre, P., Legendre, L., 1998. Numerical ecology, Numerical Ecology Second English Edition, Developments in evironmental modelling. Elsevier. doi:10.1021/ic050220j Li, W., Packard, N., 1990. The structure of the elementary cellular automata rule space. Complex Syst. 4, 281–297. Lloyd, S., 2001. Measures of complexity: a nonexhaustive list. Control Syst. IEEE 21. doi:10.1109/MCS.2001.939938 Bibliografía 135 Lopez-Ruiz, R., Mancini, H.L., Calbet, X., 1995. A statistical measure of complexity. Phys. Lett. A 209, 321–326. Luisi, P.L., 2003. Autopoiesis: a review and a reappraisal. Naturwissenschaften 90, 49–59. Luisi, P.L., 2007. The Emergence of Life: From Chemical Origins to Synthetic Biology, Angewandte Chemie International Edition. Cambridge University Press. doi:10.1002/anie.200685454 Luque, B., Solé, R.V., 1997. Controlling chaos in Kauffman networks. Eur Lett 37, 597–602. Luque, B., Solé, R.V., 1998. Stable core and chaos control in random Boolean networks. J Phys A Math Gen 31, 1533–1537. Mackenzie, D.I., Royle, J.A., 2005. Designing occupancy studies: General advice and allocating survey effort. J. Appl. Ecol. Madhusudan, H.R., 2010. 1610: The year that improved our 'vision. Resonance 15, 948–953. doi:10.1007/s12045-010-0104-7 Martínez, G.J., Adamatzky, A., Alonso-Sanz, R., 2012. Complex dynamics of elementary cellular automata emerging from chaotic ruleS. Int. J. Bifurc. Chaos 22, 1250023. doi:10.1142/S021812741250023X Martius, G., Herrmann, J., Der, R., 2007. Guided Self-organisation for Autonomous Robot Development , in: Almeida e Costa, F., Rocha, L.M., Costa, E., Harvey, I., Coutinho, A. (Eds.), Advances in Artificial Life, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 766–775. doi:10.1007/978-3-540-74913-4 Maturana, H., 2011. Ultrastability...Autopoiesis? Reflective Response to Tom Froese and John Stewart. Cybern. Hum. Knowing 18, 143–152. Maturana, H., Varela, F., 1980. Autopoiesis and Cognition: The realization of living. Reidel Publishing Company, Dordrecht. Mitchell, M., 2009. Complexity: A Guided Tour, Complexity. Oxford University Press, USA. doi:10.1080/09602011.2012.701865 Mitchell, M., Crutchfield, J.P., Hraber, P.T., 1994. Dynamics computation and the edge of chaos: A re-examination. St. FE Inst. Stud. Sci. Complexity proceedings Vol., Santa Fe Institute Proceedings, Volume 19 19, 497–513. doi:10.1016/0167-2789(90)90064-V Moreno, A., Etxeberria, A., Umerez, J., 2008. The autonomy of biological individuals and artificial models. Biosystems. 91, 309–319. 136 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Morin, E., 1992. From the concept of system to the paradigm of complexity. J. Soc. Evol. Syst. doi:10.1016/1061-7361(92)90024-8 Müller, J., Et Al., 1997. Towards agent systems engineering. Data Knowl. Eng. 23, 217–245. doi:10.1016/S0169-023X(97)00013X Müssel, C., Hopfensitz, M., Kestler, H.A., 2010. BoolNet – an R package for generation, reconstruction and analysis of Boolean networks. Bioinformatics 26, 1378–1380. Newman, M.E.J., 2003. The Structure and Function of Complex Networks. SIAM Rev. doi:10.1137/S003614450342480 Nicolis, G., Prigogine, I., 1977. Self-Organization in Non-Equilibrium Systems: From Dissipative Structures to Order Through Fluctuations. Wiley, Chichester. Nicolis, G., Prigogine, I., 1989. Exploring Complexity: An Introduction, New York NY WH Freeman. W.H. Freeman. doi:10.1063/1.2810725 Niklas Luhmann, 1995. Social Systems . Standford University Press. Parrott, L., 2005. Quantifying the complexity of simulated spatiotemporal population dynamics. Ecol. Complex. 2, 175–184. Parrott, L., 2010. Measuring ecological complexity. Ecol. Indic. 10, 1069–1076. Perozo, N., 2011. Modelado multiagente para sistemas emergentes y auto-organizados. Universidad de los Andes. Perozo, N., Aguilar, J., Terán, O., 2008. Proposal for a Multiagent Architecture for Self- Organizing Systems (MASOS), in: PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics . Springer-Verlag , Berlin, Heidelberg, pp. 434–4390. Perozo, Niriaska, Aguilar, José, Terán, O, Molina, H., 2012a. A Verification Method for MASOES. IEEE Trans. Syst. Man, Cybern. Part B, IEEE Soc. 99. doi:10.1109/TSMCB.2012.2199106 Perozo, Niriaska, Aguilar, José, Terán, O, Molina, H., 2012b. Un Modelo Afectivo para la Arquitectura Multiagentes para Sistemas Emergentes y Auto-organizados (MASOES). Rev. Técnica Ing. Univ. del Zulia 35, 80–90. Pimm, S.L., 1991. The Balance of Nature? The University of Chicago Press, Chicago. Pond, F., 2006. The Evolution of Biological Complexity. NCSE 26, 22, 27–31. Bibliografía 137 Prokopenko, M., 2009a. Information and Self-Organization: A Macroscopic Approach to Complex Systems, (3rd enlarged ed.). H. Haken. (2006, Springer.) euro79.95 (hardcover), 262 pages. ISBN: 978-3-540-33021-9. Artif. Life 15, 377–383. doi:10.1162/artl.2009.Prokopenko.B4 Prokopenko, M., 2009b. Guided self-organization. HFSP J. 3, 287–289. Prokopenko, M., Boschetti, F., Ryan, A.J., 2009. An information-theoretic primer on complexity, self-organization, and emergence. Complexity 15, 11–28. doi:10.1002/cplx Proulx, R., Parrott, L., 2008. Measures of structural complexity in digital images for monitoring the ecological signature of an old-growth forest ecosystem. Ecol. Indic. 8, 270–284. Ramírez, A., Restrepo, R., Fernández, N., 2003. Evaluación de Impactos Ambientales Causados por Vertimientos Sobre Aguas Continentales. Ambient. y Desarro. 2, 56–80. Randerson, P., Bowker, D., 2008. Aquatic Ecosystem Simulator (AES) - a learning resource for biological science students. Rhodes, J., 2009. Applications of Automata Theory and Algebra via the Mathematical Theory of Complexity to Finite-State Physics, Biology, Philosophy,and Games. World Scientific, Singapore. Rivas Lado, A.L., 2001. Una hipotesis innecesaria. Laplace y el sistema del mundo. Agora 20, 183–214. Ross Ashby, W., 1947a. Principles of the self-organizing dynamic system. J. Gen. Psychol. 37, 125–128. Ross Ashby, W., 1947b. The Nervous System as Physical Machine: with Special Reference to the Origin of Adaptive Behaviour. Mind 56. Ross Ashby, W., 1956. An Introduction to Cybernetics, New York. Ross Ashby, W., 1960a. Design for a Brain: The Origin of Adaptive Behaviour. Chapman & Hall, London. Ross Ashby, W., 1960b. Design for a Brain - The origin of adaptive behavior, Cybernetics. Chapman & Hall. doi:SYST ASHB Royle, J.A., 2006. Site occupancy models with heterogeneous detection probabilities. Biometrics 62, 97–102. 138 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Ruiz-Mirazo, K., Moreno, A., 2004. Basic autonomy as a fundamental step in the synthesis of life. Artif. Life 10, 235–259. doi:10.1162/1064546041255584 Rundell, R.J., Price, T.D., 2009. Adaptive radiation, nonadaptive radiation, ecological speciation and nonecological speciation. Trends Ecol. Evol. 24, 394–399. Scheinerman, E., 1996. Invitation to Dynamical Systems. Prentice Hall , Upper Saddle River, N.J. Schluter, D., 1996. Ecological causes of adaptative radiation. Am. Nat. 148, S40–S64. Schweitzer, F., 1997a. Self-Organization of Complex Structures: From Individual to Collective Dynamics - Some Introductory Remarks, in: Schweitzer, F. (Ed.), Self- Organization of Complex Structures: From Individual to Collective Dynamics. Gordon and Breach, pp. xix–xxiv. Schweitzer, F., 1997b. Active Brownian Particles: Artificial Agents in Physics, in: Schimansky-Geier, L., Pöschel, T. (Eds.), Stochastic Dynamics, Lecture Notes in Physics. Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, pp. 358–371. doi:10.1007/BFb0105623 Seidl, D., 2004. Luhmann ' s theory of autopoietic social systems Ludwig-Maximilians- Universität München. Munich Bus. Res. 2, 1–28. Shalizi, C., Crutchfield, J., 2001. Computational mechanics: Pattern and prediction, structure and simplicity. J. Stat. Phys. 816–879. Shalizi, C., Shalizi, K., Haslinger, R., 2004. Quantifying Self-Organization with Optimal Predictors. Phys. Rev. Lett. 93, 118701. doi:10.1103/PhysRevLett.93.118701 Shalizi, C.R., 2001. Causal Architecture, Complexity and Self-Organization in Time Series and Cellular Automata. Time University, 182. Shannon, C.E., 1948. The mathematical theory of communication. 1963. MD Comput. Comput. Med. Pract., The mathematical theory of communication 14, 306–17. doi:10.1145/584091.584093 Smith, B.S., Wang, J., Egerstedt, M.B., 2008. Persistent formation control of multi-robot networks, in: Proceedings of the IEEE Conference on Decision and Control. pp. 471– 476. Tang, H., Arnold, R.J., Alves, P., Xun, Z., Clemmer, D.E., Novotny, M. V., Reilly, J.P., Radivojac, P., 2006. A computational approach toward label-free protein quantification using predicted peptide detectability, in: Bioinformatics. Bibliografía 139 Teran, O., 2001. Emergent Tendencies in Multi-Agent-based Simulations using Constraint- based Methods to Effect Practical Proofs over Finite Subsets of Simulation Outcomes Table of Contents, Facilities. Manchester Metropolitan University. Ulanowicz, R.E., 2004. Quantitative methods for ecological network analysis. Comput. Biol. Chem. 28, 321–339. Ulanowicz, R.E., 2011. 9.04 - Quantitative Methods for Ecological Network Analysis and Its Application to Coastal Ecosystems, in: Wolanski, E., McLusky, D. (Eds.), Treatise on Estuarine and Coastal Science. Academic Press, pp. 35–57. doi:http://dx.doi.org/10.1016/B978-0-12-374711-2.00904-9 Urrestarazu, H., 2011. Autopoietic systems: A generalized explanatory approach - Part 1. Constr. Found. 6, 307–324. Varela, F., 1979. Principles of Biological Autonomy. Elsevier North Holland., New York, NY. Varela, F.G., Maturana, H.R., Uribe, R., 1974. Autopoiesis: the organization of living systems, its characterization and a model. Curr. Mod. Biol. 5, 187–196. Verlinde, E., 2011. On the origin of gravity and the laws of Newton. J. High Energy Phys. 2011. Villate, C., Gershenson, C., Fernández, N., 2013. Exploring Complexity with a Function for R:Comin, in: European Conference in Complex Systems. Von Bertalanfy, L., 1968. General System Theory: Foundations, Development, Applications. George Brazilier, New York. Walker, L., 2005. Margalef y la sucesión ecológica. Ecosistemas 14, 66–78. Weeks, A., 2010. Neutral Emergence and Coarse Graining Cellular Automata. University of York. Wetzel, R.G., 2001. Limnology: Lake and River Ecosystems, Journal of Phycology. Acedemic Press. doi:10.1046/j.1529-8817.2001.37602.x Wiener, N., 1948. Cybernetics; or, Control and Communication in the Animal and the Machine. Wiley and Sons, New York. Williams, H.T.P., 2006. Homeostatic adaptive networks. Computing. University of Leeds. Wolfram, S.A., 1984. Universality and complexity in cellular automata. Phys. D 10, 1–35. Wolfram, S.A., Gad-el-Hak, M., 2003. A New Kind of Science. Appl. Mech. Rev. 56, 18–20. 140 Modelación Multi-agentes de Sistemas Dinámicos- Un Enfoque 𝑨𝑬𝑪𝑯𝑨 Wolpert, D.H., Macready, W.G., 1999. Self-dissimilarity: An empirically observable complexity measure, in: Bar-Yam, Y. (Ed.), Unifying Themes in Complex Systems: Proceedings of the First International Conference on Complex Systems. Westview Press, Boulder, CO,USA, pp. 626–643. Wooldridge, M., Müller, J., Tambe, M., 1996. Agent theories, architectures, and languages: A bibliography. Intell. Agents II Agent Theor., Lecture Notes in Computer Science 1037, 408–431–431. Wooldridge, M.J., Jennings, N.R., 1995. Intelligent Agents: Theory and Practice. Knowl. Eng. Rev., Knowl. Eng. Rev. (UK) 10, 115–152. Wuensche, A., 1998. Discrete dynamical networks and their attractor basins, in: Standish, R, Henry, B., Watt, S., Marks, R., Stocker, R., Green, D, Keen, S., Bossomaier, T. (Ed.), Complex Systems '98. Sydney, Australia, pp. 3–21. Wuensche, A., Lesser, M.., 1992. The Global Dynamics of Cellular Automata An Atlas of Basin of Attraction Fields of One-Dimensional Cellular AutomataNo Title. Addison- Wesley, Reading, MA. Zeigler. Bernard, Kim, T., Praehofer, H., 2000. Theory of Modeling and Simulation, 2nd ed. ACADEMIC PRESS , San Diego. Zenil, H., 2009. Compression-based investigation of the dynamical properties of cellular automata and other systems 28. Zubillaga, D., Cruz, G., Aguilar, L., Zapotécatl, J., Fernández, N., Aguilar, J., Rosenblueth, D., Gershenson, C., 2014. Measuring the Complexity of Self-Organizing Traffic Lights. Entropy 16, 2384–2407. doi:10.3390/e16052384
1910.13905
1
1910
2019-10-30T14:49:14
Interplay between Topology and Social Learning over Weak Graphs
[ "cs.MA", "cs.SI" ]
We consider a social learning problem, where a network of agents is interested in selecting one among a finite number of hypotheses. We focus on weakly-connected graphs where the network is partitioned into a sending part and a receiving part. The data collected by the agents might be heterogeneous. For example, some sub-networks might intentionally generate data from a fake hypothesis in order to influence other agents. The social learning task is accomplished via a diffusion strategy where each agent: i) updates individually its belief using its private data; ii) computes a new belief by exponentiating a linear combination of the log-beliefs of its neighbors. First, we examine what agents learn over weak graphs (social learning problem). We obtain analytical formulas for the beliefs at the different agents, which reveal how the agents' detection capability and the network topology interact to influence the beliefs. In particular, the formulas allow us to predict when a leader-follower behavior is possible, where some sending agents can control the mind of the receiving agents by forcing them to choose a particular hypothesis. Second, we consider the dual or reverse learning problem that reveals how agents learned: given a stream of beliefs collected at a receiving agent, we would like to discover the global influence that any sending component exerts on this receiving agent (topology learning problem). A remarkable and perhaps unexpected interplay between social and topology learning is observed: given $H$ hypotheses and $S$ sending components, topology learning can be feasible when $H\geq S$. The latter being only a necessary condition, we examine the feasibility of topology learning for two useful classes of problems. The analysis reveals that a critical element to enable faithful topology learning is the diversity in the statistical models of the sending sub-networks.
cs.MA
cs
Interplay between Topology and Social Learning over Weak Graphs Vincenzo Matta, Virginia Bordignon, Augusto Santos, and Ali H. Sayed 1 9 1 0 2 t c O 0 3 ] A M . s c [ 1 v 5 0 9 3 1 . 0 1 9 1 : v i X r a Abstract We consider a distributed social learning problem, where a network of agents is interested in selecting one among a finite number of hypotheses. We focus on weakly-connected graphs where the network is partitioned into a sending part and a receiving part. The data collected by the agents might be heterogeneous, meaning that different sub-networks might be governed by different statistical models. For example, some sub-networks might intentionally generate data from a fake hypothesis in order to influence other agents. This work focuses on a two-step diffusion strategy where each agent: i) updates individually its belief function using its private data; ii) computes a new belief function by exponentiating a linear combination of the logarithmic beliefs of its neighbors. We provide two main contributions. First, we examine what agents learn over weak graphs (social learning problem). We obtain closed-form analytical formulas for the limiting beliefs at the different agents, which allow us to examine in some detail the learning performance of each agent. These formulas reveal how the agents' detection capability and the network topology interact to influence the asymptotic beliefs of the agents. In particular, the formulas allow us to predict if and when a leader-follower behavior is possible, where some sending agents can control the mind of the receiving agents by forcing them to choose a particular hypothesis. Second, we consider the dual or reverse learning problem that reveals how agents learned: given a stream of beliefs collected at a receiving agent, we would like to discover the global influence that any sending component exerts on this receiving agent (topology learning problem). A remarkable and perhaps unexpected interplay between social and topology learning is observed: given H hypotheses and S sending components, topology learning can be feasible when H ≥ S. The latter being only a necessary condition, we then examine the feasibility of topology learning for two useful classes of problems. The conducted analysis reveals that a critical element to enable faithful topology learning is a sufficient degree of diversity in the statistical models of the sending sub-networks. V. Matta is with DIEM, University of Salerno, via Giovanni Paolo II, I-84084, Fisciano (SA), Italy (e-mail: [email protected]). V. Bordignon and A. H. Sayed are with the ´Ecole Polytechnique F´ed´erale de Lausanne EPFL, School of Engineering, CH-1015 Lausanne, Switzerland (e-mails: {virginia.bordignon, ali.sayed}@epfl.ch). A. Santos was with the Adaptive System Laboratory, EPFL, CH-1015 Lausanne, Switzerland (e-mail: [email protected]). This work was supported in part by grant 205121-184999 from the Swiss National Science Foundation (SNSF). An early version with partial results from this paper was presented at ICASSP [1]. October 31, 2019 DRAFT 2 Social learning, topology learning, weakly-connected networks, Bayesian update, diffusion strategy. Index Terms I. INTRODUCTION I n a social learning problem, several agents linked through a network topology form their individual opinions about a phenomenon of interest (learning process) by observing the beliefs of their neighboring agents (social interaction) [2] -- [8]. One relevant paradigm for social learning is that of weakly-connected graphs, which are prevalent in social networks and have been studied in [9] -- [11]. Under this model, there are two categories of sub-networks: the sending sub-networks, which feed information to the receiving sub-networks without getting back information from them. This scenario is common over social networks. For example, a celebrity may have a large number of followers, whose individual opinions are not necessarily followed by the celebrity. Another example is that of media networks, which promote the emergence of opinions by feeding data to users without paying attention to feedback from them. This work addresses two fundamental challenges arising in the study of social learning problems. One challenge is to understand the fundamental mechanism and implications of specific social learning strategies on opinion formation. In particular, over weak graphs, it is critical to understand how the receiving agents are influenced by the sending sub-networks. It is not difficult to envisage that the network topology plays an important role in determining the opinion formation. This motivates the second problem, which can be regarded as a dual learning problem. Given observation of the receiving agents' behavior, we want to establish whether it is possible to learn the strength of connections (weighted topology) from the sending components to the receiving agents. This second question is useful in identifying the main sources for opinion formation over a network. A. Related Work The goal of social learning is to let each individual agent create its own opinion (formally, choose one from among a finite set of hypotheses) through local consultation with its neighbors. One classical distinction for social learning models is Bayesian vs. non-Bayesian models. In the former category, the belief of each agent is obtained by computing posterior distributions through Bayes' rule [2] -- [4], [12] -- [15]. In order to accomplish this task, each agent must have some detailed knowledge of the other agents' likelihoods, and some prior knowledge about the phenomenon of interest. In the latter category, this level of knowledge is not assumed and the agents implement suitable distributed algorithms to interact with their neighbors and to aggregate their beliefs into their own [9] -- [11], [16] -- [22]. The present work considers non-Bayesian learning. There are many useful implementations for non-Bayesian learning. The implementations differ in terms of the rule the agents adopt to update their beliefs. One first distinction concerns the type of distributed strategy. October 31, 2019 DRAFT 3 In particular, we can distinguish between consensus [19], [20] or diffusion [9] -- [11], [21], [22] implementations. A second distinction regards the way the beliefs are combined. In [10], [11], [19], they are combined linearly, while a linear combination of the logarithmic beliefs is used in [21], [22]. This latter form is motivated by the fact that, in many detection problems, the best detection statistic is given by the linear combination of log-likelihoods and not of likelihoods. As a matter of fact, using the log-belief combination can help achieve an improved (i.e., faster) learning rate [22]. Once a particular learning rule has been chosen, the behavior of opinion formation will depend heavily on the type of network where the information propagates. In this respect, the majority of prior works in the literature focus on strongly-connected networks. In these networks, there always exist paths linking any two agents in both directions (which makes them connected) and, in addition, at least one agent has a self-loop and places some partial trusts in its own data (which makes them strongly connected). Under a homogeneous setting where the underlying true hypothesis is the same for the entire network, it has been shown that over strongly-connected networks all agents are able to discover and agree on the true hypothesis. This result is available in [11], [19] for diffusion and consensus rules with linear belief combination, and in [22] for the diffusion rule with linear log-belief combination. There are results available also for the heterogeneous setting, where different agents might have different data models, different likelihoods, and promote different opinions across the network. In particular, the diffusion rule with linear log-belief combination with a doubly-stochastic combination matrix is considered in [21], where it is shown that, over a strongly-connected network, all agents reach a common opinion, by minimizing cooperatively the sum of Kullback-Leibler (KL) divergences across the network. In contrast, the important case of weakly-connected networks has received limited attention and was addressed more recently in [9], [10] by using the linear-belief-combination rule. Several interesting phenomena arise over weak graphs, which are absent from strongly-connected networks. The main difference in this work from [9], [10] is that we now consider the following general setting: i) diffusion-type algorithms with linear combination of log-beliefs (as opposed to the beliefs themselves), ii) heterogeneous data and inference model, and iii) inverse topology learning. B. Main Results This work leads to two main contributions. First, we characterize (Theorem 1) the limiting (as learning time elapses) agents' belief through analytical formulas that depend in a transparent manner on inferential descriptors (Kullback-Leibler divergences) and network descriptors (limiting combination matrix power). Some revealing behaviors can be deduced from these formulas. For example, we will be able to characterize a mind-control effect in terms of the interplay between the detection capacity of each agent and the centrality of the different agents. We will see that useful analogies arise with what has been observed in [10]. For example, some of the effects shown in [10] will now be shown to hold under greater generality since our formulas can be obtained by October 31, 2019 DRAFT 4 relaxing some assumptions used in [10], in particular, the all-truths-are-equal assumption, and the prevailing- signal assumption. However, we will observe also some remarkable distinctions with respect to [10]. For instance, we will observe that the individual belief of each receiving agent will necessarily collapse to (or concentrate at) a single hypothesis (which might be different across the agents). This is in contrast with [10], where the beliefs of the receiving agents could end up assigning some probabilities to more than one hypothesis. The reason for this difference in behavior arises from the difference in the combination rule used in this work in comparison to [10]. The second contribution concerns the topology learning problem. We are interested to learn the topology linking the receiving agents to the sending components. This question is interesting because it would then allow us to identify the main sources of information in a network and how they influence opinion formation. Nevertheless, the inverse topology problem is challenging because we will assume that we can only observe the beliefs evolving at the receiving agents. In particular, we will be able to recover some macroscopic topology information, in terms of the limiting weights that each receiving agent sees from each sending component. We call this a macroscopic information since these weights incorporate: i) the global effect coming from all agents belonging to a sending component, and ii) the effect of intermediate receiving agents linked to the receiving agent under consideration. The relevance in estimating these global weights relies on the fact that the limiting beliefs of the receiving agents depend solely on this aggregate information. We will establish conditions under which topology inference becomes feasible. More specifically, given H hypotheses and S sending components, under the assumption of homogeneous statistical models within each sending component, we will ascertain that a necessary condition to achieve consistent topology learning is (Lemma 1): H ≥ S (1) Once established a necessary condition, we will examine some useful models to see whether topology learning can be in fact achieved. We consider first a structured Gaussian model where: i) the true underlying (Gaussian) distributions are distinct across the sending sub-networks; and ii) the (Gaussian) likelihoods are equal across the sending sub-networks, and contain the true distributions. For this setting, we will show in Theorem 2 that topology learning is feasible only when S = 2. We then recognize that one fundamental element for topology learning is the diversity between the sending sub-networks. Adding this further element, we will establish in Theorem 3 that the problem is feasible for any S provided that (1) holds, and even under more general (e.g., non-Gaussian) models. In summary, we remark that there are two learning problems coexisting in our work: a social learning problem and a topology learning problem. The former is the primary, or direct inferential problem that the agents are deployed for. The latter is the dual, or reverse problem, which is in fact based on observation of the output (the October 31, 2019 DRAFT 5 beliefs) of the primary learning problem. One useful conclusion stemming from our analysis is to reveal some unexpected interplay between these two coexisting learning problems -- see Sec. VIII further ahead. Notation. We use bold font notation for random variables, normal fonts for their realizations. Capital letters are generally used for matrices, whereas small font letters for vectors or scalars. Given a matrix M, the symbol M† denotes its Moore-Penrose pseudoinverse. The L× L identity matrix is denoted by IL. Likewise, the L× 1 vector of all ones is denoted by 1L. The notation "a.s." signifies "almost-surely". A. Data Model and Inference II. BACKGROUND We consider a network of N agents that collect streaming data from the environment. Formally, the random variable ξk,i ∈ Xk denotes the data at agent k ∈ {1, 2, . . . , N} collected at time i ∈ N. The data are assumed to be independent over time, whereas they can be dependent across agents (i.e., over space). We work under a heterogeneous setting. First, the space where the data are defined, Xk, is allowed to vary across agents. For example, the data at different agents can be random vectors of different sizes. In the social learning context, this scenario is not that uncommon since different types of attributes can be observed by different users across the network. Second, the data ξk,i are assumed to be generated according to certain distributions fk(ξ), which are allowed to vary across the agents as well, namely, for k = 1, 2, . . . , N: ξk,i ∼ fk [true distribution] (2) This type of heterogeneity can arise in practice for several reasons, for example, some agents may intentionally inject fake data to let the other agents have a bias towards fake hypotheses. Based on the available data {ξk,i}, the network agents aim to solve an inferential problem that consists in choosing one state of nature from among a finite collection Θ = {1, 2, . . . , H}, with H denoting the number of possible hypotheses. To solve such inferential problem, the agents rely on a family of likelihood functions. Specifically, for k = 1, 2, . . . , N, the likelihood function of agent k is denoted by: (3) We will often write Lk(θ) instead of Lk(ξθ) for simplicity. In our treatment, we assume that the data can be modeled either as continuous or discrete random variables, with the same (continuous or discrete) nature ξ ∈ Xk, θ ∈ Θ [likelihoods] Lk(ξθ), across all agents. Accordingly, both the true distributions and the likelihoods will be either probability density or probability mass functions, depending on the considered type of random variables. We remark that the considered model includes the possibility that the true distribution fk(ξ) is equal to a certain likelihood Lk(ξθ0) (as assumed, e.g., in [10], [22]) and in this case θ0 can be considered as the true underlying hypothesis. More generally (e.g., in [21]) the true distribution fk(ξ) is not equal to any of the likelihoods Lk(ξθ), which might happen when the agents have an approximate knowledge of the statistical October 31, 2019 DRAFT models, and even the likelihood more similar to the true distribution can be a mismatched version thereof. In order to quantify the dissimilarity between the true distribution and a certain likelihood, we will use the Kullback-Leibler (KL) divergence [23]: 6 D[fkLk(θ)] (cid:44) Efk(cid:20)log fk(ξk) Lk(ξkθ)(cid:21) , k = 1, 2, . . . , N. (4) We remark that we have written ξk in place of ξk,i to highlight identical distributions across time, and that the expectation is computed under the actual distribution of ξk, i.e., under fk. In the forthcoming treatment we use the following regularity condition [21], [22]. Assumption 1 (Finiteness of KL Divergences): All the KL divergences in (4) are well-posed, namely, for all k = 1, 2, . . . , N, and all θ ∈ Θ we have that: D[fkLk(θ)] < ∞ (5) (cid:3) Remark 1 (Likelihood Support): Assumption 1 implies that the likelihood Lk(ξk,iθ) can be equal to zero (cid:3) only for an ensemble of realizations ξk,i having zero probability under the distribution fk. B. Social Learning Algorithm Motivated by the diffusion strategy in [10], [11] for opinion formation over social networks, in this article we consider the useful variations studied in [21], [22]. The learning procedure employs a two-step algorithm that can be described as follows. For each admissible hypothesis θ ∈ Θ at time i, each agent k uses its own fresh private observation, ξk,i, to compute the local likelihood Lk(ξk,iθ). Using this likelihood, agent k updates its local belief, µk,i−1(θ), obtaining an intermediate belief ψk,i(θ) through the following update rule: ψk,i(θ) = µk,i−1(θ)Lk(ξk,iθ) )Lk(ξk,iθ µk,i−1(θ (cid:48) (cid:88)θ(cid:48)∈Θ (cid:48) ) (6) Then, agent k aggregates the intermediate beliefs received from its neighbors through the following combination rule (the division by the denominator term in (7) is meant to ensure that µk,i(θ) is a probability measure with its entries adding up to one): µk,i(θ) = exp(cid:40) N(cid:88)(cid:96)=1 exp(cid:40) N(cid:88)(cid:96)=1 (cid:88)θ(cid:48)∈Θ a(cid:96)k log ψ(cid:96),i(θ)(cid:41) )(cid:41) a(cid:96)k log ψ(cid:96),i(θ (cid:48) (7) where a(cid:96)k is the nonnegative combination weight that agent k uses to scale the intermediate log-belief received from agent (cid:96). It is assumed that a(cid:96)k is equal to zero if k does not receive information from (cid:96), which means October 31, 2019 DRAFT that agent k can combine only intermediate beliefs received from its neighbors. When collected into a combi- nation matrix A (with ((cid:96), k)-entry equal to a(cid:96)k), these combination weights are assumed to obey the standard requirements that make A a left-stochastic matrix, namely, we have that: 7 A (cid:62)1N = 1N ⇔ N(cid:88)(cid:96)=1 a(cid:96)k = 1, ∀k = 1, 2, . . . , N. (8) The value of µk,i(θ) provides an estimate for the likelihood by agent k at time i that the true hypothesis value is θ. We remark that, differently from [10], the second step in (7) combines linearly the logarithm of the intermediate beliefs, log ψ(cid:96),i(θ), in the neighborhood of agent k. Exponentiation and normalization are used to construct the final belief. We invoke the following standard initial condition, motivated by the fact that, at time i = 0, the agents have no elements to discard any hypothesis [21], [22]. Assumption 2 (Initial Beliefs): All agents start by assigning strictly positive probability mass to all hypotheses, (cid:3) namely, µk,0(θ) > 0 for all θ ∈ Θ and k = 1, 2, . . . , N. Remark 2 (Strict Positiveness of Beliefs): From (6) we see that, if µk,i−1(θ) > 0, then ψk,i(θ) > 0 since Lk(ξk,iθ) > 0 (but for zero-probability sets) -- see Remark 1. Strict positiveness of µk,i(θ) now follows (cid:3) from (7) since the combination weights are nonnegative and convex. III. WEAK GRAPHS In this section, we consider the case of a weak graph (or weakly-connected network), which is defined as follows [9], [10]. The overall network N = {1, 2, . . . N} is divided into S +R disjoint components -- see Fig. 1. The first S sub-networks form the sending part S, whereas the remaining R sub-networks form the receiving part R: N = S ∪ R, S (cid:44) Ns, R (cid:44) NS+r. (9) S(cid:91)s=1 R(cid:91)r=1 We remark that S and R denote the number of sending and receiving components, respectively. They do not denote the cardinalities of S and R, which are instead given by: S = Ns, R = NS+r, (10) S(cid:88)s=1 R(cid:88)r=1 where the notation Nj denotes the number of agents in sub-network Nj. Communication from a sending component to a receiving component is permitted, whereas communication in the reverse direction is forbidden. Communication between sending agents is possible, but a sending sub-network is identified by the following two conditions: i) each sending sub-network is strongly connected [24]; and ii) agents belonging to different sending sub-networks do not communicate with each other. If some sending sub-networks communicate with each other, then they can be blended into a larger sending sub-network. The R receiving sub-networks are all individually assumed to be connected (but not necessarily strongly connected), with communication among the October 31, 2019 DRAFT 8 Fig. 1. One example of weakly-connected network, with sending sub-networks N1 and N2, and receiving sub-networks N3 and N4. R sub-networks being allowed. In particular, we assume that each receiving sub-network is connected to at least one agent in each sending sub-network. Without loss of generality, we assume that the network nodes across the S + R components are listed in increasing order. According to the above description, the combination matrix corresponding to a weakly- connected network admits the following convenient block decomposition [9], [10]: A = 0 AS ASR AR  where the matrix AS = blockdiag {AN1, AN2, . . . , ANS} contains the combination weights within the sending sub-networks, and has a block-diagonal form since communication between sending sub-networks is forbidden. The matrix block ASR contains the combination weights for the communication that takes place from sending agents to receiving agents. The left-bottom matrix block is zero since there are no direct links from the receiving agents to the sending ones. Finally, the matrix block AR contains the combination weights ruling the communication among the receiving agents. Figure 1 offers a graphical illustration of the weakly-connected paradigm. It was shown in [9] that the limiting combination matrix power has the following structure: (11) (12) (13) DRAFT E EW A∞ (cid:44) lim i→∞ Ai = E = blockdiag(cid:110)p(1)1(cid:62) 0 0 E Ω 0  = 0  , NS(cid:111) N2, . . . , p(S)1(cid:62) N1, p(2)1(cid:62) where October 31, 2019 N2<latexit sha1_base64="apOwlPSaog+sD+hSTDPx7xNUKk4=">AAACFHicbVC7TgJBFL2LL8QXamJjM5GYWJFdLLQk2FgZSOSRwEpmhwEmzM5uZmZNyGZ/w9hq7x/Yqa29jf/gHzgLFAKeZJKTc869c3O8kDOlbfvLyqysrq1vZDdzW9s7u3v5/YOGCiJJaJ0EPJAtDyvKmaB1zTSnrVBS7HucNr3RVeo376lULBC3ehxS18cDwfqMYG2ku46P9ZBgHt8k3VKumy/YRXsCtEycGSmUj2rf7KXyXu3mfzq9gEQ+FZpwrFTbsUPtxlhqRjhNcp1I0RCTER7QtqEC+1S58eTqBJ0apYf6gTRPaDRR/07E2Fdq7HsmmV6pFr1U/M9rR7p/6cZMhJGmgkw/6kcc6QClFaAek5RoPjYEE8nMrYgMscREm6LmNs3acWMaKZMMdZJ25Cw2skwapaJzXizVTFkVmCILx3ACZ+DABZThGqpQBwISHuEJnq0H69V6sz6m0Yw1mzmEOVifv/8SovA=</latexit>N3<latexit sha1_base64="Tg3cNi4Q2IaW/AKN0pMZvmbfrW8=">AAACFHicbVC7TgJBFL3rE/GFmtjYTCQmVmQXCi0JNlYGEnkksJLZYYAJs7ObmVkTstnfMLba+wd2amtv4z/4B84ChYAnmeTknHPv3Bwv5Exp2/6yVlbX1jc2M1vZ7Z3dvf3cwWFDBZEktE4CHsiWhxXlTNC6ZprTVigp9j1Om97oKvWb91QqFohbPQ6p6+OBYH1GsDbSXcfHekgwj2+SbinbzeXtgj0BWibOjOTLx7Vv9lJ5r3ZzP51eQCKfCk04Vqrt2KF2Yyw1I5wm2U6kaIjJCA9o21CBfarceHJ1gs6M0kP9QJonNJqofydi7Cs19j2TTK9Ui14q/ue1I92/dGMmwkhTQaYf9SOOdIDSClCPSUo0HxuCiWTmVkSGWGKiTVFzm2btuDGNlEmGOkk7chYbWSaNYsEpFYo1U1YFpsjACZzCOThwAWW4hirUgYCER3iCZ+vBerXerI9pdMWazRzBHKzPXwDFovE=</latexit>N4<latexit sha1_base64="YJhH6kS2i8SMT3edlXdDQ2OOO04=">AAACFHicbVC7SgNBFL3rM8ZXVLCxGQyCVdiNgpYhNlaSgHlAsobZySQZMju7zMwKYdnfEFvt/QM7tbW38R/8A2eTFCbxwMDhnHPvXI4Xcqa0bX9ZS8srq2vrmY3s5tb2zm5ub7+ugkgSWiMBD2TTw4pyJmhNM81pM5QU+x6nDW94lfqNeyoVC8StHoXU9XFfsB4jWBvpru1jPSCYxzdJ5zzbyeXtgj0GWiTOlORLh9Vv9lJ+r3RyP+1uQCKfCk04Vqrl2KF2Yyw1I5wm2XakaIjJEPdpy1CBfarceHx1gk6M0kW9QJonNBqrfydi7Cs18j2TTK9U814q/ue1It27dGMmwkhTQSYf9SKOdIDSClCXSUo0HxmCiWTmVkQGWGKiTVEzm6btuDGNlEmGOkk7cuYbWST1YsE5KxSrpqwyTJCBIziGU3DgAkpwDRWoAQEJj/AEz9aD9Wq9WR+T6JI1nTmAGVifvwJpovI=</latexit>N1<latexit sha1_base64="nRFT06pUrNWj/Ds2PdtE2OyDKJo=">AAACFHicbVC7TgJBFL2LL8QXamJjM5GYWJFdLLQk2FgZSOSRwEpmhwEmzM5uZmZNyGZ/w9hq7x/Yqa29jf/gHzgLFAKeZJKTc869c3O8kDOlbfvLyqysrq1vZDdzW9s7u3v5/YOGCiJJaJ0EPJAtDyvKmaB1zTSnrVBS7HucNr3RVeo376lULBC3ehxS18cDwfqMYG2ku46P9ZBgHt8kXSfXzRfsoj0BWibOjBTKR7Vv9lJ5r3bzP51eQCKfCk04Vqrt2KF2Yyw1I5wmuU6kaIjJCA9o21CBfarceHJ1gk6N0kP9QJonNJqofydi7Cs19j2TTK9Ui14q/ue1I92/dGMmwkhTQaYf9SOOdIDSClCPSUo0HxuCiWTmVkSGWGKiTVFzm2btuDGNlEmGOkk7chYbWSaNUtE5L5ZqpqwKTJGFYziBM3DgAspwDVWoAwEJj/AEz9aD9Wq9WR/TaMaazRzCHKzPX/1uou8=</latexit> is a block diagonal matrix that stacks the Ns × 1 Perron eigenvectors p(s) associated with the s-th sending sub-network1, and where 9 (15) We denote the entries of Ω by [ω(cid:96)k] and we keep indexing the columns of the S × R matrix Ω with an W = ASR (IR − AR) −1, Ω = EW. index k ∈ {S + 1,S + 2, . . . ,S + R} . (16) Since the limiting matrix power is left-stochastic and has a zero bottom block, the limiting weights ω(cid:96)k obey: i.e., Ω is left-stochastic. From (15) we can also write: ω(cid:96)k = 1, (cid:88)(cid:96)∈S Ω = EASR(IR + AR + A2 R + . . . ), (17) (18) whence we see that ω(cid:96)k embodies the sum of influences over all paths from sending agent (cid:96) to receiving agent k. IV. LIMITING BELIEFS OF RECEIVING AGENTS Let us momentarily consider a single-agent scenario where agent (cid:96) operates alone. A natural way for agent (cid:96) to choose a hypothesis would be to choose the θ that gives the best match between a model L(cid:96)(θ) and the distribution of the observed data, f(cid:96). One measure of the match between f(cid:96) and L(cid:96)(θ) is the KL divergence D[f(cid:96)L(cid:96)(θ)]. The smaller the value of this divergence is, the higher the match between the data and the model. For this reason, a strategy could be that of choosing the θ that minimizes the divergence D[f(cid:96)L(cid:96)(θ)]. In the social learning context, this optimization problem turns into a distributed optimization problem. In particular, under our social learning setting over weak graphs, we will show soon (Theorem 1) that the log- belief diffusion strategy in (6) -- (7) will end up minimizing (without knowing the true distributions) the following average divergence at receiving agent k ∈ R: Dk(θ) (cid:44)(cid:88)(cid:96)∈S ω(cid:96)kD[f(cid:96)L(cid:96)(θ)] (19) which is a weighted combination, through the limiting combination weights {ω(cid:96)k}, of the KL divergences of the sending agents reaching k. The role of average divergence measures like the one in (19) already arose in the case of strongly-connected networks. For example, it was shown in [21], [22] that with the log-belief diffusion 1For s = 1, 2, . . . , S, the Perron eigenvector of the sub-matrix ANs corresponding to the s-th sending sub-network is given by: (cid:62) Ns p(s) = 1, p(s) ANs p(s) = p(s), 1 (cid:96) > 0, (cid:96) = 1, 2, . . . , Ns. (14) DRAFT October 31, 2019 10 strategy in (6) -- (7), each agent ends up minimizing the same weighted combination of divergences. Under classical identifiability conditions, such minimization leads each individual agent to discover the true underlying hypothesis [22] or the best available approximation thereof [21]. In our weak-graph setting, however, the effect of minimizing Dk(θ) (which depends on the particular receiving agent k) will be less obvious. We already see from (19) that the average divergence combines topological attributes, encoded in the limiting combination weights, with inferential attributes, encoded in the local KL divergences. The interplay arising between the network topology and social learning will be critical in determining the choices of the receiving agents. Throughout the work, we will invoke the following classical identifiability assumption that, as we will see in our examples, arises naturally in several models of interest. Assumption 3 (Unique Minimizer): For each k = 1, 2, . . . , N, the function Dk(θ) has a unique minimizer: θ(cid:63) k (cid:44) argmin θ∈Θ Dk(θ) (20) (cid:3) We are now ready to characterize the limiting belief of the receiving agents. The following theorem is an extension to the case of weakly-connected graphs of similar theorems proved in [21], [22] for the case of strongly-connected graphs. Theorem 1 (Belief Collapse at Receiving Agents): Let k ∈ R. Under Assumptions 1-3 we have that: i→∞ µk,i(θ(cid:63) k) lim a.s. = 1 (21) where the symbol a.s. convergence of the belief to zero takes place at an exponential rate as: = denotes that the pertinent limit exists almost-surely. Moreover, for all θ (cid:54)= θ(cid:63) k, the lim i→∞ log µk,i(θ) i a.s. = Dk(θ(cid:63) k) − Dk(θ) (22) Proof: The proof combines the techniques to establish the convergence of the social learning algorithm used, e.g., in [21], [22] for strongly-connected graphs, with the convergence results of the combination matrix over weak graphs used in [10], [11]. The detailed steps are reported in Appendix A. Several insightful conclusions arise from Theorem 1. Remark 3 (Collapse): The limiting belief of each receiving agent is always degenerate, meaning that it (cid:3) collapses to a single hypothesis, when sufficient time for learning is allowed. Remark 4 (Discord): Different agents can in principle be in discord, since they can converge to different hy- potheses. The particular behavior (who chooses what) will depend on a weighted combination of KL divergences. (cid:3) Remark 5 (Mind Control): We see from (19) and (20) that only the local divergences corresponding to the k at sending agents, (cid:96) ∈ S, determine the value of Dk(θ) and, hence, of θ(cid:63) k. Therefore, the limiting hypothesis θ(cid:63) October 31, 2019 DRAFT 11 agent k is determined by the KL divergences pertaining only to the statistical models within the sending sub- networks, and, hence, irrespective of the data sensed at agent k within its receiving sub-network. In a nutshell, we see the emergence of a mind-control effect: i) the final states of the receiving agents are dependent only upon the properties of the detection problems at the sending agents; and ii) different network topologies allow the sending agents to drive the receiving agents to potentially different decisions. The emergence of a mind-control effect over weakly-connected networks was already discovered in [9], [10]. Here, we establish a similar effect albeit one where the receiving agents attain degenerate beliefs. In comparison, in [9], [10], receiving agents end (cid:3) up assigning nonzero probabilities to more than one belief. Remark 6 (Distinctions relative to [10]): Besides these commonalities, there are nevertheless important distinctions between the behavior observed in our setting and what was observed in [10]. First, for the linear- belief-combination algorithm used in [10], the limiting belief of a receiving agent was shown to be a convex combination of the limiting beliefs of the sending agents, with the convex weights coming from the matrix W in (15). This means that if two sending sub-networks have, e.g., limiting beliefs that collapse to different hypotheses, then the limiting belief of a receiving agent can have nonzero values a these two different locations. In comparison, in the log-belief-combination algorithm considered here the limiting beliefs are always concentrated at a single hypothesis. Moreover, in [10], the analysis required some regularity assumptions called all-truths-are-equal and prevailing- signal assumptions. These assumptions are not required in Theorem 1. In a sense, the lack of these assumptions ascertains that some relevant effects, such as mind control, hold under greater generality and more relaxed settings. Finally, it is useful to observe that one fundamental role in our setting is played by the weighting matrix (cid:3) Ω = EW , while in [10] the main role was played by W alone. A. Canonical Examples In order to examine in more detail the implications of Theorem 1, we consider a simple yet insightful example. The sending and receiving components are: S = N1 ∪ N2, R = N3, (23) namely, we have two sending sub-networks, N1 and N2, and one receiving sub-network N3. For what concerns the inferential model, we assume there are three possible hypotheses, θ ∈ {1, 2, 3}. The likelihood functions are the same across all agents. In particular, we assume that, for all ξ ∈ R, and for θ ∈ {1, 2, 3}: exp(cid:26)− (ξ − mθ)2 2 (cid:27) , L(ξθ) = 1√ 2π October 31, 2019 (24) DRAFT where the means corresponding to the different hypotheses are chosen as, for some ∆ > 0: m1 = −∆, m2 = 0, m3 = +∆. 12 (25) We further assume that the true distributions of the sending sub-networks (recall that only the sending sub- networks determine the limiting beliefs of the receiving sub-network) are Gaussian distributions, with expec- tations chosen among the expectations in (25). In particular, we assume that agents belonging to sub-network N1 generate data according to model θ = 1, i.e., with expectation equal to −∆, whereas agents belonging to sub-network N2 generate data according to model θ = 3, i.e., with expectation equal to +∆. Formally we write: f(cid:96)(ξ) = f(cid:96)(ξ) = 1√ 2π 1√ 2π exp(cid:26)− (ξ + ∆)2 exp(cid:26)− (ξ − ∆)2 2 2 (cid:27) , (cid:27) , ∀(cid:96) ∈ N1, ∀(cid:96) ∈ N2. (26) (27) Recalling that the KL divergence between two unit-variance Gaussian distributions of expectations a and b is given by 0.5(a − b)2, under the setting described above we can write, for all k ∈ R: ω(cid:96)kD[f(cid:96)L(cid:96)(θ)] Dk(θ) = (cid:88)(cid:96)∈S = (cid:88)(cid:96)∈N1 (−∆ − mθ)2 ω(cid:96)kD[f(cid:96)L(θ)] + (cid:88)(cid:96)∈N2 2 (cid:88)(cid:96)∈N1 ω(cid:96)k + ω(cid:96)kD[f(cid:96)L(θ)] (∆ − mθ)2 2 (cid:88)(cid:96)∈N2 = which further implies: ω(cid:96)k, (28) (29) Dk(1) = 2∆2 (cid:88)(cid:96)∈N2 Dk(2) = ∆2 2 , Dk(3) = 2∆2 (cid:88)(cid:96)∈N1 ω(cid:96)k, ω(cid:96)k, where, in the intermediate equality, we used (17). As a result, we can compute the limiting hypothesis, for each k ∈ R, as: θ(cid:63) k = argmin(cid:40)4(cid:88)(cid:96)∈N2 ω(cid:96)k, 1, 4(cid:88)(cid:96)∈N1 ω(cid:96)k(cid:41) . (30) From (18), one can argue that(cid:80)(cid:96)∈Ns ω(cid:96)k reflects the sum of influences over all paths connecting all sending agents in sub-network s to receiving agent k. In order to find the minimizer in (30), we start by using (17) in (30), which yields: θ(cid:63) k = argmin(cid:40)1 − (cid:88)(cid:96)∈N1 ω(cid:96)k, 0.25, (cid:88)(cid:96)∈N1 ω(cid:96)k(cid:41) . October 31, 2019 (31) DRAFT In view of Theorem 1, the belief of the k-th receiving agent will converge to θ(cid:63) conditions are simultaneously verified: k = 1 if the following two 13 Taking the most stringent condition in (32) reveals that: ⇔ (cid:88)(cid:96)∈N1 ω(cid:96)k ⇔ (cid:88)(cid:96)∈N1 ω(cid:96)k > 0.75, ω(cid:96)k > 0.5. 1 − (cid:88)(cid:96)∈N1 1 − (cid:88)(cid:96)∈N1 ω(cid:96)k < 0.25 ω(cid:96)k < (cid:88)(cid:96)∈N1 k = 1 ⇔ (cid:88)(cid:96)∈N1 θ(cid:63) ω(cid:96)k > 0.75. (32) (33) In summary, we conclude that agent k follows the opinion promoted by sending sub-network N1 if the influence of sub-network N1 on agent k is "sufficiently large". The situation is reversed if the influence of sub-network N2 is sufficiently large, namely, θ(cid:63) k = 3 ⇔ (cid:88)(cid:96)∈N2 ω(cid:96)k > 0.75, (34) where we recall that hypothesis θ = 3 is promoted by sub-network N2. However, there is another possibility. It occurs when: ω(cid:96)k < 0.75 ω(cid:96)k < 0.75. (35) (cid:88)(cid:96)∈N1 and (cid:88)(cid:96)∈N2 In this case, no clear dominance from one sub-network can be ascertained, and each receiving agent will choose k = 2, i.e., an opinion that does not coincide with any of the opinions promoted by the sending sub-networks. θ(cid:63) From (33) and (34), we see that the dominance of one of the sending sub-networks is determined by the aggregate influence(cid:80)(cid:96)∈N1 ω(cid:96)k, with the complementary aggregate influence being(cid:80)(cid:96)∈N2 ω(cid:96)k = 1−(cid:80)(cid:96)∈N1 ω(cid:96)k. The main way to manipulate these factors consists in varying the sizes of the sending sub-networks or their connections with the receiving agents. In order to illustrate more carefully the possible scenarios, we consider the following simulation framework: • The strongly-connected sending components N1 and N2 are generated as Erdos-R´enyi random graphs with connection probability q, and the entries of the corresponding combination matrix are determined by the averaging rule, namely,2 1/nk, if k (cid:54)= (cid:96) are neighbors or k = (cid:96) 0, otherwise (36) a(cid:96)k = where nk is the number of neighbors of node k (including node k itself). In our experiments we set q = 0.7. 2When drawing the random graph, we have verified that there exists at least one self-loop. October 31, 2019 DRAFT 14 • An agent k is connected to a sending agent through a Bernoulli distribution with parameter πs, which depends on the sending sub-network s. Given the total number dk, of directed edges from sending agents to agent k, we initially set a(cid:96)k = 1/dk. The combination matrix A of the overall network N1 ∪ N2 ∪ N3 is normalized so that it is left-stochastic. It is now possible to examine different scenarios by manipulating the size of the sending sub-networks as well as the send-receive connection probabilities πs. network graph belief evolution Fig. 2. How majorities build a majority: Convergence of beliefs when the size of sending sub-network N1 is dominant. -- Setup 1 or "How majorities build a majority". In Fig. 2, we set π1 = π2 = 0.5, i.e. it is equally probable that a receiving agent connects to any sending agent, irrespective of the sending sub-network. In view of this uniformity, we can expect that the limiting weights ω(cid:96)k are sufficiently uniform across the two sending sub- networks and, hence, that the value of(cid:80)(cid:96)∈N1 ω(cid:96)k is primarily determined by the sub-network size N1. In the example we are going to illustrate, we assume that the number of agents in sub-network N1 is three times larger than the size of sub-network N2. From the lowermost panel in Fig. 2, we observe that receiving agents October 31, 2019 DRAFT 1234567891011121314151617181920050100i0.00.51.0µ17,i(θ)Agent17050100i0.00.51.0µ18,i(θ)Agent18050100i0.00.51.0µ19,i(θ)Agent19050100i0.00.51.0µ20,i(θ)Agent20θ=1θ=2θ=3 15 network graph belief evolution Fig. 3. How filter bubbles build a majority: Convergence of beliefs when the connectivity from sending sub-network N1 is dominant. (18, 19, 20) converge to θ = 1, i.e., to the opinion promoted by N1. We see also that agent 17 takes a minority position and opts for θ = 2, i.e., it does follow neither the opinion promoted by N1 nor by N2. This shows the following interesting effect. Even if sub-network N1 is bigger, for the specific topology shown in the example (see uppermost panel of Fig. 2), the aggregate weight of agent 17 is (cid:80)(cid:96)∈N1 ω(cid:96) 17 = 0.645. This means that condition (35) is actually verified, which explains why agent 17 opts for θ = 2. In summary, we observed that building a majority of agents in N1 relative to N2 yields a majority of receiving agents opting for the hypothesis promoted by N1. -- Setup 2 or "How filter bubbles build a majority". Under this setup, we assume that both sending components have the same size, however πs is different for each of the two components. We set π1 = 0.9 and π2 = 0.1 in order to motivate agent k to have more connections with sub-network N1 than with N2. This scenario is considered in Fig. 3, where we see that all agents end up agreeing with opinion θ = 1, i.e., with the opinion promoted by the sending component N1. Therefore, closing a receiving agent into the "filter bubble" determined October 31, 2019 DRAFT 123456789101112050100i0.00.51.0µ9,i(θ)Agent9050100i0.00.51.0µ10,i(θ)Agent10050100i0.00.51.0µ11,i(θ)Agent11050100i0.00.51.0µ12,i(θ)Agent12θ=1θ=2θ=3 16 network graph belief evolution Fig. 4. Truth is somewhere in between: Convergence of beliefs under balanced influences. by the overwhelming flow of data coming from N1 essentially makes these agents blind to the solicitations coming from N2. We notice that, while in the example of Fig. 2 one receiving agent behaves differently from the majority of agents, for the specific parameters used in Fig. 3 all agents opt for the same hypothesis. However, another type of distinction arises in terms of convergence rate. We observe that agent 10 is reluctant to the received solicitations, since for the first half of the observation window the preferred hypothesis is θ2, and the convergence to θ1 is significantly slower than the convergence of the other agents. -- Setup 3 or "Truth is somewhere in between". We now address the balanced case where the sending sub- networks have the same size and similar number of connections to the receiving sub-network (π1 = π2 = 0.5). Under this setting, it is expected that no dominant behavior emerges, and (35) holds. We see in Fig. 4 that the receiving agents' opinions tend to converge with full confidence to hypothesis θ = 2 (mθ = 0), which is an opinion pushed by none of the sending agents. How can we explain this effect? One interpretation is that, in the presence of conflicting suggestions coming from the two sub-networks, the receiving agent opts for a October 31, 2019 DRAFT 123456789101112050100i0.00.51.0µ9,i(θ)Agent9050100i0.00.51.0µ10,i(θ)Agent10050100i0.00.51.0µ11,i(θ)Agent11050100i0.00.51.0µ12,i(θ)Agent12θ=1θ=2θ=3 17 conservative choice. If sending sub-network N1 says "choose −∆", while sending sub-network N2 says "choose +∆", then the receiving agent prefers to be agnostic and stays in the middle, i.e., it chooses 0. Referring to real-life situations, we can think of one person betting on a soccer match between teams A and B. Assuming that discordant solicitations come from the environment, i.e., the person receives data suggesting to bet on the victory of team A, as well as data suggesting to bet on the victory of team B. If there is no sufficient evidence to let one suggestion prevail, then the most probable choice would be betting on a draw! This "truth-is-somewhere- in-between" effect is a remarkable effect that is peculiar to the weakly-connected setting, and that has been not observed before, e.g., it was not present in [10]. In summary, it is the cumulative influence of a sending group over a receiving agent that determines whether it will follow the group's opinion or not. This situation emulates the social phenomenon of herd behavior: agents choose to ignore their private signal in order to follow the most influencing group of agents. When none of the above dominance situations occurs, the receiving agent can opt for an opinion that is not promoted by any of the sending agents. V. TOPOLOGY LEARNING In the previous section we examined the effect of the network topology on the social learning of the agents. In particular, we discovered how the topology and the states of the sending agents determine the opinion formation by the receiving agents. The way the information is delivered across the network ultimately determines the minimizers in (20), i.e., the value that each receiving agent's belief will converge to. We now examine the reverse problem. Assume we observe the belief evolution of part of the network. We would like to use this information to infer the underlying influences and topology. This is a useful question to consider because understanding the topology can help us understand why a particular agent adopts a certain opinion. The main question we consider now is this: given some measurements collected at the receiving agents, can we estimate their connections to the sending sub-networks? We shall answer this question under the following assumption of homogeneity of likelihoods and true distributions inside the individual sending sub-networks. Assumption 4 (Homogeneity within sending sub-networks): For s = 1, 2, . . . , S, we assume that the distribution and the likelihood functions within the s-th sending sub-network are equal across all agents in that sub-network, namely, for all (cid:96) ∈ Ns: f(cid:96) = f (s), L(cid:96)(θ) = L(s)(θ) (37) (cid:3) DRAFT October 31, 2019 One main consequence of Assumption 4 is that (19) becomes: ω(cid:96)kD[f(cid:96)L(cid:96)(θ)] Dk(θ) = (cid:88)(cid:96)∈S = S(cid:88)s=1(cid:32)D[f (s)L(s)(θ)](cid:88)(cid:96)∈Ns 18 (38) ω(cid:96)k(cid:33) , where Ns denotes the collection of agents in the s-th sending sub-network. Equation (38) has the following relevant implication. Under Assumption 4, the network topology influences the average divergence Dk(θ) only through an aggregate weight: xsk (cid:44) (cid:88)(cid:96)∈Ns ω(cid:96)k = (cid:88)(cid:96)∈Ns w(cid:96)k (39) The latter equality, using w(cid:96)k instead of ω(cid:96)k, comes straightforwardly from (13) and (15). This equality reveals that the aggregate weights depend solely on the matrix W , and not on the matrix E of Perron eigenvectors. In other words, the inner structure of the pertinent sending sub-network s does not influence the aggregate weight xsk. We notice that, while a combination weight a(cid:96)k accounts for a local, small-scale pairwise interaction between agent (cid:96) and agent k, the aggregate weight xsk accounts for macroscopic topology effects, for two reasons. First of all, xsk is determined by the limiting weights ω(cid:96)k, which embody not only direct connection effects between (cid:96) and k, but also effects mediated by multi-hop paths connecting (cid:96) and k. Second, from (39) we see that xsk embodies the global effect coming from all agents belonging to the s-th sending component. In other words, xsk is a measure of the effect from all agents in sending sub-network s on agent k. Since, in view of Theorem 1, the average divergence determines the behavior of the limiting belief, we conclude from (38) that the network topology ultimately influences the particular hypothesis chosen by a receiving agent only through these global weights {xsk}. We assume that the data available for estimating xsk are the shared (intermediate) beliefs, ψk,i(θ). We will say that consistent topology learning is achievable if the xsk can be correctly guessed when sufficient time is given for learning, i.e., we will focus on the limiting data, for all θ (cid:54)= θ(cid:63) k:3 yk(θ) (cid:44) lim i→∞ log ψk,i(θ) i a.s. = Dk(θ(cid:63) k) − Dk(θ). (40) Accordingly, the topology inference problem we are interested in can be formally stated as follows. For any receiving agent k, introduce its global-weight vector: (cid:62) xk (cid:44) [x1k, x2k, . . . , xSk] , and consider the vector stacking the H limiting beliefs yk(θ) (i.e., the data): (cid:62) yk (cid:44) [yk(1), yk(2), . . . , yk(H)] . 3We remark that, in view of (68) in Appendix A, the asymptotic properties of ψk,i(·) are the same as µk,i(·). October 31, 2019 (41) (42) DRAFT 19 Fig. 5. Macroscopic topology inference problem. The object of topology inference is constituted by the global weights xsk from sending sub-network s to receiving agent k. For example, the weight x1k in the figure embodies the influence of all sending agents in N1, from all paths (possibly including intermediate receiving agents) leading to receiving agent k ∈ N3. The main question is whether we can estimate xk consistently from observation of yk. In the sequel we will sometimes refer to this problem as a macroscopic topology inference problem -- see Fig. 5 for an illustration. As compared to other topology inference problems, we are faced here with one critical element of novelty. We have no data coming from the sending agents. This means that correlation between sending and receiving agent pairs cannot be performed. This is in sharp contrast with traditional topology inference problems, where the estimation of connections between pairs of agents is heavily based on comparison (e.g., correlation) between data streams coming from these pairs of agents [25] -- [27]. In contrast, we focus here on the asymmetrical case that, when estimating the weights xsk from sending to receiving agents, no data are available from the sending agents. For this reason, the topology learning problem addressed in this work is significantly different from other traditional topology problems studied in the literature. VI. IS MACROSCOPIC TOPOLOGY LEARNING FEASIBLE? We now examine the feasibility of the topology learning problem illustrated in the previous section. Let us preliminarily introduce a matrix D = [dθs], which collects the H × S divergences between any true distribution in the sending sub-networks and any likelihood, and whose (θ, s)-th entry is: [D]θs = dθs = D[f (s)L(s)(θ)]. (43) Using (41) and (43) in (38), the network divergence of receiving agent k, evaluated at θ, can be written as: S(cid:88)s=1 Through (42) we can rewrite the limiting data in (40) as: k) − D(θ) = yk(θ) = D(θ(cid:63) Dk(θ) = October 31, 2019 dθsxsk. ks − dθs) xsk. (dθ(cid:63) S(cid:88)s=1 (44) (45) DRAFT N2<latexit sha1_base64="apOwlPSaog+sD+hSTDPx7xNUKk4=">AAACFHicbVC7TgJBFL2LL8QXamJjM5GYWJFdLLQk2FgZSOSRwEpmhwEmzM5uZmZNyGZ/w9hq7x/Yqa29jf/gHzgLFAKeZJKTc869c3O8kDOlbfvLyqysrq1vZDdzW9s7u3v5/YOGCiJJaJ0EPJAtDyvKmaB1zTSnrVBS7HucNr3RVeo376lULBC3ehxS18cDwfqMYG2ku46P9ZBgHt8k3VKumy/YRXsCtEycGSmUj2rf7KXyXu3mfzq9gEQ+FZpwrFTbsUPtxlhqRjhNcp1I0RCTER7QtqEC+1S58eTqBJ0apYf6gTRPaDRR/07E2Fdq7HsmmV6pFr1U/M9rR7p/6cZMhJGmgkw/6kcc6QClFaAek5RoPjYEE8nMrYgMscREm6LmNs3acWMaKZMMdZJ25Cw2skwapaJzXizVTFkVmCILx3ACZ+DABZThGqpQBwISHuEJnq0H69V6sz6m0Yw1mzmEOVifv/8SovA=</latexit>N3<latexit sha1_base64="Tg3cNi4Q2IaW/AKN0pMZvmbfrW8=">AAACFHicbVC7TgJBFL3rE/GFmtjYTCQmVmQXCi0JNlYGEnkksJLZYYAJs7ObmVkTstnfMLba+wd2amtv4z/4B84ChYAnmeTknHPv3Bwv5Exp2/6yVlbX1jc2M1vZ7Z3dvf3cwWFDBZEktE4CHsiWhxXlTNC6ZprTVigp9j1Om97oKvWb91QqFohbPQ6p6+OBYH1GsDbSXcfHekgwj2+SbinbzeXtgj0BWibOjOTLx7Vv9lJ5r3ZzP51eQCKfCk04Vqrt2KF2Yyw1I5wm2U6kaIjJCA9o21CBfarceHJ1gs6M0kP9QJonNJqofydi7Cs19j2TTK9Ui14q/ue1I92/dGMmwkhTQaYf9SOOdIDSClCPSUo0HxuCiWTmVkSGWGKiTVFzm2btuDGNlEmGOkk7chYbWSaNYsEpFYo1U1YFpsjACZzCOThwAWW4hirUgYCER3iCZ+vBerXerI9pdMWazRzBHKzPXwDFovE=</latexit>N4<latexit sha1_base64="YJhH6kS2i8SMT3edlXdDQ2OOO04=">AAACFHicbVC7SgNBFL3rM8ZXVLCxGQyCVdiNgpYhNlaSgHlAsobZySQZMju7zMwKYdnfEFvt/QM7tbW38R/8A2eTFCbxwMDhnHPvXI4Xcqa0bX9ZS8srq2vrmY3s5tb2zm5ub7+ugkgSWiMBD2TTw4pyJmhNM81pM5QU+x6nDW94lfqNeyoVC8StHoXU9XFfsB4jWBvpru1jPSCYxzdJ5zzbyeXtgj0GWiTOlORLh9Vv9lJ+r3RyP+1uQCKfCk04Vqrl2KF2Yyw1I5wm2XakaIjJEPdpy1CBfarceHx1gk6M0kW9QJonNBqrfydi7Cs18j2TTK9U814q/ue1It27dGMmwkhTQSYf9SKOdIDSClCXSUo0HxmCiWTmVkQGWGKiTVEzm6btuDGNlEmGOkk7cuYbWST1YsE5KxSrpqwyTJCBIziGU3DgAkpwDRWoAQEJj/AEz9aD9Wq9WR+T6JI1nTmAGVifvwJpovI=</latexit>N1<latexit sha1_base64="nRFT06pUrNWj/Ds2PdtE2OyDKJo=">AAACFHicbVC7TgJBFL2LL8QXamJjM5GYWJFdLLQk2FgZSOSRwEpmhwEmzM5uZmZNyGZ/w9hq7x/Yqa29jf/gHzgLFAKeZJKTc869c3O8kDOlbfvLyqysrq1vZDdzW9s7u3v5/YOGCiJJaJ0EPJAtDyvKmaB1zTSnrVBS7HucNr3RVeo376lULBC3ehxS18cDwfqMYG2ku46P9ZBgHt8kXSfXzRfsoj0BWibOjBTKR7Vv9lJ5r3bzP51eQCKfCk04Vqrt2KF2Yyw1I5wmuU6kaIjJCA9o21CBfarceHJ1gk6N0kP9QJonNJqofydi7Cs19j2TTK9Ui14q/ue1I92/dGMmwkhTQaYf9SOOdIDSClCPSUo0HxuCiWTmVkSGWGKiTVFzm2btuDGNlEmGOkk7chYbWSaNUtE5L5ZqpqwKTJGFYziBM3DgAspwDVWoAwEJj/AEz9aD9Wq9WR/TaMaazRzCHKzPX/1uou8=</latexit>k<latexit sha1_base64="YUeHDbwsAC00t7bOZIwoEHZPjpo=">AAACCHicbVDLSgMxFM34rOOr6tLNYCm4KjN1oRux6MZlC/YB7VAy6Z02NJMJSUYoQ39At/oF/oA7cevGTxB/wy8w03ZRWw8EDuee+8gJBKNKu+63tbK6tr6xmduyt3d29/bzB4cNFSeSQJ3ELJatACtglENdU82gJSTgKGDQDIY3Wb15D1LRmN/pkQA/wn1OQ0qwNlJt2M0X3JI7gbNMvBkpXH3al+Lly6528z+dXkySCLgmDCvV9lyh/RRLTQmDsd1JFAhMhrgPbUM5jkD56eTQsVM0Ss8JY2ke185Ene9IcaTUKAqMM8J6oBZrmfhfrZ3o8MJPKReJBk6mi8KEOTp2sl87PSqBaDYyBBNJza0OGWCJiTbZ2MX5UdlwgpmfQqKMVeixbULyFiNZJo1yyTsrlWtuoXKNpsihY3SCTpGHzlEF3aIqqiOCAD2iJ/RsPViv1pv1PrWuWLOeI/QH1scvYFadjQ==</latexit>`<latexit sha1_base64="2srABkeiBvKIU4unFMHsAqLjNzw=">AAACC3icbVDLSgMxFM3UVx1fVZdugqXgqszUhW7EohuXFewD2qFk0jttaCYzJBmhDP0E3ereT3AnbsVPEH/DLzDTdlFbDwQO5577yPFjzpR2nG8rt7K6tr6R37S3tnd29wr7Bw0VJZJCnUY8ki2fKOBMQF0zzaEVSyChz6HpD6+zevMepGKRuNOjGLyQ9AULGCU6kzrAebdQdMrOBHiZuDNSvPy0L+KXL7vWLfx0ehFNQhCacqJU23Vi7aVEakY5jO1OoiAmdEj60DZUkBCUl05uHeOSUXo4iKR5QuOJOt+RklCpUegbZ0j0QC3WMvG/WjvRwbmXMhEnGgSdLgoSjnWEs4/jHpNANR8ZQqhk5lZMB0QSqk08dml+VDacEu6lkChjjfXYNiG5i5Esk0al7J6WK7dOsXqFpsijI3SMTpCLzlAV3aAaqiOKBugRPaFn68F6td6s96k1Z816DtEfWB+/wUie2Q==</latexit>x1k<latexit sha1_base64="T02HHD5lTmTurdeSVZGgf6p9QMM=">AAACDXicbVDLSsNAFJ34rPFVFdy4CZaCq5LUhS5L3bhswT6gDWUynbRjJ5MwcyOWkG/Qrf6DS3fiSvAb3PgRfoGTtovaemDgcO65jzlexJkC2/4yVlbX1jc2c1vm9s7u3n7+4LCpwlgS2iAhD2Xbw4pyJmgDGHDajiTFgcdpyxtdZfXWHZWKheIGxhF1AzwQzGcEg5aa973EGaW9fMEu2RNYy8SZkULluP7NXqoftV7+p9sPSRxQAYRjpTqOHYGbYAmMcJqa3VjRCJMRHtCOpgIHVLnJ5NrUKmqlb/mh1E+ANVHnOxIcKDUOPO0MMAzVYi0T/6t1YvAv3YSJKAYqyHSRH3MLQiv7utVnkhLgY00wkUzfapEhlpiADsgszo/KhhPM3YTGSlsjSE0dkrMYyTJplkvOealc12lV0RQ5dIJO0Rly0AWqoGtUQw1E0C16RE/o2XgwXo03431qXTFmPUfoD4zPX/LeoB8=</latexit>x2k<latexit sha1_base64="+d0tAHdVx3TSR1+CCnGPr9t7E2Q=">AAACDXicbVDLSsNAFJ34rPFVFdy4CZaCq5LUhS5L3bhswT6gDWUynbRjJ5MwcyOWkG/Qrf6DS3fiSvAb3PgRfoGTtovaemDgcO65jzlexJkC2/4yVlbX1jc2c1vm9s7u3n7+4LCpwlgS2iAhD2Xbw4pyJmgDGHDajiTFgcdpyxtdZfXWHZWKheIGxhF1AzwQzGcEg5aa972kPEp7+YJdsiewlokzI4XKcf2bvVQ/ar38T7cfkjigAgjHSnUcOwI3wRIY4TQ1u7GiESYjPKAdTQUOqHKTybWpVdRK3/JDqZ8Aa6LOdyQ4UGoceNoZYBiqxVom/lfrxOBfugkTUQxUkOkiP+YWhFb2davPJCXAx5pgIpm+1SJDLDEBHZBZnB+VDSeYuwmNlbZGkJo6JGcxkmXSLJec81K5rtOqoily6ASdojPkoAtUQdeohhqIoFv0iJ7Qs/FgvBpvxvvUumLMeo7QHxifv/SEoCA=</latexit>x2`<latexit sha1_base64="4Pw3tJ1U9R15QJ/UDbk1s2xYy+I=">AAACEHicbVDLSsNAFJ34rPFVFdy4CZaCq5LUhS5L3bhswT6kDWUyvWmHTiZhZiKWkJ/QrX6Ce3ciuPIP3PgRfoGTtovaemDgcO65jzlexKhUtv1lrKyurW9s5rbM7Z3dvf38wWFThrEg0CAhC0XbwxIY5dBQVDFoRwJw4DFoeaOrrN66AyFpyG/UOAI3wANOfUqw0tLtfS8pd4GxtJcv2CV7AmuZODNSqBzXv+lL9aPWy/90+yGJA+CKMCxlx7Ej5SZYKEoYpGY3lhBhMsID6GjKcQDSTSYHp1ZRK33LD4V+XFkTdb4jwYGU48DTzgCroVysZeJ/tU6s/Es3oTyKFXAyXeTHzFKhlf3e6lMBRLGxJpgIqm+1yBALTJTOyCzOj8qGE8zcBGKprZFKTR2SsxjJMmmWS855qVzXaVXRFDl0gk7RGXLQBaqga1RDDURQgB7RE3o2HoxX4814n1pXjFnPEfoD4/MXW12hbA==</latexit>x1`<latexit sha1_base64="ef0vtaNweRoBweVkFQa1RbVV7Wg=">AAACEHicbVC7SgNBFJ31GddXVLCxGQwBq7AbCy1DbCwTMA9JljA7uZsMmX0wMyuGZX9CW/0EezsRrPwDGz/CL3A2SRETDwwczj33MceNOJPKsr6MldW19Y3N3Ja5vbO7t58/OGzKMBYUGjTkoWi7RAJnATQUUxzakQDiuxxa7ugqq7fuQEgWBjdqHIHjk0HAPEaJ0tLtfS+xu8B52ssXrJI1AV4m9owUKsf1b/ZS/aj18j/dfkhjHwJFOZGyY1uRchIiFKMcUrMbS4gIHZEBdDQNiA/SSSYHp7iolT72QqFfoPBEne9IiC/l2He10ydqKBdrmfhfrRMr79JJWBDFCgI6XeTFHKsQZ7/HfSaAKj7WhFDB9K2YDokgVOmMzOL8qGw4JdxJIJbaGqnU1CHZi5Esk2a5ZJ+XynWdVhVNkUMn6BSdIRtdoAq6RjXUQBT56BE9oWfjwXg13oz3qXXFmPUcoT8wPn8BWbShaw==</latexit> It is useful to introduce the matrix: (46) where em is an H × 1 vector with all zeros and a one in the m-th position. It is important to note that Bk has its θ(cid:63) k-th row equal to zero. We can now formulate the topology problem in terms of the following constrained system: Bk (cid:44)(cid:16)1H e (cid:62) θ(cid:63) k − IH(cid:17) D, Find (cid:101)xk ∈ RS such that  yk = Bk(cid:101)xk, (cid:80)S s=1(cid:101)xsk = 1, (cid:101)xk > 0, where we remark that the notation (cid:101)xk > 0 signifies that all entries in the solution vector (cid:101)xk must be strictly positive. This positivity constraint is enforced because by assumption, each receiving sub-network is connected to at least one agent from each sending sub-network, which implies that the true vector we are looking for, xk, has all positive entries. The equality constraint in (47) can be readily included in matrix form by introducing 20 (47) (48) (49) the augmented matrix and vector: which allow rewriting (47) as: Bk 1(cid:62) S  , Ck (cid:44) (cid:101)yk (cid:44) Find (cid:101)xk ∈ RS : (cid:101)yk = Ck(cid:101)xk, yk 1 , (cid:101)xk > 0 We are now ready to state formally the concept of feasibility for the topology learning problem. First, we want to solve the problem under the assumption that the matrix of divergences, D, is known, i.e., that sufficient knowledge is available about the underlying statistical models (likelihoods and true distributions). In this respect, we remark that the matrix Bk in (46) depends on θ(cid:63) k, which in turn depends on the unknowns xsk as well through (20). However, from Theorem 1 we know that the beliefs (and also the intermediate beliefs) converge k from the limiting data yk(θ), which is tantamount to assuming k. Therefore, we can safely estimate θ(cid:63) to 1 at θ(cid:63) that the matrix Bk is known. Therefore, achievability of a consistent solution for the topology learning problem translates into the condition that the linear system in (49) should admit a unique solution. We will now prove the following result. Lemma 1 (Necessary Condition for Macroscopic Topology Learning): The topology learning problem de- scribed by the system in (49) admits a unique solution if, and only if: rank(Ck) = S (50) Thus, a necessary condition for topology learning is that the number of hypotheses is at least equal to the number of sending sub-networks, namely, that: October 31, 2019 H ≥ S (51) DRAFT Proof: We remark that we are not concerned with the existence of a solution for the constrained linear +, which by system (49). In fact, this system admits at least a solution, namely, the true weight vector, xk ∈ RS 21 (cid:4) assumption fulfills the equation (cid:101)yk = Ck xk. whose set of solutions is given by [29]: Let us now focus on the unconstrained system (i.e., the system in (49) without the inequality constraints), (cid:101)xk = C † where z ∈ RS is an arbitrary vector, and C k is the Moore-Penrose pseudoinverse of Ck. If rank(Ck) = S, it k Ck)−1C(cid:62) is well known [29] that C k , which implies that the second term on the RHS in (52) is zero, which in turn implies that the unconstrained system has the unique solution: † k = (C(cid:62) (52) † kCk)z, † k(cid:101)yk + (IS − C (cid:101)xk = (C (cid:62) k Ck) −1C (cid:62) k(cid:101)yk = xk (53) The latter equality holds because, if the unconstrained system has a unique solution, this is also the unique solution for the constrained system, i.e., it coincides with xk and satisfies the positivity constraints. Accordingly, we have proved that whenever rank(Ck) = S, the constrained system has the unique solution corresponding to the true vector xk. We now show that when rank(Ck) < S the constrained system has infinite solutions. Since any solution of the unconstrained system takes on the form (52), and since xk is a particular solution, there will exist a certain vector z0 such that the xk can be written as: xk = C † k(cid:101)yk + (IS − C † kCk)z0. (54) (cid:101)xk = C k(cid:101)yk + (IS − C Consider a solution (cid:101)xk in (52) that corresponds to another vector, z = z0 + , where  is a perturbation vector: † kCk)(z0 + ) = xk + (IS − C † kCk). (55) † Since by assumption xk > 0, we conclude from (55) that for sufficiently small perturbations it is always possible to obtain a distinct (cid:101)xk > 0, which implies that the constrained system in (49) has infinite solutions. In summary, we conclude that the topology learning problem is feasible if, and only if, rank(Ck) = S. Finally, by observing that the augmented matrix Ck is an (H + 1) × S matrix with an all-zeros row, we have in fact proved the claim of the lemma. Lemma 1 has at least three useful implications. First, it reveals a fundamental interplay between social learning and topology learning: the possibility of estimating xk depends on the comparison between two seemingly unrelated quantities, the number of hypotheses H (an attribute of the social inferential problem) and the number of sending sub-networks S (an attribute of the network topology). Second, the necessary condition in (51) highlights that topology learning over social networks is challenging. For example, if the agents of the social network want to solve a binary detection problem (H = 2), then the October 31, 2019 DRAFT 22 maximum number of sending sub-networks that could allow faithful topology estimation is S = 2. Increasing the complexity of the social learning problem (i.e., increasing H) is beneficial to topology estimation, since it allows to increase also S. Third, we see that having more sending sub-networks makes topology learning more complicated. This is because increasing the number of sending sub-networks increases the number of unknowns (i.e., the dimension of xk), while not adding information since in our setting we are not allowed to probe the sending nodes. Remarkably, when examining jointly the social learning and the topology learning problems, the role of the data and of the unknowns is exchanged. In the social learning problem, more hypotheses means more unknowns and more sending sub-networks means more data; in the topology learning problem, the situation is exactly reversed. A. Structured Gaussian Models In this section we consider the practical case of a Gaussian model, defined as follows. • All agents use the same family of likelihood functions {L(θ)}, for θ = 1, 2, . . . , H. • These likelihoods are unit-variance Gaussian likelihoods with different means {mθ}. • Each true distribution coincides with one of the likelihoods. This implies that the distribution of the s-th sending sub-network, f (s), is a unit-variance Gaussian distribution with mean νs that is chosen among the means {mθ}, namely, for s = 1, 2, . . . , S: νs ∈ {m1, m2, . . . , mH}. (56) • The sending sub-networks have different means. Using (43) and the definition of KL divergence between Gaussian distributions, the matrix D is given by: . (57)  D = 1 2  (m1 − ν1)2 (m2 − ν1)2 ... (mH − ν1)2 (m1 − ν2)2 (m2 − ν2)2 . . . . . . (m1 − νS)2 (m2 − νS)2 ... (mH − ν2)2 . . . (mH − νS)2 From (57) it is readily seen that, if the sending sub-networks share the same true distribution (i.e., if ν1 = ν2 = ··· = νS), then the matrix D has rank 1, and, hence, the topology learning problem is obviously not feasible. As said, we will instead focus on the opposite case where the true expectations are all distinct. For ease of presentation, and without loss of generality we can assume that the sending sub-networks are numbered so that the expectations of the true distributions are: ν1 = m1, ν2 = m2, . . . , νS = mS, (58) DRAFT October 31, 2019 23 . (59) (61) (62) (63) which implies that (57) takes on the form: D = 1 2 0 (m1 − m2)2 (m2 − m1)2 ... 0 . . . . . . (m1 − mS)2 (m2 − mS)2 ... (mH − m1)2 (mH − m2)2 . . . (mH − mS)2   The structure in (59) implies that, for H = S, the matrix D is a Euclidean distance matrix (but for the constant 1/2) [28]. These matrices are constructed as follows. Given points r1, r2, . . . , rL, belonging to Rdim, the (i, j)-th entry of the matrix EDM(r1, r2, . . . , rL) is given by the squared Euclidean distance between points ri and rj. Accordingly, we see from (59) that, for H = S: D = 1 2 EDM(m1, m2, . . . , mH ). (60) For H > S, the matrix D can be described as an extended Euclidean distance matrix, constructed as follows. Let: ES (cid:44) 1 2 EH (cid:44) 1 2 EH−S (cid:44) 1 2 EDM(m1, m2, . . . , mS), EDM(m1, m2, . . . , mH ), EDM(mS+1, mS+2, . . . , mH ), and let F be the (H − S) × S matrix with entries, for θ = S + 1, S + 2, . . . , H and s = 1, 2, . . . , S: [F ]θs = (mθ − ms)2. 1 2 Then, we have the following representation: D = ES F  , EH = F (cid:62) ES F EH−S  . The following theorem, which establishes the feasibility of the topology learning problem for the considered Gaussian model, relies heavily on some fundamental properties of Euclidean distance matrices. Theorem 2 (Macroscopic Topology Learning under Structured Gaussian Models): Let S ≥ 2 and H ≥ S. Assume that all sending sub-networks have the same family of unit-variance Gaussian likelihood functions L(θ) with distinct means {mθ}, for θ = 1, 2, . . . , H. Assume that the true distributions f (s), within the sending sub-networks s = 1, 2, . . . , S, are unit-variance Gaussian with distinct means νs, chosen from the collection {mθ}. Then, under Assumption 3 (so that the matrix Bk in (46) is well defined), for all receiving agents k ∈ R we have that: Proof: The proof is reported in Appendix B. rank(Ck) = 2 October 31, 2019 (64) DRAFT 24 Remark 7 (Topology Learning under Structured Gaussian Models is Challenging): In view of Lemma 1, Eq. (64) has the following implication. Under the considered Gaussian model, topology learning is feasible only when S = 2. We remark also that, when S = 2, condition (51) plays no role, since any meaningful classification problem has at least H = 2. In summary, Theorem 2 reveals that the structure of the Gaussian model makes topology learning very challenging, as this problem is not solvable for networks with more than 2 sending sub-networks. Thus, the theorem reveals that H ≥ S is not a sufficient condition for consistent topology (cid:3) learning. B. Diversity Models We can now examine the effect that diversity in the models of the sending sub-networks can have on topology learning. Since the limiting beliefs are essentially determined by the divergence matrix D, it is meaningful to impose a form of diversity in terms of the divergences between distributions and likelihoods. In other words, differently from the Gaussian case illustrated in the previous section, we now require that the entries of D are not tightly related to each other, namely, we allow them to assume values in RH×S (where we denote by R+ the nonnegative reals) with no strong structure linking them. + One typical model for this type of diversity is that the divergences perceived by the different agents (i.e., across index s), and corresponding to different hypotheses (i.e., across index h), are modeled as absolutely continuous random variables. This randomness is a formal way to embody some degree of variability in how the agents "see" the world. For example, this is a useful model to consider when the agents, due to imperfect knowledge, have likelihoods that are slightly perturbed versions of some nominal model. Examples of this type are illustrated in the next section. In order to avoid confusion, it is important to remark one fundamental property. Under the diversity setting, the matrix D is random4 with entries modeled as absolutely continuous random variables. The full-rank property for this type of matrices is a classical result. However, we observe from (46) that the matrix Bk is obtained from k, which in turn depends statistically upon the D by multiplying a matrix that depends on a random variable θ(cid:63) entries of D. Finally, we know from (48) that Ck is obtained from Bk by adding an all-ones row. Accordingly, to determine the rank of Ck we need to address carefully these intricate dependencies. This is accomplished in the proof of the forthcoming Theorem 3. Theorem 3 (Macroscopic Topology Learning under General Models with Diversity): Let H ≥ S, and assume that the array {dθs}, with θ = 1, 2, . . . , H and s = 1, 2, . . . , S, is made of random variables that are jointly 4Accordingly, we will now use the bold notation for the matrix entries, dθs, as well as for other related quantities. October 31, 2019 DRAFT network graph belief evolution estimated weights 25 Fig. 6. Unperturbed Gaussian model. Left. Network topology. Middle. Belief convergence at the receiving agents. Right. Estimated macroscopic topology. For each of the four panels, the numbers on the right denote the true values {xsk}, with different colors denoting different s, according to the legend. absolutely continuous with respect to the Lebesgue measure on RH×S we have that, with probability 1, Assumption 3 is verified and the matrix Ck is full column rank, namely, . Then, for all receiving agents k ∈ R + P [θ(cid:63) k is unique and rank(Ck) = S] = 1 (65) Proof: The proof is reported in Appendix C. The meaning of Theorem 3 is that configurations of KL divergence that lead to a rank-deficient matrix Ck are rare. In other words, if some diversity exists in the statistical models of the sending components, then the topology inference problem is feasible for almost all configurations. VII. SIMULATION RESULTS We now present some illustrative examples. The first example refers to the Gaussian model presented in Sec. VI-A. The other two examples refer to the setting with diversity presented in Sec. VI-B. a) Gaussian with H = S = 2. We consider the topology shown in the leftmost panel of Fig. 6. The likelihoods and true distributions for the sending sub-networks are unit-variance Gaussian with means ν1 = m1 = 1, ν2 = m2 = 2. The receiving agents5 employ the same likelihoods of the sending agents, and their true distributions are unit-variance Gaussian with mean equal to 1. In Fig. 6 (middle) we show the convergence of the receiving agents' beliefs. Next, we address the topology learning problem. First, for an observation time i, we construct the empirical data (cid:98)yk(θ) = (1/i) log ψk,i(θ), and construct an estimate (cid:98)θ(cid:63) hypothesis where (cid:98)yk(θ) will collapse to 1). We can then construct an estimate for Bk as: (cid:62)(cid:98)θ(cid:63) (cid:98)Bk =(cid:16)1H e k as the value of θ that maximizes (cid:98)yk(θ) (i.e., the − IH(cid:17) D, (66) 5We recall that the models of the receiving agents will be ultimately immaterial as regards their limiting beliefs. k October 31, 2019 DRAFT 1234567891011120100200300i0.00.51.0µ9,i(θ)Agent90100200300i0.00.51.0µ10,i(θ)Agent100100200300i0.00.51.0µ11,i(θ)Agent110100200300i0.00.51.0µ12,i(θ)Agent12θ=1θ=2010002000i0.000.250.500.751.00bxs90.650.35Agent9010002000i0.000.250.500.751.00bxs100.590.41Agent10010002000i0.000.250.500.751.00bxs110.510.49Agent11010002000i0.000.250.500.751.00bxs120.520.48Agent12s=1s=2 network graph belief evolution estimated weights 26 Perturbed Gaussian model. Left. Network topology. Middle. Belief convergence at the receiving agents. Right. Estimated Fig. 7. macroscopic topology. For each of the four panels, the numbers on the right denote the true values {xsk}, with different colors denoting different s, according to the legend. from which we obtain (cid:98)Ck by adding an all-ones row, according to (48). At this point, we have verified on the simulated data that, for any receiving agent k ∈ {9, 10, 11, 12}, the matrices (cid:98)Ck are full column rank. Then, we used (53) with empirical matrices replacing the exact ones to estimate the connection-weight vector xk as:6 (67) † (cid:62) k (cid:98)yk 1 . k(cid:98)yk 1 = ((cid:98)C −1(cid:98)C k (cid:98)Ck) (cid:98)xk = (cid:98)C (cid:62) We see from Fig. 6 (right) that this procedure allows us to retrieve the topology coefficients {xsk}, provided that the system evolves for a sufficiently long time. b) Randomly perturbed Gaussian with H = S = 3. The network topology has three sending sub-networks and one receiving sub-network as shown in the leftmost panel of Fig. 7. When S > 2, we know from Theorem 2 that for the structured Gaussian model, diversity in the sending components is not enough to ensure the full column rank of the matrix Ck. In order to increase diversity, we consider a randomly perturbed model for the likelihood functions, where the likelihood of the s-th sending sub-network, evaluated at hypothesis θ, is unit- variance Gaussian with mean θ + θs. The random variables {θs} are equally correlated zero-mean Gaussian with variance equal to 0.02 and Pearson correlation coefficient equal to 0.5. For the receiving sub-network we use the same type of random perturbation of the likelihoods. The true distributions for all sending and receiving agents are unit-variance Gaussian with mean equal to 1. The belief convergence for the receiving agents can be seen in the middle group of panels of Fig. 7. In the rightmost group of panels, we see how the estimates {(cid:98)xsk} of the topology weights converge to the true values {xsk}. In contrast with the structured Gaussian case, topology learning is now feasible for S > 2 and even if the true distributions are equal across all sending components. This change in behavior is due to the diversity in the models of the sending sub-networks, represented by the 6The symbol (cid:98) is used for quantities estimated from the data, to be not confused with the symbol (cid:101) used for the exact quantities appearing in (49). October 31, 2019 DRAFT 123456789101112131415160100200300i0.00.51.0µ13,i(θ)Agent130100200300i0.00.51.0µ14,i(θ)Agent140100200300i0.00.51.0µ15,i(θ)Agent150100200300i0.00.51.0µ16,i(θ)Agent16θ=1θ=2θ=3010002000i0.000.250.500.751.00bxs130.480.200.32Agent13010002000i0.000.250.500.751.00bxs140.370.380.25Agent14010002000i0.000.250.500.751.00bxs150.300.540.16Agent15010002000i0.000.250.500.751.00bxs160.300.420.28Agent16s=1s=2s=3 network graph belief evolution estimated weights 27 Fig. 8. Perturbed Beta model. Left. Network topology. Middle. Belief convergence at the receiving agents. Right. Estimated macroscopic topology. For each of the four panels, the numbers on the right denote the true values {xsk}, with different colors denoting different s, according to the legend. different means of the likelihoods. Moreover, we see from the parameters of the random variables {θs} that a relatively small perturbation is already sufficient to enable consistent topology learning. c) Beta with H = S = 3. Finally, we consider a non-Gaussian example. The network topology is the same as in the last example. However, now the likelihood functions follow a Beta distribution with scale parameter equal to 2 and with shape parameters given by θ + 1 + uθs, where {uθs}, for θ ∈ {1, 2, 3} and s ∈ {1, 2, 3}, are independent random variables sampled from a uniform distribution with support [−0.1, 0.1]. The true distributions coincide with the unperturbed likelihoods, i.e., the true distribution of the s-th sending sub-network is a Beta distribution with scale parameter equal to 2 and shape parameter equal to s + 1. For the receiving sub-network we apply the same type of random perturbation of the likelihoods, whereas the true distributions are Beta with scale and shape parameters equal to 2. The belief convergence for the receiving agents can be seen in the middle group of panels of Fig. 8. In the rightmost group of panels, we see the convergence of the topology estimates. VIII. SOCIAL LEARNING VS. TOPOLOGY LEARNING In this work we have considered two learning problems. The first problem is the Social Learning (SL) problem, which is the goal of the agents in the network. These agents aim at forming their opinions after consulting the beliefs of their neighbors through an iterative update-and-combine SL algorithm. The second problem is the Topology Learning (TL) problem, where a receiving agent (or some entity monitoring its behavior) attempts to get knowledge about the connections between that receiving agent and the sending sub-networks. We can refer to the SL problem as the direct learning problem, in the sense that it is the original inferential problem the network is deployed for. Likewise, we can refer to the TL problem as the dual learning problem, since it is an inferential procedure that takes as input data the output of the direct TL problem. The analysis conducted in this work has revealed some interesting interplay between SL and TL problems. Let us make a summary of the main results. We recall that S denotes the number of sending sub-networks, and October 31, 2019 DRAFT 123456789101112131415160100200300i0.00.51.0µ13,i(θ)Agent130100200300i0.00.51.0µ14,i(θ)Agent140100200300i0.00.51.0µ15,i(θ)Agent150100200300i0.00.51.0µ16,i(θ)Agent16θ=1θ=2θ=3010002000i0.000.250.500.751.00bxs130.480.200.32Agent13010002000i0.000.250.500.751.00bxs140.370.380.25Agent14010002000i0.000.250.500.751.00bxs150.300.540.16Agent15010002000i0.000.250.500.751.00bxs160.300.420.28Agent16s=1s=2s=3 28 H the number of hypotheses. First, we established in Lemma 1 that H ≥ S is a necessary condition to achieve consistent TL. This condition has a remarkable interpretation. In a sense, the number of hypotheses is an index (even if not the only one) of complexity associated to the SL problem since, other conditions being equal, more hypotheses make the SL problem more complicated. Likewise, the number of sending components represents an index of complexity of the TL problem, since, other conditions being equal, estimating more links is more complicated. According to these remarks, the condition H ≥ S implies that the TL problem can be feasible when its complexity is not greater than the complexity of the SL problem. Such an interplay appears to be not obvious at all. As a matter of fact, in the traditional topology inference problems, the connections between agents are inferred from some kind of pairwise measure of their dependency. In our setting, since we cannot measure the output of the sending sub-network, we cannot get direct data quantifying dependency between a receiving and a sending agent. Our TL inference is based instead on the belief functions. The belief function contains some richness of information in that it is evaluated for the H different values of θ. This richness (i.e., H) is critical to enable feasibility of the TL problem. In particular, H ≥ S means that the richness of information in the belief function should be greater than or equal to the number of unknown topology weights to be estimated, S. Having established a necessary condition for consistent TL, we moved on to examine some useful models to see whether and when consistent TL is in fact achievable. First, we have considered a structured Gaussian model where all sending sub-networks use the same family of Gaussian likelihoods, and the sending sub-networks have distinct true distributions, each one coinciding with one of the likelihoods. We have shown in Theorem 2 that the TL problem is feasible only if S = 2, for any H ≥ 2. The limited possibility of achieving consistent TL can be ascribed to the limited diversity existing between the different sub-networks (which all use the same family of likelihoods). This observation motivated the analysis of more general models with a certain degree of diversity, a condition formalized by saying that the KL divergences between true distributions and likelihoods are not structured, i.e., they are nonnegative real numbers with no particular relationship among them. Under this setting we have ascertained that, if H ≥ S, the TL problem becomes feasible for almost all configurations, in a precise mathematical sense as stated in Theorem 3. In summary, two critical features that enable consistent TL are: more hypotheses than sending components and a sufficient degree of diversity. APPENDIX A PROOF OF THEOREM 1 Exploiting (6) we can write, for θ, θ(cid:48) ∈ Θ: ψ(cid:96),i(θ) ψ(cid:96),i(θ(cid:48)) log = log µ(cid:96),i−1(θ) µ(cid:96),i−1(θ(cid:48)) + log L(cid:96)(ξ(cid:96),iθ) L(cid:96)(ξ(cid:96),iθ(cid:48)) . Using (7) we have: October 31, 2019 log µk,i(θ) µk,i(θ(cid:48)) = a(cid:96)k(cid:18)log N(cid:88)(cid:96)=1 µ(cid:96),i−1(θ) µ(cid:96),i−1(θ(cid:48)) + log L(cid:96)(ξ(cid:96),iθ) L(cid:96)(ξ(cid:96),iθ(cid:48))(cid:19) . (68) (69) DRAFT By iterating over i, we can write: 1 i log µk,i(θ) µk,i(θ(cid:48)) = + 1 i 1 i N(cid:88)(cid:96)=1 N(cid:88)(cid:96)=1 [Ai−t+1](cid:96)klog L(cid:96)(ξ(cid:96),tθ) L(cid:96)(ξ(cid:96),tθ(cid:48)) i(cid:88)t=1 [Ai](cid:96)k log µ(cid:96),0(θ) µ(cid:96),0(θ(cid:48)) . 29 (70) Under Assumptions 1 -- 2, thanks to the integrability of the log-ratios between the true distributions and the likelihoods implied by (5), through standard limiting arguments (see, e.g., [21], [22]) it is possible to determine the asymptotic behavior of (70) by: i) replacing the powers of matrix A with their limit A∞ in (12); and ii) applying the strong law of large numbers to conclude that: lim i→∞ 1 i log µk,i(θ) µk,i(θ(cid:48)) a.s. = N(cid:88)(cid:96)=1 = (cid:88)(cid:96)∈S = Dk(θ [A∞](cid:96)kE(cid:20)log ω(cid:96)kD[f(cid:96)L(cid:96)(θ ) − Dk(θ), (cid:48) f(cid:96)(ξ(cid:96),t) L(cid:96)(ξ(cid:96),tθ(cid:48)) (cid:48) )] −(cid:88)(cid:96)∈S − log f(cid:96)(ξ(cid:96),t) L(cid:96)(ξ(cid:96),tθ)(cid:21) ω(cid:96)kD[f(cid:96)L(cid:96)(θ)] (71) where in the second-last equality we used (4), and we performed the replacement [A∞](cid:96)k = ω(cid:96)k, which holds in view of the block representation in (12) since k is a receiving agent and since we adopt the indexing in (16). Now, in light of Assumption 3, we conclude that: lim i→∞ 1 i log µk,i(θ) µk,i(θ(cid:63) k) a.s. = Dk(θ(cid:63) k) − Dk(θ) < 0 (72) for all θ (cid:54)= θ(cid:63) is converging to zero. Since the belief function must sum to 1, the result in (21) holds. k. Since the denominator of µk,i(θ) µk,i(θ(cid:63) k) is bounded by 1, Eq. (72) implies that the numerator µk,i(θ) APPENDIX B PROOF OF THEOREM 2 Preliminarily, it is useful to introduce some auxiliary matrices. We let, for all θ = 1, 2, . . . , H: I(θ) (cid:44) 1H e θ − IH , (cid:62) and S In view of Eqs. (46) and (48), the definitions in (73) and (74) imply: B(θ) (cid:44) I(θ)D, C(θ) = B(θ) 1(cid:62)  . Bk = B(θ(cid:63) k), Ck = C(θ(cid:63) k). October 31, 2019 (73) (74) (75) DRAFT We continue by showing some useful properties of the matrix D under the considered Gaussian model. Let us focus on the representation in (63). It is a known result that the rank of a Euclidean distance matrix with n points in Rdim is at most dim + 2 [28]. Since in our case dim = 1, we, can write: 30 Moreover, for the cases S = 2 and S = 3 we have that: E2 = E3 = and, hence: rank(ES) ≤ 3. 0 (m1 − m2)2 (m2 − m1)2 0 (m2 − m1)2 (m3 − m1)2 0 (m1 − m2)2 0 (m3 − m2)2 1 2  1 2  , (m1 − m3)2 (m2 − m3)2 0 ,  (m1 − m2)2, det(E2) = − 1 4 (m1 − m2)2(m1 − m3)2(m2 − m3)2. 1 4 det(E3) = (76) (77) (78) (79) (80) (81) Therefore, when the points that determine the Euclidean distance matrix are all distinct, both the above matrices are full rank. Thus, when S = 2, we have that rank(ES) = 2. When S > 2, since E3 is full rank, and in view of (76), we have instead rank(ES) = 3. From the representation of D in (63), we then conclude that: Next we state and proof a useful lemma. Lemma 2: Let I(θ) be defined as in (73). Then, for all θ = 1, 2, . . . , H we have that: rank(D) = 2, 3, if S = 2, if S > 2. IH − I† (θ)I(θ) = 11(cid:62) 1 H Proof of Lemma 2: For ease of notation, in the following proof the explicit dependence on θ is suppressed, and we write I in place of I(θ). By definition of the Moore-Penrose inverse, matrix I† satisfies: Then we note that: II†I = I, (I†I) (cid:62) = I†I. I(IH − I†I) = I − II†I = I − I = 0, (82) (83) where in the second equality we used the first identity in (82). Equation (83) implies that the columns of (IH − I†I) belong to the null space of I, denoted by N (I) = {v : Iv = 0}. On the other hand, in view of (73) we can write: October 31, 2019 θ v − v = 1H vθ − v = 0, (cid:62) Iv = 1H e (84) DRAFT with vθ the θ-th element of v. As a result, Eq. (84) will be satisfied only if vh = vθ for all h = 1, . . . , H. Therefore, we obtain: 31 N (I) = {α1H : α ∈ R}, (85) further implying, in light of (83), that, for each h = 1, 2, . . . , H, the h-th column of IH − I†I is of form αh1H for some {αh}. On the other hand, since IH − I†I is symmetric in view of the second identity in (82), we conclude that αh = α for all h, namely, (86) (87) (88) (89) IH − I†I = α1H 1(cid:62) H for some α ∈ R. Finally, since in particular 1H ∈ N (I), we can write: (IH − I†I)1H = 1H − I†I1H = 1H , which, in view of (86), yields: α 1H 1(cid:62) H 1H = αH 1H = 1H ⇒ α = 1 H , and we have in fact proved (81). We are now ready to prove Theorem 2. Proof of Theorem 2: We will now show that rank(C(θ)) = 2 for all θ = 1, 2, . . . , H, which clearly implies the claim of the theorem in view of the second equation in (75). For the case H = S = 2, it is immediately seen that the matrix C(θ) (assuming, e.g., θ = 1) takes on the form: C(1) = 1 2 which reveals that rank(C(θ)) = 2. 0 1  0 d12 0 1 ,  (90) Let us move on to examine the other cases where H ≥ S (excluding H = S = 2). We will examine first the properties of the matrix B(θ) in (74). As done before, the dependence on θ is suppressed for ease of notation, and, in particular, we write B, C, and I in place of B(θ), C(θ), and I(θ), respectively. Applying Sylvester's inequality to the first equation in (74) we can write [29]: rank(B) ≥ rank(D) + rank(I) − H = rank(D) − 1, (91) where in the latter equality we used the fact that rank(I) = H − 1. Therefore, from (80) and (91) we conclude that: rank(B) ≥ 1, rank(B) ≥ 2, if S = 2 if S > 2. (92) (93) DRAFT October 31, 2019 Now we would like to see if equality is satisfied for the cases S = 2 (with H > 2) and S > 2 (with H ≥ S). To this end, we start by noticing that equality in Sylvester's inequality holds if, and only if, there exist 32 matrices X and Y that solve [29]: DX + Y I = IH , which in turn admits a solution if, and only if, [30]: (IH − DD † )(IH − I†I) = 0. Applying Lemma 2, from (95) we get: which means that the equality sign in (92) or (93) holds if, and only if: (IH − DD † ) 1H 1(cid:62) H = 0 1 H †1H = 1H DD (94) (95) (96) (97) In particular, we will now show that (97) does not hold for S = 2, while it holds for S > 2. Let us start with the case S = 2 (and H > 2). We will appeal to the representation of D in (63), which for the case S = 2 can be written as: D = 1 2 0 (m1 − m2)2 . (98)  (m2 − m1)2 (m3 − m1)2 ... (mH − m1)2 0 (m3 − m2)2 ... (mH − m2)2  October 31, 2019 Let us now consider the linear system Dv = 1H. From the first two rows of D, we get the unique solution: v = 2(m1−m2)−212. Considering now the third row, we get the identity (m3−m1)2 +(m3−m2)2 = (m1−m2)2, which is true only if the third point, m3, is equal to one of the previous points. We conclude that there exist no v such that Dv = 1H, which further implies that DD†1H (cid:54)= 1H Therefore, for S = 2 Eq. (92) gives rank(B) > 1, which since B is of dimension H × 2, with H > 2, implies that rank(B) = 2. Let us move on to examine the case S > 2 and H ≥ 2. It is known that, for an L × L Euclidean distance matrix M, one has M M†1L = 1L, implying that 1L belongs to the range space of M [31]. We can apply this result to the matrices ES and EH in (63), since they are proportional to Euclidean distance matrices. In particular, we can say that there exist vectors uS and uH such that ESuS = 1S, EH uH = 1H. In particular, one of the (infinite) solutions is given by u(cid:63) H = uS 0 . (99) DRAFT H = † 1H(cid:124)(cid:123)(cid:122)(cid:125)DuS F (cid:62) ES F EH−S  D(cid:124) (cid:123)(cid:122) (cid:125)D † DD = DD uS = DuS = 1H . 33 (100) (101) (103) (104) (105) (106) Applying now (99) into (63), we can write: 1H = EH u(cid:63) Equation (97) now follows by observing that: uS 0 = ES F  uS = DuS. We have in fact shown that (97) holds true for S > 2, which implies that (93) becomes an equality for S > 2. In summary, we have shown so far that rank(B) = 2 for all H ≥ S (but for the case H = S = 2, which has been examined separately). We will now use this result to prove the claim of the theorem, namely, that rank(C) = 2. Since C is obtained from B by adding an all-ones row, determining the rank of C from that of B amounts to check whether the row vector 1(cid:62) S lies in the row space of B, which is tantamount to ascertaining whether there exists z such that: (102) Since we exclude the case H = S = 2, we have always H ≥ 3. Now, let us consider an EDM E3 defined on 3 distinct points p1, p2, p3. Since in this case E3 is full rank, the system v(cid:62) 3 has the following (unique) solution: z (cid:62)ID = 1(cid:62) S . v (cid:62) 3 =(cid:104) e13+e12−e23 e13e12 e12+e23−e13 e12e23 e13+e23−e12 e13e23 3 E3 = 1(cid:62) (cid:105) , where we denoted by eij = 1/2(pi − pj)2 the (i, j)-th entry of E3. Let us now introduce the vector: (cid:62) H = [v (cid:62) 3 v (cid:62) H−3]. 0 Since, for H ≥ 3, we know that rank(EH ) = 3, we conclude that: (cid:62) H EH = 1(cid:62) H , (cid:62) 3 E3 = 1(cid:62) 3 ⇒ v v which, using the block representation of D in (63), yields: (cid:62) H D = 1(cid:62) S . H, that is, if v(cid:62) In view of (106), one solution z to (102) exists if z(cid:62)I = v(cid:62) v H lies in the row space of I. October 31, 2019 DRAFT On the other hand, from the definition in (73), we see that the matrix I can be represented as: 34 I = , (107)  0 0 ... 0 0 0 ... 0 0 −1 . . . 0 −1 . . . ... 0 ... 0 1 1 0 . . . 0 0 . . . 0 0 0 ... 0 . . . 0 . . . −1 1 0 0 . . . 0 . . . 1 −1 . . . 0 . . . 0 0 ... 0 . . . 1 0··· − 1  where the bold notation highlights the θ-th row and column. According to (107), the row space of I is: which is equivalent to: Row(I) = Row(I) =(cid:110)[α1 α2 . . . αH ] : α αh [α1 α2 . . . αH ] : αθ = −(cid:88)h(cid:54)=θ (cid:62)1H = 0(cid:111) . , (108) (109) Examining (103), from straightforward algebra it can be shown that v(cid:62) that v(cid:62) H ≥ S (excluding the case H = S = 2) that rank(C) = 2. 1H = 0. Using (109), we conclude that v(cid:62) H 13 = 0, which, in light of (104), implies H lies in fact in the row space of I, which finally implies, for 3 APPENDIX C PROOF OF THEOREM 3 We remark that in our setting the divergences are modeled as random variables, which implies that the value k is random as well. We should take this into account when proving the claim of the theorem. First, we of θ(cid:63) observe that: P[θ(cid:63) k is unique and rank(Ck) = S] = = P[θ(cid:63) k is unique and rank(C(θ(cid:63) k)) = S] We now show that, for all θ = 1, 2, . . . , H: = P[θ(cid:63) k = θ, rank(C(θ)) = S]. H(cid:88)θ=1 P[rank(C(θ)) = S] = 1 October 31, 2019 (110) (111) DRAFT It is useful to visualize the matrix C(θ) as follows: 35 . (112) dθ1 − d11 dθ2 − d12 dθ1 − d21 dθ2 − d22 ... ... dθ1 − d(θ−1)1 dθ2 − d(θ−1)2 . . . . . . dθS − d1S dθS − d2S ... . . . dθS − d(θ−1)S 0 0 . . . 0 dθ1 − d(θ+1)1 dθ2 − d(θ+1)2 . . . dθS − d(θ+1)S ... dθ1 − dH1 ... dθ2 − dH2 1 1 ... dθS − dHS 1 . . . . . .   C(θ) = BS−1(θ) bS(θ) 1(cid:62) S−1 1  . (114) The matrix C(θ) has H − 1 random rows (i.e., excluding the all-zeros and all-ones rows). Thus, when H > S there are at least S rows with random entries. These random entries are jointly absolutely continuous since i) so are the entries of D; and ii) the mapping from D to (the random entries of) C(θ) is non-singular.7 This implies that, for H > S: P[rank(C(θ)) = S] = 1, (113) which proves (111) for the case H > S. We switch to the case H = S. Let us denote by BS−1(θ) the sub-matrix of B(θ) obtained by deleting its last column, and with bS(θ) the last column of B(θ). We can write: We notice that BS−1(θ) depends only on the sub-matrix DS−1 that is obtained by deleting from D the last column. It is thus meaningful to introduce the set of matrices: (115) Recalling that BS−1(θ) contains an all-zeros row, we see that, given a matrix DS−1 ∈ E, there exists a unique sequence of weights: E (cid:44) {DS−1 : rank(BS−1(θ)) = S − 1} . w1, w2, . . . , wθ−1, wθ+1, . . . , wS, (116) to obtain the row vector 1(cid:62) S−1 as a weighted linear combination of the rows of BS−1(θ). Accordingly, given a matrix DS−1 ∈ E, the rank of C(θ) will be equal to S if the last row in C(θ) cannot be obtained as a linear 7For example, property ii) can be grasped by noting that, conditioned on dθ1, . . . , dθS, the random entries in (112) are jointly absolutely continuous. October 31, 2019 DRAFT combination of the rows of B(θ). In view of (114), this corresponds to check whether the linear combination of the elements in bS with the same weights is equal to 1, namely, if: 36 Consider now a matrix DS−1 ∈ E We have that: wh(dθS − dhS) = 1. (cid:88)h(cid:54)=θ wh(dθS − dhS) = 1(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) DS−1 = 0, P(cid:88)h(cid:54)=θ (117) (118) (119) (120) (121) since (also conditioned on DS−1) the random variables {dhS}, with h = 1, 2, . . . , H, are jointly absolutely continuous. We then conclude that: P[rank(C(θ)) = SDS−1] = 1, which implies (111) since, in view of the joint absolute continuity of the entries in D, we have that: P[rank(BS−1(θ)) = S − 1] = 1 ⇒ P[DS−1 ∈ E] = 1. If we now apply (111) in (110), we conclude that: P[θ(cid:63) k is unique and rank(Ck) = S] = The proof of the theorem will be now complete if we show that the probability of having a unique θ(cid:63) k is equal = P[θ(cid:63) k = θ] = P[θ(cid:63) k is unique ]. H(cid:88)θ=1 to 1. To this aim, by using (20) and (44), we see that: θ(cid:63) k = argmin θ∈Θ S(cid:88)s=1 xskdθs. (122) Let us consider the summations in (122) corresponding to different values of θ. Since the random variables {dθs} are jointly absolutely continuous (and since xk is not an all-zeros vector), the probability that two or (cid:4) more summations are equal is zero, which finally implies that θ(cid:63) k is unique. REFERENCES [1] V. Matta, A. Santos, and A. H. Sayed, "Exponential collapse of social beliefs over weakly-connected heterogeneous networks," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, May 2019, pp. 5267 -- 5271. [2] C. Chamley, Rational Herds: Economic Models of Social Learning. Cambridge, UK: Cambridge Univ. Press, 2004. [3] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social networks," Dyn. Games Appl., vol. 1, no. 1, pp. 3 -- 49, 2011. [4] V. Krishnamurthy and H. V. Poor, "Social learning and Bayesian games in multiagent signal processing: How do local and global decision makers interact?" IEEE Signal Process. Mag., vol. 30, no. 3, pp. 43 -- 57, May 2013. [5] A. Jadbabaie, P. Molavi, and A. Tahbaz-Salehi, "Information heterogeneity and the speed of learning in social networks," Columbia Business School Research Paper, pp. 13 -- 28, May 2013. October 31, 2019 DRAFT 37 [6] C. Chamley, A. Scaglione, and L. Li, "Models for the diffusion of beliefs in social networks: An overview," IEEE Signal Process. Mag., vol. 30, no. 3, pp. 16 -- 29, May 2013. [7] E. Yildiz, A. Ozdaglar, D. Acemoglu, A. Saberi, and A. Scaglione, "Binary opinion dynamics with stubborn agents," ACM Trans. Econ. Comput., vol. 1, no. 4, pp. 19:1 -- 19:30, Dec. 2013. [8] A. Nedi´c and A. Olshevsky, "Distributed optimization over time-varying directed graphs," IEEE Trans. Autom. Control, vol. 60, no. 3, pp. 601 -- 615, Mar. 2015. [9] B. Ying and A. H. Sayed, "Information exchange and learning dynamics over weakly connected adaptive networks," IEEE Trans. Inf. Theory, vol. 62, no. 3, pp. 1396 -- 1414, Mar. 2016. [10] H. Salami, B. Ying, and A. H. Sayed, "Social learning over weakly connected graphs," IEEE Trans. Signal Inf. Process. Netw., vol. 3, no. 2, pp. 222 -- 238, Jun. 2017. [11] X. Zhao and A. H. Sayed, "Learning over social networks via diffusion adaptation," in Proc. Asilomar Conference on Signals, Systems and Computers, Nov. 2012, pp. 709 -- 713. [12] L. Smith and P. Sorensen, "Pathological outcomes of observational learning," Econometrica, vol. 68, no. 2, pp. 371 -- 398, 2000. [13] D. Acemoglu, M. Dahleh, A. Ozdaglar, and A. Tahbaz-Salehi, "Observational learning in an uncertain world," in Proc. IEEE Conf. Decision Control (CDC), Dec. 2010, pp. 6645 -- 6650. [14] V. Krishnamurthy, O. N. Gharehshiran, and M. Hamdi, "Interactive sensing and decision making in social networks," Found. Trends Signal Process., vol. 7, no. 1 -- 2, pp. 1 -- 196, Apr. 2014. [15] D. Acemoglu, M. Dahleh, I. Lobel, and A. Ozdaglar, "Bayesian learning in social networks," Rev. Econ. Studies, vol. 78, no. 4, pp. 1201 -- 1236, Oct. 2011. [16] M. H. DeGroot, "Reaching a consensus," J. Amer. Statist. Assoc., vol. 69, no. 345, pp. 118 -- 121, 1974. [17] L. G. Epstein, J. Noor, and A. Sandroni, "Non-Bayesian learning," BE J. Theor. Econ., vol. 10, no. 1, pp. 1 -- 20, 2010. [18] D. Acemoglu, A. Ozdaglar, and A. ParandehGheibi, "Spread of (mis)information in social networks," Games and Economic Behavior, vol. 70, no. 2, pp. 194 -- 227, Nov. 2010. [19] A. Jadbabaie, P. Molavi, A. Sandroni, and A. Tahbaz-Salehi, "Non-Bayesian social learning," Games and Economic Behavior, vol. 76, no. 1, pp. 210 -- 225, Sep. 2012. [20] P. Molavi, A. Jadbabaie, K. R. Rad, and A. Tahbaz-Salehi, "Reaching consensus with increasing information," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 358 -- 369, Apr. 2013. [21] A. Nedi´c, A. Olshevsky, and C. A. Uribe, "Fast convergence rates for distributed non-Bayesian learning," IEEE Trans. Autom. Control, vol. 62, no. 11, pp. 5538 -- 5553, Nov. 2017. [22] A. Lalitha, T. Javidi, and A. D. Sarwate, "Social learning and distributed hypothesis testing," IEEE Trans. Inf. Theory, vol. 64, pp. 6161 -- 6179, Sep. 2018. [23] T. Cover and J. Thomas, Elements of Information Theory. [24] A. H. Sayed, "Adaptation, Learning, and Optimization over Networks," Found. Trends Mach. Learn., vol. 7, no. 4-5, pp. 311 -- 801, John Wiley & Sons, NY, 1991. 2014. [25] V. Matta and A. H. Sayed, "Consistent tomography under partial observations over adaptive networks," IEEE Trans. Inf. Theory, vol. 65, no. 1, pp. 622 -- 646, Jan. 2019. [26] A. Santos, V. Matta, and A. H. Sayed, "Local tomography of large networks under the low-observability regime," IEEE Trans. Inf. Theory, Oct. 2019, doi: 10.1109/TIT.2019.2945033. [27] G. Mateos, S. Segarra, A. Marques, and A. Ribeiro, "Connecting the dots: Identifying network structure via graph signal processing," IEEE Signal Process. Mag., vol. 36, no. 3, pp. 16 -- 43, May 2019. [28] I. Dokmanic, R. Parhizkar, J. Ranieri, and M. Vetterli, "Euclidean distance matrices: Essential theory, algorithms, and applications," IEEE Signal Process. Mag., vol. 32, no. 6, pp. 12 -- 30, Nov. 2015. [29] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge University Press, 2012. October 31, 2019 DRAFT [30] J. Baksalary and R. Kala, "The matrix equation AX − Y B = C," Linear Algebra and its Applications, vol. 25, pp. 41 -- 43, Jun. 1979. [31] J. C. Gower, "Properties of Euclidean and non-Euclidean distance matrices," Linear Algebra and its Applications, vol. 67, pp. 81 -- 97, Jun. 1985. 38 October 31, 2019 DRAFT
1708.02361
1
1708
2017-08-08T03:07:41
Verification & Validation of Agent Based Simulations using the VOMAS (Virtual Overlay Multi-agent System) approach
[ "cs.MA", "cs.AI", "cs.SE", "nlin.AO", "nlin.CG" ]
Agent Based Models are very popular in a number of different areas. For example, they have been used in a range of domains ranging from modeling of tumor growth, immune systems, molecules to models of social networks, crowds and computer and mobile self-organizing networks. One reason for their success is their intuitiveness and similarity to human cognition. However, with this power of abstraction, in spite of being easily applicable to such a wide number of domains, it is hard to validate agent-based models. In addition, building valid and credible simulations is not just a challenging task but also a crucial exercise to ensure that what we are modeling is, at some level of abstraction, a model of our conceptual system; the system that we have in mind. In this paper, we address this important area of validation of agent based models by presenting a novel technique which has broad applicability and can be applied to all kinds of agent-based models. We present a framework, where a virtual overlay multi-agent system can be used to validate simulation models. In addition, since agent-based models have been typically growing, in parallel, in multiple domains, to cater for all of these, we present a new single validation technique applicable to all agent based models. Our technique, which allows for the validation of agent based simulations uses VOMAS: a Virtual Overlay Multi-agent System. This overlay multi-agent system can comprise various types of agents, which form an overlay on top of the agent based simulation model that needs to be validated. Other than being able to watch and log, each of these agents contains clearly defined constraints, which, if violated, can be logged in real time. To demonstrate its effectiveness, we show its broad applicability in a wide variety of simulation models ranging from social sciences to computer networks in spatial and non-spatial conceptual models.
cs.MA
cs
1 Verification &Validation of Agent Based Simulations using the VOMAS (Virtual Overlay Multi-agent System) approach Muaz A. Niazi, Amir Hussain and Mario Kolberg Abstract-Agent Based Models are very popular in a number of different areas. For example, they have been used in a range of domains ranging from modeling of tumor growth, immune systems, molecules to models of social networks, crowds and computer and mobile self-organizing networks. One reason for their success is their intuitiveness and similarity to human cognition. However, with this power of abstraction, in spite of being easily applicable to such a wide number of domains, it is hard to validate agent-based models. In addition, building valid and credible simulations is not just a challenging task but also a crucial exercise to ensure that what we are modeling is, at some level of abstraction, a model of our conceptual system; the system that we have in mind. In this paper, we address this important area of validation of agent based models by presenting a novel technique which has broad applicability and can be applied to all kinds of agent-based models. We present a framework, where a virtual overlay multi-agent system can be used to validate simulation models. In addition, since agent-based models have been typically growing, in parallel, in multiple domains, to cater for all of these, we present a new single validation technique applicable to all agent based models. Our technique, which allows for the validation of agent based simulations uses VOMAS: a Virtual Overlay Multi-agent System. This overlay multi-agent system can comprise various types of agents, which form an overlay on top of the agent based simulation model that needs to be validated. Other than being able to watch and log, each of these agents contains clearly defined constraints, which, if violated, can be logged in real time. To demonstrate its effectiveness, we show its broad applicability in a wide variety of simulation models ranging from social sciences to computer networks in spatial and non-spatial conceptual models. Index Terms-Agent-based Modeling and Simulation, Multiagent System, Verification, Validation, Agent Oriented Software Engineering I. INTRODUCTION V ALIDATION of any simulation model is a crucial task[1, 2]. Simulations, however well-designed, are always only an approximation of the system and if it was so easy to build the actual system, the simulation approach would never have been used [3]. Of all the simulation models, agent-based modeling and simulation paradigm has recently gained a lot of popularity by being applied to a very wide range of domains such as [4-9]. Validation of models typically requires experts to look at data or animation as errors and un-wanted artifacts can appear in the development of agent-based models [10]. However, because of the complex nature of agent-based models comprising of multiple interacting entities and the strong dynamics and frequent emergence patterns in the system, it can be hard to validate agent-based models in the same way as traditional simulation models. In the case of agent-based simulations, it is even easier to fall into the trap of tweaking the variables, especially since occasionally, the inputs can tend to be quite numerous [11]. Because of the complex nature of agent based models and resulting emergence as shown in [12-14], coupled with an enormous variation possibility of the variables, the results of the simulation study can vary considerably by changing the range or even the step size of just one or two variables. Thus, it is vitally important to be able to validate the agent-based simulation. The problem however, comes from the grounds up since validation is not to be an after-thought; it needs to be initiated alongside at the start of the simulation study. Now, validation of agent based models can be quite a challenging task [15, 16]. One problem lies in the fact that validation typically requires SME (Subject Matter Experts) to analyze [3] the simulation data or animation for comparison with another system or model. However, because of appearance of complex phenomenon such as emergence of behavior, where one plus one is not necessarily two as it depends more on the two "ones" and the behavior of the addition operation as is the norm in complex systems as compared to complicated systems [17]. Thus it can be very difficult to be sure if the behavior that we are observing is truly representative of the actual system[18]. Also, it is important to note here that even models, which cannot be validated might have merit and use such as bookkeeping devices or as an aid in selling ideas or as a training aid or even as part of an automatic management system. In the social sciences literature and ACE (Agents in Computation Economics), empirical validation of agent-based models has been described in [19]. Alternate approaches to empirical validation are discussed in [20]. Replication of agent-based models has been considered very important by some authors and has been discussed in [21]. An approach of validation based on philosophical truth theories in simulations has been discussed in [22]. Another approach called "companion modeling" is an iterative participatory approach where multidisciplinary researchers and stakeholders work together continuously throughout a four-stage cycle: field study and data analysis; role-playing games; agent-based 2 and and design intensive model computational experiments social simulation has also been used for validation and calibration [24]. implementation; Agent-based [23]. In the past, although agent-based simulation has been shown to be useful in the validation of multi-agent systems[25, 26], multi-agent systems have not been used to validate agent- based models. On the other hand, simulations have been used in conjunction with software engineering for a long time[27]. Our work can be considered as pertaining to the last two stages of i.e. Agent-Based Model Design/Implementation as well as Intensive Computational Experiments. Specifically, in this paper, we present the following innovations: "Companion Modeling" • We show how to develop a VOMAS (Virtual Overlay Multi-Agent System), which can be used for the validation of agent based simulation models. • We thus further develop social science based validation techniques that can be applicable to both social science as well as other relevant domains. • We present an object-oriented software engineering based methodology for validation of agent-base models, which provides for both logging as well as animation based validation approaches in addition to test-case/invariant based approaches. The rest of the paper is structured as following: First we give an overview of the terms "Verification", "Validation" and "Credibility" as discussed in the literature. We also discuss how these terms have been considered traditionally in simulation models. Next, we give an overview of performing Validation using VOMAS. We show the design of VO (Virtual Overlay) and Logger agents. Next, we show an example of developing a VOMAS for an existing model from Agent- Based Modeling literature, and demonstrate its usefulness, and ease in validation. Finally we conclude the paper. II. VERIFICATION, VALIDATION AND CREDIBILITY Researchers transform real-world systems to models by applying abstraction. This transformation requires propagating concepts from the real world to useful computational models. These, in turn, are used to develop simulations. Simulation models, in essence end up giving back results which can be useful for the real world. As such, the more effective the abstraction mechanism, the better would be the expected real world benefits. A. Peculiarities of Agent-Based Models In case of agent-based models, the simulation comprises of one or more agents. These agents can work independently or else interact with each other. These computational entities, which are typically, simplifications of real-world counter-parts, need to have some meaningful semantics which can include anywhere from simple behaviors as well as variables for storing different to complex such as states, items, representations such as artificial neural networks, artificial immune systems, cognitive models etc. B. Definitions of the terms: Validation is the process by which we can determine if the model is a representation of the system.[3]. This is always performed while keeping the specific abstraction by the designer in mind. Verification is basically the debugging of the system where we ensure that the model that we build is working correctly. Credibility is achieved when the decision- makers and other key project personnel accept the model as well as its results as "correct". C. Correlation with VOMAS? VOMAS approach has been designed to cater for all kind of agent-based models. As such, it has capability to monitor spatial as well as non-spatial concepts in agent-based models. Fig. 1 VOMAS relation with an Agent Based Model D. Verification & Validation of agent-based models One sure way to establish the validity of agent-based model is to have Subject Matter Experts, who give the specification as well as examine the results and logs of simulation runs. VOMAS approach allows experts to be involved in the design of the agent-based model as well as the custom-built VOMAS from scratch. By involving SMEs from the start of the project, which are essentially equivalent to clients in the software engineering domain, VOMAS approach allows the simulation study to be a stronger candidate for success. III. VALIDATION USING VOMAS A. Validation in agent based simulations To understand VOMAS, let us examine figure 1. The Virtual Overlay Multi-agent System is created for each simulation model separately by a discussion between the simulation 3 specialist as well as the SMEs (Subject Matter Expert). When the actual simulation is executed, the VOMAS agents perform monitoring as well as logging tasks and can even validate constraints given by the system designer at design time. B. A Taxonomy of Agent-Based Validation techniques using VOMAS Now, let us examine how agent-based models are structured. Since agent based models have one or more agents, what these agents really mean in the real-world is entirely up to the designer of the simulation. These elements can be spatial in nature, where distance between agents in the simulation is important or else non-spatial, where there is no concept of distance in the simulation as shown in Fig. 2. In case of spatial models, it is also entirely possible that the exact distance may not be important, but the links between agents could be important. An example of this is HIV based models, where interaction between agents can be shown as links. A detailed description of each of these follows. Fig. 2 A Taxonomy of Agent Based Validation techniques 1. Visual Validation: Visual validation is a face validation technique based on an animation based validation technique where the SME can examine the animation to see if the behavior appears to be similar to that expected in the actual domain. 3. Spatial Validation: In spatial validation, the placement of agents in the simulation is important. This includes the placement of some of the VOMAS agents, which interact with the actual agent based simulation. 4. Non-Spatial Validation: In non-spatial validation, the actual distance is not important. These could be used to validate for aggregate data and constraints/invariants etc. 5. Networked or Link-Based Validation In spatial validation, it is possible that the actual placement is less important than the links between them. In case of social simulation, the example could be links to show social network friendships. In case of computer science based networks, these could represent e.g. Connectivity of Peer-to-Peer overlay networks. 6. Proximity Based Validation In this case, the actual proximity of agents to each other and especially to VOMAS agents is important. An example of this is pred-prey models where VOMAS agents can verify certain characteristics of agents passing by them at a certain time. 7. Log based validation: In log based validation, the SME can specify what things to be watched and logged so that they can be examined after the fact and see how e.g. the 2. Validation using VOMAS: In case of VOMAS, we can validate both spatially as well as non-spatially. populations evolved over time, or else how wireless sensor networks lost their power over time etc. 4 8. Constraint-based validation or Invariant Based Validation: It is entirely possible that the SME says that there are certain constraints, which should never be violated in a certain simulation experiment. If these were ever to be violated, then the simulation system should notify the user via some console or else log the event as a Fig. 3 Use case model of simulation model design and V&V special case. E.g. Wolves must never all die in a wolf-sheep predation. If all of the wolves die, then the simulation needs to be stopped etc. as further data collection exercise might not be useful. C. Analysis of VOMAS detailed verification (debugging) is checked by the simulation specialist but in case of any ambiguity, the SME can be referred. 2) Validate the Model This validation is done in three ways a. Validation using animations: This validation is face validation by the SME by means of analyzing the animations. b. Validation using Logs In this case, logs are generated based on watches specified by the SME. These logs show after the fact, the entire scenarios like black boxes from airplanes. c. Validation using Invariants These can be cases where the SME wants The analysis of VOMAS has been conducted based on a scenario-modeling approach. In figure 3, we see the use cases, some of which are described below. The rest should be self- explanatory and we are not listing them for shortage of space: 1) Verify the Model The SME verifies the model by means of execution of the simulations by the Simulation Specialist. The immediate either feedback even while running large scale parameter sweeps. So, if the invariants or constraints are ever violated, the user can be notified. Or at least, this is definitely logged in the simulation log. 5 3) Design and Develop Models b) Virtual Console Fig. 4 Class diagram of agents in a VOMAS This use case is to be conducted by the simulation specialist in conjunction with the SME. D. Design of VOMAS 1) Motivation One of the most popular approaches in Validation is the three step approach given in [28] . The approach has the following steps: Virtual Console agent is an agent, which can be used to dynamically display various messages at run-time. c) Invariant Invariant is any condition, which the designer of the VOMAS and the agent-based simulation, feels that must not be violated during the execution of the simulation. If the Invariant is violated, the violation is logged. Build a model that has high face validity. d) Logger Agent The logging capability is provided by the Logger Agent. e) Watch If the designer of the system wants some value to be observed, it can be made a watch. f) Watch Log Entry Each watch can also be logged as a logged entry. g) Invariant Violation Invariant violations can be logged at run-time to the Console Virtual agent or else the log as a log entry. h) Log Entry The base class of all log entries. i) Sim Agent This is an agent which is part of the agent based simulation model. a) b) c) Validate model assumptions Compare the model input-out transformations to corresponding input-output transformations for the real system. VOMAS has been designed to cater for both face validity as well as model assumptions and io-transformations. Model assumptions are ensured by the use of invariants. Face validation is ensured by means of various techniques based on spatial and non-spatial validation and animation-based validation. IO-transformations are ensured by means of essential logging components. Thus, in other words VOMAS provides the complete validation package. 2) Description of Class Diagram In figure 4, we see the class diagram of the VOMAS agents and how they interact with the agents in the simulation. The description of each of these agents is given below: a) VO Manager VO manager agent is the key agent handling the interaction of all of the other agents. 6 j) VO Agent These are agents which can be located spatially or non- spatially to monitor the entire simulation. IV. CASE STUDY Here, we present application of a VOMAS to an agent-based simulation mode of the "Simulation of the research process". Recently an agent-based simulation model of researchers attempting to present research in International publication venues was presented in [5]. We demonstrate how to develop and use the associated VOMAS on this model. A. The Publishing Researchers' model In the publishing researcher model, the abstraction is that researchers are modeled as agents in the simulation. The higher the publications of an agent, the higher the agent goes. Thus space in this simulation model is essentially used to show the capability of the researcher. A screenshot of the simulation model is shown in fig 5. For more details, the interested reader is advised to consult the original article. The model has been developed using NetLogo [29]. So, let us formally define some of the entities involved: SME: An Expert Researcher with experience of publishing in various venues. Objective of Simulation Study: To examine how the policies of researchers in selection of publication venues impacts an overall organization. Example Invariant: Basis: In a particular simulation experiment, enough time of simulation run should be given to ensure that journal preferring researchers publish at least ten times during the simulation. Invariant: If simulation stops before each journal preferring researcher is able to publish at least ten times, note an invariant violation in the console and/or the log. Example watches: Measure the total number of researchers with the best policy. Measure the number of researchers above a certain threshold. Measure the number of overall publications. Fig. 5 Screenshot of the researchers' model [5] showing researchers according to their publication count. (Lime = Conference preferring, Red = Journal Preferring, Cyan = No Preference) V. CONCLUSION AND FUTURE WORK In this paper, we have presented a novel framework for the validation of agent based simulation models. We have given a description of how VOMAS agents can be constructed for validation. As a case study, we have shown its application on an existing published model. In the future, we shall apply VOMAS on various types of simulation models and demonstrate how it can be effective in validation. Some of the models we intend to explore VOMAS application on, include pred-prey models, tumor growth models, Peer-to-Peer unstructured overlay network models. REFERENCES [1] [2] [3] [4] [5] [6] O. Balci, "Verification, validation, and accreditation," in Proceedings of the 30th conference on Winter simulation Washington, D.C., United States: IEEE Computer Society Press, 1998. J. Banks, J. S. C. II, B. L. Nelson, and D. M. Nicol, Discrete-Event System Simulation, Fourth ed.: Peason Education, 2005. A. M. Law, "How to build valid and credible simulation models," in Simulation Conference, 2008. WSC 2008. Winter, 2008, pp. 39- 47. M. Niazi and A. Hussain, " Agent based Tools for Modeling and Simulation of Self-Organization in Peer-to-Peer, Ad-Hoc and other Complex Networks," IEEE Communications Magazine, vol. 47, No. 3, pp. 163 - 173., March 2009. M. Niazi, A. Hussain, A. R. Baig, and S. Bhatti, "Simulation of the research process," in Winter Simulation Conference, Miami, FL, 2008, pp. 1326-1334. M. Niazi, "Self-organized customized content delivery architecture for ambient assisted environments," in Proceedings of the third international workshop on Use of P2P, grid and agents for the development of content networks, Boston, MA, USA, 2008, pp. 45-54. 7 T. H. Naylor and J. M. Finger, "Verification of Computer Simulation Models," Management Science, vol. 2, pp. B92-B101, 1967. Evanston, IL, 1999: Center for U. Wilensky, "NetLogo," Connected Learning Comp.-Based Modeling, Northwestern University, 1999. [28] [29] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] in Proceedings of N. Gilbert and K. G. Troitzsch, Simulation for the social Scientist, Second ed.: McGraw Hill Education, 2005. C. M. Macal and M. J. North, "Agent-based modeling and the 39th simulation: desktop ABMS," conference on Winter simulation: 40 years! The best is yet to come Washington D.C.: IEEE Press, 2007. A. Siddiqa, M. Niazi, F. Mustafa, H. Bokhari, A. Hussain, Noreen Akram, S. Shaheen, F. Ahmed, and S. Iqbal, " A New Hybrid Agent-Based Modeling & Simulation Decision Support System for Breast Cancer Data Analysis " in ICICT Karachi, Pakistan: IEEE Press, 2009. J. M. Galán, L. R. Izquierdo, S. S. Izquierdo, J. I. Santos, R. d. Olmo, A. López-Paredes, and B. Edmonds, "Errors and Artefacts in Agent-Based Modelling," Journal of Artificial Societies and Social Simulation, vol. 12, no. 11, 2009. T. W. Lucas, S. M. Sanchez, F. Martinez, L. R. Sickinger, and J. W. Roginski, "Defense and homeland security applications of multi-agent simulations," in Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come Washington D.C.: IEEE Press, 2007. A. Ilachinski, "Exploring self-organized emergence in an agent- based synthetic warfare lab," Kybernetes, vol. 32, pp. 38 - 76, 2003. M. Chli and P. De Wilde, "The Emergence of Knowledge Exchange: An Agent-Based Model of a Software Market," Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, vol. 38, pp. 1056-1067, 2008. M. Cartier, "An Agent-Based Model of Innovation Emergence in Organizations: Renault and Ford Through the Lens of Evolutionism," Comput. Math. Organ. Theory, vol. 10, pp. 147- 153, 2004. C. Bianchi, P. Cirillo, M. Gallegati, and P. A. Vagliasindi, "Validating and Calibrating Agent-Based Models: A Case Study," Comput. Econ., vol. 30, pp. 245-264, 2007. C. Bianchi, P. Cirillo, M. Gallegati, and P. Vagliasindi, "Validating and Calibrating Agent-Based Models: A Case Study," Computational Economics. J. H. Miller and S. E. Page, Complex Adaptive Systems: An Introduction to Computational Models of Social Life: Princeton University Press, 2007. J. S. Hodges and J. A. Dewar, "Is It You or Your Model Talking? A Framework for Model Validation," RAND Corporation, Santa Monica, California. G. Fagiolo, C. Birchenhall, and P. Windrum, "Empirical Validation in Agent-based Models: Introduction to the Special Issue " Computational Economics, vol. 30, pp. 189-194, October, 2007 2007. S. Moss, "Alternative Approaches to the Empirical Validation of Agent-Based Models," Journal of Artificial Societies and Social Simulation, vol. 11, no. 15, 2008. U. Wilensky and W. Rand, "Making Models Match: Replicating an Agent-Based Model," Journal of Artificial Societies and Social Simulation, vol. 10, p. 2, 10/31 2007. A. Schmid, "What is the Truth of Simulation?," Journal of Artificial Societies and Social Simulation, vol. 8, p. 5, 10/31 2005. O. Barreteau and e. al., "Our Companion Modelling Approach " Journal of Artificial Societies and Social Simulation, vol. 6, 2003. M. Makowsky, "An Agent-Based Model of Mortality Shocks, Intergenerational Effects, and Urban Crime," Journal of Artificial Societies and Social Simulation, vol. 9, No. 2, 2006. M. Cossentino, G. Fortino, A. Garro, S. Mascillaro, and W. Russo, "PASSIM; a simulation-based process for the development of multi-agent systems," Int. J. Agent-Oriented Softw. Eng., vol. 2, pp. 132-170, 2008. G. Fortino, A. Garro, and W. Russo, "From Modeling to Simulation of Multi-Agent Systems: An Integrated Approach and a Case Study," in Multiagent System Technologies, LNAI 3187: Springer-Verlag, 2004, pp. 213-227 R. S. Pressman, Software Engineering, A Practitioner's Approach, Sixth ed.: McGraw Hill, 2005.
1009.6050
1
1009
2010-09-30T07:18:20
Comments on "Consensus and Cooperation in Networked Multi-Agent Systems"
[ "cs.MA", "cs.NI", "math.OC" ]
This note corrects a pretty serious mistake and some inaccuracies in "Consensus and cooperation in networked multi-agent systems" by R. Olfati-Saber, J.A. Fax, and R.M. Murray, published in Vol. 95 of the Proceedings of the IEEE (2007, No. 1, P. 215-233). It also mentions several stronger results applicable to the class of problems under consideration and addresses the issue of priority whose interpretation in the above-mentioned paper is not exact.
cs.MA
cs
Comments on “Consensus and Cooperation in Networked Multi-Agent Systems” 1 = ,...,1 n i - tx )( & i (1) PAVEL CHEBOTAREV,2 Member IEEE Key words: consensus algorithms, cooperative control, flocking, graph Laplacian, networked multi-agent systems The objective of this note is to give several comments regarding the paper [1] published in the Proceedings of the IEEE and to mention some closely related results published in 2000 and 2001. I will focus on the graph theoretic results underlying the analysis of consensus in multiagent systems. As stated in the Introduction of [1], “ Graph Laplacians and their spectral properties […] are important graph-related matrices that play a crucial role in convergence analysis of consensus and alignment algorithms.” In particular, the stability properties of the distributed consensus algorithms ( ) = (cid:229) txta tx ,)( )( )( i ij j iNj for networked multi-agent systems are completely determined by the location of the Laplacian eigenvalues of the network. The convergence analysis of such systems is based on the following lemma [1, p. 221]: Lemma 2: (spectral localization) Let G be a strongly connected digraph on n nodes. Then rank( L) = n − 1 and all nontrivial eigenvalues of L have positive real parts. Furthermore, suppose G has c ‡ 1 strongly connected components, then rank(L) = n − c. Here, L is the Laplacian matrix of G, i.e., L = D – A, where A is the adjacency matrix of G, and D is the diagonal matrix of vertex out-degrees. I would like to make four comments regarding this lemma. 1. The last statement of the lemma is wrong. Indeed, recall that the strongly connected components (SCC’s) of a digraph G are its maximal strongly connected subgraphs. Let, for example, G be a converging tree (in-arborescence), i.e., a directed tree having a node r (a root) such that all nodes can be linked to r via directed paths (for r itself it is a path of length 0). Then G has c = n strongly connected components, so Lemma 2 yields that rank( L) = n − c = 0. But in fact, rank(L) = n − 1. To make the last statement of Lemma 2 valid, one should additionally require that all the SCC’s of G are disjoint. 2. In [1], the proof of the rank property (the first statement of Lemma 2) is attributed to [3]. Let me note L) for digraphs was solved earlier in [2]. More specifically, by that the general problem of finding rank( Proposition 11 of [2], for any digraph G, rank(L) = n – d, where d is the so-called in-forest dimension of G, i.e., the minimum possible number of converging trees in a spanning converging forest of G. Furthermore, it was shown (Proposition 6) that the in-forest dimension of G is equal to the number of its sink SCC’s (the SCC’s having no edges directed outwards) and that the in-forest dimension of a strongly connected digraph is one (Proposition 7)3. A corrected version of the above Lemma 2 immediately follows as a special case. 3. Remark 1 given after Lemma 2 says: “Lemma 2 holds under a weaker condition of existence of a directed spanning tree for G.” Here, by Lemma 2 the authors presumably mean the conclusion that rank(L) = n − 1 and by a directed tree they mean a converging tree. Next, they note that such a weaker condition has appeared in several papers published in 2003 and 2005. Let us observe that the existence of a spanning converging tree for G is tantamount to d = 1, so this statement follows from Proposition 11 of [2]. 1 Manuscript received August 14, 2008; revised January 22, 2010. Date of current version June 18, 2010. Digital Object Identifier: http://dx.doi.org/10.1109/JPROC.2010.2049911. 2 The author is with the Institute of Control Sciences, Russian Academy of Sciences, 65 Profsoyuznaya Street, Moscow 117997, Russia (e-mail: [email protected]; [email protected]). 3 These results have also been presented in [4]. = + i = ,...,1 n , - + )1 kx ( i kx )( i (2) (3) 4. For the study of alignment algorithms for arbitrary digraphs, it is important to observe that the statement of Lemma 2 that “all nontrivial eigenvalues of L have positive real parts” holds true for any digraphs [5, Proposition 9], and not only for strongly connected digraphs or digraphs with spanning converging trees. In Section II.C of [1], a discrete-time counterpart of the consensus algorithm (1) is considered n ( ) (cid:229) kxa kx ,)( )( e i ij j j 1 = 0>e is the step size. In the matrix form, (2) is represented as follows: where kx kxP )1 ( ( ), =+ is referred to in [1] as the Perron matrix with parameter e of G. IP L where e-= IP L The matrices were studied in [2] and [5]; in particular, (i) of Lemma 3 in [1] actually coincides e-= with Proposition 12 of [2]. Finally, let me mention a few additional results [2, 5] that are applicable to the analysis of consensus algorithms (1) and (3) and flocking algorithms. In the general case where the primitivity of a stochastic matrix P, P2, P3,… may diverge, the P is not guaranteed and the sequence long-run transition matrix m (cid:229) = k 1 P m P ¥P always exists and, by the Markov chain tree theorem [6, 7], it lim is considered. ¥ = - m ¥fi k 1 coincides with the normalized matrix J of maximal in-forests of G. J is the eigenprojector of L; by ( J = d, where d is the in-forest dimension of G. The columns of J span the Proposition 11 of [2], rank ) kernel (null space) of L; as a result, they determine the main properties of the trajectories of (1) and the flocking trajectories [8] in the general case. The elements of J were characterized in graph theoretic terms in '2 and 3 of [2]; a finite algebraic method for calculating J was proposed in [5] (see also [4]). Theorems Thus, [2, 5, 4] published before the recent avalanche of papers on distributed consensus algorithms ([2] and [5] were sent to J.A. Fax in 2001 and a reference to [4] was sent to R. Olfati-Saber apropos of Lemma 2 in 2003, both on their requests) contained the basic graph theoretic results needed for the analysis of these algorithms. A number of related theorems were proved in [9] and [10]. Some of these results were surveyed in [11]. REFERENCES [1] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proc. IEEE. vol. 95, pp. 215–233, Jan. 2007. [2] R. P. Agaev and P. Yu. Chebotarev, “The matrix of maximum out forests of a digraph and its applications,” Automation and Remote Control, vol. 61, pp. 1424–1450, Sep. 2000. [3] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1520–1533, Sep. 2004. [4] P. Chebotarev and R. Agaev, “Forest matrices around the Laplacian matrix,” Linear Algebra and Its Applications, vol. 356, pp. 253–274, 2002. [5] R. P. Agaev and P. Yu. Chebotarev, “Spanning forests of a digraph and their applications,” Automation and Remote Control, vol. 62, pp. 443–466, Mar. 2001. [6] A. D. Wentzell and M. I. Freidlin, “On small random perturbations of dynamical systems,” Russian Mathematical Surveys, vol. 25, no. 1, pp. 1–55, 1970. [7] T. Leighton and R. L. Rivest, “The Markov chain tree theorem,” Computer Science Technical Report MIT/LCS/TM–249, Laboratory of Computer Science, MIT, Cambridge, MA, 1983. [8] J. J. P. Veerman, G. Lafferriere, J. S. Caughman, and A . Williams, “Flocks and formations,” J. Statistical Physics, vol. 121, no. 5–6, pp. 901–936, 2005. [9] R. Agaev and P. Chebotarev, “On the spectra of nonsymmetric Laplacian matrices,” Linear Algebra and Its Applications, vol. 399, pp. 157–168, 2005. [10] R. Agaev and P. Chebotarev, “Which digraphs with ring structure are essentially cyclic?” Advances in Applied Mathematics, vol. 45, pp. 232–251, 2010. [11] P. Yu. Chebotarev and R. P. Agaev, “Coordination in multiagent systems and Laplacian spectra of digraphs,” Automation and Remote Control, vol. 70, pp. 469–483, Mar. 2009.
1802.01194
2
1802
2018-04-26T20:02:04
Anatomy of Leadership in Collective Behaviour
[ "cs.MA", "physics.soc-ph" ]
Understanding the mechanics behind the coordinated movement of mobile animal groups (collective motion) provides key insights into their biology and ecology, while also yielding algorithms for bio-inspired technologies and autonomous systems. It is becoming increasingly clear that many mobile animal groups are composed of heterogeneous individuals with differential levels and types of influence over group behaviors. The ability to infer this differential influence, or leadership, is critical to understanding group functioning in these collective animal systems. Due to the broad interpretation of leadership, many different measures and mathematical tools are used to describe and infer "leadership", e.g., position, causality, influence, information flow. But a key question remains: which, if any, of these concepts actually describes leadership? We argue that instead of asserting a single definition or notion of leadership, the complex interaction rules and dynamics typical of a group implies that leadership itself is not merely a binary classification (leader or follower), but rather, a complex combination of many different components. In this paper we develop an anatomy of leadership, identify several principle components and provide a general mathematical framework for discussing leadership. With the intricacies of this taxonomy in mind we present a set of leadership-oriented toy models that should be used as a proving ground for leadership inference methods going forward. We believe this multifaceted approach to leadership will enable a broader understanding of leadership and its inference from data in mobile animal groups and beyond.
cs.MA
cs
Anatomy of Leadership in Collective Behaviour Joshua Garland,1, a) Andrew M. Berdahl,1, 2 Jie Sun,3, 4, 5, 6 and Erik M. Bollt3, 6, 7 1)Santa Fe Institute, Santa Fe, NM 87501 2)School of Aquatic & Fishery Sciences, University of Washington, Seattle, WA 98195 3)Department of Mathematics, Clarkson University, Potsdam, NY 13699 4)Department of Physics, Clarkson University, Potsdam, NY 13699 5)Department of Computer Science, Clarkson University, Potsdam, NY 13699 6)Clarkson Center for Complex Systems Science, Clarkson University, Potsdam, NY 13699 7)Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY 13699 (Dated: October 17, 2018) 8 1 0 2 r p A 6 2 ] A M . s c [ 2 v 4 9 1 1 0 . 2 0 8 1 : v i X r a Understanding the mechanics behind the coordinated movement of mobile animal groups (collective motion) provides key insights into their biology and ecology, while also yielding algorithms for bio-inspired technologies and autonomous systems. It is becoming increasingly clear that many mobile animal groups are composed of heterogeneous individuals with differential levels and types of influence over group behaviors. The ability to infer this differential influence, or leadership, is critical to understanding group functioning in these collective animal systems. Due to the broad interpretation of leadership, many different measures and mathematical tools are used to describe and infer "leadership", e.g., position, causality, influence, information flow. But a key question remains: which, if any, of these concepts actually describes leadership? We argue that instead of asserting a single definition or notion of leadership, the complex interaction rules and dynamics typical of a group implies that leadership itself is not merely a binary classification (leader or follower), but rather, a complex combination of many different components. In this paper we develop an anatomy of leadership, identify several principle components and provide a general mathematical framework for discussing leadership. With the intricacies of this taxonomy in mind we present a set of leadership-oriented toy models that should be used as a proving ground for leadership inference methods going forward. We believe this multifaceted approach to leadership will enable a broader understanding of leadership and its inference from data in mobile animal groups and beyond. PACS numbers: 89.70.Cf,89.70.-a,87.10.Vg,02.50.Tt When observing the collective motion of animal groups (e.g., schooling, herding, or flocking), an immediate question is, what is the leadership structure? Who (if anyone) is in charge and who is following, and does such structure stay the same or change over time? Recent techno- logical advances in image processing and animal- mounted sensors make it possible to record the simultaneous movement trajectories of every an- imal in a group. Such abundance of data makes the present a promising time to progress in un- derstanding leadership structure in mobile animal groups. Despite the availability of data and the central importance of understanding leadership in collective motion, there is surprisingly little explicit mathematical description or even a con- sistent and well-defined approach to this subject. Here, as a first step toward addressing this de- ficiency, we construct a framework for inferring leadership in collective motion. We review var- ious sources and characteristics of leadership to provide an anatomy and a language for describ- ing the multifaceted aspects of leadership across a)Electronic mail: [email protected] a variety of animal societies. We then present a suite of leadership-focused toy models, which can be used as a proving ground for any proposed leadership inference method, before being naively applied to (empirical) data. Together, this lays the groundwork for a principled exploration of a perennial question: how is control of a collec- tive system distributed? Such understanding will not only contribute to the ecology and conserva- tion of group-traveling species, but will also aid in the design of control algorithms for emerging distributed technologies. I. OVERVIEW Mobile animals groups (e.g., flocks, herds, schools, swarms) are ubiquitous in nature. In such collective sys- tems, the interactions between individuals may be as im- portant as characteristics of the individuals themselves1. Insight into these interactions and their impact on the group dynamics is of fundamental importance for our un- derstanding of both the ecology of these systems2 as well as design and control principles underlying general com- plex systems3. A key challenge in the study of collective animal behav- ior is understanding how groups of organisms make deci- sions as a whole4, for example about where5 or when6,7 to go. Group decision-making processes range from despotic to shared8, although even in systems with shared or dis- tributed decision making there are likely inter-individual differences (e.g., sex, rank, personality, size, nutritional state, informational state) that produce asymmetry in influence. Models suggest that such heterogeneity is po- tentially important to group-level dynamics9,10, but in- ferring differential influence and leadership from empiri- cal data, though often attempted, is an open challenge. As we elaborate in some detail in this paper, a key step toward tackling this challenge lies in the recognition that the notion of leadership is not merely a simple, unidi- mensional concept. Instead, a rich palette of different types and forms of leadership often coexists, even for the very same system. Thus, we argue that a precursor step to the "correct" inference of leadership is the clarifica- tion of what (type of) leadership is sought of. Without such, any inferred leadership can potentially be deemed inappropriate. The need to distinguish between the definition and in- ference of leadership is standing out as a central problem partly because of the acceleration of technical progress that enabled collection of "big" data. For example, new technologies to collect the simultaneous trajectories of all members of a mobile animal group11, along with in- creases in computing power, make the near future a fruit- ful time to meet this challenge. Will having large amount of real-world data alone be sufficient to address ques- tions about leadership, or do we (still) need conceptual advances? As recently reviewed by Strandburg-Peshkin et al.12, most efforts to infer leadership have used po- sition within a group13 -- 16 (e.g., leaders are assumed to be at the front), initiator-follower dynamics17,18 or time- delayed directional correlations19 -- 23. Information theo- retic measures provide additional, potentially more pow- erful and less subjective, tools to infer leadership and influence24 -- 26. However, a central viewpoint of this pa- per is that any measurement of leadership needs to start by clarifying the particular type or form of leadership one is after. Without such clarification, the "leadership" re- sulted from the application of any inference method can be subject to misinterpretation, and perhaps more se- riously, lead to fundamentally flawed conclusions about the interaction mechanisms of an animal system. To illustrate the many facets of leadership and thus the need to distinguish between its definition and measure- ment, consider, for example, the case of migrating cari- bou. Older, more experienced individuals are thought to guide the migration-scale movements27, however, preg- nant or nursing females might have increased nutritional requirements28 and thus guide movements along that path towards habitat with better forage opportunities29. Therefore, who is leading depends on the time- and length-scale of the movements considered. Additionally, for some populations fall migration coincides with the 2 rut, so mating behaviors drive social interactions: a dom- inant male may attempt to herd females or drive other males away. Such a male is certainly influential, but perhaps should not always be considered a leader, at least in the context of the migration. Finally, whether or not an individual is a leader might depend on who (or which group) one is considering as a potential follower. A nursing (and thus infertile) female might be ignored by the libidinous male, but will be closely followed by her calf30. Because there are many scales and types of in- fluence/leadership, we argue that one should begin such explorations with a clear question and select analytical methods to match. The central goal of this paper is to develop a formal language and multifaceted framework for defining and (potentially) inferring the many aspects of leadership. In addition, we aim to provide a set of leadership-oriented toy models to serve as a proving ground for leadership inference methods. Thus our work here offers a practical language and set of tools for researchers hoping to match questions about leadership with the appropriate meth- ods while avoiding potential pitfalls. We hope that the combination of mathematical rigor, biological intuition, together with several real and synthetic examples will make our framework accessible and interesting to both biologists and applied mathematicians. II. GENERAL MATHEMATICAL FRAMEWORK To capture various forms of leadership, consider dy- namics of individuals (with potential interactions among them via a network) together with dynamics of the group determined by the individuals, modeled by the general form of ODEs: (cid:40) xi = f (Si1(t)x1(t), . . . , Sin(t)xn(t); µi(t); ξi(t)), y(t) = h(x1(t), . . . , xn(t)). (1) In this general model class, xi(t) represents the state of the i-th individual at time t (i = 1, . . . , n), S = [Sij(t)]n×n is the (time-dependent) adjacency matrix (also known as the sociality matrix) of a network en- coding the structure of interactions, where Sij (cid:54)= 0 if it is possible for j to (directly) impact the state of i. Further- more, µi(t) denotes the parameter (vector) associated with i, and ξi(t) is noise. Here a "parameter" can be anything that describes the heterogeneity of the individ- uals in the group. For example, in the Viscek model31, the parameter µi can represent the preferred direction an individual takes, or it can also be used to represent the speed of an individual that might differ from one to an- other, or both by associating a parameter vector to each individual. The function f models how the dynamics of each individual depends on their own state and pa- rameter(s), the state of others in the network, and noise. Finally, the state of the group, y(t), is determined by the state of the individuals through the function h; for (cid:80)n i=1 xi(t) de- example, taking h(x1(t), . . . , xn(t)) = 1 n fines the group state as the average of the individuals states. A separate and complementary perspective is to model/represent the individual and group dynamics as a multivariate stochastic process, focusing on stationary variables Xi(t) and Y (t). From this perspective, the re- lationship between the group variable and the variables are encoded in the conditional distribution function p(y(t)x1(t−), x2(t−), . . . , xn(t−)), (2) where t− = (t − τ, t) denotes time history of the system, taking into account a time lag of τ ∈ (0,∞). We point out that there is intimate connection between a dynamical system [such as one defined by Eq. (1)] and a stochastic process, generally through an underlying (er- godic) measure32, where the uncertainty associated with the state of the variables is generally related to the dis- tribution of initial conditions and noise in addition to the coupled dynamics. For a deterministic system, the randomness initiates exclusively from (experimental) im- perfection of choosing and determining the initial condi- tion, and the evolution of uncertainty can be treated as a stochastic process. Thus entropy methods are naturally associated even with otherwise deterministic dynamical systems Eq. (1) in terms of the associated stochastic pro- cess. From the stochastic representation (2) of the dynam- ics, we can define an individual's (observed) influence on the group using various forms of conditional mutual information. For example, the (unconditioned) mutual information (MI) I(xi(t−); y(t)) (3) measures the apparent influence of i on the group, aggre- gated over both direct and indirect factors. On the other hand, after factoring out indirect factors, the "net" influ- ence of i on the group can be measured by the conditional mutual information (CMI) I(xi(t−); y(t)x¯i(t−)), (4) where ¯i = {1, . . . , i − 1, i + 1, . . . , n}. As suggested re- cently by James et al.33, Eq. 4 may not capture influence entirely, therefore care should be taken when quantifying net influence in this way. Note that Eq. (1) itself does not uniquely determine the distribution in Eq. (2), due to the possibly different states/trajectories the system can follow depending on initial conditions, parameters, and other factors; unique ergodicity and fixed parameters are possible assumptions if we wish to discuss uniqueness. Equation (1) can be interpreted as modeling the possible interactions among the individuals, although these interactions may or not not be realized in a particular setting depending on the states the system operates in; on the other hand, the PDF in Eq. (2) encodes (intrinsic) dependence between the group variable and those of the individual variables 3 without necessarily matching the structural information in Eq. (1), even if such dependence comes from dynamics of Eq. (1). Next, we distinguish between intrinsic states of the sys- tem versus observed states, as a key aspect in mathemat- ical interpretation of any process, including group roles of leadership, is the concept of measurement of observ- ables, from the underlying process. In fact, the concept of leadership and information flow can be dramatically ob- scured depending on the details of the observables (ex- trinsic variables) relative to the underlying system (in- trinsic variables). We use xi(t) to represented the ob- served state regarding xi(t), and similarly, y(t) for the observed state regarding y(t). We represent the observa- tions over a finite time window, producing observational data { xi(t); y(t)}t∈I. (5) Proper characterization and interpretation of leader- ship requires the (subjective) identification of a "refer- ence frame", namely, choosing the (observable) variables, groups, as well as time and spacial scales. That is, we argue that defining such a frame needs to include making at least the following three choices: 1. Variables (e.g., position, velocity, acceleration, di- rection of motion or some combination of these). Depending on the choice of variables, different types of leadership can be defined and (potentially) identified. 2. Temporal resolution and time lag. What is the tem- poral resolution of the actions of interest (e.g., sec- onds, days, or years)? Additionally, there is an is- sue of time lag. How far into the future is an action thought to have potential impact? If the time lag is larger than the time-scale of the typical response to an individual's action, then each individual will appear to have a similar random influence on the others. On the other hand, too small of a time lag might prevent detection of the (time-delayed) dy- namics of the group in response to an individual's actions. 3. Definition of a group and what it represents. For example, a group can contain everyone within a spatial domain, or can be a certain class of individ- uals based on age, gender, etc. III. PRINCIPLE COMPONENTS OF LEADERSHIP In broad terms, we define leadership as an individual having asymmetric potential to impact the trajectory of agents in the group. As we explore below, the source of this asymmetrical impact or influence may be due to group structure, individual information or emerge from social interaction rules alone. Further, the distribution and time and length scales of the resulting leadership may vary considerably. In this section we construct a series of informative classifications which we will refer to as the components of leadership. We further divide these com- ponents into sources and characteristics of leadership. A. Sources of leadership Structural Leadership. Structural leadership encom- passes a wide range of leadership which fundamentally re- lies on the structure of the animal society. This structure could be an explicit dominance hierarchy, or more sub- tly due to unequal social influence due to semi-persistent traits (e.g., age, gender, reproductive status). Depend- ing on the particular taxa, the driving mechanism for such asymmetric interactions differ and deriving such a mechanism is not the purpose of this manuscript. For simplicity, we assume all of this rich societal structure has been pre-encoded in the sociality matrix defined in In particular, Sij (cid:54)= 0 if and only if j has the Eq. 1. capacity to lead i directly. Where "capacity to lead" is defined by the particular society. To formalize this component of leadership, let G be the directed graph associated with the sociality matrix S, where there exists an edge from j to i if Sij (cid:54)= 0. For each node (cid:96) ∈ G, denote the reachability set of node (cid:96) as F(cid:96). In particular, node k is a member of F(cid:96) if there exists a directed path from (cid:96) to k in G. If F(cid:96) (cid:54)= ∅ then (cid:96) is defined to have capacity for structural leadership. We define the set of individuals with non-zero capacity to exhibit structural leadership (have a nonempty reacha- bility set on the sociality matrix) as L. Of course, the degree to which an individual is a structural leader ex- ists on a continuum. Quantifying the strength of such leadership is a highly non-trivial and potentially system- specific task (e.g.,34 -- 36). However, to first order, indi- viduals with many individuals downstream of them and fewer individuals upstream of them in the sociality ma- trix will tend play a stronger leadership role, or at least have the potential to do so. In the same example, In our caribou example from the Introduction, we might expect to find strong hierarchical relationships be- tween males during the rut. With these hierarchies en- coded in the sociality matrix then the dominant males would be labeled as strong structural leaders and the weaker males would be members of various reachabil- ity sets. if a nursing offspring closely followed their mother, then the mother would ex- hibit structural leadership over her calf. Finally, note that while the mother is a structural leader to the calf, she may be influenced by a dominant male; making this mother a structural leader and a follower simultaneously and making the male an indirect structural leader of the calf. Therefore a binary classification of 'leader vs. fol- lower' is generally not appropriate. To further illustrate this point, consider the canonical 4 Figure 1. Hierarchical Leadership in Pigeon Flocks. Here each directed edge represents the capacity for an individual to lead as defined by Nagy et al.19. For example, L has the ability to lead J, and J has the ability to lead no one. example of hierarchical dynamics in pigeon flocks from Nagy et al.19 depicted in Figure 1. In this example, nodes C and J have no structural leadership capacity as they have empty reachability sets. All other nodes however have the capacity to lead at least one other individual and thus all have some degree of structural leadership capacity. Notice, that with the exception of node A, each of the remaining individuals both lead and follow, i.e., they have non-empty reachability sets and are also members of others reachability set. The strength of their structural leadership would roughly mirror their vertical position in Figure 1. Structural leadership is simply the capacity for a mem- ber of an animal society to lead other members of that society as dictated by the societies rules. In this sense structural leadership should really be seen more as a nec- essary but not sufficient condition for leadership to occur within a mobile animal group. However, in reality this component of leadership is quite important because it encodes the potentially important heterogeneity in inter- actions between specific pairs of individuals and more generally any hierarchies in the group. Informed Leadership. Informed leadership arises when a subset of the group are differentially informed and motivated to act on that information, e.g., a subset of the group senses a resource37,38, or has information about a migration route5,39. Such leaders may be anonymous9, or may indicate that they have information, for example by changing speed40 or signaling41. In the case of our migrating caribou, both the experi- enced individuals leading the long-scale migration move- ment, and the individuals responding to local food and predation cues provide complementary examples of in- formed leadership. Informed leadership generally arises from some under- lying intent or motivation e.g., hunger or fear. For this reason, while the concept of informed leadership is in- tuitively sensible, from a mathematical standpoint it is both difficult to define and perhaps impossible to accu- rately infer without additional knowledge of the system. Target-Driven Leadership. Target-driven leadership is a specific subset of informed leadership. A target- driven leader is an informed leader ("informed by tar- get") that uses a series of deliberate control inputs such as calls, explicit motions, etc. to guide a group toward a particular target state or set of target states. How- ever, not all informed leadership is target-driven. For example, when an individual from a group of animals detects a predator, that individual becomes "informed" and tries to move away, and such abrupt change of motion may cause the rest of the group to follow. In this case, the first-reacting individual exhibits informed-leadership, but its sole "target", if any, is to move away from the predator instead of trying to lead the entire group away from the predator. To be more precise, we characterize a target-driven leader as an individual that not only influences the group, but deliberately controls the group toward some target state. In addition, the removal of such an individual should result in the group not going towards the tar- get state. Mathematically, we define this component as follows. Given that A is a set of target states, then in- dividual i is a target-driven leader (with respect to A) if the net influence of i on the group (see Eq. 4) is nonzero and y(t) → A as t → ∞. (6) That is, the individual directly influences the group as a whole and that influence results in the group progressing toward the target states. An example of a target-driven leader is a sheep dog. These dogs runs behind a group of sheep and through an intentional series of signals such as barking, eye contact and body posture the dog deliberately controls the sheep herd toward a given target state such as a barn or field. Emergent Leadership. Asymmetrical influence, and thus leadership, may arise from social interactions rules alone, in the absence of social structure or differential in- formation; we term this emergent leadership. This would be the case if animals used anisotropic social interaction rules. For example when individuals are more influenced by other individuals that are in front of them, then indi- viduals in more frontal positions of the group are more influential, even if they have no additional information, motivation or status. Such emergent leadership has re- cently been shown to be the case in our migratory caribou example30. if Alternately, individuals are more influenced by faster-moving group-mates42, then those faster-moving individuals will have more influence. If those individuals are moving more quickly in response to information, or 5 to signal dominance, then this would be informational or structural leadership, respectively, but if the increased speed is purely a function of the group dynamics, this would be an example of emergent leadership. B. Characteristics of Leadership Distribution of Leadership. In animal groups deci- sions range from full distributed among all group mem- bers ('democratic') to dominated by a single or a few in- dividuals ('despotic')8,12. It can be informative to quan- tify the number of individuals involved in a leadership role within the group. Similar to12 we refer to this as the distribution of leadership which we define on a continuum that lies between centralized and distributed leadership. At the scale of the entire herd, we might expect our migrating caribou to fall somewhere on this spectrum, bookended by primate societies with an alpha individual on one end and leaderless fission-fusion fish schools on the other. If we consider the mother-calf pairs as subgroups, we would expect the mother to be a centralized leader. However, in a larger group containing many such pairs, we would expect distributed leadership shared between the mothers. The pigeon example in Figure 1 illustrates that many systems fall somewhere between these two ex- tremes. In this example nearly all of the individuals have some influence, yet it has a clear hierarchy so it is not fully decentralized; it therefore lies somewhere between centralized and distributed. Temporal Scale of Leadership. A leader may not be actively influencing the motion of other agents at all times and it is thus useful to quantify and understand the time scales for which a leader qualifies as a leader under any of the components of leadership. Here, we con- sider two notions of time scales -- consistency and gran- ularity. For the following discussion consider dynamics of individuals, represented by discrete-time observations {xi(t)}T t=0. Consistency of leadership is simply defined as the pro- portion of the observation window for which a leader qualifies as a leader. More specifically, we classify leaders as persistent over the observation window if it is identified as a leader for the entire time window. Conversely, we classify a leader as ephemeral if it only qualifies as a leader for some small time window [t, t + τ ], with τ (cid:28) T . A similar temporal leadership scale is presented in12 which ranges from variable to consistent but attempts to cap- ture the same notion. The granularity of leadership concerns the resolution of time steps for which an individual acts as a leader. For example, a leader for daily activities might be different from one that is for seasonal activities. We can check for granularity by altering the time step we examine the dynamics under. In particular, quantify leadership using only the observations {xi(kt)}T /k t=0 (k > 1) for a large range of k. If a leader only acts on a coarse basis then 6 a particular source of leadership. In particular, let G be a graph where there exists a directed edge from node j to node i if j has the capacity to lead i, where capacity to lead may be structural, emergent or informed leadership. Then the reach of agent i is the reachability set of i on G. Consider Figure 2, where the graph represents the po- tential for structural leadership. In this example, individ- ual G has a reachability set of {D, B, H, L, I, C, J} and thus those 7 agents are within the reach of structural leader G. Reach naturally lies on a continuum between local and global. If an agent exemplifies some form of leadership over all individuals this would be global reach; if an individual only leads some small subset of the group then this leader is considered local. In Figure 2 Agent A has global reach and agent I has local reach. In the case of our migrating caribou, the experienced migrants leading the entire herd on its broad migration path, would have global reach, while the mother leading her calf on a finer-scale would have local reach. Observability of Leadership. When we observe an animal society we do so imperfectly, mainly in two ways. First, any observed quantity is subject to noise and mea- surement errors. Secondly, and perhaps more impor- tantly, there may be elements of the society which go unobserved. Such hidden variables and states may in turn act in our interpretation of leadership. In fact, the strongest leadership might not be detectable if the data are not appropriate. Across various taxa, leaders may use vocal cues43,44, gestures45 or movements that are too fine to be picked up by GPS (e.g. pre-flight flapping46) to initiate or control movement. If the resulting movement is synchronized, leadership inference based on trajecto- ries will fail. Worse, if in the resulting movement, the least dominate individuals respond first to the cues, it could appear as though those individuals are leading. In the case of our migrating caribou, lead animals may stand up to signal departure, or motivate others to start moving. This would not be captured by GPS tags and so would be hidden to inference methods based on tra- jectories alone. Quantification of hidden leadership in practice is quite difficult by definition. Namely, if you have detected lead- ership it was observed. Doing this in theory however is quite trivial. As defined in Section II we define the full system dynamics via x, y, S (and/or some mix of these). When the system is being observed, the observed variables, denoted x, y, and S, can differ from the true ones. We term an individual's leadership role 'hidden' if it exhibits leadership defined in terms of the intrinsic variables (x, y, S) but does not appear to do so given the observed variables ( x, y, S); a leader that is not hidden is then called an observable leader. Figure 2. Reach of Agent G. Each node with a red circle is within the reachability set and thus the reach of agent G. they may not register as a leader for small k but may then register as a leader for some larger k. In contrast a fine-scaled leader may register for many k. In our migrating caribou example, the experienced in- dividuals leading the broad migration path exhibit lead- ership that is persistent, but perhaps has coarse granu- larity. In contrast, the leadership of those animals re- sponding to resources or predation threats along the way is ephemeral and has fine granularity. Time scales present several challenges when attempt- If the ing to infer leadership roles from a time series. granularity or observation window length do not match the natural time-scales of leadership then leadership events may be completely missed or misclassified. For example, consider a structural leader (cid:96) with the property that I(xi(t−); y(t)x¯i(t−)) = 0, i.e., a structural leader that does not directly influence the group -- although it has the potential to. Regardless of the inference method such a potential leader will always be misclassified. Sim- ilarly consider an informational leader that only leads when they are within some radius to a known resource. Say that this event only occurred for a very short time window [t, t+τ ], with τ (cid:28) T . If you only consider leaders that lead for the entire observation window, most aggre- gate measures will wash out such an ephemeral leadership event. For these reasons, carefully considering both con- sistency by studying sub samples of the data set as well as granularity by down sampling the data and retesting one will be able to obtain a much clearer picture of the leaders that are present in a mobile animal group. Reach of Leadership. The reach of a leader quantifies the members of the group that the leader has potential influence over, di- rectly and indirectly through subsequent interactions. Formally, we define the reach of a leader as the members of that leaders reachability set on a graph associated with C. Real World Animal Behavior and the Anatomy of Leadership IV. A MODEL SANDBOX FOR VALIDATING LEADERSHIP-INFERENCE METHODS 7 Here we discuss real world animal interactions, and we do so in a manner to emphasize the terminology of our anatomy of leadership taxonomy. We expect to find structural leadership in relatively stable animal groups, often having complex social hierar- chies, such as cetaceans, wolves, wild dogs, elephants and primates15,47 -- 50. The canonical example is the so-called 'alpha' individual in a primate society, who has some level of control over an entire group over a long period of time (assuming he society is stable)51. In our taxonomy, this dominant individual would be a persistent, centralized, structural leader with a large reach. It is important to note that in such societies, structural leadership may be well correlated with informational leadership. For exam- ple, a matriarch elephant may have better information about rarely visited water holes, as well as greater per- capita influence to lead her group to them. We expect informational leadership to dominate in an- imal groups composed of unrelated individuals and un- stable membership (i.e., fission-fusion dynamics), such as fish schools and bird flocks. A single arbitrary member of a fish school may perceive a respond to a threat, caus- ing those around it to also startle, or the entire group to make an evasive maneuver52. This is an example of centralized, ephemeral, informational leadership with a limited or global reach, depending how much of the group responded. Similarly, some fraction of the same school might have information about where or when a food re- source might occur and lead the entire school to that time-space location37,38,53. In our terms those fish are distributed, ephemeral, informational leaders with global reach. Informational leadership is also common for movement at long length scales. In flocks of pigeons, better informed individuals act as leaders during homing flights54. (How- ever, it should be noted that pigeons also exhibit a struc- tural hierarchy too19.) During migratory movements, older, more experienced, birds guide groups on efficient migration routes5,39. In both of these examples the in- formed birds are centralized, persistent, target-driven, in- formational leaders with global reach. In migrating white storks some individuals actively seek thermals updrafts, which are necessary for them to get efficient lift to complete the migration, while others tend to copy, by moving towards individuals who are al- ready in thermals55. This is a specific example of a gen- eral phenomenon, emergent sensing5, in which a group spans an environmental gradient and individuals in the 'preferred' end of the gradient alter their behaviour (pur- posefully or not) in a way that cause the entire group to climb the gradient41,56. In general such leadership would be distributed and ephemeral (although could be persis- tent if, like in the storks, the same individuals always find the thermals) informational leadership with global reach. Ultimately one would like to develop methods to in- fer and classify leadership from empirical data. This is of course a long-standing and non-trivial challenge, and a pragmatic approach is to first test inference methods on simulated data where the leadership type and dis- tribution is known because it is programmed in explic- itly. For mobile animal groups an obvious starting point is to modify classic flocking/schooling/herding models (e.g.,31,57,58) to include known leadership structures. In this section we first describe a canonical model of col- lective motion -- the so-called zonal model9,58. Following that, we modify the model to incorporate the various leadership sources and characteristics described in this paper. A. Basic Collective Motion Model Following Couzin et al.9,58, for each agent, numbered i = 1, .., N , and each time t, a position vector ci(t), a direction vector vi(t) and a speed si are maintained. At each time step agent i computes a desired direction di(t) based on neighbors in three different zones, depicted in Figure 3. Figure 3. Schematic of Zonal Flocking Model. The black triangle is the focal individual. The red ring demarks the zone of repulsion R. The blue circle is the orientation zone O, the focal individual attempts to align with the agents in this zone (blue triangles in the figure). The outer ring is the attraction zone A and the focal individual attempts to get closer to these agents (the green triangles in the picture). The resulting desired direction is then the sum of the green and blue vectors. The first zone to consider is called the repulsion zone and is denoted by R. This zone ensures that 'personal space' is maintained for each agent. If any other agent is in the repulsion zone R, for focal individual j, then the desired direction in the next time step is defined by di(t + ∆t) = −(cid:88) j(cid:54)=i j∈R cj(t) − ci(t) cj(t) − ci(t) . (7) This desired direction ensures that a collision will not occur at time t + ∆t. However, if for the focal individual R = ∅ then the focal individual attempts to get closer to agents in their attraction zone A and orient with agents in their orientation zone O. This is accomplished by choosing a desired direction at time t+∆t in the following way: di(t + ∆t) = α (cid:88) cj(t) − ci(t) cj(t) − ci(t) j(cid:54)=i j∈A + (1 − α) (cid:88) j(cid:54)=i j∈O (8) vj(t) vj(t) . Where α is a parameter that controls the relative strength of attraction and alignment. For example, a flock of geese -- dominated by alignment -- would have a relatively low α, while a swarm of insects -- dominated by attraction -- would have a relatively high α. The desired direction vector, d, is normalized to a unit vector d(t + ∆t) = di(t+∆t) di(t+∆t) . Next, to represent uncer- tainty stemming from limitations of sensory and cognitive abilities, this unit vector is transformed into d(cid:48)(cid:48)(t + ∆t) by rotating it by a small angle drawn from a circular- wrapped Gaussian distribution centered at zero. Finally, it is assumed that individuals can turn at a maximum rate of θ radians per unit time. Therefore, if the differ- ence between an individual's current direction, vi(t), and its desired direction for the next time step, d(cid:48)(cid:48) i (t + ∆t), is less than θ∆t then the desired direction is achieved and vi(t + ∆t) = d(cid:48)(cid:48) i (t + ∆t). Otherwise, that individual's direction vi(t + ∆t) is the result of rotating vi(t) by θ∆t radians towards their desired direction d(cid:48)(cid:48) i (t + ∆t). After the heading is assigned, the position at t + ∆t can be computed by ci(t + ∆t) = ci(t) + v(t + ∆t)si∆t, (9) where si is the speed of individual i. B. Explicitly Adding Sources of Leadership (emergent leadership). 8 Structural Leadership To add structural leadership we introduce a sociality matrix S = [Sij]N×N . Sij (cid:54)= 0 if agent i can be influenced by agent j. More generally, Sij is a continuous value that gives the relative influence of individual j on individual i. To take this into account the desired-direction computation is modified to weight the influence of each neighbor relative to Sij (rather than an equal weighting of everyone in A and O, i.e., cj(t) − ci(t) cj(t) − ci(t) di(t + ∆t) = α (cid:88) Sij j(cid:54)=i j∈A (1 − α) (cid:88) j(cid:54)=i j∈O + (10) Sij vj(t) vj(t) . Adding this sociality matrix to the base model allows for structural leadership to be explicitly built in. This is an advantage as you can then see if post-facto if the structural leadership placed in the model can be extracted by a candidate inference method. Informed Leadership To simulate informed leadership, a subset of the agents are given knowledge of a pre- ferred direction g (more generally each informed agent is given their own not necessarily equal preferred direction gi)9. This preferred direction may be part of a migration route or the direction of a prey or known resource. Non- informed group members, have no knowledge of g and may or may not know which individuals are informed. Following Couzin et al.9, to integrate this into the model the informed individuals balance between the social in- teractions and their preferred direction with a weighting term ω. In particular, informed individuals have a de- sired dircetion d(cid:48), given by d(cid:48) i(t + ∆t) = di(t + ∆t) + ωgi di(t + ∆t) + ωgi . (11) If ω = 0 the preferred direction is completely ignored and only social interactions are followed. As ω increases toward 1 the influence of the preferred direction is balanced with influence of the social interactions. With ω > 1 the preferred direction is favored over social interactions. While this base model captures a wide variety of flocking, swarming and schooling behavior it does not account for leadership explicitly. In order to explicitly test leadership inference methods, it is helpful to make a few simple modifications to this base model: (1) add a sociality matrix59 (structural leadership) (2) add "informed" individuals to the group9 (informed leadership) and (3) make interaction rules isotropic58 Emergent Leadership One way to make a test case for inferring emergent leadership, is to make interactions spatially asymmetric. In particular, one can simply add 'blind zones'58 to the model described in Eqs. 7-9. In this case the zones A and O are missing wedges behind them and individuals in those wedges are ignored. If these blind zones are large enough, individuals are more influenced by individuals in front of them30. C. Testing Characterizations of Leadership Distribution of Leadership Using the framework presented in the previous sections one can explore a variety of distributions of leadership, ranging from centralize to distributed12. For structural leadership, the spectrum could range from a sociality matrix with a hub structure (centralized) to a one with a random dense connectivity, or even fully connected (decentralized). For informed leadership, the fraction of the group having a non-zero value of ω would roughly span the spectrum of the distribution of leaderhip. We note that the distributions of structrural and informed leadership are potentially orthoginal. For example a group could have highly centralized structural leadership in tandem completely distributed informational leader- ship, or vise versa. Temporal Scale of Leadership Temporal consistency and granularity of leadership can be built into this leadership model by making the model parameters associated with leadership time dependent, e.g, [Sij(t)], ω(t) and g(t). For example, one could remove or change the preferred direction at regular time intervals by defining time-varying ω(t) and then see if an inference algorithm could detect this change. Reach of Leadership By setting specific examples of the sociality matrix one can experiment with a variety of leadership reach scenarios and test the ability of various inference measures to recover them. Observability of Leadership There is a vast set of variations that could be made to the framework presented here to encode potential for leadership to to be driven by non-trajectory based cues or signals43 -- 46,60. One obvious example (which is also ubiquitous in nature) is auditory signalling, which could provide long-range interactions41. D. A Potential Pitfall: Influence vs. leadership Consider a mobile-animal group where each member is governed by Eq. 9 and the direction is decided by Eqs. 7 & 10. Furthermore, define Si(i+1) = 1 and 0 otherwise for i ∈ {1, . . . , N − 1} and let α ∈ [0, 1]. This describes a simple chain topology, where each individual has the capacity for structural leadership over at most one other agent. In particular, each agent orients and attracts to (follows) at most one other agent in the group. However, it is important to note that every agent avoids collisions with all other agents (the sociality metrix applies to Eq. 10, but not Eq. 7). In this example the incidental social interactions, such as those caused by repulsion, cause a real prob- lem for the majority of influence/causal inference algo- 9 rithms. For example, if one blindly applied optimal causation entropy26 or transfer entropy61 to infer who leads whom then these algorithms would conclude an all-to-all leadership graph. By construction however we know this is incorrect and that the underlying influ- ence graph is a simple chain. The issue here is that these measures26,61, and causal inference from informa- tion in general, are not explicitly measuring leadership but reductions in uncertainty about a particular variable. In this example, the minor local repulsion interactions cause enough "information flow" over time to trigger these algorithms/measures. However, as discussed in Ap- pendix A conflating influence, information flow, causality and leadership is a non-trivial challenge, which is nicely highlighted by the present example. V. AFTERWARD Traditional approaches to leadership inference have fo- cused on a single defining characteristic, e.g., position within a group, social hierarchy, information flow or influ- ence. We believe that, in general, none of these concepts alone fully captures leadership. In this manuscript we have begun to show that a multifaceted approach where multiple axes of leadership are analyzed provides a more complete classification of the leadership structure. This formalism should serve to link questions about empirical systems with the appropriate analytical tools to address those questions. While this taxonomy we provided is surely not complete we hope that this effort will serve as a starting point for formalizing a multifaceted approach to leadership inference. Multiple technological advances in sensors, computer vision have led to the availability of more high-resolution collective motion data than ever before11. As such the near future is an opportune time to make meaningful advances in leadership inference. Causal inference and information theory show a lot of promise in this arena but as we have shown throughout this manuscript lead- ership is a highly intricate and multifaceted subject and neither causal inference nor information theory may be up for the task alone. We hope that as new inference algorithms come to be the formal language and toy mod- els developed here will serve as a proving ground. We believe that being able to carefully classify the compo- nents of leadership being inferred will be invaluable for practitioners and theorists as they begin to tackle all the high-resolution data as it becomes available. VI. ACKNOWLEDGMENTS JG and AMB were supported by Omidyar Fellow- ships from the Santa Fe Institute. AMB was also sup- ported a grant from the John Templeton Foundation. EB and JS were in part by the Army Research Office grant W911NF-16-1-0081, and JS by the Simons Foundation grant 318812, and EB by the Office of Naval Research grant N00014-15-1-2093. The opinions expressed in this publication are those of the authors and do not necessar- ily reflect the views of the John Templeton Foundation. REFERENCES 1T. Vicsek and A. Zafeiris, "Collective motion," Physics Reports 517, 71 -- 140 (2012). 2P. A. Westley, A. M. Berdahl, C. J. Torney, and D. Biro, "Col- lective movement in ecology: from emerging technologies to con- servation and management," (2018). 3P. W. Anderson, "More is different," Science 177, 393 -- 396 (1972). 4L. Conradt and T. J. Roper, "Consensus decision making in an- imals," Trends in ecology & evolution 20, 449 -- 456 (2005). 5A. M. Berdahl, A. B. Kao, A. Flack, P. A. Westley, E. A. Codling, I. D. Couzin, A. I. Dell, and D. Biro, "Collective animal naviga- tion and migratory culture: from theoretical models to empirical evidence," Phil. Trans. R. Soc. B 373, 20170009 (2018). 6B. Helm, T. Piersma, and H. Van der Jeugd, "Sociable schedules: interplay between avian seasonal and social behaviour," Animal Behaviour 72, 245 -- 262 (2006). 7A. Berdahl, P. A. Westley, and T. P. Quinn, "Social interactions shape the timing of spawning migrations in an anadromous fish," Animal Behaviour 126, 221 -- 229 (2017). 8L. Conradt and T. J. Roper, "Group decision-making in ani- mals," Nature 421, 155 (2003). 9I. D. Couzin, J. Krause, N. R. Franks, and S. A. Levin, "Effective leadership and decision-making in animal groups on the move," Nature 433, 513 -- 516 (2005). 10M. d. M. Delgado, M. Miranda, S. J. Alvarez, E. Gurarie, W. F. Fagan, V. Penteriani, A. di Virgilio, and J. M. Morales, "The importance of individual variation in the dynamics of animal col- lective movements," Phil. Trans. R. Soc. B 373, 20170008 (2018). 11L. F. Hughey, A. M. Hein, A. Strandburg-Peshkin, and F. H. Jensen, "Challenges and solutions for studying collective animal behaviour in the wild," Phil. Trans. R. Soc. B 373, 20170005 (2018). 12A. Strandburg-Peshkin, D. Papageorgiou, M. C. Crofoot, and D. R. Farine, "Inferring influence and leadership in moving ani- mal groups," Phil. Trans. R. Soc. B 373, 20170006 (2018). 13J. E. Smith, S. Gavrilets, M. B. Mulder, P. L. Hooper, C. El Mouden, D. Nettle, C. Hauert, K. Hill, S. Perry, A. E. Pusey, M. van Vugt, and E. A. Smith, "Leadership in mam- malian societies: Emergence, distribution, power, and payoff," Trends in Ecology & Evolution 31, 54 -- 66 (2016). 14J. S. Lewis, D. Wartzok, and M. R. Heithaus, "Highly dynamic fission -- fusion species can exhibit leadership when traveling," Be- havioral Ecology and Sociobiology 65, 1061 -- 1069 (2011). 15L. J. Brent, D. W. Franks, E. A. Foster, K. C. Balcomb, M. A. Cant, and D. P. Croft, "Ecological knowledge, leadership, and the evolution of menopause in killer whales," Current Biology 25, 746 -- 750 (2015). 16D. M. Jacoby, Y. P. Papastamatiou, and R. Freeman, "Inferring animal social networks and leadership: applications for passive monitoring arrays," Journal of The Royal Society Interface 13, 20160676 (2016). 17A. Strandburg-Peshkin, D. R. Farine, I. D. Couzin, and M. C. Crofoot, "Shared decision-making drives collective movement in wild baboons," Science 348, 1358 -- 1361 (2015). 18J.-B. Leca, N. Gunst, B. Thierry, and O. Petit, "Distributed leadership in semifree-ranging white-faced capuchin monkeys," Animal Behaviour 66, 1045 -- 1052 (2003). 19M. Nagy, Z. Akos, D. Biro, and T. Vicsek, "Hierarchical group dynamics in pigeon flocks." Nature 464, 890 -- 893 (2010). 20Z. ´Akos, R. Beck, M. Nagy, T. Vicsek, and E. Kubinyi, "Lead- ership and path characteristics during walks are linked to domi- 10 nance order and individual traits in dogs," PLoS computational biology 10, e1003446 (2014). 21L. Jiang, L. Giuggioli, A. Perna, R. Escobedo, V. Lecheval, C. Sire, Z. Han, and G. Theraulaz, "Identifying influential neigh- bors in animal flocking." PLoS Computational Biology 13 (2017). 22I. Watts, M. Nagy, R. I. Holbrook, D. Biro, and T. B. de Per- era, "Validating two-dimensional leadership models on three- dimensionally structured fish schools," Royal Society Open Sci- ence 4, 160804 (2017). 23H. Ye, E. R. Deyle, L. J. Gilarranz, and G. Sugihara, "Distin- guishing time-delayed causal interactions using convergent cross mapping," Scientific reports 5 (2015). 24W. M. Lord, J. Sun, N. T. Ouellette, and E. M. Bollt, "Inference of causal information flow in collective animal behavior," IEEE Transactions on Molecular, Biological and Multi-Scale Commu- nications 2, 107 -- 116 (2016). 25S. Butail, V. Mwaffo, and M. Porfiri, "Model-free information- theoretic approach to infer leadership in pairs of zebrafish," Phys- ical Review E 93, 042411 (2016). 26J. Sun, D. Taylor, and E. M. Bollt, "Causal network inference by optimal causation entropy," SIAM Journal on Applied Dy- namical Systems 14, 73 -- 106 (2015). 27S. Eyegetok, Tuktu, N. Project, and N. Hakongak, Thunder on the tundra: Inuit qaujimajatuqangit of the Bathurst caribou (Generation Printing, Vancouver, 2001). 28P. S. Barboza and K. L. Parker, "Allocating protein to reproduc- tion in arctic reindeer and caribou," Physiological and Biochem- ical Zoology 81, 835 -- 855 (2008). 29L. Conradt, J. Krause, I. D. Couzin, and T. J. Roper, "Lead- ing according to need in self-organizing groups," The American Naturalist 173, 304 -- 312 (2009). 30C. J. Torney, M. Lamont, L. Debell, R. J. Angohiatok, L.-M. Leclerc, and A. M. Berdahl, "Inferring the rules of social interac- tion in migrating caribou," Phil. Trans. R. Soc. B 373, 20170385 (2018). 31T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen, and O. Shochet, "Novel type of phase transition in a system of self-driven parti- cles," Physical review letters 75, 1226 (1995). 32E. M. Bollt and N. Santitissadeekorn, Applied and Computa- tional Measurable Dynamics (SIAM, 2013). 33R. G. James, N. Barnett, and J. P. Crutchfield, "Information flows? a critique of transfer entropies," Physical review letters 116, 238701 (2016). 34J. C. Flack and D. C. Krakauer, "Encoding power in communica- tion networks," The American Naturalist 168, E87 -- E102 (2006). 35E. R. Brush, D. C. Krakauer, and J. C. Flack, "A family of algo- rithms for computing consensus about node state from network data," PLoS computational biology 9, e1003109 (2013). 36C. De Bacco, D. B. Larremore, and C. Moore, "A phys- ical model for efficient ranking in networks," arXiv preprint arXiv:1709.09002 (2017). 37A. Strandburg-Peshkin, C. R. Twomey, N. W. Bode, A. B. Kao, Y. Katz, C. C. Ioannou, S. B. Rosenthal, C. J. Torney, H. S. Wu, S. A. Levin, and I. Couzin, "Visual sensory networks and effective information transfer in animal groups," Current Biology 23, R709 -- R711 (2013). 38S. G. Reebs, "Can a minority of informed leaders determine the foraging movements of a fish shoal?" Animal behaviour 59, 403 -- 409 (2000). 39T. Mueller, R. B. OHara, S. J. Converse, R. P. Urbanek, and W. F. Fagan, "Social learning of migratory performance," Science 341, 999 -- 1002 (2013). 40K. M. Schultz, K. M. Passino, and T. D. Seeley, "The mechanism of flight guidance in honeybee swarms: subtle guides or streaker bees?" Journal of Experimental Biology 211, 3287 -- 3295 (2008). 41C. J. Torney, A. Berdahl, and I. D. Couzin, "Signalling and the evolution of cooperative foraging in dynamic environments," PLoS Computational Biology 7, e1002194 (2011). 42B. Pettit, Z. ´Akos, T. Vicsek, and D. Biro, "Speed deter- mines leadership and leadership determines learning during pi- 11 Chaos: An Interdisciplinary Journal of Nonlinear Science 25, 043106 (2015). 66C. W. Granger, "Testing for causality: a personal viewpoint," Journal of Economic Dynamics and control 2, 329 -- 352 (1980). 67J. Sun, C. Cafaro, and E. M. Bollt, "Identifying the coupling structure in complex systems through the optimal causation en- tropy principle," Entropy 16, 3416 -- 3433 (2014). 68B. Russell, "Mysticism and logic," New Statesman (1913). 69B. Russell, "Human knowledge: Its scope and its limits," New York: Simon &Schuster (1948). 70J. Bigelow and R. Pargetter, "Metaphysics of causation," Erken- ntnis 33, 89 -- 119 (1990). 71J. Pearl and T. S. Verma, "A theory of inferred causation," in Studies in Logic and the Foundations of Mathematics, Vol. 134 (Elsevier, 1995) pp. 789 -- 811. 72J. Pearl, "Bayesian networks," (2011). 73J. Pearl, "The structural theory of causation," in Causality in the Sciences (Clarendon Press, Oxford, 2011) pp. 697 -- 727. 74B. Skyrms and W. L. Harper, Causation, Chance and Credence: Proceedings of the Irvine Conference on Probability and Causa- tion, Vol. 1 (Springer Science & Business Media, 2012). 75D. A. Freedman, "Linear statistical models for causation: A critical review," Encyclopedia of statistics in behavioral science (2005). 76L. Barnett, A. B. Barrett, and A. K. Seth, "Granger causal- ity and transfer entropy are equivalent for gaussian variables," Physical Review Letters 103, 238701 (2009). geon flocking," Current Biology 25, 3132 -- 3137 (2015). 43K. J. Stewart and A. H. Harcourt, "Gorillas' vocalizations during rest periods: signals of impending departure?" Behaviour 130, 29 -- 40 (1994). 44D. Fossey, "Vocalizations of the mountain gorilla (gorilla gorilla beringei)," Animal Behaviour 20, 36 -- 53 (1972). 45J. M. Smith and D. Harper, Animal signals (Oxford University Press, 2003). 46J. M. Black, "Preflight signalling in swans: a mechanism for group cohesion and flock formation," Ethology 79, 143 -- 157 (1988). 47A. J. King, C. M. Douglas, E. Huchard, N. J. Isaac, and G. Cowlishaw, "Dominance and affiliation mediate despotism in a social primate," Current Biology 18, 1833 -- 1838 (2008). 48K. Payne, Sources of social complexity in the three elephant species. (Harvard University Press, 2003). 49R. O. Peterson, A. K. Jacobs, T. D. Drummer, L. D. Mech, and D. W. Smith, "Leadership behavior in relation to dominance and reproductive status in gray wolves, canis lupus," Canadian Journal of Zoology 80, 1405 -- 1412 (2002). 50D. Lusseau and L. Conradt, "The emergence of unshared con- sensus decisions in bottlenose dolphins," Behavioral Ecology and Sociobiology 63, 1067 -- 1077 (2009). 51J. C. Flack, M. Girvan, F. B. De Waal, and D. C. Krakauer, "Policing stabilizes construction of social niches in primates," Nature 439, 426 (2006). 52S. B. Rosenthal, C. R. Twomey, A. T. Hartnett, H. S. Wu, and I. D. Couzin, "Revealing the hidden networks of interaction in mobile animal groups allows prediction of complex behavioral contagion," Proceedings of the National Academy of Sciences 112, 4690 -- 4695 (2015). 53K. N. Laland and K. Williams, "Shoaling generates social learn- ing of foraging information in guppies," Animal Behaviour 53, 1161 -- 1169 (1997). 54A. Flack, B. Pettit, R. Freeman, T. Guilford, and D. Biro, "What are leaders made of? the role of individual experience in de- termining leader -- follower relations in homing pigeons," Animal Behaviour 83, 703 -- 709 (2012). 55M. Nagy, I. D. Couzin, W. Fiedler, M. Wikelski, and A. Flack, "Synchronization, coordination and collective sensing during thermalling flight of freely migrating white storks," Phil. Trans. R. Soc. B 373, 20170011 (2018). 56A. Berdahl, C. J. Torney, C. C. Ioannou, J. J. Faria, and I. D. Couzin, "Emergent sensing of complex environments by mobile animal groups," Science 339, 574 -- 576 (2013). 57C. W. Reynolds, "Flocks, herds and schools: A distributed behavioral model," in ACM SIGGRAPH computer graphics, Vol. 21 (ACM, 1987) pp. 25 -- 34. 58I. D. Couzin, J. Krause, R. James, G. D. Ruxton, and N. R. Franks, "Collective memory and spatial sorting in animal groups," Journal of theoretical biology 218, 1 -- 11 (2002). 59N. W. Bode, A. J. Wood, and D. W. Franks, "The impact of social networks on animal collective motion," Animal Behaviour 82, 29 -- 38 (2011). 60C. R. Brown, M. B. Brown, and M. L. Shaffer, "Food-sharing signals among socially foraging cliff swallows," Animal Behaviour 42, 551 -- 564 (1991). 61T. Schreiber, "Measuring information transfer," Physical review letters 85, 461 -- 4 (2000). 62D. Darmon, E. Omodei, and J. Garland, "Followers are not enough: A multifaceted approach to community detection in on- line social networks," PloS one 10, e0134860 (2015). 63E. M. Bollt, "Synchronization as a process of sharing and trans- ferring information," International Journal of Bifurcation and Chaos 22, 1250261 (2012). 64J. Sun and E. M. Bollt, "Causation entropy identifies indirect influences, dominance of neighbors and anticipatory couplings," Physica D: Nonlinear Phenomena 267, 49 -- 57 (2014). 65C. Cafaro, W. M. Lord, J. Sun, and E. M. Bollt, "Causation entropy from symbolic representations of dynamical systems," Appendix A: Information Flow, Causality, Influence and Leadership Information theory provides sophisticated measures for rigorously quantifying concepts like "the reduction in un- certainty about the present state of X given past states of Y ." As such, these measures are often associated with concepts like information flow, causality, influence and even leadership -- and often all of these terms are used interchangeably. These measures are often viewed as less subjective inference methods because almost no assump- tions need to be made about the structure of the system being observed. As a result, information theory has be- come a popular tool for inferring leadership from time series19 -- 26,62. However, while influence, information flow and causality are all closely related to the notion of lead- ership, these concepts are inherently different and there- fore are not readily interchangeable. Furthermore, recent work has begun to show that these information measures fail to even capture information flow33 let alone leader- ship. The following appendix discuses information flow, causality and influence and provides motivation for why we do not believe any of these alone fully quantifies lead- ership. Information flow and entropy, as we have argued in previous mathematical works24,32,63, is a fundamental concept in coupled (dynamical) systems, and the associ- ated stochastic processes. Information theory, as formu- lated upon Shannon entropy and its variants, basically describes the average "surprise" one should attribute to observing a specific value or state of a random vari- able. More formally, such quantification of surprise or (un)predictability is referred to as "entropy" and can be defined rigorously as a function of the underlying proba- bility distributions. When the time evolution of multiple variables are considered, the state of a variable often de- pends on the history of a set of related variables, and such inter-variable dependencies can be viewed as "infor- mation flow". Explicit characterization of information flow in coupled systems can be done by quantifying how informative (again as a notion of surprise) one should be in measured observations conditioned on given previ- ous observations, giving rise to commonly used measures such as transfer entropy61 and causation entropy26,64,65. In other words, information flow describes the reduction in uncertainty regarding forecasts for predictions asso- ciated with conditioning on the past in various combi- nations. Thus whether by Granger causality66, trans- fer entropy61, causation entropy26,64,65,67, or some other method, the idea is to ask if there is a reduction in uncer- tainty with knowledge of the past of a perhaps coupled variable. Clearly, this question is universally relevant from a wide range of scientific fields of science or math- ematics. However, part of the theme of this paper is that these information flow concepts themselves are not sufficient or equivalent as leadership. Causation is a related but not identical con- 12 to statistical71 -- 75, from philosophical68 -- 70, cept as information flow. The notion of causal- ity has many interpretations, depending on the con- text, to dynamical61,64,66,76. Here we will avoid the philosophical direction entirely, but note that some of these do coincide with the others. Statistical perspectives are sometimes relevant to a stochastic process, especially from the in- fluential work of Pearl71 -- 73, associated with a calculus for understanding interventions, but not always relevant to our context. We are more so interested in understanding interpretations of causal influence, of a free running sys- tem, that is, a system that is passively observed rather than actively probed. As such, this relates more closely, almost synonymously to the concepts of information flow in a stochastic process, but not quite identically. We take the same perspective as Granger in his line of rea- soning that eventually lead to the 2003 award of the No- bel Prize in Economics; Granger's fundamental principles were that 1) cause happens before effect, and 2) a cause necessarily contains unique information concerning fu- ture states of its effect66. In details the so-called Granger causality is a specific computation that assumes a linear stochastic process, and as such, it was shown76 to be en- tirely equivalent to transfer entropy computed by other means (in information theoretic by the Kullback-Liebler divergence appropriately conditioned) in the special case of a linear stochastic process with Gaussian noise. So said, while the underlying principles of Granger are the same, the details of computation may differ. Influence can now be described within this formal- ized framework as related to, but somewhat distinct from leadership, depending on if we are relating interactions between agents in terms of information theory, reduc- tion of uncertainty, or some other underlying principle, including the potential goal of controlling the system. Consider that some agents in a group may be leaders, with various ways to interpret this phrase to be stated subsequently below. A measure of leadership may be as- sociated with information flow for example, or as a proxy for causal influences that leaders may change states, be- fore other agents, a concept which will follow analogously to cause that comes before effect. An influential mem- ber of a group is not necessarily a leader, although in some sense influence is a kind of leadership de facto in the sense that influence is comparable to the possibility to cause others to change their behavior (dynamics). So said then what is the difference between influence, causation, and leadership, from the perspective of infor- mation flow? In some interpretations then, influence or causation over others and leadership are almost synony- mous but with important distinctions. When leadership is viewed through the lens of reduction of uncertainty (thus measurable by causation inference and information flow), then causation and influence becomes a synonym for leadership. Therefore, if a leadership action is ac- tive and observable, then causation and information flow are relevant concepts that enable one to define and em- pirically score the leadership. However, there are other notions of leadership that are clearly beyond the scope of information flow. Herein, by using a taxonomy of lead- ership, we expand beyond the typical causation and in- formation flow concepts24,25,37 to allow for those features which may be missed through the narrow interpretation of entropy, including structure, degree to which agents are informed, distribution, time and space scales, and target-drive are some of the other aspects that we will discuss here. 13
1608.01430
2
1608
2018-02-12T12:42:16
Demand Control Management in Micro-grids: The Impact of Different Policies and Communication Network Topologies
[ "cs.MA" ]
This work studies how the communication network between proactive consumers affects the power utilization and fairness in a simplified direct-current micro-grid model, composed by three coupled layers: physical (an electric circuit that represents a micro-grid), communication (a peer-to-peer network within the micro-grid) and regulatory (individual decision strategies). Our results show that, for optimal power utilization and fairness, a global knowledge about the system is needed, demonstrating the importance of a micro-grid aggregator to inform about the power consumption for different time periods.
cs.MA
cs
Demand Control Management in Micro-grids: The Impact of Different Policies and Communication Network Topologies Florian Kühnlenz, Pedro H. J. Nardelli, Hirley Alves 1 8 1 0 2 b e F 2 1 ] A M . s c [ 2 v 0 3 4 1 0 . 8 0 6 1 : v i X r a Abstract -- This work studies how the communication network between proactive consumers affects the power utilization and fairness in a simplified direct-current micro-grid model, com- posed by three coupled layers: physical (an electric circuit that represents a micro-grid), communication (a peer-to-peer net- work within the micro-grid) and regulatory (individual decision strategies). Our results show that, for optimal power utilization and fairness, a global knowledge about the system is needed, demonstrating the importance of a micro-grid aggregator to inform about the power consumption for different time periods. Index Terms -- Communication networks, Agents-based sys- tems, Network topology, Smart grids, Decision making. I. INTRODUCTION The growth of communication networks within the electric power grid allows for different new applications to its end- users [1]. This, on its turn, increases the complexity involved in the management of such a system. In this context, there is a need to develop models that aim at capturing new features that might emerge [2], as for example synchronization of individual behaviors due to signals and incentive structures. Game theory illustrates one approach that can capture such features since it is able to model strategic interactions of individual agents. It is worth mentioning that this theory was firstly introduced to model distributed economic relations, but is now widespread within other research communities (e.g. [3], [4] and references therein). The present work focuses on electricity micro-grids (specific region that can be self-sustained in relation to the large power grid, e.g. isolated rural areas with local energy generation) and is related to the numerous studies done on the fields of economics [5], power systems [6], [7] and communication sys- tems [8]. Here we follow the ideas presented in [9], where the authors pointed out some limitations of the standard economic models for energy systems while indicating the importance of complexity science approaches. Like some articles as [6], [7], [10], [11], we incorporate here aspects from different fields to include how peer interactions or collective individual actions may affect the macro-level outcomes as in gossip- based algorithms or electricity markets. The authors are with the Centre for Wireless Communications (CWC) at University of Oulu, Finland. P. H. J. Nardelli is also with Laboratory of Control Engineering and Digital Systems, Lappeerntanta University of Tech- nology, Finland. This work is partly funded by Finnish Academy (n. 271150) and CNPq/Brazil (n.490235/2012-3) as part of the joint project SUSTAIN, by SRC/Aka BCDC Energy (n.292854) and by the European Commission through the P2P-SmarTest project (n.646469). Contact: [email protected] To do so, we use an agent-based model, recently proposed by the authors in [12], to model agents' interactions within a system constituted of three layers (physical, communication and regulatory, to be explained later) and then obtain a better understanding of both the inter- and intra-layer dynamics. We therefore expect to provide a different perspective about demand-side management policies [13] -- [16] that goes beyond individual utility maximization and purely competitive strate- gies (usual assumptions of many economic researches [9]). In specific terms, we extend our previous model of a fully distributed system operation by introducing an entity that provides a centralized signal. This was motivated by the demand control problem in direct current (DC) micro- grids. We consider three different scenarios related to how information is shared among consumers: no signaling (similar to [12]), global state signaling and pricing scheme. The first strategy is fully distributed, while the other two require an entity with global state information about the whole system; this entity is the micro-grid aggregator. Our main contribution is to assess these different demand-side management policies (without or with micro-grid aggregator) in both micro and macro levels looking at the agent decision dynamics and considering different communication network topologies. It is worth mentioning the present paper is the first attempt to study micro-grids using the model introduced in [12]. Our model is described as follows. The physical layer (a DC micro-grid) is a circuit composed by a power source and resistors in parallel. Individual agents (the proactive con- sumers, the "prosumers") can add, remove or keep the resistors they have. Agents' decisions aim at maximizing their own delivered power, which is a non-linear function dependent on the others' behavior, and they are based on (i) their internal state, (ii) their global state perception, (iii) the information received from their neighbors in the communication network, and (iv) a randomized selfishness related to their willingness of answering to a demand-side control request. Different peer- to-peer communication network topologies and randomized communication errors in the deployment of micro-grids are important aspects to be included as in [17], [18]. But differ- ently from other papers, we analyze here their systemic effects; for detailed results of communication network implementation in power grids using, for instance, spatial and/or temporal spectrum sharing, refer to [19] -- [23]. Looking at the proposed model, by individually modifying the peer-to-peer communication network topology and the demand-side management policies keeping fixed the other TABLE I NOTATIONS Notation t P Z A " t1, 2, ..., Nu Aztiu i P A Ni Ă A nrts P tN, N ` 1, ...u airts P N` rirts " nrts ´ airts Pirts ą 0 λirts P R λmin P R Sirts P t´1, 0,`1u si P r0, 1s perr P r0, 1s cavg P r0, 1s R RV Meaning discrete time set of agents; N is the system size set A without agent i agent i neighborhood set of agent i active number of resistors at t active resistors of agent i active resistors excluding agent i agent i consumed power [units of power] gain in power of agent i system-wide predefined minimum gain agent i's state: `1 (defect), 0 (ignore), or ´1 (cooperate) selfishness gene of agent i error probability in a communication link average value of cooperating agents resistor value added as a load by agents source resistor parameters including the link error probability, we expect to show how these factors affect the power utilization and fairness in the system for different number of agents. Note that our study assumes that each one of those three layers (physical, communication and regulatory) is equally important to deter- mine the system dynamics and the individuals' (re)actions. In this case, the system can neither be reduced to one or two of these layers nor the dynamics of the whole system cannot be assessed based on individual (typical) agents. Our previous results in [12] can be seen as the benchmark scenario where no demand-side management is considered; there we showed: (i) different communication network topolo- gies (ring and Watt-Strogatz-Graph [24]) lead to different levels of power utilization and fairness at the physical layer and (ii) a certain level of error induces more cooperative behavior at the regulatory layer. Now, if demand-side control or pricing schemes are considered, which is the focus of the present work, the system behaves in a more predictable manner and is less dependent on its size. In this case, the global knowledge about the system state enables much higher utilization and fairness, which indicates the need of an entity to guide the peer relations. It is important to say that, although there is a wide understanding that global signaling leads to more stable outcomes, this is not always the case; many times global signaling induces destabilizing collective behavior (e.g. [25] and references therein). The rest of this paper is divided as follows. Section II describes the multi-layer model employed here. Section III presents the numerical results used to analyze the proposed scenario. In Section IV, we discuss the lessons learned from our model, indicating potential future works. The most impor- tant symbols are presented in Table I. II. MULTI-LAYER MODEL A. Background The power grid has been thought as a one-way network, where the generators produce the electricity that needs to travel long distances in high-voltage transmission lines to arrive at the distribution network, which delivers the electricity to 2 final consumers [2], [12]. However, in order to integrate ever increasing wind and solar power, this network has to change in many ways. First, solar and wind energy need more physical space than classical power plants, since they are not just transforming energy from one high density form to another, but rather collecting low density energy while distilling it in to a high density form. Second, they will produce energy in a much less predictable and/or consistent way. This volatility in supply means that the consumption and distribution need to react to these changes, either though storing energy or shifting consumption in time. In this case, automation is needed to balance the system; therefore, the so-called smart grids are planned to heavily use informa- tion and communication technologies (ICTs) to collect and take autonomous actions. Communication technologies should then enable the grid to use electricity from diverse sources whenever they are available, delivering to wherever they are needed. This would improve the efficiency of both production and distribution since the smart grid is designed to provide the necessary capabilities to enhance the reliability of energy infrastructures, and decrease the impact of supply disruptions, as well as create new services and applications. To achieve the needed degree of automation to integrate volatile energy sources, the power grid needs to be coupled with the communication network. This creates a codepen- dency, where the power grid will only work when the com- munication system is working, which in turn will only work if the power system is working. Furthermore, the volatility of the power sources demands a new interaction paradigm between producers and consumers. Consumers need to react to changes in the supply, by shifting their demand, whenever possible, to synchronize with production. This means that the smart grid will also be much more coupled to a regulatory layer, which will influence consumer behavior and decisions. In summary, more than any specific technological challenge existing in the generation, transmission and distribution, a proper smart grid model should include the following different layers of analysis. ‚ Physical that electricity grids include intermittent sources of energy (e.g. solar panels or wind turbines), micro-grids and mobile batteries/loads (e.g electric ve- hicles). The energy interchange occurs in this layer, transported in form of electricity. ‚ Information networks to acquire, process and dissem- inate information respecting the specific application re- quirements. The communication between agents happens in this layer, which can be seen as the agent reality (i.e. the agent only knows about itself and whatever is communicated to it). ‚ Regulatory layer or markets where consumers and operators can interchange electricity, evolving differ- ent strategies under different exchange regulations. This layer therefore include the socio-economical context and decision-making processes, which directly affects the physical layer. Instead of analyzing each one of them separately, consider- ing the others as given (the most usual approach), this research will model these three layers as constitutive parts of the smart 3 Fig. 1. (a) Electrical circuit representing the physical layer of the system. The circuit is composed by a power source V and RV, and resistors of R in parallel, generating a current I. These resistors are related to N agents that can add, remove or keep the resistors under their control in the circuit. The minimum number of resistors an agent can have is one and there is no maximum. We also consider N as the size of the system. (b) The agents are connected in a communication network so that a given agent has access to the information related to the previous action of their first-order neighbours. In the ring topology ř illustrated here, every agent is connected with two other agents. In this case agent i is connected with agents i ´ 1 and i ` 1 with i " 1, 2, ..., N. In the ring topology, agents 1 and N are neighbors. (c) At time step t, the normalized power delivered Pallrts{Ptyp to the agents with rising number of resistors nrts in the system, where Ptyp " V 2 iPA Pirts with Pirts given by equation (1). (d) The decision tree representing the decision making RV process of each agent for each round. and Pallrts " grid system. By doing so, we will be able to provide a deeper understanding of the smart grid spatio-temporal multi-layer dynamics and the emergent systemic features that arise from them. It is important to say that this proposal is built upon the assumption that effective cross-layer management strategies targeting the realization of the ambitious goals planned for the smart grids can be only realized if the way that the system elements interact within one layer and across different layers is properly characterized. This approach is philosophically inspired by the Rus- sian/Soviet tradition of reflexive systems and control [26]. Such a perspective in their current version has two funda- mental aspects captured by our model: the importance of the information layer as the filter of the physical reality, and the reflexive effects of agents and contexts that they take their decisions. In other words, what individual agents perceive is as important as (or even more important than) what is actually happening in the physical layer. Their individual decisions at the regulatory layer, in turn, depend on a combination from their own internal state and their own perceptions of +−VRVIR1...Ra1...Agent1R1...RaNAgentN(a)Electriccircuitii+1i−1(b)Communicationnetwork0100200300400500n[t]/N0.000.050.100.150.200.250.30Pall[t]/Ptyp(c)Systempowerλ>λminrepeatpreviousstepany(Si[Ni]==−1)orrand()>siifai[t]>1:ai[t+1]=ai[t]−1rand()<siai[t+1]=ai[t]+1ai[t+1]=ai[t]yesnoyesnoyesno(d)Decisiontree the system state. The individual decisions, which are built upon different perspectives, will determine the physical layer dynamics, which shall affect the future decisions of individual agents (i.e. reflexive behavior). In practical terms, the present work is a multi-layer model of DC micro-grids, as part of smart grids, that considers also peer-to-peer exchange of information within a network with different topology; this model will be briefly described in the following. Our discrete-time, agent-based model assumes these three layers as constitutive parts of the system composed by an electric circuit as the micro-grid physical infrastructure, a communication network where agents exchange local informa- tion and a set of regulations that define the agents' behavior, as exemplified in Fig. 1. It is worth saying that this model -- as any other model -- is a clear simplification of the real grid. Our goal here is to put light on the systemic multi-layer dynamics, which is most often neglected. B. Agents' decision process As stated before the model assumes discrete time steps, denoted by t. Therefore, the interactions between agents might be viewed as a round-based game [27] based in the state Sirts, defined at Table I and discussed later on. At each step in time t, every agent aims to maximize its own consumed power. To achieve this goal, the agent has three options: ‚ Add a resistor R (defecting); ‚ Remove a resistor R (cooperating); or ‚ Do nothing (ignoring). ř We assume that the value of R is fixed and the same for all agents. Our preliminary investigation indicated that relaxing this assumption within a reasonable range of values has no significant effects on the system dynamics; then, we decided to use the homogeneous case for simplicity. The decision is based on the gain from the previous strategy Sirt´ 1s in order to decide its new state Sirts in the following manner. If the gain λirt ´ 1s is greater than or equal to a system-wide predefined minimum λmin, the agent continues to its (successful) strategy at time t, i.e. Sirts " Sirt ´ 1s. If λirts ă λmin, then agent i compares its strategy with its neighborhood Ni, which is related to the communication network and will be defined later in this section. jPNi In the case that a majority of the neighborhood is cooperat- Sjrt´ 1s ă 0, this will appear to agent i as an ing, e.g. indication that the system is in a condition of overusing. The agent will then also change to a cooperative state, leading to Sirts " ´1. Otherwise, the agent decision will be related to its individual selfishness as follows: a random number between 0 and 1 is drawn to be compared to its own selfishness gene si in order to decide whether it will start cooperating or not. Each agent is assigned with selfishness gene at the beginning of the simulation, which is also a random number between 0 and 1. In the case of not cooperating, another random number is drawn and once again compared to the selfishness gene si, but now to decide if stays inactive (i.e. Sirts " 0) or adds another load in the circuit (i.e. Sirts " `1). The agent decision procedure is shown in Fig. 1 (d). 4 C. Communication network The communication network enables agent i to know the state Sjrt ´ 1s of the agents j P Ni which are in his neighborhood. We assume that agent j always transmits its actual state Sjrts to agent i. However, the communication links can also experience errors. An error event means the received message by agent i contains a different information than agent j has sent. So that if SjÑirt ´ 1s " Sjrt ´ 1s is the state information send from j to i and SjÑirt´ 1s be the " ı information received by i. We assume that error events are independent and identically distributed (i.i.d.) such that the probability of the event: SjÑirt ´ 1s ‰ SjÑirt ´ 1s " perr for all t P Z, i P A Pr and j P Ni, Prrs refers to the probability that a given event occurs. The network is a bidirectional graph so that an error at i Ñ j does not imply an error at j Ñ i, and vice-versa. If an error happens, the received information SjÑirt ´ 1s is assumed to be i.i.d. between the other possible states. In this study we compare two different communication networks [24]: ‚ Ring: Each agent connects to exactly two other nodes to form a ring. It is a simple deterministic topology. The agents have then the same degree. ‚ Watt-Strogatz-Graph: Random graph that has small- world properties, namely short average path lengths and high clustering. In this case, the agents have, in average, similar degrees. We did not consider here Barabasi-Albert graphs since the scenario under investigation presents a similar macro-level behavior to Watts-Strogatz, as shown in [12]. D. Physical system In the physical systems as presented in Fig. 1, there exists an optimal number of resistors that leads to the maximum power delivered from the source to the agents. If the delivered power is below the maximum on the right, then there will be a gain by removing a resistor until the system has reached such point. Conversely, if it is below on the left, then there will be a gain by adding a resistor. One may ask the following question: Is it possible for the agents to reach the optimal point with limited knowledge about the system? In the presence of a central controller this would be a fairly easy problem. First, we need to find the number of resistors that leads to optimal power to then distribute them among the agents. This kind of solution resembles time division schemes in computer networks or cellular systems [28]. However, as discussed before, in the absence of a centralized controlling entity, the agents only have a limited knowledge about other agents. In any case, the agents have some information about the state of the system based on their own power consumption and the decision done. At time-step t, the power each agent consumes Pirts with i P A " t1, ..., Nu and is given by: airts µ paavgrts ` µq2 , Pirts " Ptyp (1) 5 Fig. 2. On the left: change in the average cooperation cavg depending on the system size N. On the right: examples of a typical system behavior as a function of time t where the points (pixels) represent the agent state Sirts such that red means defection, white cooperation, and black = doing nothing for N " 1000 (top), N " 100 (middle) and N " 10 (bottom). The system parameters are: λmin " 0.0005, RV " 2 Ω, R0 " R{N " 200 Ω, perr " 0.01 and V " 1 V. The communication network is configured as Watts-Strogatz graph. RV RV , µ " R where Ptyp " V 2 , airts is the number of active resistors the agent i possesses, rirts is the number of active resistors in the system excluding the source resistor RV and the ones controlled by agent i, and aavgrts " pairts`rirtsq{N. The physical system is then described by its size N, the ratio µ of the resistance values and the power source V . The resistors are scaled so that the optimal average number of ? is independent of N while the voltage might resistors avg be scaled with N to have a constant ratio of power per agent, as explained later on. The gain that agent i experiences at time-step t is then defined as: a ` III. NUMERICAL RESULTS In this section, we present our main results. We first revisit the results introduced in [12] where no demand-side manage- ment signaling is considered and the agents try to achieve a global optimum solely based in their local information. We then present our new results evaluating the effects of such factors on the system dynamics in comparison with our baseline model. Once again, it is important to say that the numerical results to be presented only exemplify the impact of different ways of signaling on the multi-layer system dy- namics. Although qualitative changes are expected to happen consistently, the actual numerical values depend on the actual signal construction. λirts " Pirts ´ Pirt ´ 1s Pirt ´ 1s " ∆Pi Pirt ´ 1s . (2) A. Baseline model This implies that the agents only use the information about the previous time-step t ´ 1. If we expand (2) using (1), the resulting equation that determines λirts becomes more complicated. To make the analysis clearer, we choose to apply the following approximation: λirts « dPi Pirts « ∆airts airts ´ 2 N 1 aavgrts ` µ p∆rirts ` ∆airtsq , (3) such that the gain λirts is now a function of the variations in agent i's own number of resistors ∆airts " airts´airt´1s and in the number of resistors controlled by other agents ∆rirts " rirts ´ rirt ´ 1s, as well as the average number of resistors aavgrts and the system parameters N and µ. In Fig. 2 one can see the inherent dynamics of the system when no demand-side management is done and the communi- cation network topology is a random graph. We identify two phenomena that are important for our analysis, as explained next. First, we see that the average number of cooperators varies with the size of the system, showing a very high number of cooperation for larger systems. However, as we will see later in Fig. 2, this is not sufficient to understand the system dynamics. This high level of cooperation is not necessarily a universally good outcome. The second phenomena is a change in behavior of the system for different sizes. While for small systems we see an almost checkerboard like distribution of white (coopera- tion) and black (defection) dots, mid-sized systems show a strikingly different image, in this case we now see a wave- like pattern where a large front of cooperation establishes and then suddenly brakes down. This is again in contrast to the 101102103sizelog(N)0.50.60.70.80.91.0cavgN=1000N=100tN=10 6 Fig. 3. Typical behavior of very small (N " 5), small (N " 10), medium (N " 100) and large systems (N " 1000). The small systems can operate much closer to the optimum, while mid-size systems show big jumps after stable periods. The system parameters are λmin " 0.005, RV " 2 Ω, R0 " R{N " 200 Ω, perr " 0.01 and V " 1 V. The communication network is configured as a ring. picture for large systems where the behavior is dominated by cooperation with some sparsely distributed red dots. The resulting changes in the power delivery can be seen in Fig. 3, which shows that only very small systems of less then 10 agents are able to stay very close to the optimum, while systems of more then 10 agents start to deviate from it. These curves also reflect the wave-like behavior for mid- sized systems, where the number resistors drops due to almost global cooperation. This brings the system close to the optimal point, when the number of resistors rises once again. For large systems, it does not get close to the optimum. However, it is more stable and predictable than the other cases. The background of how this global behavior emerges from the local interactions is found in our previous work [12]. Here, we will view this intrinsic unstable performance as a undesirable outcome. In the next subsection, we will explore ways to prevent this behaviors by using demand-side signaling with different communication topologies. As we will see later, our goal is to provide a global indication via either direct signaling or pricing so the agents can use this information to make their individual decisions. B. Demand-side management and the micro-grid aggregator Let us first define the power utilization Putil as the fraction of power that is utilized by the system and the available power: Putil " 4 Ptyp Pi,avg, (4) ÿ iPA T´1ÿ t"0 where Pi,avg is the time average power of agent i computed as: Pi,avg " lim TÑ8 1 T Pirts. (5) The first demand-side management policy is based on a global signal that every agent receives and labeled signal in the figures. In Fig. 4, we can see the results of such a global signal that is sent to all agents when the system is beyond the optimal point. The results are shown in comparison to the base case, labeled "basic graph" as presented in the previous subsection. This signal might be interpreted as a way for a micro-grid operator to implement a demand response mechanism when the system is experiencing a peak in consumption, while supply is very limited. Such a system are already found in the reality. As discussed in [29], the Scottish Island Eigg uses a traffic light system to signal its inhabitants the state of supply in the micro-grid. 0.00.20.40.60.81.0PutilN=5t0100200300400500600700aavgaoptavgN=10taoptavgN=100taoptavgN=1000taoptavg 7 Fig. 4. Power utilization for different communication strategies and topologies depending on the system. The green line shows the utilization for the basic model. The red and brown lines are from the simulations with global demand response signal. Fig. 5. Power utilization for step pricing and agents with utility function described in this section. The green line shows the utilization for the basic model. From the agents' view, this signal provides a global informa- tion about the system so they do not have to rely only on their neighbors. This global information is assumed to be reliable and is treated in the same way as the neighbor information: if the signal is present and the agent experiences a small gain, it starts cooperating. As we can see in Fig. 4, the signal enables the system to reach the optimum point seems independent from its size. This contrasts with the original system, where on average is not possible for any size to reach such high states of power utilization, regardless of the communication network topology. The second demand-side management policy is the intro- duction of a two-stage real time price for all agents. For this purpose, we have to adapt our model further. Instead of just maximizing its own power demand, the agents now have to maximize their utility value taking the price into account. The price function needs to reflect the state of the system as a signal of overuse (when necessary). In order to build such a function, we first need to build an utility function that reflects how the power demand is valued. We adopted the following utility from [30], [31]: UαpPirts, ωiq " ωPi ´ α # , 2 P 2 i if 0 ď Pi ă ω if Pi ě ω α α ω2 2α where Pi being the power consumption while α and ω determine how consumption is valued. The function is chosen so that there exists a linear marginal benefit up to a certain point, at which the benefit does not increase anymore with higher consumption. In our case, we keep α fixed at 0.2 while ωi is uniformly distributed between 2.05 0.05, representing different values of consumers about the importance of power consumption. The price function, meanwhile, is modeled as a simple step # function: prts " if nrts ď nopt if nrts ą nopt , p1 p2 assuming that p1 " 0.2 and p2 " 5. The cost for each user is then calculated by multiplying the consumption with the current price: cirts " prtsPirts. The agent decision process itself is similar, but now, in- stead of optimizing the received power, the agents are now optimizing their benefit (the utility minus the cost): birts " UαpPirts, ωiq ´ cirts. The results using the proposed scheme can be viewed in Fig. 5. We can once again see that the results are much better than the one presented in Section III-A. However, if we compare the case of a simple ring graph (brown curve, labeled "util ring") describing the neighborhood versus a more meshed topology from Watts-Strogatz graph (green, labeled "util graph"), the communication network (where local information about the neighbors are transmitted) has still a an influence on the final outcome. This effect seems to be more pronounced for small networks. However, mid-sized systems, which are the most critical size when no signaling is considered, still experience stable outcomes, comparable to the global signal policy. IV. DISCUSSION AND FINAL REMARKS In our previous contribution [12], we showed that a simple direct current micro-grid system composed by three con- stituent layers (physical, informational and regulatory) may present emergent dynamics at macro-level. This kind of very unpredictable behavior that arises is normally undesirable to manage the system and is related to a lack of global information. This paper shows that it is possible to counteract this behavior when some kind of global signaling based on the micro-grid aggregator. One strategy is to send direct signals to end-users when the micro-grid is overused, while the other is a indirect signal through a price function. The first strategy is a rather simple way of providing each agent with global information about micro-grid aggre- gate power consumption. This strategy enables a more stable outcome, which is much less influenced by other parameters of the simulation, like the communication network topology. The second strategy in its turn maps the original power op- timization into a cost-benefit optimization, where each agents wants to achieve the individual optimal power usage consid- ering price and utility value of the consumed power. While similar outputs could be demonstrated with this approach, it is necessary to point out that the choice of parameters to achieve a stable outcome in the scenario is much more complicated. In 100101102103104log(N)0.00.20.40.60.81.0Putilsignalringsignalgraphbasicgraph100101102103104log(N)0.00.20.40.60.81.0Putilutilgraphutilringbasicgraph 8 [14] B. D. S. Callaway and I. A. Hiskens, "Achieving Controllability of Electric Loads," Proceedings of the IEEE, vol. 99, no. 1, 2011. [15] W. Zhang, Y. Xu, S. Li, M. Zhou, W. Liu, and Y. Xu, "A distributed dynamic programming-based solution for load management in smart grids," IEEE Systems Journal, vol. PP, no. 99, pp. 1 -- 12, 2016. [16] V. Pradhan, V. S. K. M. Balijepalli, and S. A. Khaparde, "An effective model for demand response management systems of residential electric- ity consumers," IEEE Systems Journal, vol. 10, no. 2, pp. 434 -- 445, June 2016. [17] Q. Li, Z. Feng, W. Li, T. A. Gulliver, and P. Zhang, "Joint spatial and temporal spectrum sharing for demand response management in cognitive radio enabled smart grid," IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1993 -- 2001, 2014. [18] A. A. Khan, M. H. Rehmani, and M. Reisslein, "Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols," IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 860 -- 898, 2016. [19] P. H. Nardelli, M. de Castro Tomé, H. Alves, C. H. de Lima, and M. Latva-aho, "Maximizing the link throughput between smart meters and aggregators as secondary users under power and outage constraints," Ad Hoc Networks, vol. 41, pp. 57 -- 68, 2016. [20] M. C. Tomé, P. H. Nardelli, H. Alves, and M. Latva-aho, "Joint sampling-communication strategies for smart-meters to aggregator link as secondary users," in 2016 IEEE Energy Conference (ENERGYCON) International. [21] A. S. Cacciapuoti, M. Caleffi, and L. Paura, "On the probabilistic deployment of smart grid networks in tv white space," Sensors, vol. 16, no. 5, p. 671, 2016. [22] A. S. Cacciapuoti, M. Caleffi, F. Marino, and L. Paura, "Enabling smart grid via tv white space cognitive radio," in 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 568 -- 572. [23] A. S. Cacciapuoti et al., "Mobile smart grids: Exploiting the tv white space in urban scenarios," IEEE Access, vol. 4, pp. 7199 -- 7211, 2016. [24] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, "Complex networks: Structure and dynamics," Physics reports, vol. 424, no. 4, pp. 175 -- 308, 2006. [25] P. H. Nardelli and F. Kühnlenz, "Why smart appliances may result in a stupid energy grid?" arXiv preprint arXiv:1703.01195, 2017. [26] V. Lepskiy, "Evolution of cybernetics: Phylosophical and methodological analysis," in 2017 World Organisation of Systems and Cybernetics, 2017, to appear. [27] M. Archetti and I. Scheuring, "Review: Game theory of public goods in one-shot social dilemmas without assortment," Journal of Theoretical Biology, vol. 299, pp. 9 -- 20, 2012. [28] I. Marsic, Computer networks: Performance and quality of service. Rutgers University, 2010. [29] A. Yadoo, A. Gormally, and H. Cruickshank, "Low-carbon off-grid electrification for rural areas in the united kingdom: Lessons from the developing world," Energy Policy, vol. 39, no. 10, pp. 6400 -- 6407, 2011. [30] M. Fahrioglu and F. L. Alvarado, "Designing cost effective demand management contracts using game theory," in IEEE Power Engineering Society 1999 Winter Meeting, vol. 1. IEEE, 1999, pp. 427 -- 432. [31] P. Samadi et al., "Advanced demand side management for the future smart grid using mechanism design," IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1170 -- 1180, 2012. [32] F. Kühnlenz and P. H. J. Nardelli, "Agent-based model for spot and balancing electricity markets," in 2017 IEEE International Conference on Communications Workshops (ICC Workshops). the non-trivial cases, where the sum of the demanded power of all agents exceeds the maximum available power, the outcome is highly dependent on the choice of not only the price levels but also the valuation of the power given by the variables α and ωi. These facts suggest that real time pricing in combination with demand response, which is often proposed as the way to utilize changes in available power, needs to be finely tuned in order to achieve a stable outcome. In other words, pricing does not inherently guarantee optimal usage and stability for the micro-grid. Rather, the outcome of the first strategy indicates that a direct response to capacity constraints without the intermediate pricing layer is much easier to implement in a stable manner. In any case, our results reinforce the importance of the micro-grid aggregator as a signaler of the global system state information for a stable peer relation between prosumers in the micro-grid. We expect to further develop this simulation by adding generation capabilities in the prosumers together with a more complete market description, as indicated by our initial results [32]. ACKNOWLEDGMENTS We would like to acknowledge the computing facilities of CSC - IT Center for Science Ltd. (Finland) that was used to run the simulation scenarios. REFERENCES [1] S. Bera, S. Misra, and J. J. Rodrigues, "Cloud Computing Applications for Smart Grid: A Survey," IEEE Transactions on Parallel and Dis- tributed Systems, no. c, pp. 1 -- 1, 2014. [2] P. H. J. Nardelli et al., "Models for the modern power grid," The European Physical Journal Special Topics, vol. 223, no. 12, pp. 2423 -- 2437, 2014. [3] A. H. Mohsenian-Rad et al., "Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid," IEEE Transactions on Smart Grid, vol. 1, no. 3, pp. 320 -- 331, Dec 2010. [4] Y. Wang et al., "A game-theoretic approach to energy trading in the smart grid," IEEE Transactions on Smart Grid, vol. 5, no. 3, pp. 1439 -- 1450, May 2014. [5] W. Saad, Z. Han, H. V. Poor, and T. Basar, "Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications," IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 86 -- 105, 2012. [6] J. Engels, H. Almasalma, and G. Deconinck, "A distributed gossip-based voltage control algorithm for peer-to-peer microgrids," in 2016 IEEE International Conference on Smart Grid Communications (SmartGrid- Comm. IEEE, 2016, pp. 370 -- 375. [7] H. Almasalma, J. Engels, and G. Deconinck, "Peer-to-peer control of microgrids," arXiv preprint arXiv:1711.04070, 2017. [8] S. Safdar, B. Hamdaoui, E. Cotilla-Sanchez, and M. Guizani, "A survey on communication infrastructure for micro-grids," in 2013 9th Inter- national Wireless Communications and Mobile Computing Conference (IWCMC), pp. 545 -- 550. [9] C. S. Bale, L. Varga, and T. J. Foxon, "Energy and complexity: New ways forward," Applied Energy, vol. 138, pp. 150 -- 159, 2015. [10] F. L. Alvarado, J. Meng, and C. L. DeMarco, "Stability analysis of interconnected power systems coupled with market dynamics," IEEE Transactions on Power Systems, vol. 16, no. 4, pp. 695 -- 701, 2001. [11] J. W. Simpson-Porco, F. Dörfler, and F. Bullo, "Synchronization and power sharing for droop-controlled inverters in islanded microgrids," Automatica, vol. 49, no. 9, pp. 2603 -- 2611, Sep. 2013. [12] F. Kühnlenz and P. H. Nardelli, "Dynamics of complex systems built as coupled physical, communication and decision layers," PloS one, vol. 11, no. 1, p. e0145135, 2016. [13] S. Gottwalt et al., "Demand side management: A simulation of house- hold behavior under variable prices," Energy Policy, vol. 39, no. 12, pp. 8163 -- 8174, 2011.
1412.1523
2
1412
2015-12-06T20:48:53
Information Exchange and Learning Dynamics over Weakly-Connected Adaptive Networks
[ "cs.MA", "cs.IT", "cs.LG", "cs.IT" ]
The paper examines the learning mechanism of adaptive agents over weakly-connected graphs and reveals an interesting behavior on how information flows through such topologies. The results clarify how asymmetries in the exchange of data can mask local information at certain agents and make them totally dependent on other agents. A leader-follower relationship develops with the performance of some agents being fully determined by the performance of other agents that are outside their domain of influence. This scenario can arise, for example, due to intruder attacks by malicious agents or as the result of failures by some critical links. The findings in this work help explain why strong-connectivity of the network topology, adaptation of the combination weights, and clustering of agents are important ingredients to equalize the learning abilities of all agents against such disturbances. The results also clarify how weak-connectivity can be helpful in reducing the effect of outlier data on learning performance.
cs.MA
cs
Information Exchange and Learning Dynamics over Weakly-Connected Adaptive Networks Bicheng Ying, Student Member, IEEE, and Ali H. Sayed, Fellow, IEEE 1 5 1 0 2 c e D 6 ] A M . s c [ 2 v 3 2 5 1 . 2 1 4 1 : v i X r a Abstract -- The paper examines the learning mechanism of adaptive agents over weakly-connected graphs and reveals an interesting behavior on how information flows through such topologies. The results clarify how asymmetries in the exchange of data can mask local information at certain agents and make them totally dependent on other agents. A leader-follower relationship develops with the performance of some agents being fully determined by the performance of other agents that are outside their domain of influence. This scenario can arise, for example, due to intruder attacks by malicious agents or as the result of failures by some critical links. The findings in this work help explain why strong-connectivity of the network topology, adaptation of the combination weights, and clustering of agents are important ingredients to equalize the learning abilities of all agents against such disturbances. The results also clarify how weak-connectivity can be helpful in reducing the effect of outlier data on learning performance. Index Terms -- Weakly-connected graphs, distributed strategies, information exchange, Pareto optimality, leader-follower relation- ship, limit points, outlier data, malicious agents. I. INTRODUCTION This work examines the distributed solution of inference problems by a collection of networked agents. An individual convex cost function Jk(w) : RM → R is associated with each agent k = 1, 2, . . . , N , and the objective is for the agents to cooperate locally in order to determine the global minimizer of the aggregate cost. Several useful techniques have been developed in the literature for this purpose, including the use of consensus strategies [2] -- [8] and diffusion strategies [9] -- [11]. In most prior studies (see, e.g., [2] -- [25]), it has been generally assumed that the network topology is strongly- connected, which means that a path can be found linking any pair of agents and, moreover, at least one agent has a self- loop. In this case, and under some mild technical conditions [9], it is known that all agents are able to approach the global minimizer within O(µmax), where µmax denotes the largest step-size parameter used by the adaptive agents. This means that strongly-connected agents are able to learn well, with all agents attaining a similar performance level despite possible variations in the signal-to-noise ratios across the agents. The main theme of the current article is to examine how the learning behavior of the agents is affected when the network topology is not necessarily strongly-connected. Specifically, we shall examine the effect of weak-connectivity This work was supported in part by NSF grants CIF-1524250 and ECCS- 1407712. A short version of this word appeared in the conference publication [1]. The authors are with Department of Electrical Engineering, University of California, Los Angeles, CA 90095. Emails: {ybc,sayed}@ucla.edu. on information flow, where a weakly-connected network is one that consists of multiple clustered agents with at least one cluster always feeding information forward but never receiving information back from any of the other clusters. Such graph settings arise in important situations. For example, they can arise as the result of intruder attacks by malicious agents who keep feeding their neighbors with inaccurate information but never use the information fed back to them by the other agents. This behavior results in a unilateral and asymmetric informa- tion exchange scenario, which can be modeled by weakly- connected networks. A second example arises in the context of interactions over social networks where weak connectivity can be used to model the behavior of stubborn agents that insist on their opinions regardless of the feedback by others, or to model the ability of organizations to control the flow of media information [26], [27]. A third example arises in the context of information dissemination over social platforms such as Twitter and Weibo, where celebrities may have thousands of followers while these special users may be following only a small subset of trusted acquaintances. All these examples lead to heavily biased asymmetric information exchange scenarios, which can be modeled reasonably well by weakly-connected networks. Motivated by these considerations, we examine the learning mechanism of adaptive agents over weakly-connected graphs in some detail and reveal an interesting behavior. We will find that a leader-follower relationship develops among the agents, with the performance of some agents being fully determined/controlled by the performance of other agents that are outside their domain of influence. This scenario does not only arise as the result of intruder attacks or highly asymmetric information exchanges, as explained before, but can also be the the result of failures by some critical links that render the network topology weakly-connected. Among other contribu- tions, the findings established in this article will help explain why strong-connectivity of the network topology [9], [10] adaptation of the combination weights [9], [11] and clustering of agents [28], [29] are important ingredients to safeguard against such pitfalls. The conclusion will also highlight one useful scenario where weak-connectivity is beneficial, namely, in reducing the effect of outlier data on network performance. Some useful related works on leader-follower relationships appear in [30] -- [33]. References [31], [32] are primarily mo- tivated by the behavior of fish schools and the switching be- tween leader and follower agents, while [33] is concerned with controllability issues in the context of a switching topology. The work [30] also deals with weakly-connected networks but differs critically from our formulation in that it considers a static scenario with anchor sensors and initial fixed state values. The purpose is to show that an average consensus iteration will make the other sensors converge to a combination of the anchor states. While this is a useful conclusion, it is not surprising that it holds in this scenario due to the static nature of the problem formulation. The key difference in relation to the work proposed in the current manuscript is that we will be dealing with a dynamic network scenario where data are constantly streaming into the agents. There are no anchor agents or fixed state values. Instead, the data are continuously changing. Besides, the probability distribution of the data is unknown and the agents need to rely on approximate gradient information, as opposed to actual state values, to carry out their learning. Under such circumstances, gradient noise will be constantly present in the network and will seep into the operation of the distributed strategies. The topology couples the agents together and these gradient noise sources end up diffusing through the network. In this case, it is much less trivial to identify the limit points of the various sub-networks and agents. This is because the presence of persistent gradient noise now forces agents to fluctuate around limits points. The challenge is to show that the dynamics over the network is stable enough to keep these noises under check and to lead to a steady-state scenario with well-defined (mean-square-error) limit points. The analysis in the paper will show that this is indeed the case and will derive two main results (Theorems 1 and 4), which characterize analytically and in closed-form the stability and performance of weakly-connected graphs under dynamic continuous learning. Notation: We use lowercase letters to denote vectors, up- percase letters for matrices, plain letters for deterministic variables, and boldface letters for random variables. We also use (·)T to denote transposition, (·)−1 for matrix inversion, Tr(·) for the trace of a matrix, λ(·) for the eigenvalues of a matrix, k·k for the 2-norm of a matrix or the Euclidean norm of a vector, and ρ(·) for the spectral radius of a matrix. Besides, we use A ≥ B to denote that A − B is positive semi-definite, and p ≻ 0 to denote that all entries of vector p are positive. II. STRONGLY-CONNECTED NETWORKS In preparation for the derivation of the main results in this work, we first review the setting of strongly-connected networks following [9], [10]. Thus, consider a network consisting of N separate agents connected by a topology. We assign a pair of nonnegative weights, {akℓ, aℓk}, to the edge connecting any two agents k and ℓ. The scalar aℓk is used by agent k to scale the data it receives from agent ℓ and similarly for akℓ. The weights {akℓ, aℓk} can be different, and one or both weights can also be zero. The network is said to be connected if paths with nonzero scaling weights can be found linking any two distinct agents in both directions. The network is said to be strongly -- connected if it is connected with at least one self-loop, meaning that akk > 0 for some agent k. In this way, information can flow in both directions between any two distinct agents and, moreover, some vertices possess self-loops with positive weights [9]. Figure 1 shows one example of a 2 strongly -- connected network. For emphasis in this figure, each edge between two neighboring agents is represented by two directed arrows. The neighborhood of any agent k is denoted by Nk and it consists of all agents that are connected to k by edges; we assume by default that this set includes agent k regardless of whether agent k has a self-loop or not. ()*+,-./,..01 .21(.0)111131 # 4)5265..71 ! & % " $ ' Fig. 1. Agents that are linked by edges can share information. The neighborhood of agent k is marked by the broken line and consists of the set Nk = {4, 7, ℓ, k}. For each agent k, the nonnegative weights it employs to scale data from its neighbors will be convex combination coefficients satisfying: aℓk = 1, aℓk = 0 if ℓ /∈ Nk (1) aℓk ≥ 0, Xℓ∈Nk Assume we collect the coefficients {aℓk} into an N ×N matrix A = [aℓk]. Then, condition (1) implies that A satisfies AT1 = 1 (2) so that A is a left-stochastic matrix. Additionally, the strong connectivity of the network implies that A is a primitive matrix [9]. One important property of left-stochastic primitive matrices follows from the Perron-Frobenius Theorem [34], [35]; it asserts that the matrix A will have a single eigenvalue at one, with all other eigenvalues lying strictly inside the unit circle. Moreover, if we let p denote the right-eigenvector of A corresponding to its single eigenvalue at one, and normalize its entries to add up to one, then all entries of p will be strictly positive, meaning that p satisfies: Ap = p, 1Tp = 1, p ≻ 0 (3) We refer to p as the Perron eigenvector of A. A. Aggregate Cost Function We associate with each agent, k, a twice-differentiable and convex cost function, denoted by Jk(w) ∈ R, with indepen- dent variable w ∈ RM . We assume at least one of these costs is strongly-convex. The agents run a collaborative distributed strategy of the following adapt-then-combine (ATC) diffusion form: where the M × M matrix quantities {Hk, Gk} correspond to the Hessian matrix of the cost function and to the covariance matrix of the gradient noise process, respectively, at agent k: 3 \∇wTJ k(wk,i−1) ψk,i = wk,i−1 − µk aℓk ψℓ,i wk,i = Xℓ∈Nk (4) (5) Hk Gk w Jk(w⋆) ∆= ∇2 ∆ = lim i→∞ E(cid:2) sk,i(w⋆)sT k,i(w⋆) F i−1(cid:3) (12) (13) the vectors where µk is a positive step-size at agent k, {ψk,i, wk,i} denote iterates at agent k at time i, and [∇wJ k(wk,i−1) represents an approximation for the true gradi- ent vector of Jk(w); an approximation is needed because, over adaptive networks, the true cost functions Jk(w) are generally not known in advance and their gradients need to be estimated continually from streaming data [9], [10]. The difference between the true gradient vector and its approximation is called gradient noise -- see (14) further ahead. Other strategies of the consensus or diffusion type are possible (e.g., [3], [4], [9], [10]), but it is sufficient to illustrate the results using (4) -- (5) [9], [36]. We represent the step-sizes as scaled multiples of the same factor µmax, namely, µk ∆= τk µmax, k = 1, 2, . . . , N where 0 < τk ≤ 1. We also introduce the vector: q ∆= diag{µ1, µ2, . . . , µN } · p (6) (7) whose individual entries, {qk, k = 1, 2, . . . , N }, are obvi- ously positive. Using the {qk}, we define the strongly-convex weighted aggregate cost: J glob,⋆(w) ∆= NXk=1 qkJk(w) (8) B. Mean-Square-Error Performance We denote the unique minimizer of (8) by w⋆ and measure the error at each agent relative to this limit point by means of the vectors: ∆= w⋆ − wk,i, k = 1, 2, . . . , N (9) It was shown in [9], [10], [37] -- [39] that w⋆ serves as a Pareto optimal solution for the network. Specifically, under some reasonable technical conditions on the cost functions and gradient noise process, it holds that (see Theorem 9.1 of [9]): lim sup i→∞ E kewk,ik2 = O(µmax) That is, all agents approach in the mean-square-error sense the limiting point w⋆ to within O(µmax) for sufficiently small step-sizes. We let MSDk denote the size of the mean-square (10) We also let MSDav denote the average mean-square deviation across all N agents. It was further shown in [9], [10], [39] that these measures are given by (see Lemma 11.3 of [9]): deviation, E kewk,ik2, in steady-state to first-order in µmax. kGk!(11) qkHk!−1 NXk=1 Tr NXk=1 MSDk = MSDav = 1 2 q2 ewk,i with the symbol sk,i used to denote the gradient noise process: sk,i(wk,i−1) ∆= \∇wTJ k(wk,i−1) − ∇wTJk(wi−1) (14) and where F i−1 denotes the filtration corresponding to all past iterates across all agents: F i−1 = filtration by {wℓ,j, j ≤ i − 1, ℓ = 1, 2, . . . , N } (15) III. WEAKLY-CONNECTED NETWORKS We now examine the same learning mechanism over weakly-connected networks. The objective is to verify whether some agents can end up having a dominating effect on the performance of other agents. Broadly, a weakly-connected network consists of a collection of sub-networks with con- straints on how information flows among them. Figure 2 illustrates one particular situation consisting of three sub- networks, with the number of their agents denoted by N1, N2, and N3, respectively. These numbers can be equal to each other or they can be different. Although Figure 2 is limited to three sub-networks, the results and analysis in the sequel are general and apply to any number of sub-networks. The figure is used for illustration purposes only. There can be many more R−type (receiving) sub-networks, as well as many more S−type (sending) sub-networks. Illustration of a weakly-connected network consisting of three Fig. 2. sub-networks. In the figure, each of the two sub-networks on top is strongly-connected and does not receive information from 1, w⋆ any other sub-network (self-loops are not indicated in the figure). Each of these sub-networks has at least one strongly- convex cost and its own combination policy, denoted by {A1 ∈ RN1×N1, A2 ∈ RN2×N2}, and its own Perron vector, denoted by {p1, p2}. Therefore, if each of these sub-networks were to run the diffusion strategy (4) -- (5), then each one of them will independently converge in the mean-square-error sense towards its own Pareto solution, denoted by {w⋆ 2}. The same figure shows a third sub-network in the bottom, and which appears at the receiving end relative to the other sub-networks. The figure shows two arrows emanating in one direction from the top sub-networks towards the bottom sub- network. Therefore, this third sub-network is influenced by the behavior of the top sub-networks, while it does not feed any information back to them. We would like to examine how the limiting behavior of this third sub-network is influenced by the two top sub-networks and whether it can still exhibit independent behavior. This is an important question with criti- cal implications for inference over networks. We will discover that in situations like these, where one or more sub-networks are at the receiving end of other sub-networks, a leader- follower relationship develops with the limiting behavior of the receiving sub-networks being completely dictated by the other sub-networks regardless of their own local information (or opinions). A. Network Model Thus, consider a network consisting of a collection of S stand-alone strongly-connected sub-networks. Each of these sub-networks does not receive information from any other sub- network and they can therefore run their diffusion strategy independently of the other sub-networks. We further assume that the network contains a second collection of R sub- networks where some agents in these sub-networks can receive information from agents in the first collection. The letters S and R are chosen to designate "send" and "receive" effects: sub-networks in group S have agents that send information to sub-networks in the receiving group R. Whenever necessary, we will use the small letters s and r as subscripts to refer to sub-networks or quantities from group S and to sub-networks or quantities from group R. If we refer to Figure 2, then S = 2 and R = 1. The total number of agents in the network is still denoted by N and it is equal to the sum of the number of agents across all sub-networks.1 We collect all weighting coefficients {aℓk} from across all edges into a large N × N combination matrix A = [aℓk]. Without loss of generality, we assume the agents are numbered with the agents from the union of all S strongly-connected sub-networks coming first, followed by the agents from the remaining R sub-networks. 4 A useful matrix decomposition result proven in [41, Ch. 8] shows that the combination matrix of every such weakly- connected network can be transformed, via a symmetric per- mutation transformation of the form P TAP , to an upper block- triangular structure of the following form (in other words, the assumed structure (16) is general enough to represent any weakly-connected graph): Subnetworks:1,2,...,S Subnetworks:S+1,S+2,...,S+R z 0 A1 0 A2 ... ... 0 0 0 ... 0 0 0 0 ... 0   0 0 ... { z ... A1,S+1 A2,S+1 } . . . . . . .. . . . . AS AS,S+1 . . . . . . .. . . . . 0 0 0 ... 0 ... 0 } A1,S+2 A2,S+2 ... AS,S+2 AS+2 ... 0 ... AS,S+R A1,S+R A2,S+R . . . . . . . .. . . . . . . AS+1,S+R . . . AS+2,S+R . .. . . . AS+R ... {   AS+1 AS+1,S+2 (16) In the above expression, the quantities {A1, . . . , AS} are the left-stochastic primitive matrices corresponding to the S strongly-connected sub-networks. We sometimes denote a generic As from this set by As,s to mean that is the combination matrix from sub-network s to itself. We denote the size of each matrix As by Ns. it Likewise, the matrices {AS+1, . . . , AS+R} in the lower right-most block contain the internal combination coefficients for the R collection of sub-networks. For example, AS+1 contains the coefficients that appear on the edges within sub- network S + 1; this matrix is not left-stochastic because it does not contain all the combination coefficients that are used by the agents within sub-network S + 1. For example, AS+1 does not contain any of the coefficients on the edges arriving to sub-network S + 1 from any of the first S sub-networks. The zero entries in the lower-left block corner refer to the fact that none of the S sub-networks receive information from the R sub-networks. The entries in the right-most upper block contain the combination weights from the edges that emanate from the S sub-networks towards the R sub-networks. For example, for the network shown in Figure 3, one possibility for A is: A =   0.2 0.5 0.3 0 0 0 0 0 0.2 0.4 0.4 0 0 0 0 0 0.8 0.1 0.1 0 0 0 0 0 0 0 0 0.4 0.6 0 0 0 0 0 0 0.3 0.7 0 0 0 0 0.2 0.1 0.3 0 0.2 0.1 0.1 0 0 0 0 0 0.3 0.5 0.2 0 0.4 0 0 0 0.2 0.3 0.1   (17) 1We remark that our definition of weakly-connected networks is more strict than the terminology used in graph theory. There, a directed graph is called weakly-connected if replacing all of its directed edges with undirected edges produces a connected (undirected) graph [40]. This definition would also include strongly-connected networks as special cases. Our definition is meant to focus on networks that are truly weakly-connected in that they induce an asymmetric flow of information among some of its components. IV. STEADY-STATE DYNAMICS We are interested in examining the steady-state behavior of each agent in the network. To do so, we will need to examine first the limit of An as n → ∞, for matrices A that have the structure (16). note that 1 TAr (cid:22) 1 T 5 (22) where the symbol (cid:22) denotes entry-wise comparisons. Actually, at least one of the entries of the row vector 1TAr must be strictly smaller than one. We then conclude that it must hold: 1 TArpr < 1 Tpr (23) with strict inequality. For this conclusion to hold, at least one entry of the vector Arpr must be smaller than the corresponding entry in pr; this fact contradicts the identity Arpr = pr. We therefore conclude that ρ(Ar) < 1 and, consequently, ρ(TRR) < 1. Furthermore, recall that each of the leading blocks {As, s = 1, 2, . . . , S} is primitive. Therefore, the powers of each of these matrices tends to [9], [34]: lim n→∞ An s = ps1 T Ns , s = 1, 2, . . . , S (24) Combining this fact with ρ(TRR) < 1, we conclude that the limit of An exists as n → ∞, and that it has the following generic form: A∞ =(cid:20) Θ 0 X 0 (cid:21) (25) for some matrix X that we would like to identify. Using the relationship A∞A = A∞ , it holds that (cid:20) Θ X 0 (cid:21)(cid:18)I −(cid:20) TSS 0 0 TSR TRR (cid:21)(cid:19) =(cid:20) 0 0 0 0 (cid:21) (26) from which we conclude that X = ΘTSR(I − TRR)−1, as claimed. We can provide a useful interpretation for the factor W that appears on the right-hand side of (19). We denote the total number of agents in group S by ∆= N1 + N2 + · · · + NS and the total number of agents in group R by NgS NgR ∆= NS+1 + NS+2 + · · · + NS+R (27) (28) Then, entries on each column of W add up to one, as can be verified from the following equivalent statements: NgS W = 1T 1T NgR (20) ⇐⇒ 1T ⇐⇒ 1T NgS TSR = 1T NgS TSR + 1T NgR(I − TRR) NgRTRR = 1T NgR ⇐⇒ 1T N(cid:20) TSR TRR (cid:21) = 1T NgR (29) where the last step holds because A is left-stochastic. More- over, since TRR is a stable matrix, we have W = TSR(I − TRR)−1 = TSR(I + TRR + T 2 = TSR + TSRTRR + TSRT 2 RR + . . .) RR + . . . (30) Recall that TSR represents the combination weights that scale the data emanating from group S and reaching group R. In the same token, TRR represents the combination weights that are internal to group R and models how the sub-networks within this group scale their internal data. As such, the first term in (30) represents the information that is transferred from group S into group R, while the second term in (30) represents how this information is transformed internally within group R after one step, and similarly for the subsequent terms in (30) Fig. 3. A weakly connected network consisting of three sub-networks and the corresponding combination policy (17). A. Limiting Power of Combination Matrix We denote the block structure of A from (16) by A ∆= (cid:20) TSS 0 TSR TRR (cid:21) (18) (19) (20) (21) where, for example, TSS is block diagonal and consists of the left-stochastic and primitive entries {A1, A2, . . . , As}, while TRR is block upper triangular. The block TSR represents the influence of the S sub-networks on the R sub-networks. Lemma 1 (LIMITING POWER OF A): Let the Perron eigen- vectors of the S strongly-connected sub-networks be denoted by {ps, s = 1, 2, . . . , S}. It holds that: A∞ △ = lim n→∞ 0 where the matrices Θ and W are defined by An =(cid:20) Θ 0 ΘW (cid:21) W ∆= TSR(I − TRR)−1 Θ ∆= blockdiag(cid:8)p11T N1, . . . , pS 1T NS(cid:9) and the notation "blockdiag" refers to a block diagonal matrix constructed from its arguments. Proof: We start by establishing that ρ(Ar) < 1 for the networks at the receiving end of information, i.e., for S < r ≤ S + R. Note that we are referring here to the block entries {Ar} on the diagonal of TRR. Using the fact that the spectral radius of any matrix is upper bounded by any matrix norm, we have that ρ(Ar) ≤ kArk1 ≤ 1 in terms of the 1−norm; the property kArk ≤ 1 follows from the fact that the columns of Ar are subsets of longer columns whose entries add up to one; refer to the example in (17). We next show, by contradiction, that strict inequality must hold, i.e., ρ(Ar) < 1. Thus, assume to the contrary that ρ(Ar) = 1. Since Ar has non-negative entries and since sub-network r is connected, it follows from the Perron-Frobenius Theorem [34], [35] that2 we can find a vector, pr, with positive entries such that Arpr = pr. Now 2Consider a matrix A consisting of nonnegative entries representing the scaling weights over the edges of a connected network. Then, in general, A may have multiple eigenvalues that attain ρ(A). The Perron-Frobenius Theorem ascertains that each of these eigenvalues will have multiplicity one, and that only one of them is real, say, denoted by λ. The theorem further ensures that there exists an eigenvector vector p with positive entries such that Ap = λp. If the graph happens to be strongly-connected, instead of only connected, then λ is the only eigenvalue that attains ρ(A). Let {w⋆ s , s = 1, 2, . . . , S} denote the Pareto optimal solutions for the strongly-connected sub-networks in group S. In order to characterize the group behavior more fully, we need to introduce a more explicit notation. Thus, consider sub-network s from this group. It has Ns agents and their individual step-sizes will be denoted by {µs,k}, with the first subscript referring to the sub-network and the second subscript referring to the agent. Likewise, the Perron vector of sub- network s will be denoted by ps with individual entries {ps,k}. The associated scaled weights are denoted by: qs,k ∆= µs,kps,k, k = 1, 2, . . . , Ns (31) According to (8), the Pareto solution, w⋆ s, that corresponds to sub-network s is the unique solution to the following algebraic equation: qs,k∇wTJs,k(w⋆ s ) = 0 (32) NsXk=1 where the {Js,k(w)} denote the cost functions that are as- sociated with agents k within sub-network s. Each agent in sub-network s will converge towards this same w⋆ s within O(µmax). This conclusion means that the limit point will be uniform within each sub-network s; though the limit points can be distinct across the sub-networks. Collecting the Pareto solutions {w⋆ s } from across the S sub-networks, we find that the limiting points for all agents within group S are described by the following extended vector: W ⋆ ∆=  1N1 ⊗ w⋆ 1 1N2 ⊗ w⋆ 2 ... 1Ns ⊗ w⋆ S  (33) Recall that the total number of agents in group S is NgS. C. Limit Points for Group R of Sub-Networks Now consider an arbitrary sub-network r from group R. It turns out that, contrary to the uniform behavior observed for group S, each agent within the sub-network r will converge to an individual limit point. This conclusion is established in the sequel (see Theorem 1) and motivated as follows. First, we recall that the total number of agents across all sub- networks in group R is NgR. We denote the limiting value for each agent k in sub-network r by w• r,k, for k = 1, 2, . . . , Nr. In this way, the collection of limit points for each sub-network r will be • ∆=  • 1 • 2 W W ... W • R  The arguments that follow will allow us to identify the limit • for the sub-networks from group R in terms vector W of the Pareto solutions of the sub-networks from group S. Specifically, it will hold that • = W T W ⋆ W (36) where W = W ⊗ IM and W is the matrix transformation defined by (20). Result (36) is established further ahead in (62) by showing that each agent in the network approaches the corresponding limit point in (37) below within a mean- square-error that is in the order of µmax. Now recall that each column of W adds up to one, which implies that if all S sub-networks happen to have the same limit point, say, w⋆, then it would follow from (36) that all agents in group R will also converge to this same limit point. More generally, if sub-networks within group S have different limit points, w⋆ s, then each agent in group R will usually converge towards a different limit point, w• r,k. One important conclusion that readily follows from (36) is that the limit points of all agents in group R are fully determined by the limit points of group S. We collect the limiting points for all agents across the network into the vector W∞ △ =(cid:20) W⋆ • (cid:21) −→ (for group S) −→ (for group R) W (37) Before justifying (36), we establish a crucial property for W∞, and which will play a key role in the convergence analysis in future sections. Lemma 2 (RELATING W∞ TO A): Introduce the extended combination policy A = A ⊗ IM . Then, it holds that W∞ is a right-eigenvector for AT corresponding to the eigenvalue at one, namely, W∞ = AT W∞ (38) Eigenvectors are non-unique. However, if we fix the top entries of the right-eigenvector of AT to W⋆, then the solution to the linear system of equations x = ATx is unique and equal to W∞. Proof: In view of (18), establishing (38) is equivalent to estab- lishing the validity of the following identity: (cid:20) W W ⋆ • (cid:21) =(cid:20) T T 0 SS SR T T T T RR (cid:21)(cid:20) W W ⋆ • (cid:21) (39) where TSS = TSS ⊗ IM , TSR = TSR ⊗ IM , and TRR = TRR ⊗ IM. Let As = As ⊗ IM for each sub-network s from group S. The top row of (39) is obviously true since the blocks on the diagonal of T T s } and each As is left-stochastic. Thus, using properties of Kronecker products, note that SS are the matrices {AT involving higher-order powers of TRR. and the collection of limit points for all R sub-networks is 6 B. Limit Points for Group S of Sub-Networks W (35) W • r = w• r,1 w• r,2 ... w• r,Nr  (sub-network r) (34) T T SS W ⋆ = blockdiagnAT s (1Ns ⊗ w⋆ s )o = blockdiag{(AT = blockdiag{(AT s s ⊗ IM )(1Ns ⊗ w⋆ 1Ns ⊗ w⋆ s )} s )} = blockdiag{1Ns ⊗ w⋆ s } = W ⋆ (40) group has a total of NgS agents, numbered 1 through NgS, and both groups have a total of N agents): 7 (51) (52) (53) (54) (55) (56) (57) (58) (group S) (50)  ew1,i ew2,i ... ewNgS ,i ewNgS +1,i ewNgS+2,i ... ewN,i ∇2 wT Jk (w⋆ (group R)  k − tewk,i))dt  NgS +1) ... ... ∇wTJ1(w⋆ 1) ∇wTJNgS (w⋆ NgS ) ∇wTJNgS +1(w⋆ ∇wTJN (w⋆ N )  ∆= diag{H 1,i, H 2,i, · · · , H NgS ,i} ∆= diag{H NgS+1,i, · · · , H N,i} ∆= diag{µ1IM , µ2IM , . . . , µNgS IM } ∆= diag{µNgS+1IM , . . . , µN IM } eWS,i eWR,i H k,i HS,i HR,i bS bR MS MR SS,i 0 ∆ =  ∆=  ∆= Z 1 ∆= − ∆= − ∆=  Using the mean-value theorem [9], it holds that: ∇wTJk(wk,i) = ∇wTJk(w⋆ sNgS ,i ∇2 (60) (59) k) − , SR,i  wTJk(w⋆ ... sN,i s1,i s2,i ... (cid:20)Z 1 sNgS +1,i sNgS +2,i ∆=   k − tewk,i)dt(cid:21)ewk,i MR · bR (cid:21) (61) MR · SR,i (cid:21) − AT(cid:20) MS · bS eWR,i−1 (cid:21) MRHR,i−1 (cid:21)(cid:19)(cid:20) eWS,i−1 0 as claimed. Next, observe that the second block row in (39) is equivalent to requiring the following equivalent conditions: W • = T T SRW ⋆ + T T RRW • ⇐⇒ T T SRW (36) ⇐⇒ T T SRW • ⋆ =(cid:16)I − T T ⋆ =(cid:16)I − T T RR(cid:17) W RR(cid:17) W T ⋆ W (41) (a) ⇐⇒ T T SRω⋆ = T T SRω⋆ where step (a) is because of equation (20). The last condition is a trivial equality and, therefore, we conclude that relation (38) holds as a result of (36). We now examine the uniqueness of the solution to (38). Suppose ∞, satisfying (38) with the same top ◦. ⋆ but with a possibly different bottom entry, denoted by W ◦ must satisfy: there exists another solution, W entry W Then, W ′ W ◦ = T T SRW ⋆ + T T RRW ◦ Subtracting this equation from the same equation satisfied by W find that (I − T T RR) (W ◦ − W •) = 0 •, we (42) However, we know from the proof of Lemma 1 that ρ(T T so that (I − T T claimed. RR) is nonsingular. We conclude that W RR) < 1 •, as ◦ = W V. STABILITY OF ERROR MOMENTS For a generic agent k, we let w⋆ k denote its limit point. We know from the discussion in the previous section that the value of this limit point will depend on whether agent k belongs to group S or group R. Specifically, we have that w⋆ k = (cid:26) w⋆ s , w• r,k, (when k ∈ sub-network s in group S) (when k ∈ sub-network r in group R) (43) We denote the error vectors relative to this limit point by: ∆= w⋆ ∆= w⋆ k − ψk,i k − wk,i (44) (45) eψk,i ewk,i If we now subtract w⋆ (4) -- (5), we get k from both sides of the diffusion strategy Substituting (46) and (49), we find that the error dynamics across the network evolves according to the following recur- sion: \∇wTJ k(wk,i−1) aℓk ψℓ,i (46) (47) eWR,i (cid:21) = AT(cid:20) MS · SS,i (cid:20) eWS,i + AT(cid:18)I −(cid:20) MSHS,i−1 It follows from property (38) that the limit point w⋆ eψk,i = ewk,i−1 + µk k − Xℓ∈Nk ewk,i = w⋆ k = Xℓ∈Nk ewk,i = Xℓ∈Nk w⋆ aℓkw⋆ ℓ aℓk eψℓ,i This result allows us to absorb w⋆ (47) so that k into the right-most term in To proceed, we recall the definition of the gradient noise process from (14) and introduce the following block quantities, which collect variables from across all agents in the network (from within both groups S and R of sub-networks; the first k satisfies: (48) (49) The next statement establishes that the entries in (37) are indeed the limit points of the agents in the network in that the agents converge towards them in the mean-square error sense. Theorem 1 (MEAN-SQUARE-ERROR STABILITY): functions Jk(w) are convex, for all Assume the cost agents k = 1, . . . , N , and that at least one of the cost functions in each of the S sub-networks is strongly convex. Assume also that the first and second-order moments of the gradient noise process (14) satisfy the conditions stated the weakly-connected in Assumption 8.1 from [9]. Then, network is mean-square stable for sufficiently small step-sizes, namely, for every k it holds that, further that the individual costs Jk(w) satisfy the following smoothness condition relative to their limits points: 8 lim sup i→∞ E kewk,ik2 = O(µmax) (62) k∇2 w Jk(w⋆ k + ∆w) − ∇2 w Jk(w⋆)k ≤ κdk∆wk (69) for small perturbations k∆wk ≤ ǫ and for some κd ≥ 0. Then, for sufficient small step-sizes, it holds that: Proof: Using the block-triangular structure of A from (18), the error recursion (61) decouples into two separate recursions with the evolution of the error vectors in group S being independent of the evolution of the error vectors in group R. In particular, it holds that SSMsSS,i − T T eWS,i = T T SS(I − MSHS,i−1)eWS,i−1 + T T SSMS bS (63) where TSS is left-stochastic. This recursion is a special case of the form studied by Theorem 9.1 in [9]. Therefore, for agents in group S, it follows from the result of that theorem that (62) holds. Moreover, the arguments used in the proof of the theorem establish that construction (33) indeed corresponds to the limiting points for the sub-networks in group S. We still need to examine the stability of the agents from group R. For these agents, we conclude from (61) that the error recursion evolves instead as follows: eWR,i = T T RR (I − MRHR,i−1) eW R,i−1 + SR (I − MSHS,i−1) eWS,i−1 + T T T T SRMS SS,i + T T T T SRMSbS − T T RRMRSR,i − RRMRbR (64) We introduce the Jordan canonical decomposition of the matrix TRR as: TRR = VǫJǫV −1 ǫ (65) where Jǫ consists of Jordan blocks except that the ones on the lower diagonal are replaced by a small positive scalar ǫ [34]. We recall from the proof of Lemma 1 that ρ(Jǫ) < 1. We also introduce the extended version of (65): TRR = VǫJǫVǫ −1 (66) where Vǫ = Vǫ ⊗ IM and Jǫ = Jǫ ⊗ IM , and define the transformed quantities ǫ eW R,i, ¯WR,i = V T ¯T T SR = V T ǫ T T SR, ¯T T RR ∆= V T ǫ T T RR (67) If we now multiply both sides of (64) from the left by V T the equivalent recursion: ǫ we obtain ¯W R,i = J T ǫ (cid:17) ¯WR,i−1 + ǫ MRHR,i−1V −T ǫ (cid:16)I − V T SR (I − MSHS,i−1) eWS,i−1 + ¯T T ¯T T SRMS SS,i + ¯T T ¯T T SRMS bS − ¯T T RRMRSR,i − RRMRbR (68) In Appendix A we start from this recursion and complete the argument to conclude that (62) also holds for all agents in group R. Besides the stability of the second-order moment of the network error dynamics, we can similarly establish the stability of the first and fourth-order moments of erros. These results are useful in evaluating the performance of the network in the next section. Theorem 2 (ERROR MOMENT STABILITY): Assume the cost functions Jk(w) are convex, for all agents k = 1, . . . , N , and that at least one of the cost functions in each of the S sub-networks is strongly convex. Assume also that the first and fourth-order moments of the gradient noise process (14) satisfy the conditions stated in Theorem 9.2 from [9]. Assume lim sup i→∞ lim sup i→∞ kEewk,ik = O(µmax) E kewk,ik4 = O(µ2 max) (70) (71) Proof: We again consider the error recursion (63), which is a special case of the forms studied in Theorems 9.2 and 9.6 in [9]. Therefore, for agents in group S, it follows from the results of these theorems that results (70) -- (71) hold. We still need to establish that (70) -- (71) hold for all agents from group R. For these agents, we start from their error recursion (68). The derivation in Appendices B and C complete the derivation and show that (70) -- (71) hold for these agents as well. VI. LONG-TERM NETWORK DYNAMICS We can be more specific and assess the size of the mean- square deviation (MSD) defined by (62) to first-order in µmax. If we examine recursion (61), we find that it is a nonlinear and stochastic difference recursion due to the dependence of the Hessian matrices HS,i and HR,i on the error vectors eWS,i and eWR,i. To address this difficulty and arrive at closed- form expressions for the MSD levels at the various agents, we replace (61) by a long-term model that will be shown to provide an accurate approximation for the behavior of the network as i → ∞ and for small step-sizes. For this purpose, we extend a construction from [9, Ch. 10] to the current setting and introduce the constant Hessian matrices: HS HR Hk ∆= diag{H1, H2, . . . , HNgS } ∆= diag{HNgS+1, HNgS+2, . . . , HN } ∆= ∇2 wJk(w⋆ k) We also define the error matrices: ∆= HS − HS,i ∆= HR − HR,i eHS,i eHR,i We then replace the original error-recursion (61) by the fol- lowing model where the Hessian matrices HS,i−1 and HR,i−1 are replaced by the constant values (72) -- (73): ′ S,i ′ (cid:20) eW eW R,i (cid:21) = AT(cid:20) MS · SS,i + AT(cid:18)I −(cid:20) MSHS MR · bR (cid:21) (77) MR · SR,i (cid:21) − AT(cid:20) MS · bS R,i−1 (cid:21) MRHR (cid:21)(cid:19)(cid:20) eW eW Observe that in this model we are using the prime notation to refer to its state variables. The next result explains why the above model provides a good approximation for the actual network performance in steady-state. ′ S,i−1 ′ Theorem 3 (ACCURACY OF APPROXIMATION): Under the same conditions of Theorem 1, it holds that, for sufficiently (72) (73) (74) (75) (76) small step-sizes the state variables of models (61) and (77) are close to each other, namely, : lim sup i→∞ E(cid:13)(cid:13)(cid:13)(cid:13)(cid:20) eWS,i eWR,i (cid:21) −(cid:20) eW eW eWR,i (cid:21)(cid:13)(cid:13)(cid:13)(cid:13) E(cid:13)(cid:13)(cid:13)(cid:13)(cid:20) eWS,i i→∞ 2 2 ′ S,i ′ R,i (cid:21)(cid:13)(cid:13)(cid:13)(cid:13) E(cid:13)(cid:13)(cid:13)(cid:13)(cid:20) eW eW = lim sup lim sup i→∞ = O(µ2 max) (78) 2 ′ S,i ′ R,i (cid:21)(cid:13)(cid:13)(cid:13)(cid:13) +O(µ3/2 max) (79) Proof: In Theorem 10.2 of [9], it was established that the error bounds in (78) and (79) hold for strongly-connected networks and, hence, for all agents of type S. Appendix D completes the argument and shows that the same conclusion holds for agents of type R. We remark that in a manner similar to the proof of Theorems 1 and 2, we can also establish that ′ k,ik = O(µmax) k,ik2 = O(µmax) k,ik4 = O(µ2 max) lim sup i→∞ lim sup i→∞ lim sup i→∞ ′ kEew E kew E kew′ (80) (81) (82) VII. MEAN-SQUARE-ERROR PERFORMANCE In this section, we evaluate the steady-state mean-square deviation (MSD), defined as the value of the error variance, E kewk,ik2, as i → ∞ and for sufficiently small step-sizes. The following result holds depending on whether agent k belongs to group S or group R. For agents in group R, we introduce the S × 1 column vector: ck = 1T N1 1T N2 ... 1T NS  [W ]:,k where the notation [W ]:,k refers to the column of W from (20) corresponding to agent k. One useful interpretation for the entries of the vector ck is as follows. Since each column of W adds up to one, therefore, the entries of ck will add up to one. In addition, as expression (85) below reveals, the square of the s−th entry of ck will measure the influence of sub-network s from group S on the performance of agent k from group R. Theorem 4 (MSD PERFORMANCE): Assume agent k be- longs to a sub-network s from group S. Then, all agents within sub-network s achieve the same MSD level given by MSDs = 1 2 Tr NsXk=1 qs,kHs,k!−1 NsXk=1 q2 s,kGs,k! (84) where we are using the notation {Hs,k, Gs,k}, with a subscript s, to denote the Hessian and covariance matrices (12) -- (13) for agent k within sub-network s, in the same manner that we used s in the definition of the weighting scalars {qs,k} in (31). Assume, on the other hand, that agent k belongs to a sub- network r from group R. Then, in this case, its MSD level will be given by MSDR(k) = SXs=1 c2 k(s) · MSDs (85) 9 where ck(s) denotes the s−th entry of vector ck. That is, the performance of any agent from group R is given by a weighted combination of the MSD performance levels of the sub-networks from group S. Proof: The argument is given in Appendix E. VIII. SIMULATION RESULTS We illustrate the theoretical results by considering several examples. Our first example relates to a pattern classification problem and illustrates how a group S of agents can dramatically influence the learning behavior of agents in another group R. Thus, consider initially a simple network consisting of N = 2 agents, where one node plays the role of the S agent and the second node plays the role of the R agent. We assume each agent is observing data that belong to different classes: data at node S belong to one of two classes {A, B}, while data at node R belong to one of two other classes {C, D}. If each agent were to learn independently of the other agent, then they would be able to determine their respective separating hyper- planes and classify their data with reasonable accuracy. Here, however, we would like to examine the influence of node S on node R when both agents are connected by means of a weak topology say, one with combination matrix -- see Fig. 4: 1 S 0.03 R 0.97 (83) Fig. 4. An example of a weakly-connected two-agent network. A =(cid:20) 1 0 0.03 0.97 (cid:21) (86) This choice for A means that agent R is careful in dealing with agent S and is only assigning weight 0.03 (or 3%) to its interaction with S. Still, despite this level of caution, the corresponding matrix W defined by (20) reduces to a scalar in this case and evaluates to W = 0.03(1 − 0.97)−1 = 1 (87) In other words, agent R will be completely misguided by agent S. This effect is evident in Fig. 5, where it is seen that agent S (top plot) is able to determine its separating hyperplane, while agent R (bottom plot) is driven to select the same hyperplane (which is obviously wrong for its data). In this simulation, both agents are running a logistic regression classifier [9], [42], [43] We consider next a more involved example based on the topology shown earlier in Fig. 3 to show that a weakly- connected network can sometimes achieve better performance than strongly-connected networks. The objective now is to determine an elliptical curve that separates the data into two classes: class +1 consists of data that are concentrated inside the curve and class -1 consists of data that are concentrated outside the curve. We assume about 10% of the data available to agents R are outliers. The outlier data belong to class +1 Agent S classification result Agent 1 classification result 10 class +1 class−1 Weakly−Connected Strongly−Connected −2 −1.5 −1 −0.5 0.5 1 1.5 2 0 x Agent 8 classification result class +1 class −1 outlier 2 1 0 −1 −2 2 1 0 −1 y y y y 2 1 0 −1 −2 −3 2 1 0 −1 −2 −3 3 Class A Class B −2 −1 0 x 1 2 Agent R classification result Class C Class D −2 −1 0 x 1 2 3 Fig. 5. Agents S and R use logistic regression to learn the sepa- rating hyperplanes for their data. The agents are weakly connected. The simulation result shows that the behavior of agent R is fully misguided by agent S even though the data received by agent R is sufficient for it to learn its own hyperplane. but are located away from the origin. Obviously, since we are dealing with a weakly-connected network, agents in group S will not be affected by these outliers since the outliers are only sensed by the R agents, which in turn do not feed information into the S agents. This situation corresponds to a scenario where weak connectivity is advantageous. We assume each agent employs the same logistic cost function: Jk(w) = ρkwk2 + Enln[1 + e−γk hT kw]o where γk represents the class label {+1, −1}, ρ is a regu- larization parameter, and the feature vector hk is chosen as follows in terms of the coordinates of the measurements [42], [43]: (88) hk(1) = 5, hk(4) = x2, hk(2) = x, hk(5) = y2, hk(3) = y hk(6) = xy The gradient vector is estimated by using the instantaneous approximation: \∇wT J k(wk,i−1) = − γ k(i)hk,i 1 + eγ k(i)hT k,iwk,i−1 + ρwk,i−1 (89) We compare the performance of the weakly-connected topol- ogy against a strongly-connected (actually, fully-connected) −2 Weakly−Connected −2 −1.5 −1 −0.5 Strongly−Connected 0.5 1 1.5 2 0 x Logistic classification result using an elliptic separation Fig. 6. curve. In the simulation, agents {k = 6, 7, 8} in Fig. 3 suffer from outlier data. The black curve represents the result obtained by a strongly-connected network, while the green curve represents the result obtained by a weakly-connected network; observe that the curve is larger in the former case due to the influence of the outliers. network with combination matrix: A = 1 8 181T 8 (90) In Fig. 6, we observe that the black elliptic curve, which is the result obtained by the strongly-connected network (90), is larger than the green elliptic curve obtained by the weakly- connected network. Comparing both boundary curves, we find that the black curve includes a larger proportion of -1 data, which will be mistakenly inferred as belonging to class +1. Obviously, weakly-connected networks do not always provide performance that is superior to fully-connected networks. There are however situations when this can occur and this is what to show in this example. We considered a case in which some R−agents are subject to outliers. In a fully-connected network, the outliers will influence the performance because their presence will be sensed by all agents. In a weakly-connected network, if these outliers are affecting only the R−agents, then the S−agents will be able to suppress their influence according to Theorem 4 and performance will therefore be improved. the simulation results are meant Our third example illustrates result (36) concerning limit points. We associate with each agent in Fig. 3 the quadratic cost: Jk(w) = E (dk(i) − uk,iw)2 (91) where agent k senses streaming data {dk(i), uk,i}; the data are related to some unknown model w◦ k via the linear regression model: dk(i) = uk,iw◦ k + vk(i) (92) where vk(i) is observation noise and assumed to be spatially and temporally white. It is sufficient for this example to assume one-dimensional limit points and to set w◦ k = 1 for the agents in sub-network 1, w◦ k = 1.5 for the agents in sub- k = 1.25 for the agents in sub-network 3. network 2, and wo It is obvious that the Pareto optimal solutions of the two S sub-networks will be w⋆ 2 = 1.5, respectively. Computing the corresponding matrix W from (17) we get: 1 = 1 and w⋆ (93) (94) W = 0 0 0 0.4046 0.5267 0.7099 0.1489 0.1183 0.0725 0.4466 0.3550 0.2176 0 0 0  ) subnetwork 1 o subnetwork 2 so that the limit points for the R agents are w• r,6 = 1.2233, w• r,7 = 1.1775, w• r,8 = 1.1088 These values are consistent with the simulation results in Fig. 7. We further illustrate in Fig. 9 the MSD performance for the agents of type S and R. Figure 8 shows the observation noise and regression power profile across the agents. In these simulations, we employed Gaussian distributed data to generate the observation noise and regression data. The step- size parameters were set to µk = 0.0005 for all agents. The theoretical MSD value for agents in sub-network 1 follows from (84) and is found to be −56.43dB. Likewise, the theo- retical MSD value for agents in sub-network 2 is found to be −52.05 dB. On the other hand, using (93), we get c7(1) = 0 + 0.5267 + 0.1183 = 0.6450 c7(2) = 0.3550 + 0 = 0.3550 (95) (96) and the theoretical MSD value for agent 7 in sub-network 3 is then found from (85) to be MSDR(7) = 0.64502 × MSD1 + 0.35502 × MSD2 = −58.49dB (97) which is consistent with the simulated result. agent 6 limit point 1.25 1.2 w 1.15 agent 7 limit point 1.1 1.05 agent 8 limit point 1000 2000 Number of iterations 3000 4000 5000 Fig. 7. Limit points for agents in group R. Noise Power for Each Node Regression Power for Each Node 11 ) B d ( r e w o P e s o N e g a r e v A i −4 −6 −8 −10 −12 −14 i r e w o P n o s s e r g e R e g a r e v A 2 4 Index of Node 6 8 5 4 3 2 1 0 2 4 Index of Node 6 8 Fig. 8. Observation noise and regression power profile for all agents. 10 0 −10 −20 −30 −40 −50 −60 ) i B d ( n o i t a v e D e r a u q S n a e M subnetwork 1 subnetwork 2 agent 7 −50 −54 −58 −62 Simulation theoretical result 4000 4200 4400 4600 4800 0 1000 2000 3000 Number of iterations 4000 5000 Fig. 9. Mean-square-deviation (MSD) performance levels. IX. CONCLUDING REMARKS In this article we examined the learning behavior of adaptive agents over weakly-connected networks. We showed that a leader-follower relationship develops among the agents, and identified the limit points towards which the individual agents converge. We also derived closed-form expressions to quantify how close the agents get to their limit points in the mean- square-error sense, and revealed how the MSD performance of follower agents is determined by the MSD performance of leader agents. We illustrated the results by considering examples dealing with pattern classification and distributed estimation. We also illustrated how weak topologies can be beneficial in reducing the impact of outlier data. APPENDIX A MEAN-SQUARE-ERROR STABILITY OF (68) If we equate the squared-norm of both sides of (68), and compute expectations, we get E k ¯WR,ik2 (a) = E(cid:13)(cid:13)J T ǫ MRHR,i−1V −T ǫ (cid:0)I − V T SR (I − MSHS,i−1) eWS,i−1 − RRMRbR(cid:13)(cid:13)2 ¯T T ¯T T SRMSbS − ¯T T SRMS SS,i + ¯T T E k ¯T T + RRMRSR,ik2 ǫ (cid:1) ¯WR,i−1 + = E(cid:13)(cid:13)(cid:13)(cid:13) 1 − t 1 − t J T ǫ (cid:0)I − V T ǫ MRHR,i−1V −T ǫ (cid:1) ¯WR,i−1 + t 1 tn ¯T T SR (I − MSHS,i−1) eWS,i−1 − 2 ¯T T SRMSbS − ¯T T E k ¯T T SRMS SS,i + ¯T T RRMRbRo(cid:13)(cid:13)(cid:13) + RRMR SR,ik2 (b) ≤ (c) ≤ ǫ 1 1 − t 2 t 2 t 2µ2 E k ¯T T SRMSbS + ¯T T ǫ MRHR,i−1V −T SRk2E kSS,ik2 + k ¯T T (cid:1) ¯WR,i−1(cid:13)(cid:13)2 + + E(cid:13)(cid:13)J T ǫ (cid:0)I − V T SR (I − MSHS,i−1) eWS,i−1(cid:13)(cid:13)2 E(cid:13)(cid:13) ¯T T RRMRbRk2(cid:17) + max(cid:0)k ¯T T RRk2E kSR,ik2(cid:1) E keWS,i−1k2 + max(cid:0)k ¯TSRk2kbSk2 + k ¯TRRk2kbRk2(cid:1) + max(cid:0)k ¯TSRk2E kSS,ik2 + k ¯TRRk2E kSR,ik2(cid:1) E k ¯WR,i−1k2 + 2k ¯TSRk2 ρ(JǫJǫ 1 − t µ2 4 t 2µ2 T) t (98) for any 0 < t < 1, where step (a) is because the gradient noise process is zero-mean and independent of all other random variables conditioned on F i−1, step (b) is because of Jensen's inequality and the sub-multiplicative property of norms, and in step (c) we used the equalities k ¯TRRk = k ¯TRRk, k ¯T12k = k ¯T12k (99) as well as for sufficiently small µmax. In the statement of the theorem, we are assuming that the gradient noise process satisfies the conditions stated in Assumption 8.1 in [9], from which we conclude that E kSS,ik2 ≤ β2 S E kSR,ik2 ≤ β2 R where S E keWS,i−1k2 + σ2 E keWR,i−1k2 + σ2 R β2 S = β2 R = σ2 S = σ2 R = max 1≤k≤NgS β2 k max NgS +1≤k≤N β2 k σ2 k NgSXk=1 NXk=NgS +1 σ2 k Now let v2 ∆= kV −T ǫ k2 and note that (102) (103) (104) (105) (106) (107) kI − V T ǫ MRHR,i−1V −T ǫ k ≤ 1 kI − MSHS,i−1k ≤ 1 (100) (101) so that 12 E k ¯WR,ik2 T) 1 − t + 2µ2 + 2µ2 maxk ¯TRRk2v2β2 R! E k ¯WR,i−1k2 + ≤ ρ(JǫJǫ (cid:18) 2k ¯TSRk2 S(cid:19) E keWS,i−1k2 + max(cid:0)k ¯TRRk2kbRk2 + k ¯TSRk2kbSk2(cid:1) + S(cid:1) max(cid:0)k ¯TRRk2σ2 For compactness of notation, we introduce the scalar coeffi- cients: R + k ¯TSRk2σ2 maxk ¯TSRk2β2 4 t 2µ2 (110) µ2 t RR = k ¯TRRk2 σ2 (111) SR = k ¯TSRk2 σ2 (112) b2 = k ¯TRRk2kbRk2 + kTSRk2kbSk2 = O(1)(113) c2 = k ¯TRRk2σ2 (114) R + kTSRk2σ2 S = O(1) Before proceeding, let us examine the spectral radius of the matrix JǫJ T ǫ . For that purpose, we note that ǫ ) ≤ kJǫJ T T) = ρ(JǫJ T ρ(JǫJǫ ǫ k1 (115) where the last inequality is because the spectral radius of a matrix is bounded by any of its norms; the last norm is the one-norm (maximum absolute column sum). We next verify that kJǫJ T ǫ k1 = ρ2(TRR) ρ(JǫJǫ T) ≤ ρ2(TRR) (116) (117) To establish (116), we proceed as follows. The eigenvalues of the matrix TRR are composed of the eigenvalues of the matrices {Ak, k = S + 1, · · · , S + R} that appear on its block diagonal. Each of these matrices is associated with a connected network and has nonnegative entries. It follows from the Perron-Frobenius Theorem [34], [35], [41] that the largest eigenvalue of each {Ak, k = S +1, · · · , S +R} is simple (i.e., its multiplicity is equal to one). Some of the largest eigenvalues among the Ak may coincide with each other, in which case the largest eigenvalue of TRR may have multiplicity larger than one. However, this largest eigenvalue of TRR cannot be defective, meaning that its algebraic multiplicity must coincide with its geometric multiplicity. This is because the matrices {Ak} occur at different block locations in TRR and the eigenvectors corresponding to their largest eigenvalues will not coincide with each other. We therefore conclude that the largest eigenvalue of TRR is semi-simple (its algebraic and geometric multiplicities are equal to each other). Thus, assume we order the eigenvalues of TRR from largest to smallest, say, as: λ1(TRR) > λ2(TRR) ≥ λ3(TRR) ≥ . . . (118) ¯WR,i−1k2 ≤ v2 E k ¯WR,i−1k2 (108) E keWR,i−1k2 = E kV −T Then, we can write ǫ E kSR,ik2 ≤ v2β2 R Substituting these expressions into (98) gives: E keWR,i−1k2 + σ2 R (109) Then, the Jordan matrix Jǫ will, for example, be of the following representative form (say, for 3 Jordan blocks of size 3 × 3 each): Jǫ = blockdiag{J1, J2, J3} (119) where It follows that J1 = diag{λ1, λ1, λ1} J2 =  J3 =  λ2 ǫ λ3 ǫ λ2 ǫ λ3 ǫ λ2 λ3   (120) (121) (122) JǫJ T ǫ = blockdiag{K1, K2, K3} (123) where, for example, K1 = diag{ρ2(TRR), ρ2(TRR), ρ2(TRR)} K2 =  λ2 2 ǫλ2 λ2 ǫλ2 2 + ǫ2 ǫλ2 2 + ǫ2  λ2 (124) (125) from which we conclude that, we can choose ǫ small enough such that kJǫJ T ǫ k1 = max{ρ2(TRR), λ2 2(TRR) + 2ǫλ2(TRR) + ǫ2} = max{ρ2(TRR), (λ2(TRR) + ǫ)2} = ρ2(TRR) as claimed. Now we can use inequality (117) to replace ρ(JǫJǫ (110) and choose t = 1 − ρ(TRR), to obtain (126) T) in E k ¯WR,ik2 ≤ SR (cid:0)ρ(TRR) + 2µ2 (cid:18) 2σ2 (cid:18) 1 − ρ(TRR) 1 − ρ(TRR) 4 maxσ2 RRv2β2 + 2µ2 maxσ2 SRβ2 b2 + 2c2(cid:19) µ2 R(cid:1) E k ¯WR,i−1k2 + S(cid:19) E keWS,i−1k2 + max Noting that ρ(TRR) < 1 is independent of µmax, we have 1 − ρ(TRR) − 2µ2 maxσ2 RRv2β2 R = O(1) (127) for sufficiently small µmax. Letting i → ∞ we conclude that lim sup i→∞ E k ¯WR,ik2 ≤ d lim i→∞ where the scalar d is defined by: SR ∆ d = (cid:16) 2σ2 1−ρ(TRR) + 2µ2 1 − ρ(TRR) − 2µ2 maxβ2 maxσ2 Since we know that lim supi→∞ we find that max) E keWS,i−1k2 + O(µ2 SR(cid:17) E keWS,i−1k2 = O(µmax), Sσ2 RRv2β2 R = O(1) (128) (129) lim sup i→∞ E k ¯WR,ik2 = O(µmax) Then, combining equation (108) with above result we conclude that lim sup i→∞ E keWR,ik2 = O(µmax) (130) 13 APPENDIX B MEAN-ERROR STABILITY OF (68) We start by taking the expectation of both sides of (68): E ¯W R,i = J T ǫ ǫ MRHR,i−1V −T E(cid:2)(cid:0)I − V T SR (I − MSHS,i−1) eWS,i−1] − E [ ¯T T ¯T T SRMSbS − ¯T T RRMRbR ǫ (cid:1) ¯WR,i−1(cid:3) + (131) where the terms involving the gradient noise are canceled out. are defined in (75) and (76). Next, we need the error quantities eHS,i−1 and eHR,i−1,which Using condition (69) and proceeding similarly to the argu- ment that established (9.280) in [9], we can verify that ǫ ǫ (132) (133) RRMRbR + ǫ MRHRV −T for some nonnegative constants κS and κR. Substituting (75) and (76) back into (131), we get: (cid:1) E ¯WR,i−1 + ¯WR,i−1(cid:17) + E ¯WR,i = J T ¯T T ¯T T SRMSbS − ¯T T J T ǫ ¯T T SR keHS,i−1k ≤ κSkeWS,i−1k keHR,i−1k ≤ κRkeWR,i−1k ǫ (cid:0)I − V T SR (I − MSHS) E eW S,i−1 − E(cid:16)V T ǫ MR eHR,i−1V −T E [MS eHS,i−1eWS,i−1] ¯WR,i−1(cid:17)(cid:13)(cid:13)(cid:13) (cid:13)(cid:13)(cid:13)J T ǫ kkMRkkE eHR,i−1V −T ≤ ρ(TRR)v′µmaxE keHR,i−1kkV −T ≤ ρ(TRR)vv′µmaxκRE keWR,i−1kE k ¯WR,i−1k ≤ ρ(TRR)v2v′µmaxκRqE k ¯WR,i−1k2qE k ¯WR,i−1k2 ǫ MR eHR,i−1V −T Returning to (134), we can now bound the norms of its last (a) ≤ kJ T (b) E(cid:16)V T two terms as follows: ǫ kk ¯WR,i−1k ¯WR,i−1k ǫ kkV T (e) ≤ ρ(TRR)v2v′µmaxκRE k ¯WR,i−1k2 (134) (135) (d) (c) ǫ ǫ ǫ where step (a) is due to the sub-multiplicative property of norms, step (b) uses Jensen's inequality, and introduces In addition, combining kJ T also can conclude that, v′ = kV T ǫ k ǫ k = pρ(JǫJ T (136) ǫ ) with (117), we kJ T ǫ k ≤ ρ(TRR) (137) Step (c) uses (133), step (d) uses (108), and step (e) uses (E kxk)2 ≤ E kxk2 for any random variable x. Similarly, we get: E(cid:16)MS eHS,i−1eWS,i−1(cid:17)(cid:13)(cid:13)(cid:13) ≤ σSRµmaxκS E keWS,i−1k2 For compactness of notation, we introduce the scalars: (cid:13)(cid:13)(cid:13) ¯T T (138) SR e f ∆= ρ(TRR)vv′µmaxκR = O(µmax) ∆= σSRµmaxκS = O(µmax) (139) (140) and return to equation (134) to find that: kE ¯WR,ik ≤ kJ T k ¯T T k ¯T T ǫ kkI − V T ǫ MRHRV −T ǫ kkE ¯WR,i−1k + ǫ kkE ¯WR,i−1k + ǫ kkI − V T RRMRbRk + ǫ MRHRV −T SRMSbS − ¯T T ≤ kJ T k ¯T T SRkkI − MSHSkkEeWS,i−1k + eE k ¯WR,i−1k2 + f E keWS,i−1k2 SRkkI − MSHSkkEeWS,i−1k + eE k ¯WR,i−1k2 + f E keWS,i−1k2 + µmax(cid:0)k ¯T T RRkkbRk(cid:1) ≤ ρ(TRR)kE ¯WR,i−1k + σSRkEeWS,i−1k + eE k ¯WR,i−1k2 + f E keWS,i−1k2 + µmax(cid:0)k ¯T T RRkkbRk(cid:1) SRkkbSk + k ¯T T SRkkbSk + k ¯T T (a) (141) In step (a), we used following inequality kI − V T ǫ MRHRV −T ǫ k ≤ 1 kI − MSHSk ≤ 1 (142) (143) for sufficiently small µmax and denoted the scalar coefficient here: b′ ∆= (cid:0)k ¯T T If we now let i → ∞: SRkkbSk + k ¯T T RRkkbRk(cid:1) = O(1) (144) lim sup i→∞ kE ¯WR,ik ≤ σSR 1 − ρ(TRR) e 1 − ρ(TRR) f 1 − ρ(TRR) b′ 1 − ρ(TRR) E k ¯WR,i−1k2 + kEeWS,i−1k + E keWS,i−1k2 + µmax (145) Notice that ρ(TRR) < 1 and calling upon (62), we conclude that lim sup i→∞ kE ¯WR,ik = O(µmax) (146) Lastly, similar to equation equation (108), we get following inequality, kEeWR,ik = kV −T ǫ Combining (146) and (147) we arrive at E ¯WR,ik ≤ kV −T ǫ kkE ¯WR,ik (147) lim sup i→∞ kEeWR,ik = O(µmax) APPENDIX C (148) STABILITY OF FOURTH-ORDER ERROR MOMENT OF (68) From recursion (68) we obtain: E k ¯WR,ik4 = E(cid:13)(cid:13)J T ¯T T ǫ MRHR,i−1V −T ǫ (cid:0)I − V T SR (I − MSHS,i−1) eWS,i−1 − ǫ (cid:1) ¯WR,i−1 + 14 E(cid:13)(cid:13) ¯T T 6 E(cid:13)(cid:13)J T ¯T T − ¯T T ¯T T SRMSbS − ¯T T SRMS SS,i + ¯T T + RRMRbR(cid:13)(cid:13)4 RRMRSR,i(cid:13)(cid:13)4 + ǫ ǫ MRHR,i−1V −T ǫ (cid:0)I − V T SR (I − MSHS,i−1) eWS,i−1 − ¯T T RRMRbR(cid:13)(cid:13)2(cid:13)(cid:13) ¯T T (cid:1) ¯WR,i−1 + RRMRSR,i(cid:13)(cid:13)2 SRMS SS,i + ¯T T SRMSbS (149) where we used the expansion ka + bk4 = kak4 + kbk4 + 6kak2kbk2 + 4bTakak2 + 4aTbkbk2 and where the expectation of the last two terms in the expansion are eliminated since the gradient noise is zero mean and independent of other random variables. Let us consider the last term in (149): last term T) E k ¯WR,i−1k2 + 2k ¯TSRk2 (98) ≤ 6n ρ(JǫJǫ 1 − t µ2 4 t × 2 µ2 t E keWS,i−1k2+ max max(cid:0)k ¯TSRk2kbSk2 + k ¯TRRk2kbRk2(cid:1)o E (cid:8)k ¯TRRk2kSR,ik2 + k ¯TSRk2kSS,ik2(cid:9) E keWS,i−1k2+ E keWS,i−1k2+ maxb2o × 2 µ2 E keW R,i−1k2k2 + k ¯TRRk2σ2 2σ2 SR t SRβ2 max(cid:8)σ2 E k ¯WR,i−1k2 + R + kTSRk2σ2 R S S(cid:9) (a) ≤ 6n ρ(TRR)2 1 − t µ2 4 t σ2 RRβ2 (b) ≤ 6nρ(TRR)E k ¯WR,i−1k2+ 1 − ρ(TRR)(cid:19) E keW S,i−1k2 + (cid:18) 2σSR max(cid:8)σ2 E keWS,i−1k2 + σ2 SRβ2 2µ2 S 1 − ρ(TRR) RRβ2 R 4 µ2 maxb2o× E keWR,i−1k2 + c2(cid:9)(150) In step (a), we expand the stochastic gradient noise similar to (102) -- (103), and in step (b) we choose t = 1 − ρ(TRR) and use the scalar defined (114). To emphasize the order of the coefficients, we rewrite the above equation as: + O(µ2 last term ≤nO(1)E k ¯WR,i−1k2 + O(1)E keWS,i−1k2 max)o max)E keWS,i−1k4 max)o ×nO(µ2 max)E keWS,i−1k2 + O(µ2 max)E k ¯WR,i−1k4 + O(µ2 max)E k ¯WR,i−1k2+ We consider next the second term using Jensen's inequality: = O(µ2 + O(µ4 O(µ2 max) (151) second term ≤ 8σ4 maxkSR,ik4 Referring to equation (8.122) in [9], we also conclude that maxkSS,ik4 + 8σ4 RRµ4 SRµ4 E kSS,ik4 ≤ β2 E kSR,ik4 ≤ β2 4,S 4,R where β2 4,S = max 1≤k≤NgS E keWS,i−1k4 + σ2 E keWR,i−1k4 + σ2 4,S 4,R β2 4,k = O(1) (152) (153) (154) β2 4,R = max NgS +1≤k≤N β2 4,k = O(1) σ2 4,k = O(1) σ2 4,S = σ2 4,R = NgSXk=1 NXk=NgS +1 σ2 4,k = O(1) zR,i (cid:21) = AT(cid:18)I −(cid:20) MSHS (cid:20) zS,i (156) (157) so that (155) Subtracting recursions (61) and (77), we get: 15 zR,i (cid:21) MRHR (cid:21)(cid:19)(cid:20) zS,i eHR,ieWR,i #(167) + ATM" eHS,ieWS,i SRMS eHS,ieWS,i(168) Using the eigen-decomposition (65), we can transform the above equation into. zR,i = T T RR (I − MRHR) zR,i−1 + T T SR (I − MSHS) zS,i−1 + T T ¯zR,i = J T ¯T T SR (I − MSHS) zS,i−1 + ¯T T ǫ MRHRV −T(cid:1) ¯zR,i−1 + RRMR eHR,ieWR,i + T T ǫ (cid:0)I − V T RRMR eHR,ieWR,i + ¯T T ¯zR,i ∆ = V T ǫ zR,i SRMS eHS,ieWS,i(169) (170) where we are using the notation from (67) as well as Now note that k ¯T T SRMS eHS,ieWS,ik2 ≤ (112) = (132) ≤ Similarly, we can verify that k ¯T T µ2 maxσ2 µ2 maxσ2 SRκ2 SRk2kMSk2keHS,ieWS,ik2 SRkeHS,ieWS,ik2 SkeWS,ik4 RkeWR,ik4(172) maxσ2 RRκ2 (171) k ¯T T RRMR eHR,ieWR,ik2 ≤ µ2 Therefore, following steps similar to the arguments in Appen- dices A and B we then conclude that lim sup i→∞ which is equivalent to: E kzR,ik2 = O(µ2 max) (173) i→∞ Finally, note that E keW (174) (175) ′ ′ ′ ′ max) lim sup E keW R,ik2 = E keW ≤ E keW 2E (eW E keWR,ik2 = lim sup R,i − eWR,ik2 = O(µ2 R,i − eWR,i + eWR,ik2 R,i − eWR,ik2 + E keWR,ik2 + R,i − eWR,i)∗eWR,i E keW i→∞ APPENDIX E R,ik2 + O(µ3/2 ′ ′ PROOF OF THEOREM 4 max) (176) Hence, we conclude that We know from Theorem 11.2 in [9] that the MSD expres- sion for a generic agent k in a connected network is given by: MSDk = Tr(EkX ) (177) where Ek is a block diagonal matrix with zero blocks except for an identity matrix of size M × M at the location corre- Hence, we find for the second term with simplified notation that, second term ≤ O(µ4 O(µ4 max)E keWS,i−1k4+ max)E k ¯WR,i−1k4 + O(µ4 max) (158) Lastly, we consider the first term using Jensen's inequality again: first term ≤ E k ¯WR,i−1k4 + ρ(TRR)4 (1 − t)3 8σ4 E keWS,i−1k4 + RR t3 max(cid:0)σ4 64 t3 µ4 RRkbRk4 + σ4 SRkbSk4(cid:1)(159) for any 0 < t < 1. Here, we select t = 1 − ρ(TRR) so that first term ≤ (ρ(TRR)) E k ¯WR,i−1k4 + (160) 8σ4 RR E keWS,i−1k4 + max(cid:0)σ4 (1 − ρ(TRR))3 (1 − ρ(TRR))3 µ4 64 RRkbRk4 + σ4 Recalling that ρ(TRR) < 1, we get: SRkbSk4(cid:1) first term ≤ ρ(TRR)E k ¯WR,i−1k4 + O(1)E keWS,i−1k4 + max)(cid:17)E k ¯WR,i−1k4 + E k ¯WR,ik4 = (cid:16)ρ(TRR) + O(µ2 Substituting (151), (158), and (161) back into (149), we find: O(µ4 max) (161) (162) max) Recalling ρ(TRR) < 1 again, we then let i → ∞ to find: O(1)E keWS,i−1k4 + O(µ4 lim sup i→∞ E k ¯WR,ik4 = O(1) lim sup i→∞ Since we already know that O(µ2 max), we conclude that lim supi→∞ max) E keWS,i−1k4 + O(µ4 E keWS,i−1k = (163) lim sup i→∞ E k ¯WR,ik4 = O(µ2 max) Combining the square of equation (108) with the above result we arrive at lim sup i→∞ lim sup i→∞ E keWR,ik4 = O(µ2 APPENDIX D max) (164) PROOF OF THEOREM 3 To simplify the notation, we introduce the differences zS,i zR,i ∆= eW ∆= eW ′ ′ S,i − eWS,i R,i − eWR,i (165) (166) sponding to agent k. Moreover, the matrix X is defined as: Comparing with (19), we conclude that it must hold (I − F )−1bvec(Ek) (186) We conclude that X = BnYBTn ∞Xn=0 Y = ATMSMA S = diag{G1, G2, . . . , GN } B = AT(I − MH) M = diag{MS, MR} H = diag{HS, HR} HS = diag{H1, H2, . . . , HNgS } HR = diag{HNgS+1, . . . , HN } (178) (179) (180) (181) (182) (183) (184) (185) Using the block Kronecker product notation, it can be verified that expression (177) can be equivalently expressed in the form: MSDk =(cid:0)bvec(Y T)(cid:1)T where F ∆= BT ⊗b BT (187) and bvec(Z) denotes the block vectorization operation; for a matrix Z with blocks of size M × M , this operation vectorizes each M × M submatrix of Z and the resulting vectors are subsequently stacked on top of each other. We now examine how expression (177) simplifies for both cases of agents in group S and agents in group R. To do so, we introduce the canonical Jordan decompensation of matrix A. Recall that A has S leading primitive left-stochastic matrices, {As, s = 1, 2, . . . , S}. Each of these matrices has all its eigenvalues strictly inside the unit circle with the exception of a single eigenvalue equal to one. The corresponding Perron vector is denoted by ps and has dimensions Ns × 1. We therefore conclude that the canonical Jordan decomposition of A has the form: 16 (192) (193) (194) (195) (196) (cid:20) Θ 0 so that we can set P = ΘW 0 (cid:21) = P QT p1 p2 ... 0 pS   where we are defining N1, 1T QT = (cid:2) LT LTW (cid:3) LT ∆= blockdiag(cid:8)1T ǫ (cid:21) V −1 A = V(cid:20) ISM = (cid:2) P Vx (cid:3)(cid:20) ISM J ′ N2, . . . , 1T NS(cid:9) Vy (cid:21) ǫ (cid:21)(cid:20) QT J ′ where (197) (198) (199) (200) (201) (202) Using the Jordan decomposition (196) for A we can now write: V = V ⊗ IM P = P ⊗ IM QT = QT ⊗ IM J ′ ǫ = J ′ ǫ ⊗ IM Vx = Vx ⊗ IM Vy = Vy ⊗ IM All eigenvalues of J ′ V in the form ǫ are strictly smaller than one. We partition where P is N × S and Vx collects the remaining right- eigenvectors of A. We also partition V −1 as ∆ J ′ A = V ·(cid:20) IS ǫ (cid:21) V −1 Vx (cid:3) = (cid:2) P V −1 ∆= (cid:20) QT Vy (cid:21) V (189) where (188) (190) where the matrices {QT, V −1 y } contain the corresponding left- eigenvectors and QT is S × N . We can use expression (19) for the limiting power of A to identify the matrices {P, Q} in the above decomposition. Indeed, if we compute the limit of An using (188) we conclude that BT = (I − MH)A = A − MHA = V(cid:26)(cid:20) ISM = V(cid:20) ISM − D11 −D21 ǫ (cid:21) − V −1MHV(cid:20) ISM ǫ − D22 (cid:21) V −1 −D12 J ′ J ′ D11 = QTMHP = blockdiag( N1Xk=1 = O(µmax) q1,kH1,k, . . . , NSXk=1 D12 = QTMHVxJ ′ D21 = VyMHP = O(µmax) D22 = VyMHVxJ ′ ǫ = O(µmax) ǫ = O(µmax) ǫ (cid:21)(cid:27) V −1 J ′ (203) qS,kHS,k) (204) (205) (206) (207) (208) lim n→∞ An = lim n→∞(cid:18)V ·(cid:20) IS n (cid:21) · V −1(cid:19) J ′ ǫ = P QT We then obtain that (191) F = (V ⊗b V)Z(V ⊗b V)−1 where we introduced the matrix Z ∆= (cid:20) ISM − D11 −D21 −D12 Jǫ − D22 (cid:21)⊗b(cid:20) ISM − D11 −D21 −D12 Jǫ − D22 (cid:21) (209) This relation allows us to determine a low-rank expansion for (I − F ) as follows. First note that (I − F )−1 = (V ⊗b V)(I − Z)−1(V ⊗b V)−1 (210) 17 because of the definition of Es It is therefore clear that the performance of agents in group S will be different from the performance of agents in group R. For agents in group S, from this point onwards, we can follow the same argument from Lemma 11.3 in [9] to arrive at their MSD expression. With regards to agents in group R we proceed as follows. Let (218) (219) Then, we can appeal to the derivation used in the proof of Lemma 9.5 from [9] to conclude that the entries of (I − Z)−1 are in the order of: k ⊗ IM )) or, equivalently, by using the definition of Z1: 1 bvec(ckcT x1 = Z −1 (I − Z)−1 =(cid:20) O(1/µmax) O(1) O(1) (cid:21) O(1) (211) where the size of the leading block is (SM )2 × (SM )2. Since O(1/µmax) dominates O(1) for sufficiently small µmax, we have that (I − Z)−1 =(cid:20) (cid:0)I ⊗ D11 + DT 11 ⊗ I(cid:1)−1 0 0 0 (cid:21) + O(1) (212) Noting that the Hessian matrices {Hs,k} are symmetric, we conclude that DT 11 = D11. Substituting (212) into (210), we arrive at the following low-rank approximation: (213) (I − F )−1 If we now substitute (213) into (186), we obtain: = (P ⊗b P) (I ⊗ D11 + D11 ⊗ I)−1(cid:0)QT ⊗b QT(cid:1) + O(1) (cid:0)bvec(Y T)(cid:1)T (I − F )−1bvec(Ek) = O(µ2 (P ⊗b P) Z −1 max)+ 1 (cid:0)QT ⊗b QT(cid:1) bvec(Ek) (214) (cid:0)bvec(Y T)(cid:1)T (I ⊗ D11)x1 + (D11 ⊗ I)x1 = bvec(cid:0)ckcT k ⊗ IM(cid:1) Let X1 = unbvec(x1) denote the SM × SM matrix whose block vector representation is x1. Then, the matrix X1 is the solution to the Lyapunov equation: D11X1 + X1D11 = ckcT k ⊗ IM (220) We can solve for the block diagonal entries of X1. For example, consider the s−th diagonal block of size M × M . It satisfies: NsXk=1 so that qs,kHs,k! [X1]s,s +[X1]s,s NsXk=1 k(s) NsXk=1 qs,kHs,k! = c2 qs,kHs,k!−1 [X1]s,s = 1 2 c2 k(s)IM (221) (222) Since this information is sufficient to obtain the MSD level for agent k, we do not need to compute the off-diagonal blocks of X1. where Z1 ∆= I ⊗ D11 + D11 ⊗ I (215) Returning to equation (214), and using properties of the block Kronecker product operation, we have (216) = Tr [unbvec{(P ⊗b P) bvec(X1)}Y] We can simplify the right-hand side of (214) as follows. Starting from the rightmost term we note that: (cid:0)QT ⊗b QT(cid:1) bvec(Ek) = bvec(cid:0)QTEkQ(cid:1) = bvec(cid:0)(cid:2)QTEkQ(cid:3) ⊗ IM(cid:1) = (bvec(Es ⊗ IM ) bvec(ckcT (a) (when k ∈ sub-network s in group S) k ⊗ IM ) (when k ∈ sub-network r in group R) where the matrix Ek is an S × S matrix with all zero entries except at location (k, k), where the entry is equal to one. Moreover, the vector ck is the same defined earlier in (83). In step (a), we expanded the quantity QTEkQ using the following identity: (179) [P⊗bP]bvec(X1) (cid:0)bvec(Y T)(cid:1)T = Tr(cid:2)PX1P TY(cid:3) = Tr(cid:2)X1P T(ATMSMA)P(cid:3) = Tr(cid:2)X1U TSU(cid:3) Tr SXs=1 k(s) NsXk=1 (b) = 1 2 c2 (a) where in step (a) we introduced qs,kHs,k!−1 NsXk=1 q2 s,kGs,k!(223) QTEkQ = (b) = (194) = Ek(i, j)[QT]:,i[Q]j,: NXj=1 NXi=1 ([LT]:,k[L]k,: [QT]:,k[Q]k,: [LTW ]:,k[W TL]k,: (when k ∈ group S) (when k ∈ group R) (217) U ∆= MAP (31) = q1 q2 ... 0 qS   where the notation [ · ]:,i and [ · ]j,: denotes here the the i−th column and j−th row of the matrix, respectively. Step (b) is In step (b), we exploited the fact that U TSU is block diagonal matrix. ⊗ IM (224) 18 [26] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social networks," Dynamic Games and Applications, vol. 1, no. 1, pp. 3 -- 49, 2011. [27] E. Yildiz, D. Acemoglu, A. Ozdaglar, A. Saberi, and A. Scaglione, "Binary opinion dynamics with stubborn agents," ACM Trans. Econ. Comput., vol. 1, no. 4, pp. 19:1 -- 19:30, Dec. 2013. [28] X. Zhao and A. H. Sayed, "Distributed clustering and learning over networks," IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3285 -- 3300, July 2015. [29] J. Chen, C. Richard, and A. H. Sayed, "Multitask diffusion adaptation over networks," IEEE Trans. Signal Process., vol. 62, no. 16, pp. 4129 -- 4144, Aug. 2014. [30] U. Khan, S. Kar, and J. M. F. Moura, "Higher dimensional consensus: Learning in large-scale networks," IEEE Trans. Signal Process., vol. 58, no. 5, pp. 2836 -- 2849, 2010. [31] N. Abaid and M. Porfiri, "Leader -- follower consensus over numerosity- constrained random networks," Automatica, vol. 48, no. 8, pp. 1845 -- 1851, 2012. [32] D. S. Bassett, D. L. Alderson, and J. M. Carlson, "Collective decision dynamics in the presence of external drivers," Phys. Rev. E, vol. 86, pp. 036105, Sep 2012. [33] B. Liu, T. Chu, L. Wang, and G. Xie, "Controllability of a leader -- IEEE Trans. follower dynamic network with switching topology," Autom. Control, vol. 53, no. 4, pp. 1009 -- 1013, 2008. [34] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, 2003. [35] S. U. Pillai, T. Suel, and S. Cha, "The Perron -- Frobenius theorem: Some of its applications," IEEE Signal Processing Magazine, vol. 22, no. 2, pp. 62 -- 75, 2005. [36] S.-Y. Tu and A. H. Sayed, "Diffusion strategies outperform consensus IEEE strategies for distributed estimation over adaptive networks," Trans. Signal Process., vol. 60, no. 12, pp. 6217 -- 6234, 2012. [37] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 -- 220, April 2013. [38] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks -- Part I: Transient analysis," IEEE Trans. Inf. Thy., vol. 61, no. 6, pp. 3487 -- 3517, June 2015. [39] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks -- Part II: Performance analysis," IEEE Trans. Inf. Thy., vol. 61, no. 6, pp. 3518 -- 3548, June 2015. [40] J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, Macmillan London, 1976. [41] C. D. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, PA, 2000. [42] C. M. Bishop, Pattern Recognition and Machine Learning, vol. 1, Springer, NY, 2006. [43] S. Theodoridis and K. Koutroumbas, Pattern Recognition, Academic Press, 4th edition, 2008. REFERENCES [1] B. Ying and A. H. Sayed, "Learning by weakly-connected adaptive agents," in Proc. IEEE ICASSP, Brisbane, Australia, Apr. 2015, pp. 5788 -- 5792. [2] S. Kar, J. M. F. Moura, and K. Ramanan, "Distributed consensus algorithms in sensor networks: Link failures and channel noise," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 355 -- 369, 2009. [3] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi- agent optimization," IEEE Trans. Aut. Control, vol. 54, no. 1, pp. 48 -- 61, 2009. [4] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal processing," Proceedings of the IEEE, vol. 98, no. 11, pp. 1847 -- 1864, Nov. 2010. [5] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2508 -- 2530, 2006. [6] K. I. Tsianos, S. Lawlor, and M. G. Rabbat, "Consensus-based distributed optimization: Practical issues and applications in large-scale machine learning," in Proc. Annual Allerton Conference on Commun. Control and Comput., Monticello, IL, Oct. 2012, vol. 51, pp. 1543 -- 1550. [7] S. Kar, J. M. F. Moura, and H. V. Poor, "Distributed linear parameter estimation: Asymptotically efficient adaptive strategies," SIAM Journal on Control and Optimization, vol. 51, no. 3, pp. 2200 -- 2229, 2013. [8] S. S. Stankovic, M. S. Stankovic, and D. M. Stipanovic, "Decentralized parameter estimation by consensus based stochastic approximation," IEEE Trans. Aut. Control, vol. 56, no. 3, pp. 531 -- 543, Mar. 2011. [9] A. H. Sayed, "Adaptation, learning, and optimization over networks," Foundations and Trends in Machine Learning, vol. 7, no. 4 -- 5, pp. 311 -- 801, NOW Publishers, Boston-Delft, 2014. [10] A. H. Sayed, "Adaptive networks," Proceedings of the IEEE, vol. 102, no. 4, pp. 460 -- 497, Apr. 2014. [11] A. H. Sayed, S.-Y. Tu, J. Chen, X. Zhao, and Z. Towfic, "Diffusion IEEE Signal strategies for adaptation and learning over networks," Processing Magazine, vol. 30, no. 3, pp. 155 -- 171, May 2013. [12] S. Chouvardas, K. Slavakis, and S. Theodoridis, "Adaptive robust distributed learning in diffusion sensor networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct 2011. [13] P. Braca, S. Marano, and V. Matta, "Running consensus in wireless in Proc. Int. Conf. Inform. Fusion (FUSION), sensor networks," Cologne, Germany, June-July 2008, IEEE, pp. 1 -- 6. [14] D. H. Dini and D. P. Mandic, "Cooperative adaptive estimation of distributed noncircular complex signals," in Proc. Asilomar Conference, Pacific Grove, CA, Nov. 2012, pp. 1518 -- 1522. [15] N. Takahashi and I. Yamada, "Link probability control for probabilistic diffusion least-mean squares over resource-constrained networks," in Proc. IEEE ICASSP, Dallas, TX, Mar. 2010, pp. 3518 -- 3521. [16] S. Barbarossa, S. Sardellitti, and P. Di Lorenzo, "Distributed detection and estimation in wireless sensor networks," in Academic Press Library in Signal Processing, vol. 2, R. Chellapa and S. Theodoridis, eds., pp. 329 -- 408, Elsevier, 2014. [17] A. Bertrand and M. Moonen, "Seeing the bigger picture: How nodes can learn their place within a complex ad hoc network topology," IEEE Signal Processing Magazine, vol. 30, no. 3, pp. 71 -- 82, May 2013. [18] O N. Gharehshiran, V. Krishnamurthy, and G. Yin, "Distributed energy- aware diffusion least mean squares: Game-theoretic learning," IEEE J. Sel. Topics Signal Process, vol. 7, no. 5, pp. 821 -- 836, Oct 2013. [19] K. I. Tsianos and M. G. Rabbat, "Distributed strongly convex optimiza- tion," in Proc. Allerton Conf., Allerton, IL, Oct. 2012, pp. 593 -- 600. [20] S. S. Ram, A. Nedi´c, and V. V. Veeravalli, "Distributed stochastic subgradient projection algorithms for convex optimization," J. Optim. Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010. [21] J. B. Predd, S. R. Kulkarni, and H. V. Poor, "A collaborative training algorithm for distributed learning," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1856 -- 1871, Apr. 2009. [22] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Systems & Control Letters, vol. 53, no. 1, pp. 65 -- 78, Sep. 2004. [23] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asyn- chronous deterministic and stochastic gradient optimization algorithms," IEEE Trans. Autom. Control, vol. 31, no. 9, pp. 803 -- 812, Sep. 1986. [24] V. Saligrama, M. Alanyali, and O. Savas, "Distributed detection in sensor networks with packet losses and finite capacity links," IEEE Trans. Signal Proc., vol. 54, no. 11, pp. 4118 -- 4132, Oct. 2006. [25] P. Bianchi, G. Fort, and W. Hachem, "Performance of a distributed stochastic approximation algorithm," IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7405 -- 7418, 2013. This figure "photo_sayed.jpeg" is available in "jpeg"(cid:10) format from: http://arxiv.org/ps/1412.1523v2 This figure "photo_ybc.jpg" is available in "jpg"(cid:10) format from: http://arxiv.org/ps/1412.1523v2
1904.05267
1
1904
2019-04-10T16:09:53
Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks
[ "cs.MA", "cs.CY" ]
Current demographic trends in the UK include a fast-growing elderly population and dropping birth rates, and demand for social care amongst the aged is rising. The UK depends on informal social care -- family members or friends providing care -- for some 50\% of care provision. However, lower birth rates and a graying population mean that care availability is becoming a significant problem, causing concern amongst policy-makers that substantial public investment in formal care will be required in decades to come. In this paper we present an agent-based simulation of care provision in the UK, in which individual agents can decide to provide informal care, or pay for private care, for their loved ones. Agents base these decisions on factors including their own health, employment status, financial resources, relationship to the individual in need, and geographical location. Results demonstrate that the model can produce similar patterns of care need and availability as is observed in the real world, despite the model containing minimal empirical data. We propose that our model better captures the complexities of social care provision than other methods, due to the socioeconomic details present and the use of kinship networks to distribute care amongst family members.
cs.MA
cs
MODELLING SOCIAL CARE PROVISION IN AN AGENT-BASED FRAMEWORK WITH KINSHIP NETWORKS A PREPRINT Umberto Gostoli MRC/CSO Social and Public Health Sciences Unit University of Glasgow, Glasgow, UK G2 3AX Eric Silverman MRC/CSO Social and Public Health Sciences Unit University of Glasgow, Glasgow, UK G2 3AX [email protected] [email protected] ABSTRACT Current demographic trends in the UK include a fast-growing elderly population and dropping birth rates, and demand for social care amongst the aged is rising. The UK depends on informal social care -- family members or friends providing care -- for some 50% of care provision. However, lower birth rates and a graying population mean that care availability is becoming a significant problem, causing concern amongst policy-makers that substantial public investment in formal care will be required in decades to come. In this paper we present an agent-based simulation of care provision in the UK, in which individual agents can decide to provide informal care, or pay for private care, for their loved ones. Agents base these decisions on factors including their own health, employment status, financial resources, relationship to the individual in need, and geographical location. Results demonstrate that the model can produce similar patterns of care need and availability as is observed in the real world, despite the model containing minimal empirical data. We propose that our model better captures the complexities of social care provision than other methods, due to the socioeconomic details present and the use of kinship networks to distribute care amongst family members. Keywords Social Care, Kinship Networks, Agent-Based Modelling 1 Introduction As human lifespans continue to lengthen and birth-rates drop throughout much of the developed world, many nations are experiencing an increase in demand for social care -- the provision of personal and medical care for people in need of assistance due to age, disability or other factors. In the UK, the elderly consume the largest share of social care, and lower birth-rates mean that the supply of available carers is decreasing over time even as demand is growing rapidly [1]. As a result, social care is a frequent topic in UK policy debates, with widespread concern that the country will be unable to afford the significant public investment needed to fulfill this growing care need. Age UK notes that nearly 50% of those aged 75 and over are living with a long-term limiting health condition -- and the fastest-growing age group in the UK is the over-85s, so the problem will only get worse in the coming decades [2]. As a result, social care need is rising at a pace that outstrips the growth of public and private care supply. Unmet social care need is therefore an increasingly important and widespread social problem in the UK. The 2017 Ipsos MORI report Unmet Need for Care showed that "more than half of those with care needs had unmet need for at least some of their needs" [3]. This means that less than half of those elderly individuals in need of assistance with activities of daily living (ADLs) were able to receive sufficient care. Large numbers of UK citizens are thus living without sufficient care; an estimated 1.2 million people did not receive sufficient care for their needs in 2017, an increase of 48% since 2010 [2]. The increased pressure on the social care system also has an impact on the health care system, with delayed discharges from hospital being a particularly expensive consequence of unmet care need. Patients in need of social care frequently stay in hospital longer than necessary due to a lack of care availability, leading to a shortage of beds for other patients and increased costs to hospitals. According to Age UK, between 2010 and 2016 the number of additional bed- days attributable a lack of available home-care packages increased by 181.7%, while wait times for residential care Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT placements increased by 40% [2]. In 2016 the National Audit Office estimated the total delays attributable to care shortages amounted to 2.7 million bed-days per year, resulting in an annual cost to the National Health Service (NHS) of approximately £820 million [4]. The UK is largely dependent on informal social care, or care provided free-of-charge by family members and loved ones, in order to meet the needs of the population. Informal care is enormously widespread in the UK and is much larger than the formal care infrastructure. The Family Resources Survey 2013/14 showed that there were 5.3 million informal carers in the UK [5], while projections indicate that the number of people receiving informal care will increase by 60% in the period 2015-2035 [6]. The increase in demand is such that Carers UK proposes that carer numbers would need to increase 40% over the next two decades to meet demand [7]. At the same time, the number of people using privately-funded social care is expected to rise by almost 50% by 2035, and private expenditure for social care is projected to increase from £6.8 billion to almost £20 billion in the same period, almost a three-fold increase [6]. Understanding how the need for social care evolves and the process through which informal and formal care is provided is a vital component in developing sustainable social care policies. In this regard, the importance of support and care- giving networks has long been recognized [8]. In particular, research has shown that informal care is provided mostly through care networks with an average of three to five members [9]. These networks are predominantly composed of an individual's close relatives. Aldridge and Huges [5] report that 72% of carers provide care to a member of their immediate family, whether a parent (40%), partner (18%), son or daughter (14%), while Petrie and Kirkup [10] show that 51% of carers provide care to someone in their household. Wettstein and Zulkarnain[11] show that, in 2011, 31% of informal care in the US was provided by spouses, 47% by children and 18% by other relatives (sons-in-law, daughters-in-law and grandchildren), with only 4% being provided by non-relatives. Moreover, empirical research has shown that the kind of social care provided is affected by socioeconomic status. Petrie and Kirkup [10] report that people working in routine occupations and those with lower qualifications are more likely to provide informal care. Moreover, Laing and Buisson [12] find that, while across the UK an estimated 24% of care home residents are funded through private 'top-ups', in North-East England only 18% are funded privately, as opposed to 54% in the wealthier South-East. Overall, these findings suggest that informal care becomes less common in higher socioeconomic status groups than in lower groups, while formal care becomes more common. Finally, the social care literature also reveals a significant gender gap in social care provision. Wettstein et al. [11] reported that in the US daughters are almost twice as likely (31%) to provide care as compared to sons (16%). These findings are confirmed by Petrie and Kirkup [10], who find that 59% of family carers in the UK are women. At the population level, 16% of women provide informal care as compared to 12% of men. In this paper, we propose an agent-based model of the UK informal and privately-funded formal social care system. This model reflects the complexity of a system where demographic, social and economic processes interact to deter- mine the dynamics of social care demand and supply. Our aim is to provide a theoretical framework that allows us to to improve our understanding of the mechanisms driving unmet social care need. Moreover, using ABMs enables us to model scenarios of economic and social policy change in virtual populations, providing a means to test complex policies targeted at multiple levels of society. Such models can allow policy-makers to experiment with potential pol- icy interventions and reveal any possible unintended side-effects of those policies prior to implementing them in the real world. Previous work has attempted to address the social care problem using agent-based simulation approaches [13] [14]. Here we present a simulation that significantly extends these previous efforts. The model provides a more compre- hensive simulation of social care provision behaviour, via the inclusion of a detailed socioeconomic model and the representation of care provision as not just a simple one-to-one exchange of resources, but a complex negotiation taking place between members of the care receivers' kinship networks. 2 The Model 2.1 Motivations Here we present an agent-based model as a formal representation of the complex demographic and social processes affecting informal social care demand and supply, and the dynamics of the social care outcomes resulting from their interaction over time. Our primary concern at this stage, was not the precise replication of empirical, real-world data but, rather, the development of a theoretical framework potentially capable of representing the full complexity of the social care system. In our results we aim for qualitative similarity to real-world social care trends, rather than precise 2 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT numerical replication, in order to determine if our modelling of the underlying processes is producing appropriate outcomes. With these motivations in mind, at this initial stage the behavioural assumptions made in this paper should not be considered necessarily accurate, but rather should be seen as a first approximation, i.e. a necessary point of departure allowing us to provide proof-of-concept results and demonstrate the model's potential as a policy-making tool. Further work and more specialized expertise will be needed to refine and revise the model's behavioural assumptions in order for the model to be used in this way. Ultimately, our aim is for this simulation to facilitate the development and evaluation of alternative social care poli- cies, including complex interventions aimed at behavioural change. Our addition of health care costs and a detailed economic model to the simulation can also clarify the impact of interventions on other key areas of policy, enable more robust policy evaluation, and reduce the incidence of unintended consequences derived from otherwise well-meaning policy prescriptions. Future versions of this framework can also be applied to nations other than the UK, simply by altering the simulated geography and population data. 2.2 Basics of the model The model itself is complex and contains many detailed economic and social processes and sub-processes; this section provides a high-level overview of the model's functionality. For details of the previous models which formed the initial basis for this simulation, please refer to Noble et al. [13] and Silverman et al. [14]. 1 The simulated agents occupy a space roughly based on UK geography. Agents live in houses which form towns containing clusters of up to 1225 houses. These clusters vary in size in rough proportion to real-world population density, which varies across the 8×12 grid composing the model's geography. The agent population is scaled down from real UK levels at a factor of roughly 1:10,000. The model updates in one-year time steps. Initial populations are generated and randomly distributed in the year 1860, and the model then runs until 2040 when final social care costs are calculated and recorded. We start the model in 1860 to ensure the population dynamics have time to settle before empirical population data (UK Census data) is integrated into the model in 1951. 2.3 Agent Life-Course Newborn agents are classed as dependent children until age 16, at which point they reach adulthood (the minimum working age in the UK). The agents then decide whether to continue to study or to start looking for a job. This choice is repeated every two years until the age of 24. This is a probabilistic choice that depends on the household's income level and on the parent's education level. When the agent decides to look for a job (or when it reaches age 24 at the latest), the agent then enters the workforce. During their working life, agents can be hired, fired and can change jobs. When an agent is unemployed, they find a job with a certain probability which depends on the unemployment rate (which is an input of the model), then start earning an income and paying tax. At a certain age, agents retire from the workforce (at age 65 when default parameter settings are used), at which point they stop paying tax and begin receiving a pension. This version of the simulation uses a Gompertz-Makeham mortality model to approximate mortality rates until 1951, as in Noble et al. [13]. From 1951 the simulation uses mortality rates from the Human Mortality Database [15]. After 2009 a Lee-Carter model is used to generate future mortality rates, as in Silverman et al. [14]. 2.3.1 Partnership Formation Upon reaching adulthood, agents can form partnerships with other agents 2. Employed male agents and adult female agents are randomly paired with probabilities based on the agents' socioeconomic difference, age difference and geographical distance (with the relative weight of these three factors depending on the model's parameters). Age- specific annual divorce probabilities determine whether a couple dissolves their partnership. Fertility rates follow the procedures outlined in Silverman et al. [14], in which data from [16] and the Office for National Statistics [17] are used from 1950 -- 2009, at which point Lee-Carter projections are used. 1For those who wish to examine the model more closely, or run it for yourself, you can find the annotated Python code available at https://github.com/UmbertoGostoli/ABM-for-social-care/releases/tag/v.09 2Hereafter we use 'partnership' as shorthand for relationships capable of producing children. 3 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT 2.3.2 Migration As in the real world, agents can migrate for a variety of reasons. An agent becomes independent when they leave the parental home. This can happen when they form a partnership, when they find a job in a different town from the family home, or with a certain probability when they find a job in the same town of their parental home. When a partnership dissolves, the male agent will move elsewhere on the map, while any dependent children resulting from that partnership will stay with the mother. A family will relocate to a new house if one of the two parents finds a job in another town or when the family needs a larger house due to the increased size of the family. Retired agents with social care needs may elect to move into the household of one of their children, with a probability directly proportional to the amount of care provided by that household. Rarely, dependent children will be orphaned before reaching adulthood; in that case the agent will be adopted by a household of their kinship network or by a randomly-selected couple if no such household is available. 2.4 Health status and care need Agents begin in a healthy state and have no need of additional care. They may enter different categories of care need depending on age- and gender-specific probabilities. Table 1 shows the five possible categories of care need and the amount of care required per week at each level of need. Agents who enter a state of care need do not recover and return to normal health, but instead continue to progress to higher levels of need over time. The probability of progressing to higher care need levels depends positively on the agent's age and on the discounted sum of the agent's unmet care need in past periods 3. Table 1: The different care need categories, with the number of hours of care required per week Care need category Weekly hours of care required None Low Moderate Substantial Critical 0 8 16 32 80 Social care provision is linked to informal care availability in an agent's kinship network. An agent's kinship network's nodes consist of the households of agents with a familial relationship with the agent; the degree of kinship is defined as the network distance between the household and the agent. If they have time or available income, agents will provide informal or formal care to anyone in their kinship network with care need. The amount of care agents are available to provide depends on their status (through their income), their kinship relationship with the receiver and their geographical distance from the receiver (see the Kinship Network sub-section below for details). 2.5 Model Enhancements This updated version of the Linked Lives model presented in Silverman et al. [14] has been rewritten from the ground up and substantially extended for greater detail and realism. The following features have been introduced: relationship to the agent). • The population is composed of five socioeconomic status groups. • The care supply is provided by the agent's kinship network, (a network of households which have a kinship • Households allocate part of their income to care provision, which can be in the form of both informal and • A salary function implying an inverse relationship between time taken off work to provide informal care and • Unmet social care needs affect the agents' hospitalization probability (and the associated health care costs). the agent's hourly wage. formal care. 2.5.1 Socioeconomic Status Groups The population is composed of 5 distinct socioeconomic status (SES) groups. These categories follow the Approxi- mated Social Grade, a socioeconomic classification produced by the Office for National Statistics, which is composed 3The assumption is that a prolonged period of unmet care will increase the agents' frailty and, therefore, the probability that their health will further deteriorate. 4 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT of 6 categories (A, B, C1, C2, D and E). For convenience, we redistributed category E (state pensioners, casual and lowest grade workers, unemployed with state benefits only) into the categories D (semi-skilled and unskilled manual workers) and C2 (skilled manual workers), to maintain a unimodal distribution. We initialised the groups' distribution to roughly reflect the 2016 UK distribution. The SES groups are characterized by different education levels, different career paths (represented by income growth curves) and different unemployment rates. The introduction of SES groups has a number of effects on the various stages of agent life-courses. A higher socioe- conomic position is associated with lower mortality and fertility rates, and to a lower probability of developing care need. In the marriage market, the probability that two opposite-sex individuals will form a couple depends on their SES distance (which determine the marriage probability together with the partners' geographical distance and age dif- ference)4. In the job market, a higher SES is associated with higher starting and maximum salaries (but a lower salary growth rate); a higher probability to find a job and a lower probability to be fired (probabilities which are reflected in a lower unemployment rate); and a higher probability to change jobs if the job offer comes from a different town from their current hometown. Given that in this model care supply and relocation decisions depend on income level, the socioeconomic position of an agent affects its behaviour (and that of the household it belongs to) through the agent's income, as a higher socioeconomic position is associated with a higher income level. For example, the share of income the household allocates to care supply depends positively on the household's per capita income (see the Formal Care section below). We included an inter-generational mobility process which allows agents to move to a different SES group from their parents'. Each SES group is associated with an education level. From the age of 16, an agent can decide whether to continue its studies (a choice that will allow the agent to reach a higher education level and therefore a higher SES group) or start searching for a job (in which case the agent is assigned the SES group associated with the education level reached). This choice is made by the agents every two years, until the age of 24 (i.e. at ages 16, 18, 20 and 22) 5. The probability that an agent keeps studying depends on three factors: the per capita available income (i.e, net of social care costs) of the agent's household; the difference between the maximum education level reached by the agent's parents and the agent's current education level; and the amount of time the agent allocates to informal social care supply. In this highly stylized inter-generational mobility process, an agent's SES group is determined by the education level the agent reaches6. 2.5.2 Kinship Networks Each agent is associated with a kinship network -- a network of households containing at least one agent with a kinship relation to them. This network includes: • the agent's household (distance 0); • the households of the agents' parents and of children who are not part of the agent's household (distance I); • the households of the agents' grandparents, grandchildren, brothers and sisters who are not part of the agent's household nor of the households at distance I (distance II); • the households of the agents' uncles, aunts, nephews and nieces who are not part of the agent's household nor of the households at distance I and II (distance III). The kinship network has two functions. First, the network defines the total care supply available for a particular agent in need. The care receiver's total care supply is the sum of the available care supply of all the members of all the households that are part of the kinship network which met certain conditions. These conditions represent kinship- and space-specific limitations in the supply of care. Kinship relationship and distance determine the quantity of informal care that each member of the receiver's kinship network is available to supply, as shown in Table 2: 4The relationship between SES distance and probability of forming a couple is asymmetric: the probability of getting married decreases less rapidly with the SES distance if the higher-status individual is male rather than female. 5We assume each education step lasts 2 years. The educational stages correspond to A-level, Higher National Diploma, Degree 6Meaning the SES group of agents ending their studies when they are 16, 18, 20, 22 and 24 year-old, will be, respectively, D, and Higher Degree. C2, C1, B and A. 5 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT Table 2: Amount of care agents can provide depending on their status and distance from the receiver Agent status Household (D-0) D-I D-II D-III Teenager Student Employed Unemployed 16 24 28* 32 48 0 16 20* 24 36 0 8 12* 16 20 0 4 8* 8 10 Retired *These are the minimum amounts the employed can offer, representing the informal care provided outside of the work- ing hours. If needed, additional informal care can be supplied by these agents taking time off their working hours. More- over they can use their income to pay for formal care. See the Formal Care section for details. In particular, we assume first that the amount of care which an agent is available to provide to another agent depends positively on their kinship's closeness. Agents living with the care receiver are an exception, as these agents' available care supply is assumed to be equal to that of the receiver's next of kin (i.e. spouse, children and parents), independently from the kinship degree (although most of the time the members of the receiver's household are his/her next of kin). The second factor affecting the informal care supply availability is the physical distance from the receiver's household. With regards to the physical distance we can distinguish three classes of care suppliers: • agents living in the receiver's household; • relatives living in another household in the same town as the care receiver; • relatives living in a different town. We assume that only households living in the same town of the care receiver can provide informal care. Moreover, in the case of formal care we assume that only the care receiver's household and the households at distance I (i.e., the care receiver's parents or children) are available to provide formal care. The care allocation process proceeds in a series of steps in which a 4-hour 'quantum' of care supply is transferred to an agent needing care from one of the households with available supply in its kinship network. The care alloca- tion function first samples a care receiver from the pool of people with unmet social care need who have a kinship network with available care supply. The probability of each care receiver being sampled is directly proportional to the care receivers' quantity of unmet care need. Then the allocation function samples a household from the selected care receiver's kinship network with a probability that is directly proportional to a distance-weighted measure of the household's available supply 7. Once the supplying household has been selected, a 'quantum' of care is transferred from one of the household's members with available supply to the care receiver. The member who is to provide care within the selected household is determined in two steps. First, one of the house- hold's six possible care sources is selected with a probability proportional to the residual available care of each source. The six care sources consist of the five groups that can provide informal care as shown in Table 2: teenager, student, retired, unemployed and employed; plus a sixth source which represents the amount of care which the household is available to supply by allocating part of the household income (a category we call out-of-income care). The house- hold's out-of-income care supply is the share of income that the household has available to allocate to care, either directly in the form of formal care, or indirectly in the form of informal care provided by employed household mem- bers (who provide care by taking unpaid time off work). If one of the first five sources is selected, the household member with the greater residual available care within that category will provide care. If the out-of-income category is selected, the household will provide formal care if the lowest hourly wage among the hourly wages of the employed household members is higher than the hourly cost of social care. Otherwise, the employed household member with the lowest hourly wage will provide the 'quantum' of care8. At the end of this step, both the care receiver's care need and the supplying household's availability are reduced by the amount of care transferred (i.e. the 4-hour 'quantum' of care). The allocation process is repeated until the set of care re- 7For an household at kinship network's distance x from the care receiver, the weight is the reciprocal of the exponential function of the product of x and a parameter. 8Given that the quantity of out-of-income care supply depends on the household's per-capita income, this care allocation mech- anism implies that the probability that members of the households will spend time providing informal care is inversely related to the household's per-capita income. In other words, the wealthier the supplying household, the more likely that it will provide formal care 6 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT ceivers with unmet care need and available care supply is empty (i.e. there are no more care receivers with outstanding care need and available care supply). The ultimate result of this care allocation function is that units of social care are distributed from potential providers to receivers across the receiving agents' kinship network, and decisions about who provides care and choosing informal or formal care provision are made according to the composition, socioeconomic position and employment status of potential care providers. We suggest this detailed decision-making process better represents the complexities of care decisions that families need to navigate. The specifics of this complex process can be adjusted further by incorporating insights received from qualitative and quantitative data on informal care-givers and their decision-making. The kinship network also allows households to compute the informal care attraction associated with each town, which represents a rough measure of the informal care that a household expects to get or supply in a given town. The households use this town-specific attraction to make relocation decisions 9. More precisely, for a particular household Hi, the informal care attraction of a town T , is a function of the sum of the members of the households with a kin relationship with H, living in the town T 10. The contribution of a household Hj to the social care attraction is weighted according to the degree of kinship between Hi and Hj. This weighted sum is then multiplied by the complement to one of the share of care provided by the government. Two assumptions characterise the towns' informal care attraction: first, the larger the local kinship network in a town (in terms of number of people who are part of it), the higher the amount of social care the agent can expect to receive (or to supply) and the higher the social care 'value' associated with a town; second, the higher the share of care supplied by the government, the lower the importance of the potential informal care in the relocation decision. Apart from this 'network size' factor, a household's probability of relocating depends on the relocation cost, which increases with the household's size and the number of years the household's members lived in the current town 11, and the town's homophily attraction, which depends on the town's share of people belonging to other SES groups. Towns with a larger share of unoccupied houses are more likely to be chosen for relocation. 2.5.3 Formal Care Both informal and formal care are allocated through the care recipient's kinship network. Each household allocates a share of its income to care, which increases with the household's per capita income 12. We assume that formal care can be provided only by the care receiver's own household or from the households in the care receiver's kinship network with distance equal to 113. As explained above, the choice between the informal and formal care is stochastic, with probabilities equal to the relative availability of the two kinds of care. In order for the household to supply formal care, the hourly wage of the working member with the lowest wage (and available time left) must be higher than the price of formal social care. If the hourly wage of this member is lower than the price of formal social care, they will take time off work to provide informal care (as in this case it is cheaper for the household to give up the agent's salary than pay for formal care). However, the supplying household can provide informal care only if it is in the same town of the care receiver, otherwise it will provide only formal care. 2.5.4 Salary function. We model the hourly salary that an agent receives (on average) when it finds a job using the Gompertz function. This function is a double exponential that takes the following three SES-specific arguments: 9In this model, agents face the choice of relocating to other towns either if they receive a job offer or partner with someone from another town. 10The household's kinship network is obtained by joining the kinship networks of the household's members. 11The relocation cost R can be thought of as a measure of the social capital developed by the household in their current town. This social capital would be lost by relocating to another town, so it acts as a barrier to relocation. Formally, relocation cost is computed as: n(cid:88) i=1 R = K yp i where n is the set of the household's members, yi is the number of years the household member i spent in the current town and p is a parameter with value smaller than 1 (as additional years will increase the member's social capital by increasingly smaller amounts). K is a scaling parameter. 12More precisely, with x being the household's per-capita income, the share allocated to care supply is the complement to one of the reciprocal of the exponential function of the product of x and a parameter. 13In other words, only the care receiver's parents and children are available to pay for formal care if they cannot provide informal care. 7 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT • the initial salary level; • the final salary level; • the salary growth rate. The salary growth rate is multiplied by the agent's cumulative work experience, which is the discounted sum of all the fractions of the working week allocated to work (if an agent works full time, this fraction is equal to 1) 14. This equation implies that if an agent takes time off work to provide informal care, this will result in less work experience and, therefore a lower hourly salary. Given the properties of the care allocation mechanism, the agents employed with the lowest hourly salary will be more likely to provide informal care in the future (if there are not retired/students/unemployed agents or if the household's retired/students/unemployed agents do not have available informal care supply). In this model new mothers devote their time to caring for their newborn, meaning that we see a gender pay gap emerge due to the interaction between: • the allocation of part of the household's income to care supply; • the choice of the care giver within the supplying household; • the salary function. Retired agents receive a pension which is proportional to their final income level. We assume that when an agent needs care they retire due to sickness and thereafter receive a pension. If their care need is low or moderate, their ill-health pension is their normal pension reduced in accordance with the ratio between lost working years and the maximum number of working years (in other words, the working years of a person in good health). If the agent's care need is substantial or critical, the ratio is computed by reducing the number of lost working years by 50%. 2.5.5 Hospitalisation We assume that agents with care need will spend additional time in the hospital, time whose duration is a function of the agents' care need level and the average discounted share of unmet care need. The higher the agent's care need level and the higher her average share of unmet care need, the greater the number of days the agent is expected to spend in the hospital each year. By multiplying the sum of the hospitalisation's duration by the hospitalisation cost per day, we can determine the cost of unmet care need for the public health service. 2.5.6 Simulation steps More specifically, the simulation unfolds through the following eleven steps: 1. deaths: with a given probability which depends on age, SES and care need level, some agents are removed from the population; 2. adoptions: children without parents are adopted; 3. births: with a probability which depends on age and SES, married woman give birth to new agents; 4. divorces: some couples dissolve (and the male relocates); 5. marriages: with a certain probability which depends on age, SES and geographical location, some singles get married and go to live together. 6. social care allocation: social care is transferred from agents with available hours (or income) to agents with social care needs; 7. age transitions: the age of the agents is incremented, and their age-related status is updated. 8. social transitions: students decide whether to start working or keep studying, depending on their family income per capita, their parents' SES and their care responsibilities. In case they start looking for a job, they are assiged the SES associated to the education level they have reached. 14Formally, the salary function is: where: w = F ece−rt c = ln I F and F is the maximum hourly wage, I is the initial hourly wage, r is the wage growth rate and t is the discounted cumulative work experience. 8 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT 9. job market: employed and unemployed agents receive new job offers (and eventually accept them) and em- ployed agents are fired, with probabilities which depend on the age and SES-specific unemployment rate. 10. relocations: agents who have accepted job offers from towns different from their current town, relocate. 11. care transitions: with a probability which depends on age, SES, current care need level and unmet care need, agents pass to higher care need levels or are hospitalised. 3 Social Policy Experiments ABM allows us to investigate the effects of virtual social or economic policies. This model is characterised by various policy-related parameters, the value of which can be directly or indirectly related to specific measures of social care policy. Therefore, by varying these parameters, we can examine 'what if' scenarios and simulate social care outcomes and costs under alternative social care policies. For illustrative purposes, we investigated the effect on social care of two policies: the introduction of tax-deductible social care expenses, and direct governmental funding of care for people above a certain level of care need. For the first policy, we assume that the carers are allowed to deduct 100% of social care expenses from their tax. In the second policy experiment, we assume that the government directly pays for the social care expenses of those agents with the highest social care need (i.e., care need level at 'critical', see Table 1). We assume that the two policies are implemented from simulation year 2020 and compare the outputs of these two policy scenarios with the benchmark no-policy scenario in the period 2020-2040. We present two results: the hours of unmet care need in each scenarios and the incremental cost-effectiveness ratio (ICER) of the two policies considered 15. Figure 1: Hours of informal and formal care received and of unmet care need in the simulated population. Figure 2: Hours of informal and formal care received and unmet care need per recipient. 4 Results As described above, this simulation is highly complex with numerous processes at play, and a number of parameters governing system behaviour. For these early-stage results, we present figures from a representative single run at default parameter values plus a comparison of this run, taken as the benchmark, with two simulations where we introduce two alternative policy interventions in the year 2020. The single-run charts displayed here were chosen to highlight the key features of this new simulation framework, namely the modelling of formal care, additional economic and labour 15In this paper we formally define the ICER as: e = Cp − Cb Ub − Up where C is the total additional cost of policy implementation, U is the total unmet care need and the subscripts p and b indicate two scenarios (i.e. the policy scenario and the benchmark scenario, respectively). In this case, being b the no-policy scenario, Cb is equal to 0. 9 19902000201020202030204001000020000300004000050000Hours per weekSocial Care by Type and Unmet Care NeedsInformal CareFormal CareUnmet Care Needs1990200020102020203020400.02.55.07.510.012.515.017.5Hours per weekDelivered and Unmet Social Care Per RecipientInformal CareFormal CareUnmet Care Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT market details such as socioeconomic status groups, interaction between social care need and health care demand, and agent kinship networks. Figure 1 shows the evolution of hours of informal and formal care delivered and of unmet social care need per week for the whole population over the period 1990-2040. In our simulations, the total population reaches a peak of around 10,000 agents in the period 2025, and then decreases slowly to around 8000 by 2040. As in Bijak et al. [18], the simulation's population projections roughly match those of the Office for National Statistics in the UK if we assume no international migration. Figure 3: Hours of informal and formal care received and unmet care need per recipient by care need level. Figure 4: Hours of informal and formal care received and unmet care need per recipient by SES group (with I being the poorest SES group). Figure 5: Informal care supplied by women as share of total informal care supplied, for the population. Figure 6: Ratio of women's to men's income, for the population as a whole. In Figure 1 we can see that from 2010 informal care cannot keep pace with the growth in care need, with a consequent rapid increase of unmet care need, which reaches a peak in 2025. In Figure 2 we show the weekly hours of informal and formal care delivered and the unmet social care need per recipient. Here we can see that the negative trend of the unmet care need after 2025 in Figure 1 is entirely due to the decrease of population: in fact, the unmet care need per recipient keeps growing quite steadily up to 2033. Figure 3 shows the mean informal and formal care received and the unmet care need by care need level over the period 2020-2040 (note that the heights of the bars correspond to the weekly hours of care required as shown in Table 1). We can see that most of the unmet care need is due to the agents with the highest care need. Figure 4 shows the mean informal and formal care received and the unmet care need by SES group (with I being the poorest SES group). We can see that the relative weight of informal care with respect to formal care decreases from the poorest to the wealthiest SES group, a result which reflects empirical findings. As expected, by comparing the green bars in Figure 4, we can 10 NL 1NL 2NL 3NL 401020304050607080Hours per weekInformal/Formal/Unmet Social Care by Care Need LevelInformal CareFormal CareUnmet Care NeedsSES-ISES-IISES-IIISES-IVSES-V0510152025Hours per weekInformal, Formal and Unmet Social Care Need per RecipientInformal CareFormal CareUnmet Care Needs1990200020102020203020400.600.650.700.750.800.850.900.951.00Share of careShare of Informal Care supplied by Women1990200020102020203020400.850.900.951.001.05Income RatioWomen and Men Income Ratio Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT see that the poorest SES group has a somewhat higher level of unmet care need compared to the wealthiest group but also that unmet care need is a significant share of total care need across SESs. Figure 5 shows the share of total informal care provided by women. At the population level this figure starts from just below 75% in 1990, then decreases steadily until 2020, when it starts fluctuating just above 60%, a value which is in line with empirical findings. Moreover, there is a marked difference between SES groups, with the poorest SES group having the highest (and growing) gender inequality. As shown in Figure 5, this inequality in care provision affects income inequality between genders. At the population level, female agents' income is about 5% lower than the male's income. Therefore our model can explain at least part of the gender pay gap. Figure 7 shows the total informal and formal care provided in the period 2020-2040 according to the kinship distance between caregiver and receiver: household (distance 0); parents and children (distance 1); grandparents, grandchildren and brothers (distance 2); aunts, uncles and nephews (distance 3). We can see that most social care is supplied within the household, however a significant part comes from outside the household, especially formal care. Figure 8 shows annual per capita health care cost due to the hospitalization of people with care needs. We can see that although the total unmet care need levels off after 2020 (as shown in Figure 1), the per capita health care cost keeps growing until the late 2030s. This is due to the decrease in population after 2015, resulting in the per capita health care cost reaching its peak 15 years after the unmet social care need. Figure 7: Total informal and formal care supplied by different groups of receivers' suppliers: household, parents and children (I), grandparents, grandchildren and brothers (II) and aunts, uncles and nephews (III). Figure 8: Per capita health care cost due to the hospi- talisation of people with social care needs (per year). In the last two charts we investigate and compare the efficacy of two policy interventions. These two policy exper- iments are illustrative examples that show how this model may be used as a tool for the design and evaluation of social care policies. In these examples we consider a tax deduction policy, in which the households are allowed to deduct all the social care expenses from their tax base, and a direct funding policy, in which the social care needs of people with the highest need level (the 'critical' level in Table 1) are taken care of directly by the state. The policies are implemented starting in simulation year 2020, and the two scenarios are compared to the benchmark no-policy scenario. In Figure 9 we can see that the two policies have a positive impact on total unmet social care need, as expected. However, while the tax deduction policy has a marginal effect, decreasing the total unmet care need by about 11%, the direct funding policy has a drastic effect, reducing the total unmet care to 23% of the original level. Although the tax deduction policy has a smaller effect on the unmet social care need, Figure 10 shows that the tax deduction policy is more cost-effective than the direct funding policy. This is because, while the effect of direct funding on total unmet social care is seven times the effect of the tax deduction, the cost of the former policy compared to the latter is much higher, as shown in Figure 11. We note however that notwithstanding its cost-effectiveness, the effect of the tax deduction policy on unmet care demand is limited and thus it is not a solution to the growing social care demand on its own. Finally, Figure 12 shows the discounted value of the hospitalization costs in the period 2020-2040 in the three policy scenarios. We can see that, apart from the direct costs associated with each policy, our model allows us to estimate the policies' spillover effects (in this case, the effect 11 HouseholdD-ID-IID-III020004000600080001000012000Hours per weekInformal and Formal Care per Kinship LevelInformal CareFormal Care199020002010202020302040050100150200250300350Pounds per YearPer Capita Health Care Cost Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT Figure 9: Unmet care need per recipient in the no- policy scenario and with the two alternative social policies. Figure 10: Cost-effectiveness of 'tax deduction' and 'direct funding' policies. on hospitalization cost), effects which we need to take into account to assess the relative advantages and disadvantages of alternative policies. Figure 11: Unmet care need per recipient in the no- policy scenario and the two alternative social policy scenarios. Figure 12: Cost-effectiveness of 'tax deduction' and 'direct funding' policies. 5 Discussion While the results presented here are still early, the outcomes of these simulation runs suggest that this model can produce broadly realistic portraits of the coming trends in UK social care. The overall population dynamics largely mirror those in evidence in the real world, with the notable exception of international migration which is not modelled here. The simulation also produces inequalities in care provision by both SES and gender; while the data presently available is not sufficient to determine if the socioeconomic inequalities are accurate, the gender pay gap is reflective of current UK norms. The simulation results on unmet care need lend credence to the worries expressed by UK policy-makers. The simula- tion shows that unmet care need will continue to grow over time, and given that 1.2 million older people in England alone are not receiving sufficient care [2], further growth in these figures could lead to severe consequences for pub- lic health. The results also show marked inequalities in care provision, with the wealthy capable of supporting their aged relatives in need through privately-funded care while still staying in work and receiving high wages. Among the lower-income groups women are providing an overwhelmingly larger share of informal care as compared to men, 12 Tax DeductionDirect FundingBenchmark0100000200000300000400000500000Hours of Unmet CareTotal Unmet Social Care NeedTax DeductionDirect Funding0.02.55.07.510.012.515.017.520.0ICERICER based on unmet care needTax DeductionDirect FundingBenchmark0.00.20.40.60.8Pounds per week1e7Total public expenditure per weekTax DeductionDirect FundingBenchmark0.00.51.01.52.02.53.03.54.0Cost in Pounds1e7Total Discounted Hospitalization Cost Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT meaning that women at the lower end of the socioeconomic scale are more likely to be pushed out of work and toward unpaid care provision. Our use of kinship networks as the mechanism for distributing care illustrates that kinship distance impacts care provision behaviour, and thus is an important aspect of care decision-making that should be taken into account in future research. We observed a significant difference in caring behaviours between within-household and kinship distance I agents, with the latter providing much more formal care than informal. This suggests that future models in this area should consider kinship networks and their impact on caring behaviours. Understanding the negotiation process within families regarding care provision will be an important aspect for policy-makers to examine as well, as policies put into place to support and encourage informal care may need to take account of these complex social aspects of care. Finally, the speculative policy scenarios we provide here demonstrate the efficacy of this platform as an aid to policy- makers who wish to examine the impact and possible unintended side-effects (spillover effects) of their planned policy interventions. The scenarios showed that while some policies such as tax deductions may seem like an easy 'win' for the policy-maker, the actual impact on social care need is minimal. For significant reductions in care need and related health care costs, more expansive -- and expensive -- interventions are needed. The direct funding scenario here is a relatively simplistic example used to demonstrate this point; the model is capable of simulating the results of much more nuanced policy interventions, due to the detailed modelling of key social care mechanisms and related economic and social processes. 6 Future Work While the current simulation does broadly reflect the expected trends in social care provision, validating the results is difficult. Ongoing projects in Scotland are linking administrative data sources to develop a clearer picture of social care provision and receipt across the country. In future revisions of the model we intend to make use of these data by focusing the simulation on Scotland rather than the whole UK. As the framework matures and incorporates more real- world data, we will use Gaussian process emulators to perform detailed sensitivity analyses, following the example of Silverman et al. [14]. Apart from the validation process, this model can be expanded in various directions. First, according to the Office for National Statistics the proportion of informal childcare to GDP increased from 13.8% to 17.6% in the period 2005- 2014 [19]. Child care represents a significant part of the total household's informal care need and, therefore, it affects the care supply which can be allocated to social care needs. Our next planned update to the model will include a child care mechanism which will allow us to model the interaction with social care supply. Second, according to the Office for National Statistics, in 2016, 28.2% of births in England and Wales were to women who were not born in the UK [20]. Moreover, projections show that post-2016 immigration accounts for 77% of total population growth until 2041 [21]. The addition of international migration to the model will allow us to understand UK demographic dynamics in future decades. Following on from the simplistic policy comparison presented here, in future work we will consult with social care policy-makers in Scotland to model proposed social care policies in more detail. Social care policy is very complex, with the programmes available varying not only by region (England, Wales, Scotland and Northern Ireland), but by individual local councils. The model is capable of representing these details by varying relevant policy parameters across the simulated UK geography. Once we are able to replicate the current state of social care policy in the UK, we will then be able to develop detailed evaluations of the possible impacts of new policy interventions. Our model's ability to capture detailed individual-level care decision-making will enable policy-makers to examine policies aimed at behavioural change as well as broader economic and social policies. Finally, while the current simulation is very UK-centric, the core simulation engine can be altered easily to examine the situation in other countries. Ultimately we hope to produce a simulation framework that is capable of modelling informal and formal social care across a variety of cultural and economic contexts. 7 Data Availability The code is available on GitHub: https://github.com/UmbertoGostoli/ABM-for-social-care/tree/v.09 The output data used for the figures is available in this Dryad repository: 13 Modelling Social Care Provision in An Agent-Based Framework with Kinship Networks A PREPRINT https://datadryad.org/review?doi=doi:10.5061/dryad.6tm6183 8 Authors' Contributions Umberto Gostoli developed the model (based on a previous version, developed by Eric Silverman), run the simulations, gathered the data and produced the charts. Eric Silverman conceived the research and helped develop the model. Both authors contributed to draft the paper. All authors gave final approval for publication. 9 Funding The authors are part of the Complexity in Health Improvement Programme supported by the Medical Research Council (MC UU 12017/14) and the Chief Scientist Office (SPHSU14). 10 Acknowledgements We would like to thank Chris Patterson and Lauren White from the MRC/CSO Social and Public Health Sciences Unit for their helpful comments. References [1] Coleman DA. 2002. Replacement migration, or why everyone is going to have to live in Korea: a fable for our times from the United Nations. Philos Trans R Soc London B Biol Sci 357. [2] Age UK. 2017. The Health and Care of Older People in England 2017. London, UK: Age UK. [3] Ipsos MORI. 2017. Unmet Need for Care, Report 15-042098-01. London, UK: Ipsos Public Affairs. [4] National Audit Office. 2016. Discharging older patients from hospital. London, UK: National Audit Office. [5] Aldridge H, and Hughes C. 2016. Informal carers and poverty in the UK. London, UK: New Policy Institute. [6] Wittenberg R, Hu B. 2015. Projections of demand for and costs of social care for older people and younger adults in England, 2015 to 2035. London, UK: London School of Economics. [7] Carers UK. 2015. Facts About Carers - Policy Briefing. London, UK: Carers UK. [8] Keating N, Otfinowski P, Wenger C, Fast J, Derksen L. 2003. Understanding the caring capacity of informal networks of frail seniors: a case for care networks. Ageing Soc 23, 1. [9] Tennstedt SL, McKinlay JB, Sullivan LM. 1989. Informal care for frail elders: The role of secondary caregivers. Gerontologist 29, 5. [10] Petrie K, Kirkup J. 2018. Caring for carers. London, UK: The Social Market Foundation. [11] Wettstein G, Zulkarnain A, et al. 2017. How Much Long-Term Care Do Adult Children Provide? Issue in Brief. [12] Laing and Buisson. 2016. Care of Older People: UK market report. London, UK: LaingBuisson. [13] Noble J, Silverman E, Bijak J, Rossiter S, Evandrou M, Bullock S, Vlachantoni A, Falkingham J. 2012. Linked lives: the utility of an agent-based approach to modelling partnership and household formation in the context of social care. Proceedings of the 2012 Winter Simulation Conference. Eds: C. Laroque, J. Himmelspach, R. Pasupathy, O. Rose and J.M. Uhrmacher. Publisher: IEEE. [14] Silverman E, Hilton J, Noble J, Bijak J. 2013. Simulating the cost of social care in an ageing population. Proceedings of the 27th European Conference on Modelling and Simulation. Eds: W. Rekdalsbakken, R.T. Bye, H. Zhang. Publisher: Digitaldruck Pirrot. [15] Human Mortality Database 2011. url: http://www.mortality.org/cgi-bin/hmd. Accessed 26/07/2011 [16] Eurostat Statistics Database: Domain Population and Social Conditions. url: http://epp.eurostat.ec.europa.eu. Accessed 27/10/2011 [17] Office for National Statistics 1998. Birth Statistics, Series FM1 (27). London, UK: Office for National Statistics. [18] Bijak J, Hilton J, Silverman E, Cao VD. 2013. Reforging the Wedding Ring: Exploring a Semi-Artificial Model of Population for the United Kingdom with Gaussian process emulators. Demogr Res 29, 27 [19] Office for National Statistics 2016. Chapter 2: Home produced childcare services. London, UK: Office for National Statistics. [20] Office for National Statistics 2017. Births by parents country of birth, England and Wales: 2016. London, UK: Office for National Statistics. [21] Cangiano A. 2018. The Impact of Migration on UK Population Growth. Oxford, UK: University of Oxford. url: https://migrationobservatory.ox.ac.uk/resources/briefings/the-impact-of-migration-on-uk-population-growth/ 14
1905.13275
1
1905
2019-05-30T19:45:06
New Algorithms for Functional Distributed Constraint Optimization Problems
[ "cs.MA" ]
The Distributed Constraint Optimization Problem (DCOP) formulation is a powerful tool to model multi-agent coordination problems that are distributed by nature. The formulation is suitable for problems where variables are discrete and constraint utilities are represented in tabular form. However, many real-world applications have variables that are continuous and tabular forms thus cannot accurately represent constraint utilities. To overcome this limitation, researchers have proposed the Functional DCOP (F-DCOP) model, which are DCOPs with continuous variables. But existing approaches usually come with some restrictions on the form of constraint utilities and are without quality guarantees. Therefore, in this paper, we (i) propose exact algorithms to solve a specific subclass of F-DCOPs; (ii) propose approximation methods with quality guarantees to solve general F-DCOPs; and (iii) empirically show that our algorithms outperform existing state-of-the-art F-DCOP algorithms on randomly generated instances when given the same communication limitations.
cs.MA
cs
New Algorithms for Functional Distributed Constraint Optimization Problems Khoi D. Hoang1 , William Yeoh1 , Makoto Yokoo2 and Zinovi Rabinovich3 1Washington University in St. Louis, USA 2Kyushu University, Japan 3Nanyang Technological University, Singapore {khoi.hoang, wyeoh}@wustl,edu, [email protected], [email protected] Abstract tool formulation is a powerful The Distributed Constraint Optimization Problem (DCOP) to model multi-agent coordination problems that are distributed by nature. The formulation is suitable for problems where variables are discrete and constraint utilities are represented in tabular form. However, many real-world applications have variables that are continuous and tabular forms thus cannot accurately represent constraint utilities. To overcome this limitation, researchers have proposed the Functional DCOP (F-DCOP) model, which are DCOPs with continuous variables. But existing approaches usually come with some restrictions on the form of constraint utilities and are without quality guarantees. Therefore, in this paper, we (i) propose exact algorithms to solve a specific subclass of F-DCOPs; (ii) propose approximation methods with quality guarantees to solve general F-DCOPs; and (iii) empirically show that our algorithms outperform existing state-of-the-art F-DCOP algorithms on randomly generated instances when given the same communication limitations. 1 Introduction [Modi et al., 2005; Constraint Optimization The Distributed Problem Petcu and Faltings, 2005] (DCOP) formulation is a powerful tool to model cooperative multi- agent problems. DCOPs are well-suited to model many problems that are distributed by nature and where agents need to coordinate their value assignments to maximize the aggregate constraint utilities. This model is widely employed to model distributed problems such as meeting scheduling problems [Maheswaran et al., 2004], sensor and wireless [Farinelli et al., 2008; Yeoh and Yokoo, 2012], networks [Zivan et al., 2015], multi-robot [Kumar et al., 2009; Miller et al., 2012; smart Fioretto et al., 2017b], genera- tion [Ueda et al., 2010] and smart homes [Rust et al., 2016; Fioretto et al., 2017a]. coordination structure coalition teams grids However, the regular DCOP model assumes that the vari- ables are discrete and the constraint utilities are represented in tabular form (i.e., a utility is defined for every combina- tion of discrete values of variables). While these assumptions are reasonable in some applications where values of vari- ables correspond to a set of discrete possibilities (e.g., the set of tasks that robots can perform in multi-robot coordination problems or the set of coalitions that agents can join in coali- tion structure generation problems), they make less sense in applications where values of variables correspond to a con- tinuous range of possibilities (e.g., the range of orientations a sensor can take in sensor networks or the range of frequencies an agent can choose in wireless networks). These limiting assumptions have prompted Stranders et al. [2009] to extend the DCOP formulation to allow for con- tinuous variables. We refer to this extension as Functional DCOPs (F-DCOPs) in this paper.1 Additionally, as vari- ables can now take values from a continuous range, con- straint utilities are also similarly extended from tabular forms to functional forms in F-DCOPs. To solve such problems, Stranders et al. [2009] extended the discrete Max-Sum (MS) algorithm [Farinelli et al., 2008] to Continuous MS (CMS), where constraint utility functions are approximated by piece- wise linear functions. Voice et al. [2010] later proposed Hybrid CMS (HCMS), which combines the discrete MS al- gorithm with continuous non-linear optimization methods. Specifically, agents in HCMS approximate the utility func- tions with a number of samples that they iteratively improve over time. A key limitation of CMS and HCMS is that they both do not provide quality guarantees on the solutions found. The reason for this is that they rely on discrete MS as the un- derlying algorithmic framework, which do not provide qual- ity guarantees on general graphs. To this extend overcome limitation, Pseudo-tree we Optimization [Petcu and Faltings, 2005] the Procedure Distributed (DPOP) algorithm to three extensions -- Exact Functional DPOP (EF-DPOP); Ap- proximate Functional DPOP (AF-DPOP); and Clustered AF-DPOP (CAF-DPOP). EF-DPOP provides an exact approach to solve F-DCOPs with linear or quadratic utility functions and are defined over tree-structure graphs. Both AF-DPOP and CAF-DPOP solve F-DCOPs approximately without any restriction on the type of utility functions or graph structure. We also provide theoretical properties on the error bounds and communication complexities of AF-DPOP and CAF-DPOP and show that they outperform HCMS in randomly generated instances when given the same 1As Stranders et al. [2009] did not name their extension in their paper, we choose a name so that we can refer to it easily. communication limitations. 3 Functional DCOP Model 2 Background DCOPs: A Distributed Constraint Optimization Problem (DCOP) is a tuple hA, X, D, F, αi: A = {ai}p i=1 is a set of agents; X = {xi}n i=1 is a set of decision variables; D = {Dx}x∈X is a set of finite domains and each variable x ∈ X takes values from the set Dx; F = {fi}m i=1 is a set of utility functions, each defined over a set of decision variables: fi : Qx∈xfi Dx → R ∪ {−∞}, where infeasible configu- rations have −∞ utilities, xfi ⊆ X is the scope of fi, and α : X → A is a mapping function that associates each deci- sion variable to one agent. A solution σ is a value assignment for a set xσ ⊆ X of variables that is consistent with their respective domains. The utility F(σ) = Pf ∈F,xf ⊆xσ f (σ) is the sum of the utilities across all the applicable utility functions in σ. A solution σ is complete if xσ = X. The goal is to find an optimal complete solution x∗ = argmaxx F(x). A constraint graph visualizes a DCOP, where nodes in the graph correspond to variables in the DCOP and edges connect pairs of variables appearing in the same utility function. A pseudo-tree arrangement has the same nodes and edges as the constraint graph and satisfies that (i) there is a subset of edges, called tree edges, that form a rooted tree and (ii) two variables in a utility function appear in the same branch of that tree. The other edges are called backedges. Tree edges connect parent-child nodes, while backedges connect a node with its pseudo-parents and its pseudo-children. In this paper, we assume that each agent controls exactly one decision variable and thus use the terms "agent" and "variable" interchangeably. We also assume that all utility functions are binary functions between two variables. DPOP: Distributed Pseudo-tree Optimization Procedure (DPOP) [Petcu and Faltings, 2005] is a complete inference algorithm that is composed of three phases: • Pseudo-tree Generation: In this phase, all agents start building a pseudo-tree [Hamadi et al., 1998]. • UTIL Propagation: Each agent, starting from the leaves of the pseudo-tree, adds the optimal sum of utilities in its subtree for each value combination of variables in its sep- arator.2 It does so by adding the utilities of its functions with the variables in its separator and the utilities in the UTIL messages received from its children. The agent then projects out its variable by optimizing over it and sends the projected function in a UTIL message to its parent. • VALUE Propagation: Each agent, starting from the root of the pseudo-tree, determines the optimal value for its vari- able and then sends the optimal value as well as the opti- mal values of agents in its separator to its children. The root agent does so by choosing the values of its variables from its UTIL computations, and send them as VALUE messages. 2The separator of xi contains all ancestors of xi in the pseudo- The Functional DCOP (F-DCOP) model generalizes the reg- ular discrete DCOP model by modeling the variables as con- tinuous decision variables [Stranders et al., 2009]. More for- mally, an F-DCOP is a tuple hA, X, D, F, αi, where A, F, and α are exactly as defined in DCOPs. The key differences are as follows: • X = {xi}n i=1 is now a set of continuous decision variables controlled by the agents. • D = {Dx}x∈X is now a set of continuous domains of the decision variables. Each variable x ∈ X takes values from the interval Dx = [LBx, U Bx]. The objective of an F-DCOP is the same as that in DCOPs -- to find an optimal complete solution x∗ = argmaxx F(x). 4 F-DCOP Algorithms We now introduce three F-DCOP algorithms: Exact Func- tional DPOP (EF-DPOP), Approximate Functional DPOP (AF-DPOP), and Clustered AF-DPOP (CAF-DPOP). All three algorithms are based on the framework of DPOP, where they extend the capability of DPOP such that they can solve F-DCOPs with continuous variables and utility functions. 4.1 Exact Functional DPOP Exact Functional DPOP (EF-DPOP) is an exact algorithm for F-DCOPs with linear or quadratic utility functions and are defined over tree-structure graphs. It extends the two pri- mary operations of DPOP in the UTIL propagation phase -- addition and projection. Addition Operation: In EF-DPOP, each UTIL message contains a piecewise function and the addition of two piece- wise functions is done by adding their sub-functions that may have different domains. We will use the following two func- tions to illustrate our operations: 12 f a f b f c f d 12 12 12 23 23 f a f b f c f d 23 23 f12(x1, x2) =  f23(x2, x3) =  if x1 ∈ [0, 4], x2 ∈ [0, 6] if x1 ∈ [0, 4], x2 ∈ [6, 10] if x1 ∈ [4, 10], x2 ∈ [0, 6] if x1 ∈ [4, 10], x2 ∈ [6, 10] if x2 ∈ [0, 3], x3 ∈ [0, 7] if x2 ∈ [0, 3], x3 ∈ [7, 10] if x2 ∈ [3, 10], x3 ∈ [0, 7] if x2 ∈ [3, 10], x3 ∈ [7, 10] (1) (2) When adding two piecewise functions, we first identify the common variable between the two functions and create a new set of atomic ranges for the variable. For example, when adding the functions f12 and f23 above, the common vari- able is x2, and the new ranges for x2 are [0, 3], [3, 6], and [6, 10]. The ranges of the other variables remain unchanged from their original functions. We then take the Cartesian product of the range sets of all common variables and associate the appropriate function to that range. For example, the addition of f12 and f23 will be a new function f123: tree that are connected to xi or to one of its descendants. f 123(x1, x2, x3) 23 f a 12 + f a f a 12 + f b f c 12 + f a f c 12 + f b . . . 23 23 23 =   if x1 ∈ [0, 4], x2 ∈ [0, 3], x3 ∈ [0, 7] if x1 ∈ [0, 4], x2 ∈ [0, 3], x3 ∈ [7, 10] if x1 ∈ [4, 10], x2 ∈ [0, 3], x3 ∈ [0, 7] if x1 ∈ [4, 10], x2 ∈ [0, 3], x3 ∈ [7, 10] (3) Projection Operation: Projecting out a variable xi from a function f (xi, xi1 , . . . , xik ) means finding the piecewise function: g(xi1, . . . , xik ) = argmax xi f (xi, xi1 , . . . , xik ) (4) To find g, we solve the following for closed-form solutions: ∂f (xi, xi1 , . . . , xik ) ∂xi = 0 Let ¯xi be the solution to the equation above. Then: ¯xi = g ′(xi1 , . . . , xik ) ¯g(xi1 , . . . , xik ) = f (xi = ¯xi, xi1 , . . . , xik ) Aside from ¯g, there are two other candidate functions: g = f (xi = LBxi , xi1 , . . . , xik ) g = f (xi = U Bxi , xi1 , . . . , xik ) (5) (6) (7) (8) (9) Next, we need to find the intervals where each of the func- tions ¯g, g and g is the largest. Those intervals are the inter- sections between the three functions and, thus, we solve each of the equations below to find them: g(xi1 , . . . , xik ) = g(xi1 , . . . , xik ) g(xi1 , . . . , xik ) = ¯g(xi1 , . . . , xik ) g(xi1 , . . . , xik ) = ¯g(xi1 , . . . , xik ) (10) (11) (12) The result of this process is a set of intervals where either ¯g, g, or g is the largest. The projected function g is the piecewise function that consists of ¯g, g, or g with the intervals that they are the largest in. Unfortunately, it is not always possible to find closed-form solutions to the partial derivative in Equation (5). We discuss below two types of functions -- binary linear and quadratic functions -- where it is possible to find closed-form solutions. • Binary linear functions of the form f (xi, xi1 ) = axi + bxi1 + c. By following the monotonicity property of linear f (xi, xi1 ) at functions, we can find g(xi1 ) = argmaxxi the two extremes: g(xi1 ) =(f (xi = LBxi , xi1 ) f (xi = U Bxi , xi1 ) if a > 0 otherwise (13) • Binary quadratic functions of the form f (xi, xi1 ) = ax2 i + i1 + dxi1 + exixi1 + f . We first take the partial bxi + cx2 derivative and setting it to 0 to find the critical point: ∂f ∂xi = 2axi + b + exi1 = 0 ¯xi = −b − exi1 2a (14) (15) As ¯xi has to belong to the interval [LBxi, U Bxi], we solve the inequalities below to find the range xi1 as the domain of ¯g(xi1 ): LBxi ≤ −b − exi1 2a ≤ U Bxi (16) 4.2 Approximate Functional DPOP In general F-DCOPs, Eq. (5) may be a multivariate equation, and it is not always possible to find a closed-form solution to such functions. Therefore, an approximation approach is desired for F-DCOPs. In this section, we introduce Approximate Functional DPOP (AF-DPOP), which is an approximation algorithm that can solve F-DCOPs without any restriction on the functional form of the constraint utilities. AF-DPOP is similar to DPOP in that the algorithm has the same three phases: pseudo- tree generation, UTIL propagation, and VALUE propaga- tion phases. The pseudo-tree generation phase is identical to that of DPOP, and the UTIL and VALUE propagation phases share some similarities. We now describe how these two propagation phases work at a high level. In the UTIL propagation phase, like DPOP, agents in AF-DPOP also discretizes the domains of variables and sends up UTIL tables that contain utilities for each value combination of values of separator agents. However, un- like DPOP, agents in AF-DPOP perform local optimization of these values by "moving" them along the gradients of rele- vant utility functions in order to improve the overall solution quality. As such, the addition and projection operators have to be updated as well. In the VALUE propagation phase, like DPOP, agents in AF-DPOP also sends down their best value down to their children in the pseudo-tree. However, unlike DPOP, agents in AF-DPOP may receive values of ancestors that do not map to computed utilities. As such, the agents must perform local interpolation of the utilities value in this phase. We now describe the algorithm in more detail, where we focus on the UTIL and VALUE propagation phases of the algorithm. UTIL Propagation: In this phase, each leaf agent first dis- cretizes the domains of the agents in its separator (i.e., its par- ent and pseudo-parents) and then stores the Cartesian product of these discrete values in the set V . Therefore, each element v ∈ V is a tuple hvi1 , . . . , vik i, where each value vij is the value of separator agent aij . Then, for each tuple v ∈ V , the agent "moves" each value vij in the tuple along the gradient of each function that is relevant to agent aij . Specifically, the agent updates value vij according to the following equation for each separator agent xij of the leaf agent xi: vij = vij + α ∂fij (xi, xij ) ∂xij vij (cid:12) (cid:12) (cid:12) (cid:12) argmaxxi (17) fij (xij =vij ) where fij (xi, xij ) is the utility function between the leaf agent xi and the separator agent xij and α is the learning rate of the algorithm. The agent can "move" the values as many times as it like until they have either converged or a maxi- mum number of iterations is reached. The agent can "move" the values as many times as desired until they have either con- verged or a maximum number of iterations is reached. Then, the updated values in V and their corresponding utilities de- fine the UTIL table that is sent to the parent of the agent in a UTIL message. As in DPOP, each non-leaf agent will first wait for the UTIL messages from each of its children. When all the UTIL messages are received, the agent processes the UTIL tables in the UTIL message from each child. Note that in regular DPOP, the Cartesian product of the values of agents are con- sistent across the UTIL tables of all children (i.e., if the values of an agent a exists in the Cartesian products of two children, then those values are identical). The reason is because all agents agree on the discretization of the domain of agent a and do not update the value of that agent (such as through Eq. (17)). Therefore, each agent can easily add up the utili- ties in the UTIL tables received together with the utilities of constraints between the agent and its separator. In contrast, since the values of agents are updated accord- ing to Eq. (17) in AF-DPOP, these values may no longer be consistent across different UTIL tables received. To remedy this issue, each agent first adds additional tuples to each UTIL table received such that the Cartesian product of the values of agents are consistent across all the UTIL tables. Then, it approximates the utilities of the newly added tuples by inter- polating between the utilities of the existing tuples. Finally, since the UTIL tables are now all consistent, the agent adds up the utilities in the UTIL tables of children together with the utilities of constraints between the agent and its separator in the same way as DPOP. After the utilities are added up, similar to leaf agents, the agent xi will proceed to repeatedly update the values vij of the separator aij in the updated Cartesian product V using: vij = vij + α ∂fij (xi, xij ) ∂xij (cid:12) (cid:12) (cid:12) (cid:12) vij argmaxxi U T ILi(vi1 ,...,vik ) (18) where U T ILi is the utility table that is constructed from the summation of the children's utilities and the utilities of con- straints between the agent xi with its separator set. The key difference between this Eq. (18) and the Eq. (17) used by leaf agents is that the substitution of fij (xij = vij ) with U T ILi(vi1 , . . . , vik ). The reason for this substitution is that the utilities in the UTIL tables of leaf agents are only a function of constraints with their separator agents and the functional form of those constraints are known. Therefore, leaf agents can optimize exactly those functions to get accurate gradients. In con- trast, utilities in the UTIL tables of non-leaf agents are also a function of the constraints between its descendant agents and its separator agent, and the functional form of those con- straints are not known. They are only represented by samples within the UTIL tables received and are now integrated into the UTIL table of the non-leaf agent. Therefore, in Eq. (18), the agent approximates its maximum value xi by choosing the best value of under the assumption that the values of the other separator agents are exactly the same as in the tuple hvi1 , . . . , vik i that is being updated. After these values are all updated, the agent approximates their corresponding utilities by interpolating between known utilities and sends these utilities up to its parent in a UTIL message. These UTIL messages propagate up to the root agent, which then starts the VALUE phase. VALUE Propagation: The root agent starts this phase after processing all the UTIL messages received from its children in the UTIL phase. It chooses its best value based on its com- puted UTIL table and sends this value down to its children. Like in DPOP, each agent will repeat the same process after receiving the values of its parent and pseudo-parents. However, unlike DPOP, an agent may receive the informa- tion that its parent or pseudo-parent is taking on a value that doesn't correspond to an existing value in the agent's UTIL table due to the values being moved during the UTIL propa- gation phase. As a result, the agent will need to approximate the utility for this new value received and it does so by inter- polating between known utilities in its UTIL table. Once all the leaf agents receive VALUE messages from their parents and choose their best values, the algorithm ter- minates. 4.3 Clustered Approximate Functional DPOP A possible limitation of AF-DPOP is that the number of tu- ples in the Cartesian product V that is propagated in the UTIL messages can be quite large, especially if additional tuples are added to maintain consistency between the UTIL tables of children. In communication-constrained applications, it is preferred that the number and size of messages transmitted between agents to be as small as possible. With this motivation in mind, we extend AF-DPOP to Clustered AF-DPOP (CAF-DPOP), which bounds the num- ber of tuples sent in UTIL messages to limit the message size. CAF-DPOP is identical to AF-DPOP in every way except that agents choose k representative tuples and their correspond- ing utilities to be sent up to their parents in UTIL messages. To choose these k representative tuples, we use the k-means clustering algorithm [MacQueen, 1967] to cluster the tuples and then approximate the utilities of those tuples through in- terpolation. This approach assumes that tuples that are close to each other will have similar values. Note that while only k tuples are sent between agents in UTIL messages, each agent still maintains the original un- clustered set of tuples in their memory. Thus, when they perform interpolation during the VALUE propagation phase, they will use the utilities of the unclustered set of tuples since they are more accurate than the utilities of the clustered set of tuples. 5 Theoretical Properties We now provide some theoretical properties of some of our algorithms as well as that of (discrete) DPOP and Hybrid Continuous Max-Sum (HCMS). For each reward function f (xi, xi1 , . . . , xik ) of an agent xi and its separator agents xi1 , . . . , xik , assume that agent xi discretizes the domains the reward function into hyper- cubes of size m (i.e., the distance between two neighboring discrete points for the same agent xij is m). Let ∇f (v) de- note the gradient of the function f (xi, xi1 , . . . , xik ) at v = (vi, vi1 , . . . , vik ): ∇f (v) = ( ∂f ∂xi (vi), ∂f ∂xi1 (vi1 ), . . . , ∂f ∂xik (vik )) (19) A HCMS DPOP 10 20 30 40 50 129k 306k 436k 636k 832k 220k 541k 766k 1104k 1456k 5 330k 795k 1128k 1587k 2109k AF-DPOP 10 356k 870k 1230k 1728k 2316k 15 374k 947k 1331k 1876k 2533k 20 404k 1008k 1414k 1980k 2687k EF-DPOP 518k -- -- -- -- Table 1: Experimental Results Varying the Number of Agents on Random Trees with Three Initial Discrete Points Furthermore, let ∇f (v) denote the sum of magnitude: ∇f (v) = ∂f ∂xi (vi) + ∂f ∂xi1 (vi1 ) + . . . + ∂f ∂xik (vik ) (20) Assume that ∇f (v) ≤ δ holds for all utility functions in the DCOP and for all v. Theorem 1. The error bound of discrete DPOP is Fmδ. Proof. First, we prove that the magnitude of the projection of function f is also bounded from above by δ. Let xi = vi be the point where: g(xi1 , . . . , xik ) = f (xi = vi, xi1 , . . . , xik ) f (xi, xi1 , . . . , xik ) = max xi (21) (22) Then, assume that ∇g(v) > δ for all v. Let v′ = (vi, vi1 , . . . , vik ) and v′ ∇f (v′) = ∂f ∂xi (vi) + −i = (vi1 , . . . , vik ), then: ∂f ∂xik (vi1 ) + . . . + ∂f ∂xi1 ≥ ∂f ∂xi1 (vi1 ) + . . . + ∂f ∂xik (vik ) −i) = ∇g(v′ > δ (vik ) (23) (24) (25) (26) This contradicts with assumption that ∇f (v) ≤ δ for all v. The error bound of each function is then mδ because each hypercube is of size m and the magnitude of the gradient within each hypercube is at most δ. As the error may be ac- cumulated each time an agent sums up utility functions, the total error bound for a problem is thus Fmδ, where F is the number of utility functions in the problem. Theorem 2. The error bound of AF-DPOP is F(m + Akαδ)δ, where k is the number of times each agent "moves" values of its separator by calling Eqs. (17) or (18). Proof. After each "move" of an agent by calling either Eqs. (17) or (18), the maximum size of the hypercubes in- creases by αδ, where α is the learning rate. Since each agent performs this update only k times, the largest increase in the size of the hypercube is kαδ. Finally, since the value of an agent can be updated by any of its children or pseudo- children, the total increase in the size of the hypercube is thus Akαδ, where A is the number of agents in the problem. Therefore, this combined with the proof of the bound for dis- crete DPOP, the error bound is thus F(m + Akαδ)δ. Theorem 3. In a binary constraint graph G = (X, E), the number of messages of HCMS with k iterations is 4kE. The number of messages of discrete DPOP, AF-DPOP, and CAF- DPOP is 2X. Proof. HCMS has the same number of messages as the Max- Sum algorithm [Farinelli et al., 2008]. Every edge of the con- straint graph has two variable nodes and one function node and, thus, it takes 4 messages per edge in one iteration. The total number of messages in HCMS is thus 4kE. The number of messages required by AF-DPOP and CAF- DPOP is identical to that of DPOP -- each agent sends one UTIL message to its parent and one VALUE message to each of its children in the pseudo-tree. Since pseudo-trees are spanning trees, the number of messages is thus 2X. Theorem 4. The message size complexity of discrete DPOP, AF-DPOP and CAF-DPOP is O(dw), O((dX)w), and max{A, k}, respectively, where d is the number of points used by each agent to discretize the domain of its separator agents, w is the induced width of the pseudo-tree, and k is the number of clusters used by CAF-DPOP. size the message [Petcu and Faltings, 2005]. complexity is Proof. For DPOP, O(dw) For AF-DPOP, as the values of an agent are "moved" by their children and pseudo-children, in the worst case, all the values are unique and the maximum number of such values is O(dX). The message sizes are then similar to discrete DPOP with O(dX) values per agent. Therefore, its message size com- plexity is O((dX)w). For CAF-DPOP, the message size complexity of UTIL messages is O(k) since only the utilities of the centroids of k clusters are sent. And the message size complexity of VALUE messages is O(A), such as in a fully-connected graph where an agent sends the values of every agent from the root of the pseudo-tree down to itself in a VALUE message to its child. Therefore, the message complexity of the algorithm is the O(max{A, k}). 6 Experimental Results We empirically evaluate EF-DPOP, AF-DPOP, and CAF- DPOP against (discrete) DPOP and HCMS on both random trees and random graphs. We adapt the (discrete) DPOP al- gorithm to solve F-DCOPs by discretizing the continuous do- main into discrete representative points. We measure the quality of solutions found by the algo- rithms as well as the number of messages taken by the al- gorithm. Since HCMS is an iterative algorithm that may take a long time and a large number of messages before converg- ing, in order for fair comparisons, we initially planned to ter- minate the algorithm after it sends as many messages as the DPOP-variants. However, even a single iteration of HCMS requires more messages than the DPOP-variants. We thus let HCMS terminate after one iteration. We did not report the A HCMS DPOP 15 20 25 30 265k 345k 439k 506k 522k 865k -- -- 5 710k 1171k -- -- AF-DPOP 10 763k 1285k -- -- 15 824k 1334k -- -- CAF-DPOP 20 891k 1407k 5 639k 1006k -- 1040k -- 1513k 10 697k 1017k 1101k 1682k 15 715k 975k 1024k 1597k 20 787k 973k 1027k 1656k Table 2: Experimental Results Varying the Number of Agents on Random Graphs with p1 = 0.2 and Three Initial Discrete Points (a) Random Trees with A = 20 (b) Random Graphs with A = 20 and p1 = 0.2 #points HCMS DPOP 0 541k 990k 0 306k 554k 1 3 9 AF-DPOP 254k 870k 1133k HCMS DPOP AF-DPOP 428k 1285k -- 8 345k 706k 15k 865k -- CAF-DPOP 431k 1017k 1272k Table 3: Experimental Results Varying the Number of Discretized Points actual number of messages since they could be trivially com- puted via Theorem 3. Tables 1 and 2 show the various algorithms' solution qual- ities on random trees and graphs, respectively, where we vary the number of agents A and every algorithm discretizes the domains of variables into three points. We also vary the number of times AF-DPOP and CAF-DPOP agents "move" a point (by calling Eqs. (17) or (18)) from 5 to 20. Tables 3(a) and 3(b) show the various algorithms' solution qualities on random trees and graphs, respectively, where we set the num- ber of agents A to 20 and vary the number of initial points used by the algorithms to discretize the domains from 1 to 9. In all our experiments, we set the domain of each agent to be in the range [−100, 100]. We generate utility functions that are binary quadratic functions, where the signs and co- efficients of the functions are randomly chosen. Our exper- iments were performed on a 2.10GHz machine with 100GB of RAM. Results are averaged over 20 runs. Random Trees: We omit the results of CAF-DPOP from Table 1 since it finds identical solutions to AF-DPOP on trees -- there is no need to perform any clustering on trees since an agent does not receive utilities for value combinations of its parent from its children since there are no backedges in the pseudo-tree. Not surprisingly, EF-DPOP finds the best solution since it is an exact algorithm. However, it could only solve the smallest of instances -- due to memory limitations, the agents could not store the necessary number of piecewise functions to accurately represent the utility functions after additions and projections. In general, AF-DPOP finds better solutions than DPOP, which finds better solutions than HCMS. The reason is because AF-DPOP updates the value of representative points before propagating up the pseudo-tree. In contrast, the val- ues chosen by DPOP is fixed from the start. Finally, HCMS performs poorly because a single iteration is insufficient for it to converge to a good solution. Additionally, as expected, the quality of solutions found by AF-DPOP improves with increasing number of times points are "moved" by the algo- rithm. We omit the results of EF-DPOP from Table 3(a) as it failed to solve these instances and we omit the results of CAF-DPOP because it finds identical solutions to AF-DPOP on trees. Not surprisingly, the quality of solutions found by all the three algorithms increase with increasing number of points. The reason is that the agents can more accurately rep- resent the utility function with more points. Random Networks: The trends in Table 2 are similar to those in random trees, except that CAF-DPOP finds solu- tions with qualities between that of AF-DPOP and DPOP. The reason is that CAF-DPOP clusters the points into k clusters and only propagate a representative point from each cluster. Therefore, the k points represent the utility functions less ac- curately than the full number of unclustered points that AF- DPOP uses. However, this reduced number of points prop- agated also improves the scalability of CAF-DPOP, where it is able to solve problems larger problems than AF-DPOP and DPOP. The trends in Table 3(b) are again similar to that in random trees, except that both AF-DPOP and DPOP ran out of mem- ory with 9 points. Interestingly, CAF-DPOP also finds better solutions than AF-DPOP when they use only 1 point. 7 Conclusions In many real-world applications, agents usually choose their values from continuous ranges. Researchers have thus pro- posed the F-DCOP formulation to model continuous vari- ables. However, existing methods suffer from the limitation that they do not provide quality guarantees on the solutions found. In this paper, we remedy this limitation by introducing (1) EF-DPOP, which finds exact solutions on F-DCOPs with linear or quadratic utility functions and are defined over tree- structure graphs; (2) AF-DPOP, which finds error-bounded solutions on general F-DCOPs; and (3) CAF-DPOP, which limits the message size of AF-DPOP to a user-defined pa- rameter k. Experimental results show that AF- and CAF- DPOP both find better solutions that HCMS, an existing state- of-the-art F-DCOP algorithm, when given the same commu- nication limitations. Therefore, these algorithms combined extend the applicability of DCOPs to more applications that require quality guarantees on the solutions found as well as those that require limited communication capabilities. problems. In Proceedings of the International Joint Con- ference on Artificial Intelligence (IJCAI), pages 468 -- 474, 2016. [Stranders et al., 2009] Ruben Alessandro Farinelli, Alex Rogers, and Nicholas Jennings. De- centralised coordination of continuously valued control parameters using the Max-Sum algorithm. In Proceedings of AAMAS, pages 601 -- 608, 2009. Stranders, [Ueda et al., 2010] Suguru Ueda, Atsushi Iwasaki, and Makoto Yokoo. Coalition structure generation based on distributed constraint optimization. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), pages 197 -- 203, 2010. [Voice et al., 2010] Thomas Voice, Ruben Stranders, Alex Rogers, and Nicholas Jennings. A hybrid continuous max- sum algorithm for decentralised coordination. In Proceed- ings of the European Conference on Artificial Intelligence (ECAI), pages 61 -- 66, 2010. [Yeoh and Yokoo, 2012] William Yeoh and Makoto Yokoo. Distributed problem solving. AI Magazine, 33(3):53 -- 65, 2012. [Zivan et al., 2015] Roie Zivan, Harel Yedidsion, Steven Okamoto, Robin Glinton, and Katia Sycara. Dis- tributed constraint optimization for teams of mobile sens- ing agents. Journal of Autonomous Agents and Multi- Agent Systems, 29(3):495 -- 536, 2015. References [Farinelli et al., 2008] Alessandro Farinelli, Alex Rogers, Adrian Petcu, and Nicholas Jennings. Decentralised coor- dination of low-power embedded devices using the Max- Sum algorithm. In Proceedings of the International Con- ference on Autonomous Agents and Multiagent Systems (AAMAS), pages 639 -- 646, 2008. [Fioretto et al., 2017a] Ferdinando Fioretto, William Yeoh, and Enrico Pontelli. A multiagent system approach to scheduling devices in smart homes. In Proceedings of the International Conference on Autonomous Agents and Mul- tiagent Systems (AAMAS), pages 981 -- 989, 2017. [Fioretto et al., 2017b] Ferdinando Fioretto, William Yeoh, Enrico Pontelli, Ye Ma, and Satishkumar Ranade. A DCOP approach to the economic dispatch with demand response. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 999 -- 1007, 2017. [Hamadi et al., 1998] Youssef Hamadi, Christian Bessi`ere, and Joel Quinqueton. Distributed intelligent backtracking. In Proceedings of the European Conference on Artificial Intelligence (ECAI), pages 219 -- 223, 1998. [Kumar et al., 2009] Akshat Kumar, Boi Faltings, and Adrian Petcu. Distributed constraint optimization with structured resource constraints. In Proceedings of the In- ternational Conference on Autonomous Agents and Multi- agent Systems (AAMAS), pages 923 -- 930, 2009. [MacQueen, 1967] James MacQueen. Some methods for classification and analysis of multivariate observations. In Proceedings of the Berkeley Symposium on Mathematical Statistics and Probability, pages 281 -- 297, 1967. [Maheswaran et al., 2004] Rajiv Maheswaran, Milind Tambe, Emma Bowring, Jonathan Pearce, and Pradeep Varakantham. Taking DCOP to the real world: Efficient complete solutions for distributed event scheduling. In the International Conference on Au- Proceedings of tonomous Agents and Multiagent Systems (AAMAS), pages 310 -- 317, 2004. [Miller et al., 2012] Sam Miller, Sarvapali Ramchurn, and Alex Rogers. Optimal decentralised dispatch of embedded generation in the smart grid. In Proceedings of the Interna- tional Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 281 -- 288, 2012. [Modi et al., 2005] Pragnesh Modi, Wei-Min Shen, Milind Tambe, and Makoto Yokoo. ADOPT: Asynchronous dis- tributed constraint optimization with quality guarantees. Artificial Intelligence, 161(1 -- 2):149 -- 180, 2005. [Petcu and Faltings, 2005] Adrian Petcu and Boi Faltings. A scalable method for multiagent constraint optimization. In Proceedings of the International Joint Conference on Ar- tificial Intelligence (IJCAI), pages 1413 -- 1420, 2005. [Rust et al., 2016] Pierre Rust, Gauthier Picard, and Fano Ramparany. Using message-passing dcop algorithms to solve energy-efficient smart environment configuration
0911.0753
1
0911
2009-11-04T09:19:37
An XML-based Multi-Agent System for Supporting Online Recruitment Services
[ "cs.MA" ]
In this paper we propose an XML-based multi-agent recommender system for supporting online recruitment services. Our system is characterized by the following features: {\em (i)} it handles user profiles for personalizing the job search over the Internet; {\em (ii)} it is based on the Intelligent Agent Technology; {\em (iii)} it uses XML for guaranteeing a light, versatile and standard mechanism for information representation, storing and exchange. The paper discusses the basic features of the proposed system, presents the results of an experimental study we have carried out for evaluating its performance, and makes a comparison between the proposed system and other e-recruitment systems already presented in the past.
cs.MA
cs
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 1 An XML-based Multi-Agent System for Supporting Online Recruitment Services Pasquale De Meo, Giovanni Quattrone, Giorgio Terracina, and Domenico Ursino 9 0 0 2 v o N 4 ] A M . s c [ 1 v 3 5 7 0 . 1 1 9 0 : v i X r a Abstract -- In this paper we propose an XML-based multi- agent recommender system for supporting online recruitment services. Our system is characterized by the following features: (i) it handles user profiles for personalizing the job search over the Internet; (ii) it is based on the Intelligent Agent Technology; (iii) it uses XML for guaranteeing a light, versatile and standard mechanism for information representation, storing and exchange. The paper discusses the basic features of the proposed system, presents the results of an experimental study we have carried out for evaluating its performance, and makes a comparison between the proposed system and other e-recruitment systems already presented in the past. Index Terms -- Multi-Agent Systems, XML, E-Services, Re- cruitment Services. I. INTRODUCTION I N the last decade Internet services emerged as a significant, both social and cultural, phenomenon; in fact, presently, many organizations provide their customers with the possibil- ity to access their services also on the Internet. In this scenario, online recruitment services, supporting both individuals looking for a job and companies looking for employees, are assuming a prominent role. In such a context, generally, companies populate a database of job proposals and individuals are supported in their job search by an engine based on classical Information Retrieval (IR) techniques1. Several studies show that the number of users accessing these services is dramatically increasing [1]; as a consequence, it is possible to foresee that, in the next years, a huge amount of job proposals will be handled by means of the Internet. In such a situation, classical IR techniques used by the present recruitment services could provide an individual with an excessively large number of job proposals not interesting for him. This could result in a low user perceived quality of service and, ultimately, in his decision to not access these services. A way for solving this problem consists of realizing person- alized search engines, which combine classical IR techniques and user modeling methodologies [2]. In the literature some approaches based on recommender systems [3] have been proposed to personalize search engines in various applica- tion contexts, such as Web browsing [4], e-commerce [5], e-learning [6], and so on. In addition, in some proposals, P. De Meo, G. Quattrone and D. Ursino are with DIMET (Dipartimento di Informatica, Matematica, Elettronica e Trasporti) of University Mediterranea of Reggio Calabria, Reggio Calabria, Italy. G. Terracina is with the Depart- ment of Mathematics of University of Calabria, Rende (CS), Italy. Email: {demeo,quattrone,ursino}@unirc.it, [email protected]. example, http://www.jobfinder.com. for 1See, hotjobs.yahoo.com or recommender systems have been combined with the agent technology for making them autonomous, reactive and pro- active [7]. This paper provides a contribution in this setting; in fact, it proposes an XML-based multi-agent recommender system that exploits rich user profiles to support personalized recruitment services. Our system is based on the agent technology. In fact, a User Agent is associated with each user and manages his profile, as well as the interaction with him; a Recruitment Agent supports each User Agent in the selection of those job proposals appearing to be the most adequate for the corresponding user. The exploitation of the intelligent agent technology allows our system to improve its autonomy and adaptiveness, as well as to easily partition the various tasks among several entities, thus improving its scalability. Finally, it allows an easy management of existing legacy systems by means of suitable wrappers; as a consequence, our system can easily interact with pre-existing recruitment Web sites and this contributes to enhance the completeness of obtained results. Our system is XML-based. XML is a standard language for representing and exchanging information. It embodies both representation capabilities, typical of HTML, and data management features, typical of DBMSs. XML information bases are plain text documents and, consequently, they are light, versatile, easy to be exchanged and can reside on different, both hardware and software, platforms. In spite of this simplicity, the information representation rules embodied in this language are powerful enough to allow the management of sophisticated queries. As for the contribution of our paper in the field of e- recruitment systems, we observe that: • In order to select the job proposals that best satisfy user requirements, a traditional e-recruitment system considers only the query of the user (that specifies his preferences and constraints), along with the features of available job proposals. On the contrary, our system takes into account not only the query of the user but also his reaction to previous job proposal recommendations it made to him. Moreover, it analyzes similitudes and/or correlations among job proposals to produce its suggestions; in this way, it can highlight some proposals that are usually ignored by traditional e-recruitment systems and that might be appealing for the user. • In a traditional e-recruitment system, a user can query the corresponding (internal) database. As a consequence, if the system's answer to a query is insufficient, the user must access other e-recruitment systems and re- submit the query; after this, he must compose the results IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 2 provided by each system to construct his final list of job proposals. This activity might be time consuming, since the user is obliged to contact and query several e-recruitment systems. In addition, it might be prone to errors, since two e-recruitment systems might exploit different methodologies and use different terminologies to both select and represent job proposals. Specifically, as for methodologies, it could happen that the same job proposal for a user ui receives contrasting scores by different e-recruitment systems. As a consequence, when ui compares the results provided by the various systems, he might be confused and, therefore, incapable of making a decision about its suitability for him. As for termi- nologies, two independent e-recruitment systems might present to a user the same job proposal by exploiting different terms. As an example, a job proposal regarding the design, the development and the validation of software programs might be called "Program Application Support Specialist" by an e-recruitment system, and "Software Test and Software Design Engineer" by another one. In situations like that previously described, since the two systems are totally independent each other, there is no form of coordination and, consequently, no way to inform a user that two or more terms represent the same job proposal. Our system is capable of facing all these problems; specif- ically, as it will be clarified in the following, it continuously monitors existing online recruitment services and collects job proposals coming from them; as a consequence, user search is not restricted to the database associated with an e-recruitment system but it spreads across disparate sources. This system organization allows a user to pose his queries in a transparent way; in other words, in order to obtain an answer, he could be unaware of the models and the languages of the involved databases, as well as of their internal structure. As for the Recommender Systems research area, the system we propose in this paper provides the following novelties: • A traditional Recommender System usually identifies the "Top K" recommendations, i.e., the K information items (in our case, job proposals) having the highest relevance for the user. The coefficient K is usually constant and pre-defined. In line with current advances [8], our system can analyze user reactions to past proposals to assess if the number of job proposals it presents to users is too low (resp., too high) and, in the affirmative case, it can dynamically augment (resp., reduce) this number. • In content-based Recommender Systems, a user profile is generally represented as a vector of pairs hki, wii, where ki is a keyword and wi is a weight denoting the impor- tance of ki for the user. On the contrary, in our system, user profiles are richer and take into account various characteristics and preferences of involved users. Even if this implies a higher complexity in their management, the improvement of results that can be obtained is very satisfying, as it will be clarified in Section V-E. • Our approach applies in the Recommender Systems field some mathematic tools generally used in other appli- Fig. 1. General architecture of our system cation contexts, such as manufacturing engineering [9], bioinformatics [10] and econometrics [11]. Interestingly enough, the computational effort it requires is not partic- ularly heavy, as it will be demonstrated in Section IV-B.1. II. GENERAL ARCHITECTURE OF OUR SYSTEM Our system consists of two main agent typologies, namely: (i) a User Agent (U A), that manages the profile of a user, as well as the interaction with him, and (ii) a Recruitment Agent (RA), that handles both job proposals and recommendation activities. Moreover, a Job Proposal Database (J P D) is used to store all available job proposals. J P D can be populated by companies who can insert, remove or modify job proposals by means of a Company Agent, i.e., a suitable Interface Agent, analogous to that described in [12]. In addition, J P D can be automatically enriched by suitable Wrapper Agents, analogous to that described in [13], that continuously monitor existing online recruitment services, find new job proposals and store them in J P D, if they are not already present. J P D can be described by an XML document; the corresponding XML Schema is shown in the Appendix available at the address http://www.ing.unirc.it/ursino/tsmc05/Appendix.pdf. Specifically, J P D stores is job proposals; a by tuple hJ IDl, J U RLl, J T opicSetl, J CharacteristicSetli, where: proposal a set of described job J Pl a • J IDl is an identifier; • J U RLl is the url where the complete description of the job proposal is available; • J T opicSetl = {J T opicl1, J T opicl2 , . . . , J T opiclm} is a set of topics describing J Pl; a topic is characterized by its name; • J CharacteristicSetl is a dynamic set of characteristics associated with J Pl. Each characteristic is described by a pair hF eature, V aluei; some of the possible features are the salary associated with the job proposal, the city/country of the job proposal, the foreign languages, the skills, the years of experience and the academic title(s) required from the candidate. Observe that we have chosen to store available job proposals into an independent knowledge base and not in the ontology IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 3 of a specific agent; independent and specialized agents can operate in our system to automatically and continuously update and refine them. in this way, several The general architecture of our system is shown in Figure 1. Its behaviour is as follows. When a user ui wants to perform a job search, he submits a query to the associated User Agent U Ai. After this, U Ai contacts RA and provides it with both the query and the profile of ui. RA selects from J P D the available job proposals satisfying user query, ranks them on the basis of the presumed user preferences and selects those ones that best fit the past interests of ui, as well as other interests, someway related to those ui considered in the past and that he still disregarded. After this, RA sends the selected proposals to U Ai that presents them to ui; U Ai monitors ui and, when he performs his choices, it updates his profile accordingly. As previously pointed out, the role of XML in our system is crucial. In fact: • Agent ontologies are stored as XML documents; as a con- sequence, they are light, versatile, easy to be exchanged and can reside on different hardware and software plat- forms. In spite of this simplicity, the information repre- sentation rules embodied in XML are powerful enough to allow a sophisticated information management. • The agent communication language adopted in our sys- tem is ACML [14]; this is the XML encoding of the standard Agent Communication Language. • The extraction of information from the various data structures is carried out by means of XQuery [15]. This is becoming the standard query language for the XML environment. Since XQuery is based on the XML framework, it can handle a large variety of data. It has capabilities typical of database query languages as well as features typical of document management systems. • The manipulation of agent ontologies is performed by means of the Document Object Model (DOM) [16]. DOM makes it possible for programmers to write applications working properly on all browsers and servers as well as on a large variety of both hardware and software platforms. The architecture of our system can be considered mixed, i.e., partially centralized and partially distributed. In this sense it follows the ideas expressed in [17], where an architecture for handling telecommunication networks, based on the presence of an auctioneer agent that carries out most of the negotiation activities, is described. It can be considered centralized for the presence of the Recruitment Agent that performs most of the activities concerning the selection of the job proposals best fitting user exigencies. On the other hand, it can be assumed to be distributed for the presence of many User Agents, Wrapper Agents and Company Agents that continuously cooperate with the Recruitment Agent for performing the whole recruitment task. Observe that, in our system, there exists only a central Recruitment Agent. Such a choice is justified by the following motivations: • Network Congestion. In our architecture, each User Agent is in charge of forwarding both the User Profile and the user query to the Recruitment Agent that processes this query and sends the corresponding results to it; as a consequence, the two agents exchange a small number of (generally simple) messages and this prevents network overload. In a distributed implementation of the Recruit- ment Agent activities, various Recruitment Agents would cooperate for processing user queries. As a consequence, they should continuously communicate and exchange messages; this would generate a high network traffic and the whole system would quickly be overwhelmed with messages among agents. This problem is particularly in our reference scenario where the number relevant of job seekers, and consequently of User Agents, is very high; this would cause an overwhelming amount of exchanged messages and, ultimately, significant latencies and users dissatisfaction. • Task Assignment. In a distributed implementation of the Recruitment Agent activities, a query is propagated through several Recruitment Agents that spend memory and CPU resources to process it. In this scenario, it could happen that some Recruitment Agents would be overwhelmed with requests, whereas other ones would be almost unoccupied. In order to optimize the system per- formances, it would be necessary to define protocols for intelligently assigning tasks to the various Recruitment Agents. These protocols appear very complex to be real- ized because the potential job seekers (and, consequently, the potential User Agents) might be very numerous and geographically sparse. • Message Duplication. In a distributed implementation of the Recruitment Agent activities, multiple copies of a query might be received by the same Recruitment Agent (we call these copies duplicated messages). To better clarify this concept and its consequences, consider four Recruitment Agents RAd1, RAd2, RAd3 and RAd4, and assume that: (i) a user submits a query Q to RAd1; (ii) RAd1 is not capable of answering Q; (iii) RAd1 asks RAd2 and RAd3 to answer Q; (iv) RAd2 and RAd3 are only capable of producing a partial answer to Q (e.g., the number of job proposals retrieved by them is lesser than that required by the user); (v) RAd2 and RAd3 might independently forward Q to RAd4 that would receive and, in its turn, could process and possibly transmit Q twice. This example clearly shows that duplicated messages are pure overhead; they increase the network congestion and determine a waste of CPU and memory resources for the Recruitment Agents that are often obliged to process the same query more than once. In spite of the resource waste caused by them, they do not improve system accuracy since they do not contribute to increase the chance of finding job proposals relevant for user. These problems are emphasized in an e-recruitment sce- nario, where the number of job seekers contemporarily accessing our system could be very high; in this case, the probability of duplicating messages might be extremely high. As a consequence, suitable mechanisms for iden- tifying duplicated messages and avoiding to process and forward them are required; however, these mechanisms IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 4 are generally difficult to be designed and implemented. Interestingly enough, these motivations are in accordance also with the ideas illustrated in [18]. Finally, we would like to point out that our system does not provide for any additional layer between the User Agent and the Recruitment Agent. This choice is justified by the following motivations: • Ability to cooperate with other e-recruitment systems. One of the most important capabilities of our system consists of its ability to effectively cooperate with other e- recruitment systems (see below). A layered architecture does not appear particularly suitable for pursuing such an objective. In fact, in a layered architecture, system functionalities are associated with different abstraction levels, each represented by a layer; the abstraction degree generally increases from the lowest levels to the highest ones. The presence of different abstraction levels has the following consequences: -- The interaction between two layered systems re- quires each of them to have a deep knowledge of the architectural features of the other one. In fact, each system should know the abstraction level associated with each layer of the other system to properly ex- change information and cooperate. Such a knowledge is often missing and, hence, the mapping from a layer in a system to a layer in another one might be not obvious and, in some cases, not possible. -- Many systems cannot be easily structured in a lay- ered fashion. As a consequence, if our system would be layered, we could have a scenario in which layered and non-layered architectures coexist; in this case, suitable communication protocols between lay- ered and non-layered systems are compulsory; their realization, however, is often a hard and expensive activity. • Performance Issues. Several studies point out that the number of users accessing e-recruitment systems is rapidly increasing [1]. As a consequence, an e- recruitment system should be capable of quickly process- ing user queries. Such a requirement cannot be easily satisfied in a layered system; in fact, in this case, each layer supplies services to the layer above it and operates as a client for the layer below it. Therefore, in a layered system, a continuous message exchange between low- level layers and the high-level ones is required. Since a message often has to pass through many layers, the overhead associated with message exchange is often significant and might determine a performance decay. Various techniques have been proposed to boost the performances of a layered system (e.g., it is possible to couple non-adjacent layers) but they seem too difficult to be realized in practical contexts, especially in our application case where the various layers could belong to different owners. • Reliability Issues. The fast identification of faults and the quick reaction to them cannot be easily performed in a layered architecture since a failure in a layer might determine the crash of the whole system. Even the (pos- sibly non fast) fault identification might be difficult to be carried out since the functionalities of the low-level layers are often hidden to the high-level ones and, consequently, an application running on high-level layers has many difficulties in identifying where a certain problem has occurred. In the following sections we provide a detailed description of the two main agents involved in our system, namely the User Agent and the Recruitment Agent. III. THE USER AGENT A. Ontology The ontology of the User Agent U Ai, associated with a user ui, stores the profile of ui. It contains: • The code U IDi identifying ui. • A set T opicSeti storing the preferences of ui; each preference corresponds to a topic which ui looked for in the past. Each element T opicij of T opicSeti is represented by a tuple hT opicN ameij , Countij , F irst- T imeStampij i, where: (i) T opicN ameij indicates the is an access counter name of T opicij ; (ii) Countij denoting how many times T opicij has been specified in a query submitted by ui; (iii) F irstT imeStampij indicates the first time instant in which T opicij has been specified in a query of ui. As it will be clarified in the following, these last two coefficients allow the relevance of T opicij for ui to be measured. • A dynamic set ConstraintSeti of constraints that ui fixes for the desired job. Each constraint is described by a pair hF eature, V aluei; some of the possible con- straints are the minimum salary ui would like to earn, the city/country where he desires to work, the foreign language(s) he knows, his skills, the years of experience he has attained, and his academic title(s). • A set P astQueriesi, storing information about i i. i , αk the queries that ui posed to the system in the past. Each element of P astQueriesi consists of a pair hσk is the satisfaction coefficient; it belongs to the real σk i interval [0, 1] and indicates how much ui appreciated the recommendations provided by the system as a response to his kth query. In the literature many proposals have been presented to measure the satisfaction of a user for a set of recommendations (see, for example, [19], [20]). In this paper we follow the ideas illustrated in [20] and define σk i be the set of job proposals recommended by the system as a response to the kth query of ui and let AcceptedJ P k i be the set of job proposals accepted by ui; σk i can be defined as i = AcceptedJP k i σk JP Listk i is the audacity coefficient; it belongs to the real αk i interval [0, 1]; the higher αk i is, the higher the number of job proposals returned by the system as its answer to the query Qk is computed by the Recruitment i will be. αk Agent; the various strategies for its computation are shown in Section IV-B.1; they have been designed in i as follows. Let J P Listk . i IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 5 such a way to make our system adaptive against the past behaviour of ui. C. Influences of job market specifics in the design of the User Agent architecture The XML Schema associated with the ontology of U Ai is shown in the Appendix. B. Behaviour i , QT Setk i by means of a suitable wizard. Qk i i. SelDegreek The behaviour of U Ai consists of the following steps. • Step 1. When ui wants to perform a job search, U Ai supports him in the construction of a corresponding query i consists of a pair Qk i , belonging to the hSelDegreek real interval [0, 1], is the Selectivity Degree; it indicates how much the system should be selective in the search of proposals (see below); the wizard associated with U Ai proposes to ui some possibilities and he chooses the most suitable one for him in a friendly, guided manner. iq } is the set of QT Setk topics describing the job proposals currently interesting for ui. Moreover, if ui wants to update the constraints for a desired job, U Ai provides him with a suitable graphical interface that allows him to view the constraints he has defined, as well as to add, drop or modify some of them. • Step 2. U Ai updates T opicSeti; this task is performed by inserting in it those topics of Qk i not already present therein and by increasing the access counters of the topics corresponding to QT opick i = {QT opick i1, . . . , QT opick i1, . . . , QT opick iq . that best fit • Step 3. U Ai contacts RA and supplies it both Qk i and the profile of ui. RA selects the job proposals answering interests of ui, as well as Qk i other interests, someway related to those ui considered in the past and that he still disregarded. Then, it sends to U Ai both the selected job proposals and the audacity coefficient αk i the past it used. • Step 4. U Ai presents to ui the job proposals provided by RA. ui accepts those ones appearing to be the closest to his exigencies and rejects the other ones. After this, U Ai computes the satisfaction degree σk i that ui showed for the provided recommendations, and stores the pair hσk i i into P astQueriesi. In order to avoid an excessive growth of T opicSeti, U Ai executes a pruning activity on it. Such a task is carried out by computing the relevance for ui of each topic T opicij stored in T opicSeti and by remov- ing from T opicSeti those topics presenting a relevance smaller than a certain threshold. The relevance of T opicij at the time instant T is computed by means of the formula . This formula is r(T opicij , T ) = justified by considering that the more a user is interested in a topic, the more frequently he asks information about it. T −F irstT imeStampij Countij i , αk • Step 5. In order to show the exploitation of ACML and XQuery in our system, in the Appendix, we present the ACML message that U Ai sends to RA for requiring a set of recommendations and the query that U Ai executes for identifying those topics of Qk i not already present in T opicSeti. The design of our User Agent model has been influenced by various job market specifics. In the following we examine the most relevant of them. 1) Construction of a network of job seekers: Several studies point out the importance of constructing a job seeker network (JSN), i.e., a community of job seekers that share and ex- change information about their past job experiences. A JSN is an effective channel for disseminating job information and can successfully support its users in their job search: as an example, a study presented in [21] shows that the probability of a user to find a job grows with the increase of the size of the network he belongs to. Actually, the construction of a J SN is a delicate activity. In fact, job seekers, due to both selfishness and rivalry, might be unwilling to cooperate. To overcome this drawback, it is necessary to create a free-of-competition environment based on trustful relationships among its members. In order to carry out this task, it is necessary to enhance the cooperation among job seekers belonging to the same job context for whom a rivalry might not exist; think, for example, to job seekers having different experience degrees (e.g., a senior software programmer who helps a newly graduated person to find his first job). The experience shows also that information sharing among members of a JSN increases their capability of posing precise queries. In fact, users accessing e-recruitment services are ex- tremely heterogeneous: job seekers having a deep knowledge of a job domain often coexist with other seekers having a su- perficial knowledge of it. An expert is capable of formulating a query that really captures his needs; on the contrary, a novice might ignore the information content of the database storing available job proposals and, consequently, might be unable to formulate precise queries. As previously pointed out, a JSN might support novices to compose their queries; specifically, a novice might ask the experts of a JSN to support him in his query composition. Our User Agent model has been designed in such a way to facilitate the creation of a JSN; specifically, a User Agent U Ai, on behalf of ui, could contact other User Agents for finding job seekers having a profile similar to ui but being more expert than him; such a task can be carried out by taking into account the lists of topics specified in user profiles and by comparing them by means of the Jaccard Coefficient [22]. When the list of job seekers similar to ui is available, ui can ask U Ai to activate a contact with one or more of them in such a way to require a support to formulate his queries. 2) Integration with e-learning systems: Several studies point out that the capability of a job seeker to continuously update his know-how has a significant implication on the success of his job search, as well as on the advancement of his career; as a consequence, learning activities should be regarded as a lifelong process. For this reason a strict integration between e-recruitment and e-learning systems might provide a job seeker with a significant competitive advantage. A key component of most e-learning systems is the so- called student profile, storing information about the student IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 6 background knowledge and information needs. In this way, it is possible to diversify the learning process on the basis of user skills and necessities. Our User Agent model can make the interaction between our system and an e-learning one easier; specifically, a User Agent could transfer the corresponding User Profile to an e-learning system that might construct an initial student profile starting from it. Conversely, the profile of a student that acquired some skills with the support of an e-learning system could be exploited to construct an initial user profile for the User Agent of our e-recruitment system. 3) Efficient retrieval of curricula: Presently, a large number of curricula vitae is available on the Internet. Generally, a cur- riculum consists of a title and a set of additional information provided by the job seeker (e.g., his past experience). These curricula can be consulted by businesses; a common way to do this activity is the so called "curricula spidering", i.e., the exploitation of a software agent that tracks down curricula and finds those of interest for businesses. The search of curricula is generally performed by means of a traditional search engine; in this case the business manager specifies some words to the engine and this last searches for those curricula containing these words. These techniques might lead to irrelevant and spurious results; in fact, a cur- riculum might be too vague; it might be not updated; last, but not the least, the words appearing in a curriculum might not belong to the vocabulary of terms used by business managers in their searches. Our User Agent model is capable of enhancing the curricula search capabilities of businesses; in fact: • A User Agent is in charge of monitoring the behaviour of its user and this allows it to maintain the corresponding profile always updated. • A User Agent learns the profile of its user on the basis of the job proposals that he searches for and, eventually, accepts or rejects. In this way, the topics specified in a User Profile derive from the job proposal features directly inserted by businesses; such a policy avoids ambiguity, that could arise when a term present in a traditional curriculum could be interpreted in more than one way by a business manager, and protects the job seeker against his lack of knowledge of the terms that are currently used by businesses. IV. THE RECRUITMENT AGENT A. Ontology set of The ontology of a Recruitment Agent RA consists in Sec- is described by a tuple of a tion II, a Job Proposal J Pl hJ IDl, J U RLl, J T opicSetl, J CharacteristicSetli. job proposals; as pointed out The XML Schema associated with the ontology of RA is shown in the Appendix. B. Behaviour RA is activated by U Ai when ui wants to perform a query i for searching job proposals. It receives Qk i and the profile Qk of ui; it returns to U Ai: (i) the job proposals answering Qk i that best fit the past interests of ui, as well as other interests, someway related to those ui considered in the past and that i it used to he still disregarded; (ii) the audacity coefficient αk select the job proposals. In order to perform its activity, RA carries out the following steps: • Step 1. It queries J P D for retrieving the job proposals (keyword-based filtering) and satisfying matching Qk i user constraints (feature-based filtering); to this purpose it applies classical Information Retrieval techniques [23]. • Step 2. It ranks the selected proposals on the basis of user preferences, as stored in T opicSeti. Such a task is carried out as follows: let J Pl = hJ IDl, J U RLl, J T opicSetl, J CharacteristicSetli be a job proposal and let T Sil = T opicij ∈ T opicSeti, T opicN ameij ∈ {T opicij J T opicSetl} be the set of topics of J Pl appearing to be interesting for ui. RA assigns an interest degree to J Pl, for the user ui at the current time instant T , according r(T opicij , T ). to the formula ρ(T Sil, T ) = PT opicij ∈T Sil Here, the relevance r has been defined in Section III-B. Clearly, the higher the value of ρ(T Sil, T ) is, the higher the end of the relevance of J Pl for ui will be. At this phase, RA constructs J P T empListk i , obtained by sorting the selected job proposals on the basis of their interest degrees. Observe that a more complex formula could be adopted for ρ. However, in this way, the complexity of the Recruit- ment Agent would unnecessarily increase. In fact, since, during the selection of job proposals, our approach takes into account also user past preferences and satisfaction, a simple ranking function is sufficient. This is confirmed also by the experimental results shown in Section V. is already a good candidate to be pre- J P T empListk i sented to ui. However, two further improvements could be performed by RA to make it more adequate. Firstly, we observe that J P T empListk i ranks the job proposals on the basis of their relevance for ui, according only to his past preferences; however, it does not consider topics, someway related to those ui considered in the past and that he still disregarded. Secondly, J P T empListk i could still contain quite a large number of proposals. The next steps performed by RA are devoted to carry out these improvements. of • Step 3. RA constructs the set SeedP roposalsk i obtained by selecting the first ⌈SelDegreek i ⌉ of proposals J P T empListk i are used by RA as seeds to choose SeedP roposalsk other job proposals containing topics, someway related to those ui considered in the past and that he still disregarded. i × J P T empListk i . The elements ∈ i = SeedP roposalsk • Step 4. RA constructs the final list J P Listk i of recom- mended job proposals as J P Listk i ∪ {J Pl ∈ J Pl i , J Pm i }. Here αk SeedP roposalsk δ(J Pl, J Pm) measures "dissimilarity degree" between J Pl and J Pm. It is defined as δ(J Pl, J Pm) = 1 − 2JT opicSetl∩JT opicSetm JT opicSetl+JT opicSetm , where J T opicSetl and topics associated J T opicSetm represent i , δ(J Pl, J Pm) the J P T empListk the sets of ≤ IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 7 with J Pl and J Pm, respectively, and the symbol S represents the cardinality of a set S. Interestingly enough, the value 2S1∩S2 S1+S2 is known as Dice's coefficient in the literature. It is easy to show that δ ranges between 0 (if the two job proposals coincide) and 1 (if the two job proposals are completely different). The audacity coefficient αk i is dynamically computed by RA on the basis of the feedback that ui showed for past recommendations. In this paper we propose three different strategies for the computation of this coefficient; they are extensively described in Section IV-B.1. i , obtained at the end of this step, contains at least J P Listk the seed proposals; moreover, it could include also some job proposals relative to topics not particularly relevant for ui in the past, but that could be of interest for him in the future (since they are sufficiently similar to those he judged relevant in the past). In the selection of this last category of proposals δ plays a key role; in fact, it measures the dissimilarity degree of two job proposals on the basis of their topics, i.e., of their meaning and seman- tics, without considering the relevance that ui assigned to them in the past. i to U Ai. i and αk • Step 5. RA sends J P Listk 1) Strategies for the audacity computation: In our system we have chosen to dynamically update the audacity coefficient after each query performed by the user ui. This allows it to be very sensitive to the user judgements about its recom- mendations and significantly improves its accuracy. However, this makes the manual update of the audacity coefficient a very difficult in our opinion, asking the user to manually update the audacity coefficient after each query is obtrusive. In addition, even with the exploitation of suitable graphic interfaces, the user could be not capable of understanding the role of the audacity coefficient and to choose the most correct value for it. task. In fact, However, in our prototype, in order to consider the possible presence of very smart users, we have inserted a module allowing a smart user to personally modify the values of the audacity coefficient determined by the system. i that RA associates with Qk In this section we illustrate three different strategies that may be used for automatically computing the audacity coef- ficient αk i . Recall that the higher this coefficient is, the higher the number of job proposals returned by the system for answering Qk i will be; this strictly depends on the satisfaction that ui showed for the recommen- dations of RA in the past. As a consequence, any strategy for the computation of αk i must evaluate the satisfaction of ui w.r.t. the previous recommendations of RA. As previously pointed out, the choice to make audacity dependent on satisfaction allows our system to be adaptive against the past behaviour of ui. a) Strategy 1: Positive and Negative Feedback (PNF). In this strategy, αk i is dynamically updated on the basis of the feedback provided by ui for the last recommendation; this is encoded in the satisfaction coefficient σk−1 relative to the recommendations associated with the query Qk−1 . Recall that σk−1 is the fraction of job proposals accepted by ui w.r.t. i those recommended by the system when it answered Qk−1 . i i i PNF works as follows: • If, during the execution of Qk−1 i i > 1 , the number of accepted recommendations has been greater than the number of the rejected ones (i.e., σk−1 2 ), then it is possible to argue that ui has appreciated the system recommendations, since he accepted most of them. As a consequence, if the system would send further recommendations, it is extremely probable that ui would receive other proposals interesting for him. Now, since in our system the amount of proposals sent to the user as the answer to the query Qk i i , increasing is strictly related to the audacity coefficient αk this coefficient would imply an increase of the number of proposals recommended by the system when answering i . Qk Clearly, the key issue in this reasoning is the correct estimation of the increase of αk i . In fact, if such an increase is too high, then ui would receive several use- less proposals and his perceived quality of the overall recommendations could decrease. On the contrary, if the increase is too low, the system could miss to recommend some proposals interesting for ui. The previous reasoning led us to define the increase εk i to apply on the audacity αk−1 i as a linear function of the user for obtaining αk i = σk−1 2 . This formula shows satisfaction; formally, εk that the more ui is satisfied, the more σk−1 is higher i is increased w.r.t. αk−1 . Clearly, than 1 other functions could be adopted for εk i , e.g., logarithmic, quadratic, cubic or exponential functions; however, in our opinion, the linear function is the most suitable one to satisfy the contrasting exigencies mentioned above and to provide the system with the correct balance between stability and readiness in adapting its behaviour to user satisfaction (see the Appendix for an experimental anal- ysis of this topic). 2 and the more αk i − 1 i i i • If, during the execution of Qk−1 i i < 1 , the number of rejected recommendations has been greater than the number of the accepted ones (i.e., σk−1 2 ), then it is possible to argue that ui has disliked system recommendations, since he refused most of them, and that he is interested to examine fewer proposals during the next queries. As previously the number of system recommendations pointed out, depends on αk i ; therefore, in order to make the system to recommend fewer proposals to ui, it is necessary that αk i is lower than αk−1 . For the same reasoning introduced in the previous case, the most suitable function for defining i appears the decrease εk for obtaining αk the linear one. More formally, the decrease εk i can be defined as εk i to apply to αk−1 . i = 1 2 − σk−1 i i i • The last possible situation happens when the number of accepted proposals has been equal to the number of the rejected ones (i.e., σk−1 2 ). This situation can be seen as a specific case of both the first and the second situations described above. If it is consid- ered as a particular case of the first (resp., second) situation, the increase (resp., decrease) εk is equal to i 0 and, consequently, it is possible to conclude that the number of recommendations should be neither increased = 1 i IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 8 nor decreased; this implies that the audacity coefficient should be maintained constant. The previous reasoning leads to the following formula for computing the new value of αk i : min{1, αk−1 αk−1 max{0, αk−1 αk i =   i i if σk−1 if σk−1 if σk−1 i i > 1 2 = 1 2 < 1 2 i + εk i } i − εk i } This formula is valid when ui exploits the system at least for the second time. During the first query α1 i is set equal to a constant value α. An analysis of the impact of α on the system performance is reported in the Appendix. b) Strategy 2: 2-Least Square Error (2-LSE). This strategy is based on the Least Square Error tech- nique (LSE) that is largely exploited in several research areas, such as manufacturing engineering [9], bioinformatics [10], econometrics [11], and so on. LSE considers two sets X = {x1, x2, . . . , xN } and Y = {y1, y2, . . . , yN } and a function y = f (x, a0, a1, . . . , ap) depending on p+1 unknown parameters but having a predefined form (e.g., f might be a polynomial, a linear combination of exponentials, a sinusoid, and so on). The goal of LSE is to identify the values a∗ 0, a∗ 1, . . ., a∗ p of the parameters a0, a1, . . . , ap such that the residual N p)(cid:1)2 is minimum. In such a Pl=1(cid:0)yl − f (xl, a∗ p) is the function that best 0, a∗ case it is said that f (x, a∗ "fits" the sets X and Y , in the least squares sense. 1, . . . , a∗ 0, a∗ 1, . . . , a∗ R = i , this strategy: In order to compute αk • Applies the LSE technique for determining the values a∗ 0, . . . , a∗ p of the parameters a0, . . . , ap of the fitting it exploits the sets X = function. To this purpose, }. Ob- {α1 serve that, as a consequence of this choice for the sets X and Y , the fitting function represents the user satisfaction against the system audacity. } and Y = {σ1 i , . . . , σk−1 i , . . . , αk−1 i , α2 i , σ2 i i • Sets αk i to the value of the audacity corresponding to the maximum value2 of the fitting function and, consequently, to the maximum value of the user satisfaction. A crucial problem in the implementation of the LSE strategy is the choice of both the shape and the parameters of the fitting function. Such a choice must minimize the residual R; as a consequence, it requires to compute the partial derivatives of R and to solve the set of equations ∂R ∂aj = 0, ∀j = 0, . . . , p. If we use, as fitting function, a combination of sinusoids, logarithms and exponentials, these equations generally define a non-linear system that, often, cannot be exactly solved; in this case, even the calculation of an approximate solution requires an heavy computational effort. On the contrary, if the fitting function has a polynomial shape, i.e., f (x, a0, a1, . . . , ap) = a0xp + a1xp−1 + . . . + ap, it is possible to show that these equations are equivalent to the linear system [24] Ax = b, where A is a matrix called Vandermonde matrix. It is possible to show that at least an approximate solution of this system can be computed in a 2Observe that, since the independent variable (i.e., the audacity) belongs to the compact interval [0, 1], the fitting function has always a maximum within this interval. polynomial time; generally, the exact solution can be computed in O(p2) steps [24]; as a consequence, a polynomial shape for the fitting function appears well suited for our purposes. The next step of our activity consists of determining the order of the polynomial to be used as fitting function. To this purpose observe that LSE must compute the audacity value that maximizes the fitting function f (x); to compute this value we need to determine the derivative f ′(x) of f (x) and to solve the equation f ′(x) = 0. Now, if f (x) is a pth order polynomial, f ′(x) will be a (p − 1)th order polynomial; as a consequence, we have that: (i) if p = 2 (i.e., if the fitting function is a parabola), it is possible to directly obtain an exact solution of f ′(x) = 0 by solving a first order equation; (ii) if p = 3 (i.e., if the fitting function is a cubic), it is possible to obtain an exact solution of f ′(x) = 0 by solving a second order equation; (iii) if p > 3, the computation of the roots of f ′(x) can be performed by means of numerical (and approximate) techniques; with regard to this, it was shown that the time necessary for finding all the roots of f ′(x) = 0 with 2b is O(p log p4 + p log2 p log b) a maximum error equal to 1 [25]. This analysis shows that, for obtaining a correct (i.e., not approximate) solution of the equation f ′(x) = 0, the fitting function must be either a parabola or a cubic. Since the accuracy ensured by the polynomial of degree 2 (i.e., the parabola) is high [26], and since the computation time it requires for solving f ′(x) = 0 is lower than that necessary if the fitting function is a cubic, we have adopted the parabola as fitting function; in this case the LSE technique is called 2-LSE technique. Therefore, in our case, the fitting function is y = a0x2 + a1x + a2; this choice implies that the 2-LSE strategy is valid only when ui exploits the system at least for the fourth time. During the first three queries α1 i are set equal to three constant values α′, α′′, α′′′, respectively. An analysis of the impact of α′, α′′, α′′′ on the system performance is reported in the Appendix. i , α3 i , α2 c) Strategy 3: Weighted Sum (WS). i i i i and αk,2−LSE ; specifically, αk i = γ × αk,P N F In order to compute αk i , . The overall audacity value αk i this strategy applies the PNF and the 2-LSE strategies and obtains two audacity values αk,P N F is obtained by computing a suitable weighted mean of αk,P N F and αk,2−LSE + (1 − γ) × αk,2−LSE . Here, γ is a coefficient ranging in the real interval [0, 1]. Specifically, if γ = 1, the WS strategy coincides with the PNF strategy; on the contrary, if γ = 0, the WS strategy coincides with the 2-LSE strategy. In our experiments we have considered different values for γ and we have studied their impact on the system performance (see the Appendix for more details); in addition, we have examined how to dynamically compute γ for maximizing the system performances. i i V. EXPERIMENTAL RESULTS In this section we describe in detail the various experiments we have conducted for testing the performance of our system. Specifically, in Section V-A we describe the characteristics of both the users and the job proposals considered in our IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 9 tests; Section V-B presents the accuracy measures we have chosen for testing our approach. Section V-C is devoted to make a comparison of the three strategies for the audacity computation. In Section V-D we evaluate the performance of our system in different application domains. Finally, Section V-E is devoted to present an experimental comparison of our system with other e-recruitment ones. In order to perform our tests, we have designed a pro- totype implementing our approach. This prototype has been developed in JADE3 (Java Agent DEvelopment framework), a software framework conceived for supporting the implemen- tation of agent-based applications in compliance with FIPA specifications [27]. A. Characteristics of the users and job proposals In our tests we have considered a set of users U Set = {u1, u2, . . . , u200} consisting of 200 volunteers. As for their distribution against their age we have that: (i) 21.00% of them was 18-24 years old; (ii) 39.00% of them was 25-34 years old; (iii) 25.50% of them was 35-44 years old; (iv) 13.50% of them was 45-54 years old; (v) 1.00 % of them was more than 54 years old. As for their distribution against their past usage to com- mercial e-recruitment systems we have that: (i) 11.00% of them had never used a commercial e-recruitment system; (ii) 10.00% of them exploited it very rarely; (iii) 10.00% of them used it rarely; (iv) 25.50% of them exploited it sometimes; (iv) 31.00% of them exploited it often; (v) 12.50% of them used it very often. job The proposals, available sites extracted http://www.jobpilot.co.uk about from and the http://www.careerbuilder.com were 3000. They belonged to different domains; specifically, reference domains where: (i) "Information Technology" for 19.29% of them; (ii) "Health Care Management" for 17.02% of them; (iii) "Finance" for 15.84% of them; (iv) "Engineering" for 12.07% of them; (v) "Banking" for 10.04% of them; (vi) "Legal" for 7.02% of them; (vii) "Real Estate Management" for 5.26% of them; (viii) "Others" for 13.46% of them. B. Evaluation Measures In our tests we have computed two widely accepted eval- uation measures, namely Precision and Recall. Precision is defined as the share of job proposals accepted by ui among those recommended by the system; Recall is the share of job proposals suggested by the system among those of interest for ui. These parameters have been computed as follows: • Each user ui ∈ U Set was asked to submit a query Qk i i was obtained (see and the corresponding J P T empListk Section IV). • ui was asked to identify the subset U serListk i ⊆ i of job proposals that he considered in- J P T empListk teresting. 3JADE is an open source platform; it can be downloaded from http://sharon.cselt.it/projects/jade. AvgPre PNF AvgPre 2−LSE 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 n o s i i c e r P e g a r e v A 0 0 5 10 15 Number of Queries 20 25 Fig. 2. Average Precision for the PNF and the 2-LSE strategies • Our prototype was run for obtaining the set J P Listk i ⊆ i of job proposals to be recommended to J P T empListk ui. • The Precision P rek i and the Recall Reck i relative to the kth query have been obtained by applying the formulas: P rek i = i ∩U serListk JP Listk i i = JP Listk . i ∩U serListk i JP Listk i , Reck U serListk i • Finally, the Average Precision AvgP rek and the Average Recall AvgReck relative to the kth query have been obtained as AvgP rek = Pi=1..U Set Pi=1..U Set , AvgReck = P rek i U Set Reck i . U Set Observe that Precision, Recall, Average Precision and Av- erage Recall belong to the real interval [0, 1]; specifically, the higher these coefficients are the better the system works. C. Experimental comparison of the three strategies imple- mented in our approach In this section we experimentally compare the strategies for the audacity computation described in Section IV-B.1. Actually, it is necessary to examine only the PNF and the 2-LSE strategies; in fact, the WS strategy is a weighted mean of the two other ones. In the test of the PNF strategy we have set α = 0.55 whereas in the test relative to the 2-LSE strategy we have set α′ = 0.5, α′′ = 0.6, α′′′ = 0.4 (see the Appendix). For each strategy we have computed the Average Precision and the Average Recall against the number of queries. The obtained results are shown in Figures 2 and 3. From the analysis of these figures we can conclude that: • If the number of queries carried out by users is low (i.e. lesser than 10), the PNF strategy shows a better performance than the 2-LSE strategy; in fact, its Average Precision and its Average Recall increase up to 0.75 and 0.69, respectively. This behaviour can be motivated by considering that, before 10 queries have been performed, the 2-LSE strategy has still not completed the audacity "tuning" and, hence, the corresponding results are not particularly satisfactory. • If the number of queries carried out by users is high (i.e. greater than 15), the performance improvements of the PNF strategy are small. On the contrary, the 2-LSE IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 10 AvgRec PNF AvgRec 2−LSE 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 l l a c e R e g a r e v A 0 0 5 10 15 Number of Queries 20 25 Fig. 3. Average Recall for the PNF and the 2-LSE strategies strategy shows a very good performance; as an example, after 15 queries, the Average Precision and the Average Recall are 0.85 and 0.76, respectively. This behaviour can be motivated by considering that the 2-LSE strategy "tunes" the audacity coefficient on the basis of the user feedback during all the k − 1 previous queries, whereas the PNF strategy considers only the last one. As a consequence, a high number of queries allows the 2-LSE strategy to more precisely predict user expectations. • During the initial queries, both Average Precision and Average Recall have an oscillatory behaviour; this de- pends on the fact that, initially, both user profiles and user feedbacks are relatively poor. • Finally, we observe that the Average Precision is gen- erally greater than the Average Recall; this confirms the results obtained in [28]. As pointed out in this paper, such a feature is to be considered a positive characteristic for a recruitment system; in fact, in this application context, Precision is generally assumed to be more important than Recall since the user could be frustrated by many irrelevant proposals. Finally, it is worth pointing out that the results of this experiment confirm the results of the experiments about the tuning of γ described in the Appendix. In fact, in that case, we have obtained that, for a small number of queries (i.e., lesser than 10), the value of γ should be high (i.e., the WS strategy should tend to coincide with the PNF strategy); on the contrary, when the number of queries is high, the value of γ should be low (i.e., the WS strategy should tend to coincide with the 2-LSE strategy). D. Performance of our system in different application domains This series of experiments was devoted to determine the performance of our system in several application domains; some of them were very generic, other ones were more specialized. In all existing e-recruitment systems, job proposals can be hierarchically organized on the basis of the application domains they refer to; specifically, the most generic domains (e.g., "Health-Care" or "Information Technology") are located on the top of the hierarchy; on the contrary, the most spe- cialized ones (like "Biochemical Scientist") are located at the bottom. This hierarchy can be graphically represented by means of a tree; each node of the tree, with the exception of the root, represents a domain; a fragment of this tree is graphically shown in Figure 4. With regard to this classification tree, we say that the specialization level of a domain D is j if the depth of the node associated with D is j. As an example, the specialization level of the domain "Application Developer" is 3, since the depth of the node representing this domain is 3. In this test we have computed the Average Precision and the Average Recall obtained by our system when applied to four domains, namely "Information Technology", "Pharmacy", "Software Support" and "Biomedical Scientist", character- ized by different specialization levels. During this compu- tation we have used the WS strategy by setting γ(k) = max(cid:8)0, 1 − (cid:0) k−1 25 (cid:1)(cid:9), α = 0.55 and α′ = 0.5, α′′ = 0.6, α′′′ = 0.4. The obtained results are shown in Table I. From the analysis of this table it is possible to observe that, in general domains (i.e., domains at a specialization level 1 or 2), our system rapidly (i.e., after a few number of queries) obtains good results; however, this performance slightly worsens when the number of queries increases. On the contrary, in specific domains, our system needs several queries for achieving good results but, after this initial phase, it maintains, and even improves, its performance. This behaviour can be motivated by the following reasoning: during the first queries, users interested in general domains do not have a precise idea about their needs and, consequently, many of the provided recommendations appear interesting to them. On the contrary, users interested in specific domains have a precise idea of their desires already during the initial phase; as a consequence, it is more difficult to satisfy them during the first queries. When the number of queries increases, users of general domains "ripen" a more precise idea of their needs, but the application domain they are interested in is too generic to precisely satisfy their requirements; however, Table I shows that, even in these conditions, our system achieves quite good results. On the contrary, after many queries, the profiles of the users of specific domains are quite rich and this allows our system to precisely identify their needs and to significantly reduce the job proposals search space. E. Experimental comparison of our system with other e- recruitment prototypes Job Search - www.jobsearch.co.uk, system with We have experimentally compared our other, already available, ones. Specifically, the systems that we have taken into account were: (i) CareerBuilder - www.careerbuilder.com, (ii) 1job - www.1job.co.uk, (iii) (iv) - www.jobpilot.co.uk, and (v) Fish4Jobs - JobPilot www.fish4.co.uk/iad/jobs. These systems share various similarities; specifically, they operate on the Internet and manage an internal, relational database storing all available job proposals. In addition, they provide job seekers with a graphical interface to retrieve the job proposals they are interested in; a job seeker can use this interface to specify some constraints (e.g., the place where he would like to work), as well as a list of keywords describing the job typology of his interest. Finally, some of these systems allow each IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 11 ROOT Health Care Information Technology Research- Development Application Developer Network Administration ... ... Technical Support Software Support ... ... Medical Pharmacy Surgeon Paramedical ... ... Nurse ... Sales Consultant ... Research ... Biomedical Scientist ... Fig. 4. A fragment of a tree classifying job proposals Finance ... Financial Analyst Risk Management ... Investment Consultant ... ... PERFORMANCE OF OUR SYSTEM IN DIFFERENT APPLICATION DOMAINS TABLE I Domain Specialization Level Query 5 Query 10 Query 15 Query 20 Query 25 Information Technology Pharmacy Software Support Biomedical Scientist 1 2 3 4 Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec 0.73 0.68 0.54 0.49 0.67 0.63 0.52 0.46 0.76 0.72 0.61 0.60 0.70 0.69 0.58 0.56 0.74 0.79 0.80 0.81 0.68 0.71 0.72 0.73 0.72 0.78 0.85 0.86 0.65 0.70 0.73 0.76 0.68 0.77 0.86 0.90 0.61 0.69 0.75 0.82 user to construct a simple profile by filling a questionnaire; each profile stores user skills (e.g., the foreign languages he knows) as well as a brief curriculum vitae. Since the queries submitted by a job seeker consist of a list of keywords, each system must transform them into SQL queries; for this reason, the underlying DBMS must incorporate Information Retrieval (hereafter, IR) algorithms [29]. Our activity aimed at comparing the accuracy of our system against that of the other systems mentioned previously. To this purpose we asked each user of U Set to submit some queries; these were processed by the systems into examination and the corresponding Average Precision and Average Recall were computed. As for our system we have chosen the WS strategy and we have set γ(k) = max(cid:8)0, 1 − (cid:0) k−1 25 (cid:1)(cid:9), α = 0.55 and α′ = 0.5, α′′ = 0.6, α′′′ = 0.4. The results we have obtained are shown in Table II. From the analysis of this table, we can observe that the accuracy of our system is quite satisfying. This interesting result can be justified by the following reasoning: • In order to score available job proposals, the ranking function adopted by our system considers several aspects of the profile of a user, as well as his reaction to past proposals (see Sections III-B and IV-B); on the contrary, the ranking functions adopted by the other systems into examination consider only some constraints specified by the user (e.g., the salary he would like to earn). Taking into account a large number of issues makes our system more sensible to the real user exigencies; this justifies the improvement of the Average Precision w.r.t. the other systems into examination. • Our system suggests to users not only the job proposals exactly matching their queries but also those ones some- way semantically related to them. Hence, it is capable of suggesting potentially interesting job proposals that cannot be revealed by traditional IR algorithms; this implies an improvement of the Average Recall w.r.t. the other systems into examination. • Our system is capable of considering job proposals avail- able in several other systems; this contributes to improve both the Average Precision and the Average Recall w.r.t. the other systems into examination. However, neither Precision nor Recall alone are capable of completely capturing the "quality" of the proposals provided by e-recruitment systems. As an example, a key aspect of these systems regards their capability of correctly scoring their job proposals. To better clarify this concept, consider two e-recruitment systems, ERS1 and ERS2, that receive the same query from a user Ui and return the same set of results but in a reverse order: in other words, ERS1 returns the list hJ P1, J P2, . . . , J Pn−1, J Pni whereas ERS2 returns the list hJ Pn, J Pn−1, . . . , J P2, J P1i; this implies that ERS1 (resp., ERS2) rates J P1 (resp., J Pn) as the most relevant proposal for Ui and J Pn (resp., J P1) as the least relevant one. Finally, assume that Ui fully agrees with the suggestions provided by ERS1. In this case ERS1 and ERS2 return the same proposals and, consequently, obtain the same Average Precision and the same Average Recall; however, from the previous reasoning, it is possible to conclude that the "quality" of suggestions provided by ERS2 is lower than the quality of suggestions provided by ERS1: in fact, Ui must browse the whole list of suggestions provided by ERS2 to find the job proposal of his maximum interest and this might be both a boring and a time-consuming activity. To measure the ranking capability of an e-recruitment sys- tem we adopted the Newell Distance [30], a parameter defined in User Modelling theory. To define the Newell Distance associated with a user Ui and a system to evaluate Sj we need to consider a set J P Set of test job proposals and a pair of functions, sys and usr; sys (resp., usr) takes a job proposal J Pk ∈ J P Set as input and returns an integer p belonging to the set {1, 2, . . . , J P Set} as output; p indicates IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 12 TABLE II AVERAGE PRECISION AND AVERAGE RECALL OF THE SYSTEMS INTO EXAMINATION System Query 5 Query 10 Query 15 Query 20 Query 25 Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec Avg Pre Avg Rec Our System CareerBuilder 1job Job Search JobPilot Fish4Jobs 0.62 0.50 0.52 0.54 0.44 0.47 0.61 0.48 0.46 0.44 0.51 0.48 0.73 0.61 0.63 0.64 0.47 0.50 0.66 0.52 0.57 0.60 0.53 0.52 0.81 0.68 0.71 0.69 0.59 0.60 0.74 0.57 0.66 0.64 0.54 0.55 0.86 0.72 0.68 0.70 0.67 0.63 0.76 0.63 0.67 0.65 0.60 0.62 0.87 0.73 0.70 0.73 0.71 0.69 0.79 0.65 0.63 0.68 0.66 0.63 AVERAGE NORMALIZED NEWELL DISTANCE ACHIEVED BY THE SYSTEMS TABLE III INTO EXAMINATION System Query 5 Query 10 Query 15 Query 20 Query 25 Our System CareerBuilder 1job Job Search JobPilot Fish4Jobs 0.27 0.40 0.38 0.33 0.39 0.38 0.20 0.31 0.36 0.29 0.33 0.31 0.13 0.19 0.22 0.21 0.29 0.25 0.09 0.15 0.14 0.14 0.24 0.19 0.06 0.12 0.11 0.09 0.15 0.13 14 12 10 8 6 4 2 ) s e t y b K ( e z i S e g a r e v A that, according to Sj (resp., Ui), J Pk has the pth highest score among all job proposals existing in J P Set. 0 0 5 10 15 Number of Queries 20 25 The Newell Distance Nij associated with Ui and Sj is defined as Nij = PJ Pk∈J P Set w(usr(J Pk)) × usr(J Pk) − w(sys(J Pk)) × sys(J Pk) . Here w(i) is a weighting function defined as: w(i) = (cid:16) JP Set−i ; it assumes its maximum value when i = 1 and decreases when i increases; this implies that it gives a different importance to the errors possibly made by the system to evaluate; specifically, if a system is unable to detect the most important job proposal, it commits a more serious error than if it is not capable of identifying the least relevant ones. (cid:17)2 i The Newell Distance can be properly normalized in such a way to lie in the real interval [0,1]; specifically, if we indicate by N max the maximum value of the Newell Distance measured over all users and systems into consideration, the normalized Newell Distance can be defined as Nij = Nij N max . Observe that the lesser Nij is, the better a system works. In Table III we report the normalized Newell Distance, aver- aged on all users, obtained for the systems into examination. From the analysis of this table we observe that the Newell Distance obtained by our system is smaller than that obtained by the other systems into evaluation. In our opinion, this result is motivated by considering that: • The parameters adopted by our system for scoring avail- able job proposals are strictly related to the profile of a user, as well as to his reaction to past proposals; this enhances its capability of correctly identifying the most relevant job proposals. • Our system continuously monitors user behaviour and is capable of detecting if the relevance of a job proposal for a given user changes over time. On the contrary, the other systems we have considered in our experiments do not consider the possible modifications of user desires over time. From the previous experiments we can conclude that the recommendations provided by our system are more accurate than those supplied by the other systems into examination; this Fig. 5. Average size of user profiles against the number of queries carried out by users improvement is mainly due to quite a sophisticated manage- ment of information about user profiles and past behaviour. This information is combined with classical IR techniques exploited also by the other systems into consideration and allows the most appropriate answers for user needs to be found. On the other hand, our system requires an additional amount of space for storing user profiles; this is a problem affecting all systems handling and exploiting user profiles. In order to quantify the space requirements of our system for storing user profiles we have performed a final experiment. Specifically, we have computed the average size of user profiles (expressed in Kbytes) against the number of queries carried out by users. The obtained results are shown in Figure 5. From the analysis of this figure we can observe that, initially, user profiles are generally "poor" and, consequently, the storage space they require is negligible; when a user poses his queries, the system enriches the corresponding profile by inserting new topics. After a "reasonably large" number of queries (i.e., after about 10 queries) user profiles become rich and occupy a certain amount of space; however, this space occupation does not increase during the next queries; in fact, when user profiles become excessively large, the system activates a pruning task in such a way that the number of new topics inserted in a profile is approximately equal to the number of topics removed from it; as a consequence, after 15 queries, the average size of user profiles remains quite constant (specifically, it is about 10 Kbytes). The previous analysis shows that the quantity of space our system needs for storing user profiles is limited and acceptable; moreover, since user profiles are implemented in XML, it is possible to apply the methodologies illustrated in [31] for handling their space occupation in a more efficient way. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 13 VI. RELATED WORK Even if e-recruitment is quite a novel research area, sev- eral systems devoted to handle such an activity have been already presented in the literature. In this section we aim at positioning our system amongst other related ones. In order to carry out this activity, we have considered three terms of comparison, namely: (i) Purpose: e-recruitment systems can be classified as company oriented, if they aim at supporting companies in the selection of new candidates, and seeker oriented, if they support users looking for new job proposals; (ii) Architecture: e-recruitment systems could be centralized, if a single computational entity is in charge of managing all activities, distributed, if tasks are partitioned among several computational entities, and mixed, if some tasks are performed in a centralized fashion and other ones are carried out in a distributed way; (iii) User Profile Construction: e-recruitment systems might be obtrusive, if they interact with the user for constructing his profile, or unobtrusive, if they learn the profile of a user by monitoring his accesses to the system. On the basis of these terms of comparison our system can be considered seeker oriented, mixed and unobtrusive. In the following we compare our approach with other related ones and highlight similarities and differences existing among them. Table IV provides a summary of the in-depth comparison we carry out in the following subsections. A. Approach of [32] [32] proposes a recommender system devoted to support users looking for new job proposals. The system operates as follows: (i) it classifies each user according to his personal traits (e.g., shy/sociable or talktive/taciturn); (ii) a user queries it to retrieve new job proposals; (iii) it ranks retrieved job proposals according to their similarity to the personal traits of the user. There are some similarities between our approach and [32]; in fact, both of them: (i) are seeker oriented; (ii) can cooperate with existing e-recruitment Web sites; (iii) classify job proposals according to their relevance for the user. As for differences, we may notice that: (i) in [32] user profiles are constructed by means of psychological tools (e.g., questionnaires) whereas our system obtains information about users unobtrusively, by watching their interactions with it; (ii) in [32] no mechanisms for user profile update are provided; (iii) the architecture of [32] is centralized whereas our system is mixed, since the Recruitment Agent performs most of the activities connected with the selection of the job proposals best fitting user exigencies, but User Agents, Wrapper Agents and Company Agents continuously cooperate with the Re- cruitment Agent for performing the whole recruitment task (see Section II). Interestingly enough, our system might inherit some features typical of the approach of [32]; specifically, the user profiles managed in our system might include information about user personal traits, analogous to that handled in [32], to enhance the job search process. B. Approach of [33] In [33] the authors present a probabilistic e-recruitment system that uses both content-based and collaborative filter- ing techniques to produce recommendations. There are some similarities between our approach and that described in [33]; more specifically, both of them: (i) provide a mechanism for automatically and unobtrusively learning user preferences; (ii) take into account the user feedback that influences the system behaviour: specifically, in our approach, the knowledge of the job proposals accepted/rejected by the user is exploited for automatically tuning the system audacity; analogously, in [33], user preferences influence the coefficients of the probabilistic model adopted for deriving recommendations; (iii) are seeker oriented. As for differences, we may notice that: (i) [33] exploits a probabilistic model for deducing new recommendations; such an approach is very refined but it might be excessively time-consuming; (ii) our system is mixed whereas the approach of [33] is centralized; (iii) the approach of [33] is hybrid, whereas our own is content-based. C. CASPER In [28], [34] the system CASPER is described. CASPER is a client-server system that separately exploits collaborative filtering and content-based techniques to provide new job recommendations. There are some similarities between our approach and CASPER; in fact, both of them: (i) are seeker oriented; (ii) construct user profiles by unobtrusively monitor- ing user activities; (iii) follow similar criteria for estimating user preferences; (iv) are mixed. As for differences we may notice that: (i) CASPER can operate either as a content- based or as a collaborative filtering recommender system; on the contrary, our system is content-based; (ii) CASPER does not provide tools for modelling the semantics of a job proposal; on the contrary, our approach uses an XML Schema for representing the main features of each job proposal; these features play a key role during the recommendation process. D. Personnel Mall In [35] the Personnel Mall system is proposed. Personnel Mall is an agent based platform conceived for matching job seekers with companies in a distributed (and electronic) job marketplace. Specifically, Personnel Mall defines a set of rules to represent and manage the preferences/exigencies of job seekers and companies and uses them during the matching process. There are some similarities between our approach and Personnel Mall; in fact, both of them: (i) use the agent technology to perform e-recruitment activities; (ii) model job marketplace as a complex system in which heterogeneous components (i.e., companies and individuals) incessantly in- teract. As for differences, we may observe that: (i) Personnel Mall is company oriented; (ii) in Personnel Mall the matching between a job seeker and a job proposal depends not only on subjective variables (e.g., the personal interests of a user) but also on economic parameters (e.g., the quantity of labor that companies would like to hire for a certain wage and the quantity of labor that a job seeker would like to supply); (iii) Personnel Mall aims at maintaining the conditions of equilibrium in the job marketplace: as an example, it is capable of dynamically raising/lowering wages in response to labor surpluses/shortages; such a feature is not present in our system; IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 14 TABLE IV A COMPARISON OF SOME E-RECRUITMENT SYSTEMS System Purpose Architecture User Profile construction Additional Features Our approach Supjarerndee et al. [32] Farber et al. [33] CASPER [28], [34] Personnel Mall [35] Dafoulas et al. [36] CommOnCV [37] e-SRS [38] Seeker Oriented Seeker Oriented Seeker Oriented Seeker Oriented Company Oriented Company Oriented Seeker Oriented Company Oriented Mixed Centralized Centralized Mixed Distributed Centralized Centralized Distributed Unobtrusive Obtrusive Unobtrusive Unobtrusive Obtrusive Obtrusive Obtrusive Obtrusive It exploits Agent Technology and XML It considers the personal traits of a user It is an hybrid recommender system It separately exploits content based and collaborative filtering techniques It exploits the agent technology and a matching algorithm It allows online interviews to be performed It exploits Semantic Web languages to model a curriculum vitae It exploits both psychometric techniques and clustering algorithms to recruit candidates (iv) Personnel Mall does not provide mechanisms for updating the preferences and the exigencies of job seekers; (v) Personnel Mall is obtrusive; (vi) Personnel Mall is distributed; on the contrary, our system is mixed. each interest. However, it should be taken into account that the exploitation of a network, instead of a list, for representing user interests, would cause an increase of the computational complexity of our system. E. Approach of [36] G. e-SRS In [36] an agent based approach for supporting e- recruitment activities is proposed. This system embodies the functionalities typical of a traditional e-recruitment Web site (e.g., a user can insert/update his profile, a company can post new job proposals, and so on); moreover, it allows companies to perform an on-line interview of candidates; this interview is useful for both companies (that can perform a preliminary screening of candidates) and job seekers (that can enrich their profiles by storing their past interviews). It is possible to identify only few similarities between our approach and [36]; specifically, both of them: (i) define and manage user profiles; (ii) use the agent technology. As for differences we observe that: (i) [36] is company oriented; (ii) [36] provides a layered and centralized architecture whereas our approach is mixed; (iii) [36] is obtrusive. F. CommOnCV In [37] the authors propose CommOnCV, a system capable of representing and managing a curriculum vitae by means of Semantic Web tools. The approach implemented by Com- mOnCV is based on the concept of competency that is used to represent the knowledge/skills owned by a job seeker; competencies are defined and described by means of suitable ontologies. In addition, CommOnCV defines a curriculum vitae as a network of competencies and represents it by means of Se- mantic Web languages, like RDF/RDFs or DAML+OIL. There are some similarities between our approach and CommOnCV; in fact, both of them: (i) exploit ontologies to allow companies and job seekers to have a common reference for representing competencies and tasks; (ii) represent the contents of a job proposal or a curriculum vitae by means of suitable tools (i.e., XML in our approach, and Semantic Web languages in [37]); (iii) are seeker oriented. As for differences, we may observe that: (i) CommOnCV is centralized and obtrusive whereas our approach is mixed and unobtrusive; (ii) CommOnCV is not a recommender system. Our system might inherit some features from CommOnCV. Specifically, analogously to CommOnCV, it might represent a user profile as a network of interests, instead of a list of topics; such a choice would allow a better comprehension of the relationships existing among user interests, as well as a better evaluation of the relevance of In [38] a multi-agent platform, called e-SRS (e-Sales Re- cruitment System), for recruiting and benchmarking sales persons, is proposed. e-SRS exploits psychometric tools (e.g., questionnaires) for classifying each user in a specific category; it considers four user categories representing specific behav- ioral models (e.g., if a user rarely/frequently trusts others, if a user is/is not aggressive, and so on). This categorization can be improved by applying a suitable clustering algorithm (fuzzy K-means). The obtained results can be considered by a human expert for selecting the best candidates. There are some simi- larities between our approach and e-SRS. In fact, both of them: (i) exploit the agent technology and artificial intelligence tools to overcome the limitations of existing recruitment services; (ii) construct, handle and exploit accurate user profiles. As for differences, we may observe that: (i) e-SRS is company oriented; (ii) it is obtrusive; (iii) it is distributed, whereas our system is mixed; (iv) it is very specific, since it has been conceived for managing the recruitment of sales persons; on the contrary, our approach is generic, since it can support the recruitment activities in several professional areas; due to this reason, e-SRS produces accurate and refined results in its application area but its extension to other professional categories seems to require a valuable effort. e-SRS might be combined with our approach; specifically, in both the recruitment and the benchmark of sales persons, it might take into account not only the behavioural aspects of a job candidate but also his preferences and "constraints". VII. CONCLUSIONS AND HINTS FOR THE FUTURE In this paper we have presented an XML-based, multi- agent system for supporting e-recruitment services. We have seen that our system is characterized by various interesting capabilities, namely: (i) it allows a uniform management of heterogeneous job proposals; as a consequence, a job seeker can pose his queries across different, and presumably hetero- geneous, job databases; (ii) it is agent- and XML-based; as a consequence, it can easily cooperate with company informa- tion systems; (iii) the job proposal selection algorithm takes into account information about possible interests that the user did not consider in the past but that appear to be potentially interesting for him in the future; (iv) it is capable of handling IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 15 different recommendation strategies; (v) its recommendation strategies encompass some mathematic tools already applied in many fields. In the paper we have illustrated our system in detail, we have shown the obtained experimental results and, finally, we have compared it with other related systems already presented in the literature. Various application contexts might benefit from our research efforts. Some of the most promising ones are the following: • Team Building. In many organizations it is necessary to match individuals for composing a team working on the same project. Such an activity, often called team building or partnership building [39], is becoming an increasingly popular strategy for encouraging and boosting production. Team building has been studied in a large variety of scientific areas: for instance, Human Resource based approaches consider the skills and the abilities owned by each individual as a leading criterium to compose teams; analogously, sociological and psychological ap- proaches focus on the role of trust among individuals as a key element for the success of a team. Team building activities generally consist of two phases, namely: (i) identification of potential members of a team, and (ii) choice of individuals that really compose a team, among the previously defined potential candidates. As observed in [39], while various Web sites offer tools for effectively carrying out phase (i), decision support for phase (ii) is still rudimentary. In our opinion, our system might offer a concrete contribution in this area. Specifically, since our approach manages a large volume of data stored in user profiles, it can elaborate this information to compute the "affinity degree" existing among two individuals. In other words, an analysis of the personal features of an individual, as well as of its preferences and exigencies, allows managers: (i) to assign each individual to a team; (ii) to predict if trust can be established among the potential members of a team, even if they do not share a common work history. • Task Assignment. A classical activity of Human Resource managers consists of associating individuals to tasks; this activity should be carried out in such a way to exalt the skills and the capabilities of individuals. Since this activ- ity has a great impact on the business success, an exten- sive research on it has been performed in the past [40]. In our opinion our system could be used to effectively solve the problem of assigning individuals to tasks. Specifically, information stored in user profiles could be exploited for capturing user aptitudes/preferences whereas the XML- based model describing job proposals could be used for representing task features. A matching between a user profile and a job proposal description could be adopted for computing the so called Person-Job Fit (PJF), a pa- rameter used by psychologists to measure the suitability of a candidate for a specific job. • Outsourcing. In recent past businesses have outsourced a large variety of activities for improving the quality of services and products, for reducing the duration of the production cycle and for lowering costs. However, an excessive reliance on outsourcing may negatively affect business performance: for instance, it might lead to a reduced technological innovation [41] or to a limited ca- pability of competing with outsourcing partners [42]. Our system could be adopted to support business managers to decide about the effectiveness of an outsourcing activity; specifically, it might analyze the information stored in user profiles for assessing the capability of the internal components of an organization of executing a given task and to evaluate if it is/is not convenient its outsourcing. As for future work, we plan to contribute to the imple- mentation of the ideas mentioned previously. In addition, we plan to enrich our system by providing it with more powerful algorithms that try to predict the future interests of a user, as well as by designing and implementing modules for supporting companies looking for candidates. This last feature would allow the realization of a hybrid e-recruitment system, embodying the functionalities of both seeker oriented and company oriented systems. Finally, we plan to study the possibility to integrate our system with an e-learning framework for realizing a system capable of suggesting (and, next, teaching) to a user the skills he should acquire for accessing new, more appealing, job proposals. [1] "Bureau of labor REFERENCES statistics, U.S. Department of Labor." http://stats.bls.gov/opub/ted/2002/nov/wk1/art03.htm. [2] F. Liu, C. Yu, and W. Meng, "Personalized Web search for improving retrieval effectiveness," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 1, pp. 28 -- 40, 2004. [3] P. Resnick and H. Varian, "Recommender systems," Communications of the ACM, vol. 40, no. 3, pp. 56 -- 58, 1997. [4] H. Lieberman, "Letizia: An agent that assists Web browsing," in Proc. of the International Joint Conference on Artificial Intelligence (IJCAI' 95). Montreal, Quebec, Canada: Morgan Kaufmann, 1995, pp. 924 -- 929. [5] M. He, N. Jennings, and H. Leung, "On agent-mediated electronic commerce," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 4, pp. 985 -- 1003, 2003. [6] O. Zaiane, "Building a recommender agent for e-learning systems," in Proc. of the International Conference on Computers in Education (ICCE 2002). Auckland, New Zealand: IEEE Press, 2002, pp. 55 -- 59. [7] M. Wooldridge, An Introduction to MultiAgent Systems. Chichister: John Wiley & Sons, 2002. [8] R. Lawrence, G. Almasi, V. Kotlyar, M. Viveros, and S. Duri, "Person- alization of supermarket product recommendations," Data Mining and Knowledge Discovery, vol. 5(1-2), pp. 11 -- 32, 2001. [9] D. Gilsinn, H. Bandy, and A. Ling, "A spline algorithm for modeling cutting errors on turning centers," Journal of Intelligent Manufacturing, vol. 13, no. 5, pp. 391 -- 401, 2002. [10] S. Sadray, S. Rezaee, and S. Rezakhah, "Non-linear heteroscedastic regression model for determination of methotrexate in human plasma by high-performance liquid chromatography," Journal of Chromatography B, Analytical Technologies in the Biomedical and Life Sciences, vol. 787, no. 2, pp. 293 -- 302, 2003. [11] L. Yikang, "Low-pass filtered least squares estimators of cointegrating vectors," Journal of Econometrics, vol. 85, no. 2, pp. 289 -- 316, 1998. [12] A. Cesta and D. D'Aloisi, "Building interfaces as personal agents: a case study," ACM SIGCHI Bullettin, vol. 28, no. 3, pp. 108 -- 113, 1996. [13] C. Hsinchun, C. Yi-Ming, M. Ramsey, and C. Yang, "An intelligent per- sonal spider (agent) for dynamic Internet/intranet searching," Decision Support System, vol. 23, no. 1, pp. 41 -- 58, 1998. [14] B. Grosof and Y. Labrou, "An approach to using XML and a rule-based content language with an agent communication language," in Proc. of the IJCAI-99 Workshop on Agent Communication Language, Stockolm, Sweden, 1999, pp. 96 -- 117. Web [15] "World Consortium Wide - XML query," http://www.w3.org/XML/Query. [16] "Document Object Model," http://www.w3.org/DOM/. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 37, NO. 4, 2007 16 [40] M. O'Connell, D. Doverspike, A. Cober, and J. Philips, "Forging work-teams: Effects of the distribution of cognitive ability on team performance," Applied Human Resource Management Research, vol. 6, pp. 115 -- 128, 2001. [41] M. Kotabe, Global sourcing strategy: R&D, manufacturing, and mar- keting interfaces. New York, United States: Quorum, 1992. [42] K. Gilley, C. Greer, and A. Rasheed, "Human resource outsourcing and organizational performance in manufacturing firms," Journal of Business Research, vol. 57, no. 3, pp. 232 -- 240, 2004. [17] N. Haque, N. Jennings, and L. Moreau, "Resource allocation in com- munication networks using market-based agents," International Journal on Knowledge Based Systems, vol. 18, no. 4 -- 5, pp. 163 -- 170, 2005. [18] R. Dash, D. Parkes, and N. Jennings, "Computational mechanism design: A call to arms," IEEE Intelligent Systems, vol. 18(6), pp. 40 -- 47, 2003. [19] R. Carreira, J. Crato, D. Goncalves, and J. Jorge, "Evaluating adaptive user profiles for news classification," in Proc. of the International Conference on Intelligent User Interface (IUI 2004). Funchal, Madeira, Portugal: ACM Press, 2004, pp. 206 -- 212. [20] A. Thor and E. Rahm, "AWESOME - a data warehouse-based system for adaptive website recommendations," in Proc. of the International Conference on Very Large Databases (VLDB 2004). Toronto, Canada: Morgan Kaufmann, 2004, pp. 384 -- 395. [21] J. Wahba and Y. Zenou, "Density, Social Networks and Job Search Methods: Theory and Application to Egypt," The Research Insti- tute of Industrial Economics, Tech. Rep. 629, 2004, available at http://ideas.repec.org/p/hhs/iuiwop/0629.html. [22] J. Han and M. Kamber, Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2001. [23] R. Baeza-Yates and B. Ribeiro-Neto, Modern Information Retrieval. Addison Wesley Longman, 1999. [24] G. Golub and C. V. Loan, Matrix Computations, third edition. Hopkins University Press, 1996. Johns [25] V. Pan, "Solving a Polynomial Equation: Some History and Recent Progress," SIAM Review, vol. 39, no. 2, pp. 187 -- 220, 1997. [26] D. Bertsekas, Nonlinear Programming. Belmont, Massachusets, USA: Athena Scientific, 1999. [27] FIPA, "Foundation for Intelligent Physical Agents Specifications," http://www.fipa.org. [28] K. Bradley and B. Smyth, "Personalized information ordering: a case study in online recruitment," Knowledge-Based Systems, vol. 16, no. 5-6, pp. 269 -- 275, 2003. [29] V. Hristidis, L. Gravano, and Y. Papakonstantinou, "Efficient IR-style keyword search over relational databases," in Proc. of the International Conference on very large Databases (VLDB 2003), Berlin, Germany, 2003, pp. 850 -- 861. [30] S. Newell, "User models and filtering agents for improved internet information retrieval," User Modeling and User-Adapted Interaction, vol. 7, no. 4, pp. 223 -- 237, 1997. [31] H. Jagadish, S. Al-Khalifa, A. Chapman, L. Lakshmanan, A. Nierman, S. Paparizos, J. Patel, D. Srivastava, N. Wiwatwattana, Y. Wu, and C. Yu, "TIMBER: A native XML database," The VLDB Journal, vol. 11, no. 4, pp. 274 -- 291, 2002. [32] S. Supjarerndee, Y. Temtanapat, and U. Phalavonk, "Recruitment filter- ing with personality-job fit model," in Proc. of the IEEE International Conference on Information Technology: Coding and Computing (ITCC 2002). Las Vegas, Nevada, United States: IEEE Computer Society, 2002, pp. 46 -- 53. [33] F. Farber, T. Keim, and T. Weitzel, "An automated recommendation approach to personnel selection," in Proc. of the Americas Conference on Information Systems (AMCIS'2003). Tampa, Florida, United States: Association for Information System Electronic Library, 2003, pp. 2329 -- 2339. [34] R. Rafter, K. Bradley, and B. Smyth, "Automated collaborative filtering applications for online recruitment services," in Proc. of the Interna- tional Conference on Adaptive Hypermedia and Adaptive Web-Based Systems (AH 2000). Trento, Italy: Lecture Notes in Computer Science, Springer Verlag, 2000, pp. 363 -- 368. [35] W. Gates and M. Nissen, "Designing agent-based electronic employment markets," Electronic Commerce Research, vol. 1, no. 3, pp. 239 -- 263, 2001. [36] G. Dafoulas, A. Nikolaou, and M. Turega, "E-Services in the Internet Job Market," in Proc. of the Hawaii International Conference on System Sciences (HICSS '03). Big Island, Hawaii, United States: IEEE Computer Society, 2003. [37] M. Harzallah, M. Leclere, and F. Trichet, "CommOnCV: modelling the competencies underlying a curriculum vitae," in Proc. of the Interna- tional Conference on Software Engineering and Knowledge Engineering (SEKE'02). Ischia, Italy: ACM Press, 2002, pp. 65 -- 71. [38] R. Khosla and T. Goonesekera, "An online multi-agent e-sales recruit- ment system," in Proc. of the IEEE/WIC International Conference on Web Intelligence (WI 2003). Halifax, Canada: IEEE Computer Society Press, 2003, pp. 111 -- 117. [39] T. Keim and T. Weitzel, "An integrated approach to online partnership building," in Proc. of the Hawaiian International Conference on System Sciences (HICSS '05). Big Island, Hawaii, United States: IEEE Computer Society Press, 2005.
1902.01024
1
1902
2019-02-04T03:43:47
Cooperative Driving at Unsignalized Intersections Using Tree Search
[ "cs.MA" ]
In this paper, we propose a new cooperative driving strategy for connected and automated vehicles (CAVs) at unsignalized intersections. Based on the tree representation of the solution space for the passing order, we combine Monte Carlo tree search (MCTS) and some heuristic rules to find a nearly global-optimal passing order (leaf node) within a very short planning time. Testing results show that this new strategy can keep a good tradeoff between performance and computation flexibility.
cs.MA
cs
Cooperative Driving at Unsignalized Intersections Using Tree Search Huile Xu, Yi Zhang, Member, IEEE, Li Li, Fellow, IEEE, and Weixia Li 1 9 1 0 2 b e F 4 ] A M . s c [ 1 v 4 2 0 1 0 . 2 0 9 1 : v i X r a Abstract -- In this paper, we propose a new cooperative driv- ing strategy for connected and automated vehicles (CAVs) at unsignalized intersections. Based on the tree representation of the solution space for the passing order, we combine Monte Carlo tree search (MCTS) and some heuristic rules to find a nearly global-optimal passing order (leaf node) within a very short planning time. Testing results show that this new strategy can keep a good tradeoff between performance and computation flexibility. Index Terms -- Connected and Automated Vehicles (CAVs), cooperative driving, unsignalized intersection, Monte Carlo tree search (MCTS). I. INTRODUCTION C ONNECTED and Automated Vehicles (CAVs) are be- lieved to be a key role in the next-generation transporta- tion systems [1]. With the aid of vehicle-to-vehicle (V2V) communication, CAVs can share their driving states (position, velocity, etc.) and intentions with adjacent vehicles [2], [3] to better coordinate their motions to alleviate traffic congestion and improve traffic safety. In the last decade, various strategies had been proposed to make optimal coordination for CAVs at a typical driving scenario: unsignalized intersection. It is pointed out in [4] and [5] that the key problem is to determine the optimal order of CAVs that passed the intersection. As summarized in [6], there are two kinds of cooperative driving strategies, planning based and ad hoc negotiation based, for determining the passing order. Planning based strategies aim to enumerate all possible passing orders to find the globally optimal solution [7]. There are two equivalent formulations of the problem. Most state-of- the-art studies formulate the problem as a mixed integer linear programming problem of vehicles' passing time scheduling [1], [8]. The objective is usually set to minimize the total delay of all CAVs. Li et al. showed that we can also view this problem as a tree search problem. Each tree node indicates a Manuscript received in February 4, 2019; This work was supported in part by National Natural Science Foundation of China under Grant 61673233, 61790565, 61603005, and the Beijing Municipal Commission of Transport Program under Grant ZC179074Z. (Corresponding author is Li Li). H. Xu is with Department of Automation, Tsinghua University, Beijing 100084, China. (E-mail: [email protected]) Y. Zhang is with Department of Automation, BNRist, Tsinghua University, Beijing 100084, China and also with Berkeley Shenzhen Institute (TBSI), Tower C2, Nanshan Intelligence Park 1001, Xueyuan Blvd., Nanshan District, Shenzhen 518055, China. (E-mail: [email protected]) L. Li is with Department of Automation, BNRist, Tsinghua University, Bei- jing 100084, China. (Tel:+86(10)62782071, E-mail: [email protected]). W. Li is with Department of Automation, Tsinghua University, Beijing 100084, China. (E-mail: [email protected]) special (partial) passing order. The equivalent objective is to find the leaf node corresponds to the minimum total delay of all CAVs [4], [5]. It was shown in [9] that some planning based strategies work well for ramp metering scenarios. However, the time to enumerate all the nodes increases sharply as the number of vehicles increases, especially for unsignalized intersection scenarios. This problem hinders their applications in practice. Ad hoc negotiation based strategies aim to find an accept- able passing order using some heuristic rules within a very short time. For example, Stone et al. proposed autonomous intersection management (AIM) cooperative driving strategy which divides the intersection into grids (resources) and assigns these grids to CAVs in a roughly First-In-First-Out (FIFO) manner [10], [11]. This strategy has several variations, including reservation strategy [12]. However, as shown in [6], the passing orders found by ad hoc negotiation based strategies were not good enough in many situations. To keep a good tradeoff between performance and computa- tion flexibility, we propose a new cooperative driving strategy based on the tree representation of the solution space for the passing order. Its key idea is to use the limited planning time to explore the nodes that are potential to be the optimal solution. To this end, we combine Monte Carlo tree search (MCTS) and some heuristic rules to accelerate the searching process, since the solution space of this problem has special structures to be exploited. Testing results show that we can find a nearly global-optimal passing order within a short enough planning time. To give a better presentation of our finding, the rest of this paper is arranged as follows. Section II formulates the problem and briefly reviews the existing strategies. Section III presents the new strategy. Section IV validates the effectiveness of the proposed strategy via numerical testing results. Finally, Section V gives concluding remarks. II. PROBLEM FORMULATION Fig. 1 shows a typical intersection scenario with multiple lanes in each leg. The area within the circle is called the control zone, and the shadow area is called the conflict zone where lateral collisions might happen. According to the geometry of the intersection, the conflict zone can be further divided into several conflict subzones. We assign each vehicle that enters the control zone a unique to denote the conflict identity Vi. We also use the set Zi subzones that Vi will pass through. For example, Zi = {4, 1} means Vi will pass through Conflict Subzone 4 and Conflict Subzone 1 in sequence. 2 Fig. 2. An intersection scenario with 5 vehicles. indicates the first vehicle in a special passing order. The nodes in the third layer refer to one string consisting of two indices symbols that indicate the first two vehicles in a special passing order. Similarly, the child nodes expand their child nodes, and all possible passing order are generated as leaf nodes in the bottom layer of the solution tree as shown in Fig. 3. Fig. 3. The solution tree stemmed from the intersection scenario shown in Fig. 2. The leaf nodes in the bottom layer represent the complete passing orders for all vehicles. If a (partial) passing order is given, the desired arrival times for all the vehicles that has been covered in this (partial) passing order can be directly derived by the following Passing Order to Trajectory Interpretation Algorithm. Our objective turns to seek the leaf node that corresponds to the shortest total delay. Moreover, the total delay values of leaf nodes can be used to evaluate the potential of their parent nodes in a backpropagation way. This method provides us a chance to find a nearly global-optimal leaf node but only search a small part of the whole tree. In Algorithm 1, P (i) is the ith element in the input (partial) passing order, tmax,z is the largest arrival time that the subzone Fig. 1. A typical intersection scenario. To simplify the problem, we adopt the following assump- tions: • Each vehicle instantly and thoroughly shares its driving states (position, velocity, etc.) and intentions with other vehicles via vehicle-to-vehicle (V2V) communication. • Changing lane maneuver is prohibited in the control zone to ensure vehicle safety. • Similar to [12] and [13], the velocities of vehicles are constant when passing through the conflict zone. The cooperative driving strategy aims to minimize the total delay of vehicles by scheduling the velocity and acceleration profiles of all vehicles [14]. So, we can get the following optimization problem n(cid:88) (tassign,i,Zi(1) − tmin,i,Zi(1)) min J = (1) i=1 where tassign,i,z is the desired arrival time to the conflict subzone z for Vi, tmin,i,z is the minimum arrival time to the conflict subzone z when Vi travels at the maximum velocity and the maximum acceleration, Zi(1) is the first element in the set Zi, n is the number of vehicles in the control zone. To directly attack Problem (1) often leads to a mixed integer linear programming (MILP) problem whose computation time increases exponentially with the increase of the number of vehicles [8], [9]. Noticing that the traffic efficiency mainly depends on the passing order of vehicles [6], we can formulate the whole problem as a tree search problem in the solution space that consists of all possible passing orders. Each leaf node repre- sents a passing order of vehicles which can also be denoted as a string [5]. For example, string CAB means vehicle C, vehicle A, and vehicle B enter the conflict zone sequentially. Let us take the intersection scenario shown in Fig. 2 as an example to explain how to build the tree representation of the solution space gradually . At first, we set the passing order in the root node to be empty. Then, each direct child node of the root node (in the second layer) refers to one index symbol that Lane 1Lane 2Lane 3Lane 4Lane 5Lane 6Lane 7Lane 8Lane 9Lane 10Lane 11Lane 12Control ZoneConflict ZoneADCEB1234RootABCDC AC BC DC EC B AC B DC B EC B D AC B D EC B D A EC B D E A Algorithm 1 Passing Order to Trajectory Interpretation Input: A (partial) passing order P Output: The total delay J of the covered vehicles and their arrival times tassign for each z ∈ Zi do 1: for each i ∈ [1, length(P )] do 2: 3: 4: 5: 6: Vj is the last vehicle that passed through subzone z tassign,P (i),z = max(tmin,P (i),z, tmax,z + ∆j,a) end for Adjust tassign,P (i),z according to the constraint: the velocity of Vi in the conflict zone is constant. for each z ∈ Zi do tmax,z = tassign,P (i),z 7: 8: 9: 10: end for end for 11: J =(cid:80)length(P ) i=1 tassign,P (i),Zi(1) z has been occupied. ∆j,a is the minimum safety gap between two consecutive vehicles passing through the same subzone. the time complexity of Algorithm 1 is O(n). Obviously, A detailed explanation of Algorithm 1 can be found in our previous report [7]. III. MCTS BASED COOPERATIVE DRIVING STRATEGIES It is usually impossible to expand all the nodes of the solution tree within the limited computation budget, when there are lots of vehicles in the control zone. In this paper, we use MCTS + heuristic rules to select nodes with the potential to be the optimal solution. The recent success of the MCTS method in the game of Go shows it is an effective way to deal with such problems [15], [16]. A. The Classical MCTS Based Strategy In MCTS, each node in the formulated tree will be assigned a score to evaluate its potential. The score of a leaf node is equal to the total delay of its corresponding passing order. MCTS uses these scores to determine which branch of tree to explore. Generally, MCTS gradually builds a search tree in an iteration way. One iteration consists of four steps: selection, expansion, simulation, and backpropagation [17]; see Fig. 4. 1) Selection: Starting at the root node, we select the most urgent expandable node based on the following policy [18] arg max i Qi + C (2) where Qi is the score of child node i and the value of Qi is within [0, 1]. n is the number of times the current node has been visited, ni is the number of times child node i has been visited, and C is a weighting parameter. The child node with the largest total score is selected. (cid:114) ln n ni 3 Here, an expandable node refers to a node that is not a leaf node and has unvisited child nodes. This child node selection policy is suggested in the field of computer Go and is called UCB1 [18]. The first term in the equation encourages to select the child node that is currently believed to be optimal, while the second term encourages to explore more child nodes. 2) Expansion: We randomly select one unvisited child node of the most urgent expandable node to be a new node that is added to the tree. 3) Simulation: We run several rollout simulations to de- termine a complete passing order based on the partial passing order represented by the current new node to evaluate the potential of the new node. The classical MCTS randomly samples and adds the uncovered vehicles into the passing order string one by one, until we find a complete passing order string and reach the maximum depth of the tree from the current new node without branching [16]. For example, when we apply random sampling policy to the node CB shown in Fig. 4, we can randomly expand a direct child node in its next layer; say node CBA. The node CBA will be further expanded by repeating such a process until a leaf node (e.g., node CBADE) is reached. Finally, the partial passing order will be evaluated by all its simulated off-spring leaf nodes (passing orders). Sometimes, the generated passing order is not invalid, because it may violate the prohibition of lane change, such solutions will be discarded after check. After simulation, we update the scores of the current new node as follows: i Apply Algorithm 1 to calculate the total delay ¯Ji of the partial order corresponds with the current new node. ii Apply Algorithm 1 to calculate the total delay Ji of the partial order corresponds with the best off-spring node of the current new node via simulation. iii Calculate the score Qi of the current new node as Qi = ω ¯Ji + (1 − ω) Ji (3) where ω is a weighting parameter. Since Qi ∈ [0, 1], we normalize ¯Ji and Ji into [0, 1] before updating Qi. 4) Backpropagation: The simulation result is backpropa- gated through the selected nodes to update the scores of all its parent nodes. During the building process of the search tree, the state-of- the-art best passing order is continuously updated. As soon as the computation budget is reached, the search terminates and returns the state-of-the-art best passing order. The planned ar- rival times of vehicles can be determined by using Algorithm 1. The velocity and acceleration profiles of each vehicle plan will be finally calculated by using the motion planning method proposed in [14]. We can see that the performance of the proposed strategy is influenced by the choice of the parameters including the maximum search time and two weighting parameters C and 4 Algorithm 2 Heuristic Simulation Policy Input: Locations and velocities of all vehicles Output: A possible passing order 1: Among all uncovered vehicles, we select the vehicles which are the closest to the conflict zone in each lane as candidate vehicles and calculate their arrival times to all conflict subzones. 2: If there exists a candidate vehicle whose arrival times to all conflict subzones are all the smallest, we add it into the passing order string. If not, we randomly select one vehicle among all candidate vehicles and add it into the passing order string. 3: Then we repeat the steps 1 and 2 until a complete passing order string is generated. 4: The objective value (1) of the generated passing order can be easily derived by Algorithm 1 and denoted as q2,i. is assumed to be a Poisson process. We vary the mean value of this Poisson process to test the performance of the proposed strategy under different traffic demands. The vehicles arrival rates at all lanes are the same unless otherwise specified. It should be pointed out that we had tested other intersections with different road geometries and various vehicle arrival patterns, but the conclusions remain unchanged. To accurately describe the total delays of vehicles, we adopt the point-queue model in the simulation [6], [19]. The model assumes vehicles travel in free flow state until it gets to the boundary of the intersection we study. If the preceding vehicle leaves enough spaces, the first vehicle in the point-queue will dequeue and enter the intersection. Otherwise, it will stay in the virtual queue. Each lane has an independent point-queue. In this paper, we reschedule the passing order of all the vehicles within the control zone every 2 seconds. As sug- gested in [6], we set the minimum safety gap between two consecutive vehicles passing through the same subzone as a slightly enlarged constant as 1.5s a = 1 2s a = 2 1.5s a = 3 ∆j,a = (go straight) (turn left) (turn right) (4) to avoid the collisions caused by position measurement errors and communication delay. Fig. 4. One iteration of the MCTS based cooperative driving strategy. ω. We will discuss how to choose these parameters in Section IV below. B. The MCTS + Heuristic Rules As aforementioned, the classical MCTS strategy uses ran- dom sampling to generate a leaf node (a passing order) in the simulation step. However, because of the huge number of possible passing orders, the passing orders generated by random sampling cannot help us quickly capture the real potential of a node during simulation. Thus, we propose the following heuristic rules to help decide which nodes (vehicles) should be expanded (added into the candidate passing order string) during simulation. Heuristic rule 1 helps to quickly prune the invalid passing order [5]. Heuristic rule 2 determines the vehicle among the candidates to be chosen. 1) For the vehicles on the same lane, the vehicle which is the closest to the conflict zone should be added earlier than other vehicles since changing lane maneuver is prohibited. 2) For the vehicles passing through the same conflict sub- zone, the vehicle with a less desired arrival time should be added earlier. The simulation step can be summarized as Algorithm 2. We can see that the classic MCTS applies random sampling in both expansion and simulation steps; while our MCTS + heuristic rules applies random sampling only in expansion step. The Ad hoc negotiation based strategies organize all the vehicles according to the FIFO principle. In contrast, the new simulation policy tends to organize just a part of vehicles (the vehicles uncovered in the current partial passing order) according to the FIFO strategy. This trick helps to avoid the convergence to a over-greedy solution. IV. SIMULATION RESULTS A. Simulation Settings We design three experiments to determine the best parame- ter set for the new cooperative driving strategy and compare it with some classical ones. These experiments are conducted for the intersection with three lanes in each leg shown in Fig. 1. The mandatory signs stipulate the permitted directions for each lane. According to the geometry of the intersection, the conflict zone is further divided into 36 subzones. The vehicles arrival RootABCDC ARootABCDC AC BRootABCDC AC BA Leaf Node(A Passing Order)RootABCDC AC BSelectionExpansionSimulationBackpropagationSimulation Policy B. The Choice of Parameters 5 In this paper, we consider two performance indices: the delay J of the given n vehicles and the traffic throughput (the number of vehicles that has passed the intersection control zone) within a given time interval to compare different coop- erative driving strategies. Specially, we highlight the decreased ratio of the total delay if being compared withe baseline solution that is gotten by the FIFO strategy JF IF O − JM CT S (5) η = JF IF O where JF IF O is the objective value of the FIFO passing order, and JM CT S is the objective value of the best passing order from the MCTS based strategy. To determine the best parameter setting of the new MCTS + heuristic rules, we first fix the time budget as 0.1 s and vary ω and C from 0 to 1. To better understand the performance of the strategy under different traffic conditions, we vary the vehicle arrival rate to generate a series of intersection scenarios with different number of vehicles. Fig. 6. The results of the improvement rates with respect to the number of searched nodes for the intersection shown in Fig.1. through searching 1000 nodes. For most intersection scenarios, 1000 nodes can be searched within 0.1 s in our personal computer, so we set the maximum search time as 0.1 s for the following experiments. C. Comparisons of Different Cooperative Driving Strategies To further clarify the difference between the FIFO strategy and our new strategy, we study a typical intersection scenario with single lane in each leg and 20 vehicles. We calculate the objective values for all the valid solutions (passing orders) and plot them in a histogram manner; see Fig. 1. Fig. 5. The improvement rate of the MCTS based strategy with different parameter settings for the intersection shown in Fig.1. Fig. 5 gives the improvement rates for the intersection shown in Fig.1 with 30 vehicles. We can see that a significant improvement can be achieved even with the worst parameter setting. The parameter C and ω are not so critical but may still influence the balance between exploitation and exploration, partly because we use heuristic rules in simulation step to reduce the influence of random sampling. We further study the scenarios with other numbers of vehicles and the results are all similar. Thus, in the rest of this paper, we set ω = 0.85 and C = 0.05. Then, to determine an appropriate time budget, we vary the time limits of tree search. To eliminate the influence of the computing power of the device, we examine the improvement rates with respect to the number of nodes that has been searched. It can be seen from Fig. 6 that the improvement rate increases significantly when the number of searched nodes increases from 10 to 1000. However, the improvement rate soon becomes saturated after that. Thus, we believe that the proposed strategy can obtain a good enough passing order Fig. 7. The histogram of all solution values for a single lane intersection scenario with 20 vehicles. It is clear that the solution found by the MCTS based strategy is nearly the same as the global optimal solution found by the enumeration based strategy, while the computation time of the MCTS based strategy is much less. For the FIFO based strategy, the computation time is the least, but the solution is far away from the optimal solution. The solution found by the MCTS based strategy ranks 648th in the nearly 10 billion solutions; while the solution of the FIFO based strategy ranks 4563421793th. We then carry out another comparison for the intersection shown in Fig. 1, where the average arrival rate is varied to 0.15510.160.1650.5010.90.80.70.60.50.40.30.20.10Best Parameter Setting3003504004505005500.20.40.60.811.21.41.61.8Probability (%)31032033034000.050.10.15 explore the influence of different traffic demands. For each arrival rate, we simulate 20-minute. It is obvious that our new strategy further reduces the average delay and improves the traffic throughput in all situations. COMPARISON RESULTS OF DIFFERENT COOPERATIVE DRIVING TABLE I STRATEGIES scenario and find a nearly optimal solution with a short time. Although we only discuss the schedule of vehicles at unsignalized intersections, this method can be easily adapted to other scenarios (e.g., ramping areas and working zones). We are currently building several automated vehicle prototypes so that we can test our new strategy in field studies in the near future. 6 Arrival rate veh/(lane*h) Strategies Average delay (s) Traffic Throughput 150 (veh) 589 605 1095 1168 1205 1766 ∗ The computation time of the MCTS based strategy is 0.1s. 1.3053 0.4499 39.8313 1.1407 41.6996 4.8743 FIFO MCTS FIFO MCTS FIFO MCTS 300 450 D. A Further Look into the Structure of the Obtained Search Tree Fig. 8 shows the formulated search tree of our new strategy for an intersection scenario with 50 vehicles. Similar to the classical MCTS strategy, our new strategy tends to first find some promising branches (partial passing orders) of the tree and spends most search time to further explore these branches. However, the search tree generated by the classical MCTS strategy contains much more unnecessary leaf nodes. In contrast, when the heuristic rules are introduced, only a very small number of leaf nodes will be finally reached. For this case, although there are more than 1046 possible passing orders, only about two thousands passing orders are explored by our new strategy within 0.1 s. This difference explains why the classical MCTS needs much more time to find a good enough passing order. Fig. 8. The structure of a search tree for an intersection scenario with 50 vehicles. V. CONCLUSION In this paper, we propose a cooperative driving strategy that combines Monte Carlo simulation and heuristic rule simulation to accelerate the search of the passing order. This new method can quickly learn the tree structure knowledge of the given REFERENCES [1] P. T. Li and X. Zhou, "Recasting and optimizing intersection automa- tion as a connected-and-automated-vehicle (cav) scheduling problem: A sequential branch-and-bound search approach in phase-time-traffic hypernetwork," Transportation Research Part B: Methodological, vol. 105, pp. 479 -- 506, 2017. [2] L. Li, D. Wen, and D. Yao, "A survey of traffic control with vehicular communications," IEEE Transactions on Intelligent Transportation Sys- tems, vol. 15, no. 1, pp. 425 -- 432, 2014. [3] T. Sukuvaara and P. Nurmi, "Wireless traffic service platform for com- bined vehicle-to-vehicle and vehicle-to-infrastructure communications," IEEE Wireless Communications, vol. 16, no. 6, 2009. [4] S. I. Guler, M. Menendez, and L. Meier, "Using connected vehicle technology to improve the efficiency of intersections," Transportation Research Part C: Emerging Technologies, vol. 46, pp. 121 -- 131, 2014. [5] L. Li and F. Wang, "Cooperative driving at blind crossings using in- tervehicle communication," IEEE Transactions on Vehicular technology, vol. 55, no. 6, pp. 1712 -- 1724, 2006. [6] Y. Meng, L. Li, F. Wang, K. Li, and Z. Li, "Analysis of cooperative driving strategies for nonsignalized intersections," IEEE Transactions on Vehicular Technology, vol. 67, no. 4, pp. 2900 -- 2911, 2018. [7] H. Xu, S. Feng, Y. Zhang, and L. Li, "A grouping based coop- erative driving strategy for cavs merging problems," arXiv preprint arXiv:1804.01250, 2018. [8] E. R. Muller, R. C. Carlson, and W. K. Junior, "Intersection control for automated vehicles with milp," IFAC-PapersOnLine, vol. 49, no. 3, pp. 37 -- 42, 2016. [9] L. Chen and C. Englund, "Cooperative intersection management: a survey," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 2, pp. 570 -- 586, 2016. [10] K. Dresner and P. Stone, "Multiagent traffic management: A reservation- based intersection control mechanism," in Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2. IEEE Computer Society, 2004, pp. 530 -- 537. [11] -- -- , "A multiagent approach to autonomous intersection management," Journal of artificial intelligence research, vol. 31, pp. 591 -- 656, 2008. [12] M. Choi, A. Rubenecia, and H. H. Choi, "Reservation-based cooperative traffic management at an intersection of multi-lane roads," in Information Networking (ICOIN), 2018 International Conference on. IEEE, 2018, pp. 456 -- 460. [13] Y. Zhang, A. A. Malikopoulos, and C. G. Cassandras, "Decentralized optimal control for connected automated vehicles at intersections includ- ing left and right turns," arXiv preprint arXiv:1703.06956, 2017. [14] A. A. Malikopoulos, C. G. Cassandras, and Y. J. Zhang, "A decentralized energy-optimal control framework for connected automated vehicles at signal-free intersections," Automatica, vol. 93, pp. 244 -- 256, 2018. [15] M. Enzenberger, M. Muller, B. Arneson, and R. Segal, "Fuegołan open- source framework for board games and go engine based on monte carlo tree search," IEEE Transactions on Computational Intelligence and AI in Games, vol. 2, no. 4, pp. 259 -- 270, 2010. [16] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton et al., "Mastering the game of go without human knowledge," Nature, vol. 550, no. 7676, pp. 354 -- 359, 2017. [17] C. B. Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez, S. Samothrakis, and S. Colton, "A survey of monte carlo tree search methods," IEEE Transactions on Computational Intelligence and AI in games, vol. 4, no. 1, pp. 1 -- 43, 2012. [18] L. Kocsis and C. Szepesv´ari, "Bandit based monte-carlo planning," in European conference on machine learning. Springer, 2006, pp. 282 -- 293. [19] X. J. Ban, J. Pang, H. X. Liu, and R. Ma, "Continuous-time point-queue models in dynamic network loading," Transportation Research Part B: Methodological, vol. 46, no. 3, pp. 360 -- 380, 2012.
1609.08116
2
1609
2017-03-06T23:07:01
Predictive Positioning and Quality Of Service Ridesharing for Campus Mobility On Demand Systems
[ "cs.MA" ]
Autonomous Mobility On Demand (MOD) systems can utilize fleet management strategies in order to provide a high customer quality of service (QoS). Previous works on autonomous MOD systems have developed methods for rebalancing single capacity vehicles, where QoS is maintained through large fleet sizing. This work focuses on MOD systems utilizing a small number of vehicles, such as those found on a campus, where additional vehicles cannot be introduced as demand for rides increases. A predictive positioning method is presented for improving customer QoS by identifying key locations to position the fleet in order to minimize expected customer wait time. Ridesharing is introduced as a means for improving customer QoS as arrival rates increase. However, with ridesharing perceived QoS is dependent on an often unknown customer preference. To address this challenge, a customer ratings model, which learns customer preference from a 5-star rating, is developed and incorporated directly into a ridesharing algorithm. The predictive positioning and ridesharing methods are applied to simulation of a real-world campus MOD system.A combined predictive positioning and ridesharing approach is shown to reduce customer service times by up to 29% and the customer ratings model is shown to provide the best overall MOD fleet management performance over a range of customer preferences.
cs.MA
cs
Predictive Positioning and Quality Of Service Ridesharing for Campus Mobility On Demand Systems Justin Miller and Jonathan P. How 7 1 0 2 r a M 6 ] A M . s c [ 2 v 6 1 1 8 0 . 9 0 6 1 : v i X r a Abstract- Autonomous Mobility On Demand (MOD) systems can utilize fleet management strategies in order to provide a high customer quality of service (QoS). Previous works on autonomous MOD systems have developed methods for rebalancing single capacity vehicles, where QoS is maintained through large fleet sizing. This work focuses on MOD systems utilizing a small number of vehicles, such as those found on a campus, where additional vehicles cannot be introduced as demand for rides increases. A predictive positioning method is presented for improving customer QoS by identifying key locations to position the fleet in order to minimize expected customer wait time. Ridesharing is introduced as a means for improving customer QoS as arrival rates increase. However, with ridesharing perceived QoS is dependent on an often unknown customer preference. To address this challenge, a customer ratings model, which learns customer preference from a 5-star rating, is developed and incorporated directly into a ridesharing algorithm. The predictive positioning and ridesharing methods are applied to simulation of a real-world campus MOD system. A combined predictive positioning and ridesharing approach is shown to reduce customer service times by up to 29%. and the customer ratings model is shown to provide the best overall MOD fleet management performance over a range of customer preferences. I. INTRODUCTION Mobility On Demand (MOD) systems have the potential to revolutionize transportation systems in urban settings by providing commuters access to vehicles without requiring private ownership. In such systems, a fleet of shared vehicles continually services multiple customers by transporting them from their requested on demand pickup location to their desired destination. It is estimated that by 2030, as much as 26% of all global miles traveled will be from customers using shared vehicles [1]. A fundamental challenge for MOD systems is providing a high customer quality of service (QoS) in order to minimize any drawbacks that customers may experience by relying on the shared resources. There are many factors that can affect a customer's QoS such as cost, comfort, safety and convenience [2], many of which can be improved through the use of autonomous MOD systems composed of self-driving vehicles [3]. Several autonomous MOD fleet management strategies have been introduced as a means of improving QoS. These approaches attempt to find a "rebalancing" policy that redistributes vehicles within the system based on customer demand using either a fluid model approach [4], a Markov transition model approach [5], a queueing-theoretical model approach [6], or a model predictive control approach [7]. The approaches Laboratory of Information and Decision Systems, Massachusetts Institute of Technology, 77 Massachusetts Ave., Cambridge, MA, USA {justinm, jhow}@mit.edu (a) MIT MOD fleet (b) Rating app Fig. 1: (a) A fleet of three electric shuttles operate as MOD vehicles on MIT campus. (b) MIT MOD customers have the ability to provide app-based feedback in the form of a 5-star rating. were developed to operate on city-wide scales and assume that an appropriately large fleet of autonomous vehicles is available, an assumption that does not yet reflect the current state of real-world autonomous MOD systems. In practice, autonomous MOD systems are being deployed with limited sized fleets [8]–[10]. This work is further motivated by our own MOD system operating on MIT campus, where autonomous fleet management strategies are applied to a fleet of only three human-driven vehicles, shown in Figure 1a. Previous rebalancing methods do not scale well when applied to such small fleets. For example, the policies are designed to redistribute multiple excess vehicles to relatively few network arrival locations. The methods breakdown when the reverse is true and fleet sizes are relatively small compared to the number of network locations such that there generally aren't enough vehicles to cover all arrival locations. This work seeks to address this challenge by instead identifying key locations in the MOD system which minimize expected customer wait times regardless of fleet size. Additionally, those previous works only consider the use of single capacity vehicles and do not address the benefits and challenges of utilizing ridesharing. In ridesharing, multiple customers may share a ride in an MOD vehicle at the same time. Newly arrived passengers can be picked up before onboard passengers have been dropped off, allowing for more customers to be serviced with fewer vehicles. However, the reduced wait time for requested passengers comes at the expense of increased ride time of onboard passengers. With ridesharing, perceived QoS becomes dependent on customer preference (i.e. how much customers prefer one service metric over another). A large body of work has studied a form of ridesharing known as the Dial-A-Ride Problem (DARP), which is a specialization of the Vehicle Routing Problem formulated specifically for the transportation of customers. DARP problem formulations typically take either the form of an integer program or a scheduling problem. Integer program formulations encode each customer QoS metric as a decision variable and use heuristic methods such as genetic algorithms [11], simulated annealing [12], and tabu search [13] to minimize an objective, such as a cost function composed of a weighted sum of the metrics. Scheduling problem formulations enumerate the possible ways of inserting new passengers into vehicle schedules, and encode customer QoS metrics as feasibility constraints [14]–[16]. The main challenge with all of these approaches is that the weights or constraint thresholds that define customer preference may be chosen incorrectly and even the structure that encodes the QoS metrics could be wrong. In general determining customer preference can be difficult. However, many MOD systems such as Uber, Lyft, and the MIT MOD system are able to query passengers for feedback in the form of a 5-star rating using a ride request app, as shown in Figure 1b. This work takes advantage of this available information through a ridesharing algorithm which does not encode customer preference directly, but rather utilizes a learned customer ratings model when solving the DARP scheduling problem. The contributions of this work are: 1) a predictive posi- tioning approach that minimizes expected customer wait time in MOD networks with fewer vehicles than customer arrival locations; 2) a customer rating model which learns from 5- star rating feedback and serves as a customer QoS-focused cost function; and 3) a schedule-based ridesharing framework that accommodates customer QoS metrics without the need for encoding customer preference constraints. II. PROBLEM FORMULATION 1) Customer Arrival Model: An MOD network is modeled as a directed network graph denoted by G = (N ,L), where N = {n1, . . . , nNn} is a set of Nn nodes, and L = {l1, . . . , lNl} is a set of Nl directed link edges each taking the form of an ordered pair of neighbor nodes l = (ni, nj) ∈ N 2. A route r(ni, nj) is defined as a sequence of directed links Lr ⊆ L which corresponds to a unique minimum-travel-time path between a pair of nodes (ni, nj). Customers are assumed to arrive at nodes in the network graph according to a Poisson process with arrival rate parameter λn. In many MOD systems, customer arrival rates will be time-varying and may feature large fluctuations on short-time scales. In this work, a discrete- time approximation is used where Poisson arrival rates are static for the operating duration, with short-term fluctuations averaged out across the time period. 2) Ridesharing: Upon arrival, customers send ride requests consisting of a pickup node p ∈ N and a drop off node e ∈ N . Let C of size Nc be the set of customers who have requested rides, let O of size No = 2Nc be the set of requested customer pickup and drop off nodes, and let V of size Nv be the set of vehicles in the MOD fleet. Vehicle v will service a subset of the customers Cv ⊆ C by visiting their pickup and drop off nodes. All customer nodes are inserted into a schedule sv = {s1, . . . sNo}, si ∈ {∅,N}, which the vehicle traverses in order using a sequence of routes. Let Q be the maximum capacity of each vehicle. The ridesharing problem is that of finding both the customer to vehicle assignments as well as the vehicle schedules such that the cost of scheduling all customers is minimized. A four-index ILP formulation for the DARP is proposed as an extension of the models presented in [17], with emphasis placed on the ordering of customers within schedules. The cij ∈ {0, 1} are equal to 1 if vehicle v is decision variables xv assigned customer c, with pc and ec respectively sequenced at si and sj; and zero otherwise. The objective of the ridesharing problem formulation is to minimize the total customer QoS cost, that is, ∀c ∈ C ∀v ∈ V, c ∈ C ∀ v ∈ V, i, j ∈ {1, . . . , No} (1) (2) (3) (4) argmin xv cij s.t. No(cid:88) gv cijxv cij i=1 j=1 xv cij = 1 v∈V v∈V c∈C No(cid:88) (cid:88) (cid:88) (cid:88) No(cid:88) No(cid:88) i(cid:88) No(cid:88) (cid:88) (cid:88) j=1 xv cij = 1 k(cid:88) No(cid:88) c∈C j=1 i=1 i=1 xv cij = 0 i=1 j=k+1 c∈C cij ∈ {0, 1} xv cij ≤ Q ∀v ∈ V, k ∈ {1, . . . , No} xv (5) ∀v ∈ V, c ∈ C, i, j ∈ {1, . . . , No}, where (2) enforces that all customers are assigned, (3) enforces that a customer is picked up before being dropped off, (4) enforces that only one customer can occupy a given schedule position, and (5) enforces that the capacity of the vehicle is not exceeded. The cost, further described in Section III-B.2, is chosen to be a function of the QoS metrics mc that a customer experiences, that is gv cij = g(mvij c ) where the metrics themselves are a function of the customer's position in a vehicle's schedule. 3) QoS Metrics: Customer QoS is quantified using a set of transportation metrics, similar to those in [2]. First, customer requests are either accepted by the MOD sys- tem, in which case the customers will be assigned to a vehicle and given a ride, or rejected by the system and the customers will walk. Let 1rej be a rejection indicator variable which takes value 1 if the customer is rejected and 0 otherwise. The remaining customer QoS metrics are: ride time tride, wait time twait, service time tservice, ratio of ride time to direct time tratio, excess ride time texcess ride, maximum number of stops while user is onboard N stops, the notification time tnotify, the total traveled distance while onboard dtraveled, the time it would have taken the customer to walk, twalk, and service time in excess of walk time texcess walk. Let mc ∈ R11 be the QoS metrics for customer c, that is mc = {1rej , N stops , , texcess ride c , tride , tservice , tratio , twait c c c c c c Algorithm 1: Predictive Positioning 1 Input: customer node arrival rates {λ1, . . . λNn} 2 Output: vehicle locations k∗ 3 enumerate vehicle placement options K 4 enumerate possible arrival locations A 5 for a ∈ A do 6 7 wk,a ← computeTotalWaitTime(k, a) for k ∈ K do pa ← computeProbability(a) (cid:80) a∈A wk,apa 8 9 k∗ = argmin k∈K 10 return k∗ , dtraveled tnotify c is further detailed in Appendix A. , twalk, texcess walk c c }. Evaluation of these metrics III. APPROACH This section present two new approaches for utilizing and solving the ridesharing problem, (1) to (5), in order to improve customer service under different operating regimes. The first approach manages vehicles in the absence of ride requests by using a predictive positioning algorithm, while the second approach manages vehicles to accommodate ride requests using a ridesharing algorithm. Additionally, two QoS focused cost functions are presented, a traditional weighted cost function, and a customer rating model which learns customer QoS preference from customer rating feedback. A. Predictive Positioning The predictive positioning algorithm uses known customer arrival rates {λ1, . . . λNn} to find the key predictive nodes within the network graph to place unassigned vehicles such that the expected wait time for arriving customers is minimized. A special form of the ridesharing problem, (1) to (5), is solved for a sequence of Na predicted customer arrivals, where 1) vehicles are only assigned to at most one predicted customer (Q = 1); 2) the number of considered customers is set to be the number of vehicles (Na = Nv); and 3) the cost is set to be the customer wait time. Let the vector k ∈ {0, 1, . . . , Nv}Nn denote the number of vehicles located at each node and a ∈ {0, 1, . . . , Na}Nn be the number of i=1 ki = Nv} is the set of all possible vehicle placement options, and i=1 ai = Na} is the set of all combinations of possible arrivals. The predictive node locations k∗ for which to place vehicles is determined using Algorithm 1. customer arrivals on each node. K = {k (cid:80)Nn A = {a (cid:80)Nn The wait time cost wk,a in Line 7 is determined by using a greedy solution to the ridesharing problem. The wait times are assumed to be dependent only on the structure of the network graph, and therefore are computed and stored offline. To handle the cases where some vehicles are serving customers while others need to be predictively positioned, wait times are computed for all numbers of free vehicles from 1 to Nv. The probability of a set of arrivals pa in Line 8 is determined using decomposition of the total network arrival Algorithm 2: Ridesharing 1 Input: request {pc, ec}, previous customer allocations {C1, . . .CNv}, schedules {s1, . . . , sNv} (cid:80) 2 Output: schedule for assigned vehicle sv∗ 3 for v = 1 : Nv do Cv ← {c,Cv} 4 Sv ← enumerateInsertions(sv, pc, ec) 5 s∗ g(h(sv, ic, jc)) v = argmin 6 sv∈ Sv 7 M∗ v ← computeNewMetrics(s∗ v) 8 Mv ← computeBaselineMetrics(sv) 9 M∗ Nv+1 ← computeRejectionMetrics(pc, ec) 10 v∗ ← assignToLowestBid({M,M∗}1:Nv ,M∗ 11 sv∗ ← s∗ v∗ 12 return sv∗ c∈ Cv Nv+1) Poisson process. Given that an arrival occurs, the probability of that arrival occurring at a node ni is given by P (ai = 1 Na = 1) = λni Λ . The probability of a set of arrivals occurring according to a follows a multinomial distribution, (cid:18) λ1 (cid:19)a1 ··· (cid:18) λNn (cid:19)aNn P (a) = Na! . (6) a1! . . . aNn ! Λ Λ Arrival probabilities are computed online whenever customer arrival rates change. B. Ridesharing 1) Ridesharing Algorithm: The ridesharing algorithm uses an insertion method as a heuristic solution to the ridesharing problem. Algorithm 2 presents the method for assigning a new customer request to a vehicle such that the total QoS cost to the system is minimized. The algorithm is executed online whenever a new customer ride request is submitted. Line 4 temporarily assigns the new customer to each vehicle generating a temporary customer allocation Cv. Line 5 enumerates all feasible ways of inserting the request into the schedule, where Sv is the set of all feasible schedules sv, and where feasibility is met by ensuring that pc is inserted before ec and that vehicle capacity is not exceeded. Lines 6 and 7 find the best feasible schedule s∗ v and corresponding new customer QoS metrics M∗ v for each vehicle, where v = {m¯c ¯c ∈ Cv}. For comparison, Line 8 computes the M∗ original customer QoS metrics Mv for each vehicle, where Mv = {m¯c ¯c ∈ Cv}. Rather than imposing constraints on customer QoS metrics, the algorithm uses a virtual "rejection vehicle", v = Nv + 1 to make bids that consider the case where the customer is not serviced by the MOD system. Line 9 computes the rejection vehicle customer metrics M∗ . While seemingly counter-intuitive, rejections are in fact important for improving customer QoS. For example, if a customer's wait time is significantly longer than the time it would take for them to walk, then they may prefer to be rejected rather than to wait to use the service. In this work, rejected customers are prevented from making additional requests, although this Nv+1 = mrejected c could be adapted to allow customers to resubmit with QoS relaxations. Line 10 finds the combination of baseline and new metrics that includes all customers and has the lowest overall customer QoS cost, and then returns the vehicle v∗ that contains c. If v∗ is the rejection vehicle, then the customer is rejected, otherwise the schedule for v∗ is updated to accommodate the request. The primary benefit of the ridesharing algorithm is the ability to evaluate customer QoS without having to encode the customer preference structure into the algorithm. For example, other methods [14]–[16] encode feasibility constraints on customer metrics such as wait time or ride time, where customers are rejected if these are not met. Instead, a more general approach is taken in Algorithm 2 where a competing bid is made to reject a customer, and the rejection is made only when the overall QoS of the system would be improved by doing so. This approach opens the door for a ratings based cost function where bids are made without constraining the customer metrics directly. 2) Ridesharing Cost Functions: Two ridesharing cost functions are presented which evaluate the customer QoS cost from a set of customer ride metrics. First, a cost function composed of a linear weighted combination of the customer metrics is proposed as mc(cid:88) i=2 g(mc) = wrej i 1rej c mc,i + wacpt i (1 − 1rej c )mc,i, (7) i i and wacpt where wrej are weights for metric i that are used to allow for differentiating between rejected and serviced customers. For example, a service time focused cost function would be g(mc) = 1rej , where the cost is the service time if the customer receives a ride and the walk time if they are rejected. This form of cost function requires that the weights be properly chosen to reflect customer preference, and can result in poor customer QoS if the weights are wrongly chosen. c + (1 − 1rej c twalk c )tservice c To overcome the need to choose weights, a second ratings based cost function is presented which learns and uses customer preference through feedback from 5-star ratings. The rating model utilizes a random forest of classification decision trees, based on the work of [18]. Random forest algorithms tend to prevent overfitting and have been demonstrated to perform well empirically [19]. To train the random forest model, a dataset D from ND customers is collected in the form of 5-star ratings Ytrain = {y1, . . . , yND} and a ride metrics feature vector Xtrain = {m1, . . . , mND} such that Ytrain = RF (Xtrain) where RF (X) is the trained random forest. The trained random forest then serves as the ridesharing cost function such that g(mc) = −RF (mc) where the minus sign is included to maximize customer rating. It is assumed that a customer's 5-star rating is given purely to reflect their ride metrics and not factors such as driver interactions which are not necessary for autonomous MOD systems. Fig. 2: Pedestrian traffic network on MIT campus with overlaid pedestrian trajectories. The network graph is composed of 27 nodes, 106 directed links, and 1056 precomputed routes. IV. EXPERIMENTS The predictive positioning and ridesharing methods are tested using simulation of the MIT MOD system. Specially, there are two motivating test cases: 1) evaluating how service times for customers are affected under different fleet management strategies as customer arrival rates grow; and 2) evaluating how customer QoS is affected by various ridesharing strategies operating under a range of unknown customer preference models. The MIT MOD system is used to provide simulation parameters that reflect a realistic operating environment for vehicles and customers. A. Simulation Setup Pedestrians and vehicles operate within a network graph for the MIT campus. The network graph, shown in Figure 2, is generated using pedestrian trajectory data collected from sensors onboard the MOD vehicles following the method presented in [20]. A two hour time period is simulated; during which time a subset of 10 randomly chosen nodes are assigned non-zero pedestrian arrival rates in order to reflect that not every campus location experiences arrivals at all times. Customer arrival rates are static for the time period and take values between 0 and 0.45 ped/min at each node. There are 3 vehicles in the MIT MOD system each with a maximum capacity of 3 passengers. Vehicles travel between nodes according to the schedule generated by the ridesharing algorithm. A vehicle picks up its assigned customers upon reaching a scheduled node. If a vehicle's schedule is empty, the vehicle will travel to nodes prescribed by the predictive positioning algorithm. Vehicle link speeds are either 11m/s for links corresponding city streets or 4m/s for campus pathways. Predictive Positioning The predictive positioning algorithm finds key predictive node positions to place unallocated MOD vehicles based on customer arrival rate parameters. Figure 3 shows the predictive nodes chosen for either 1, 2, or 3 unallocated vehicles for a particular set of arrival rates. The predictive nodes take into Fig. 3: Relative customer arrival rates and computed predictive nodes. The numbered predictive nodes illustrate where unassigned MOD vehicles should be located to minimize the expected wait time for customers. The radius of the circles indicates the relative magnitudes of the node arrival rates. The numbers indicate the locations to place either 1, 2, or 3 vehicles depending on the current number of unallocated vehicles. account both the probability of the arrivals occurring and the vehicles' travel time to reach each node. If only a single vehicle is unallocated, it will tend to be positioned centrally within the network, but skewed towards large arrival rates. When more vehicles are unallocated, the predictive nodes are further spread out for better coverage. The performance of the predictive positioning algorithm is evaluated through comparison against a baseline unmanaged MOD strategy, where vehicles respond to pickup requests but are not repositioned after dropping off customers. The two methods are first compared without the use of ridesharing (vehicle capacities are 1), with assignments evaluated using a minimum service time cost function. Figure 4 shows that predictive positioning is able to reduce customer service times. When arrival rates are lower than 0.35 ped/min per vehicle, there is often time between arrivals for vehicles to reposition to the predictive nodes and service times can be reduced by up to 20%. As arrival rates increase, however, the benefits of predictive positioning are reduced as vehicles are continually allocated to requests. Under high arrival rates, it would be desirable to add more vehicles to shift to the lower portion of the curve. However, with a fixed-sized fleet, that option is not available so ridesharing is used as an alternative. B. Ridesharing The performance of the ridesharing algorithm is evaluated by comparing the single capacity predictive positioning and unmanaged MOD methods with ridesharing versions where the maximum vehicle capacity is increased to 3. The ridesharing algorithm is applied using a minimum service time cost function. Figure 4 also shows that ridesharing reduces customer service times. When arrival rates are lower than 0.35 ped/min per vehicle, the ridesharing methods perform similarly to their single capacity counterparts since current customers can be serviced before new customers arrive. But Fig. 4: Service times for unmanaged and predictive positioning methods, with and without ridesharing, over a range of customer arrival rates. The figure shows that predictive positioning reduces service times when arrival rates are low and ridesharing reduces service times when arrival rates are high. The service times are normalized by the direct time so as not to penalize service times for customers with longer routes. Lower service times are better. The arrival rates are normalized by the number of vehicles. The mean and standard deviation from 100 iterations are shown. at higher arrival rates, the ridesharing algorithm begins to utilize the excess vehicle capacity and new customers are inserted into vehicle schedules before previous customers have finished their ride. Through the use of a combined predictive positioning and ridesharing approach, the MOD system is able achieve a better customer QoS across all arrival rates, resulting in as much as a 29% reduction in service time compared to the single capacity unmanged MOD strategy. C. Customer Preference In the previous analysis, the customer preference was assumed to be focused on service time. However, this assumption can be wrong and customers may give poor ratings if the the true customer preference lies elsewhere in other QoS metrics. To evaluate the rating performance of an MOD system, a simulated rating model is used to assign a 5-star ratings to customers based on a set of customer preference weights. The details of the simulated rating model are provided in Appendix B, which also specifies how customer preference is encoded using weight concentration parameters. Six customer preference modes are analyzed, where the weight concentration parameters are 90% skewed towards either wait time, ride time, service time, the number of stops while onboard, ride distance, or a combined weight between service time and ride distance. Five fleet management strategies are considered. First, a minimum vehicle distance strategy is considered, where assignments are not made based on customer ratings but rather based on the traditional minimum vehicle travel distance metric which would minimize fuel consumption. Next, three focused strategies based on ride time, service time, and wait time are included, where each strategy is given access to the underlying ground truth ratings function but chooses rating weights according to its focus. Finally, the presented random TABLE I: MOD fleet management performance as measured by average customer rating. Customer Preference Strategy Wait Ride Service # Stops Distance Combined Average 4.53 4.70 Distance 4.42 4.97 Ride Time Service Time 4.67 4.88 4.69 4.42 Wait Time 4.67 4.96 4.22 4.43 4.64 4.09 4.63 4.17 4.70 4.63 3.82 4.60 Ratings 3.91 4.50 4.30 3.64 4.95 4.10 4.97 4.62 3.51 4.96 4.27 4.66 4.62 4.03 4.80 forest ratings model strategy is included where the ground truth ratings function is not available but rather customer preference is learned from 5-star customer feedback ratings. The random forest model is implemented using [21], which is trained separately under each customer preference mode for 10 runs. To further test the ratings model, all ride distance metrics are removed from the random forest feature vector in order to see if performance can be learned using only non-corresponding, but correlated metrics. The arrival rate is fixed at 0.35 ped/min per vehicle so that the MOD fleet is operating under the ridesharing regime. Figure 5 shows how the performance, in terms of average received rating, for each strategy depends on the underly- ing customer preferences. Table I summarizes the average customer rating over all 20 iterations. The results show that wait time, ride time, and service time each perform best when the customer preference mode matches. Additionally, the ride time metric performs best under the excess ride distance and combined customer preference modes because ride distance and ride time are correlated. However, each of the focused fleet management strategies performs relatively poorly under at least one customer preference mode, and the minimum distance strategy always performs poorly because customer preference is not considered. In contrast, the ratings model demonstrates robust performance across all customer preference modes. The ratings model is within 0.5% of the focused strategies under their respective modes, demonstrating that it was able to learn which customer metrics were important under each mode. The excess ride distance mode illustrates how the ratings model is able to learn customer preference using elements in its feature vector that are only correlated with the customer preference metric and not included directly. Finally, when considering the average performance over all customer preference modes, the ratings model performed best. V. CONCLUSION This work demonstrated that predictive positioning and ridesharing can be utilized in an MOD system in order to improve customer QoS. A predictive positioning algorithm was presented which uses customer arrival rate information to position vehicles at key nodes in the MOD network graph which minimize the expected customer wait time. In a simulated campus setting, the predictive positioning method was shown to reduce customer service times by as much as 20% when customer arrival rates are low. To improve QoS as arrival rates increase, a ridesharing approach was presented which utilizes a customer QoS based cost function. (a) Wait Time (b) Ride Time (c) Service Time (d) Number of Stops (e) Excess Ride Distance (f) Combined Fig. 5: Average customer rating for several fleet management strategies under customer preferences that are skewed towards either (a) wait time, (b) ride time, (c) service time, (d) the number of stops while onboard, (e) the excess ride distance between the received ride and a direct ride, or (f) a combined skew between service time and excess ride distance. The figures show that the performance of each strategy is dependent on the underlying customer preference, with the exception of the ratings strategy which performs well in all cases. Each figure shows the results of 20 runs. Performance is measured by the average customer rating where higher ratings are better. A combined predictive positioning and ridesharing approach was shown to reduce customer service times by as much as 29%. A customer ratings model was introduced as a means for learning customer preference through feedback in the form of a 5-star rating. The customer ratings model is shown to provide the best overall MOD fleet management performance over a range of customer preferences. The predictive positioning and ridesharing methods which were evaluated for the campus setting could also be applied to larger networks. To improve the scalability of Algorithm 1, predictive node locations could represent larger regions within an MOD service area, where customer wait times include both the travel time between regions and the expected travel time within a region. The ridesharing method can be applied to larger fleets by parallelizing the scheduling computations 05101520Run Number33.544.55Rating05101520 Run Number33.544.55Rating05101520Run Number33.544.55Rating05101520Run Number 33.544.55Rating05101520Run Number33.544.55Rating05101520Run Number33.544.55Rating for each vehicle across multiple machines which bid to a centralized machine for the customer allocations. Future work will apply these methods to the physical MIT MOD system. Methods for learning and predicting customer arrival rate trends will be studied so that vehicles can be pre- dictively positioned to match real time demand. Additionally, ratings and service metrics from actual customers will be used to improve and evaluate rating models based on random forest and other machine learning techniques. ACKNOWLEDGMENT Research supported by the Ford Motor Company through the Ford-MIT Alliance. REFERENCES [1] "Morgan StanleyVoice: Shared Mobility On The Road Of The Future," Forbes, 2016. [2] J. Paquette, J.-F. Cordeau, and G. Laporte, "Quality of service in dial- a-ride operations," Computers & Industrial Engineering, vol. 56, no. 4, pp. 1721–1734, May 2009. [3] M. Pavone, "Autonomous Mobility-on-Demand Systems for Future Urban Mobility," in Autonomes Fahren, M. Maurer, J. C. Gerdes, B. Lenz, and H. Winner, Eds. Springer Berlin Heidelberg, 2015, pp. 399–416. [4] M. Pavone, S. L. Smith, E. Frazzoli, and D. Rus, "Robotic load balancing for mobility-on-demand systems," The International Journal of Robotics Research, vol. 31, no. 7, pp. 839–854, June 2012. [5] M. Volkov, J. Aslam, and D. Rus, "Markov-based redistribution policy model for future urban mobility networks," in 2012 15th International IEEE Conference on Intelligent Transportation Systems (ITSC), Sept. 2012, pp. 1906–1911. [6] R. Zhang and M. Pavone, "Control of robotic mobility-on-demand systems: A queueing-theoretical perspective," The International Journal of Robotics Research, vol. 35, no. 1-3, pp. 186–203, 2016. [7] R. Zhang, F. Rossi, and M. Pavone, "Model predictive control of autonomous mobility-on-demand systems," in 2016 IEEE International Conference on Robotics and Automation (ICRA), May 2016, pp. 1382– 1389. [8] S. Abuelsamid, "Singapore, Delphi and nuTonomy To Launch Pilot Of Autonomous, On-Demand Car Service," Forbes, 2016. [9] P. E. Ross, "Helsinki Tries Self-Driving Buses in Real Traffic," IEEE Spectrum: Technology, Engineering, and Science News, Aug. 2016. [10] P. Ross, "Uber Will Start Driverless Service in Pittsburgh-This Month," IEEE Spectrum: Technology, Engineering, and Science News, Aug. 2016. [11] R. M. Jorgensen, J. Larsen, and K. B. Bergvinsdottir, "Solving the Dial-a-Ride Problem Using Genetic Algorithms," The Journal of the Operational Research Society, vol. 58, no. 10, pp. 1321–1331, 2007. [12] G. R. Mauri, L. Antonio, and N. Lorena, "Customers' satisfaction in a dial-a-ride problem," IEEE Intelligent Transportation Systems Magazine, vol. 1, no. 3, pp. 6–14, Fall 2009. [13] J. Paquette, J.-F. Cordeau, G. Laporte, and M. M. B. Pascoal, "Combining multicriteria analysis and tabu search for dial-a-ride problems," Transportation Research Part B: Methodological, vol. 52, pp. 1–16, June 2013. [14] J.-J. Jaw, A. R. Odoni, H. N. Psaraftis, and N. H. M. Wilson, "A heuristic algorithm for the multi-vehicle advance request dial-a- ride problem with time windows," Transportation Research Part B: Methodological, vol. 20, no. 3, pp. 243–257, June 1986. [15] L. Coslovich, R. Pesenti, and W. Ukovich, "A two-phase insertion technique of unexpected customers for a dynamic dial-a-ride problem," European Journal of Operational Research, vol. 175, no. 3, pp. 1605– 1615, Dec. 2006. [16] D. J. Fagnant and K. M. Kockelman, "Dynamic Ride-Sharing and Optimal Fleet Sizing for a System of Shared Autonomous Vehicles," Transportation Research Board 94th Annual Meeting, 2015. [17] J.-F. Cordeau and G. Laporte, "The dial-a-ride problem: Models and algorithms," Annals of Operations Research, vol. 153, no. 1, pp. 29–46, May 2007. [18] L. Breiman, "Random forests," Machine Learning, vol. 45, no. 1, pp. 5–32, Oct. 2001. [19] R. Caruana and A. Niculescu-Mizil, "An empirical comparison of supervised learning algorithms," in Proceedings of the 23rd International Conference on Machine Learning, ser. ICML '06. ACM, pp. 161–168. [Online]. Available: http://doi.acm.org/10.1145/1143844. 1143865 [20] J. Miller, A. Hasfura, S.-Y. Liu, and J. P. How, "Dynamic Arrival Rate Estimation for Campus Mobility on Demand Network Graphs," IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). [21] A. Jaiantilal, "Randomforest-matlab," https://code.google.com/archive/ p/randomforest-matlab/, 2010. A. Computing Customer Ride Metrics APPENDIX This section provides details on how customer metrics are evaluated using vehicle schedule information. Customer c makes a request at the point in time t request and is assigned to v currently located at node nv. The pickup pc and drop off ec nodes for c occur at respective nodes si and sj in the vehicle schedule sv. The vehicle travels between any adjacent nodes sk and sk+1 in its schedule using route r(sk, sk+1). The travel distance and travel time between the nodes are c d(sk, sk+1) = t(sk, sk+1) = (cid:88) (cid:88) l∈Lr(sk ,sk+1) l∈Lr(sk ,sk+1) dl, dl ul , (8) (9) where dl and ul are the length and average travel speed of link l, respectively. The metrics mvij are computed as follows: c t pickup c = t(nv, s1) + t dropoff c = t(nv, s1) + t(sk, sk+1), t(kk, sk+1), i−1(cid:88) j−1(cid:88) k=1 k=1 − t pickup − t request , c , c c tdirect = t(pc, ec), c ddirect = d(pc, ec), c twalk c = ¯t(pc, ec), tride c = t dropoff twait c = t pickup = twait tservice c + tride c c = tride tratio c /tdirect , c − tdirect texcess ride = tride c c = k − j, N stops j−1(cid:88) tnotify = t assigned c c , c c c c dtraveled c = , − t request , c d(sk, sk+1), k=i texcess walk c = tservice c − twalk c , c c , twalk c , tnotify = }. If the customer is given a ride, then the met- , N stops , not apply and the customer metrics are set to be mrejected {1rej rics are mc = {1rej c tnotify , twalk, texcess walk c B. Simulated Rating Model , twait , tservice }. , texcess ride , dtraveled c , tride , tratio c c c c c c c c This section presents a simulated rating model, which is used as ground truth in simulation to assign 5-star ratings to MOD customers. The values and functional forms are chosen based on an assumed customer preference and are kept hidden from the 5-star rating model. If a customer is rejected, then they give one of the two lowest ratings based on how long they waited to be notified of their rejection. A rejected customer's rating is rrejected = if tnotify c twalk c 2, 1, otherwise. ≤ 0.1 (23) (cid:40) If a customer is given a ride, then the rating will be a weighted sum of 5 aggregate ratings based on wait time, ride time, service time, number of stops, and ride distance computed as raccepted c c +w3rservice c +w2rride +w4rstops = w1rwait c c +w5rdistance , (24) c with rwait c = Range rride c = Range (cid:19) (cid:19) (cid:19) , 0, 1 , 0, 1 c twait c (cid:18) (cid:18) tride (cid:18) tservice (cid:18) dtraveled c − tdirect twalk c − tdirect c − tdirect twalk − tdirect c c − tdirect twalk c ) − ddirect c c c c c , 0, 1 (cid:19) = Range rservice c c = max(1, 6 − N stops rstops c rdistance c = Range ddirect c , 0, 0.5 , where Range(α, β, γ) maps α to the i-th interval of 5 exponentially spaced values between β and γ and assigns the value 6-i as the rating. Range values were chosen to reflect a set of possible expected customer satisfaction levels for each metric. For example, setting the γ value for rdistance to 0.5 reflects that customers would give the lowest rating once their journey distance exceeded the nominal distance by a factor of 0.5. Exponential spacing is used to cause ratings to drop off more quickly as metrics worsen for customers. c The majority of customers follow the same set of weights w, but some customers do not. To accommodate this, the weights are drawn from a Dirichlet distribution such that w ∼ Dir( w), where the concentration parameters w represent the nominal weights for the population. (10) (11) (12) (13) (14) (15) (16) (17) (18) (19) (20) (21) (22) c c c is the point in time c is picked up, t dropoff where t pickup is the point in time c is dropped off, tdirect is the time it would take to drive directly from pc to ec, ddirect is the direct route distance between pc and ec, twalk is the time it would take to walk from pc to ec, ¯t(ni, nj) is (9) evaluated with r(ni, nj) and vl, as the respective route and speed of the pedestrian instead of a vehicle, and t assigned is the point in time when the ridesharing algorithm assigns the customer to the vehicle. Note, if a customer is rejected (1rej c = 1), then many of the metrics do c c c
1905.12083
1
1905
2019-04-24T09:36:29
EasySched: a multi-agent architecture for the predictive and reactive scheduling of Industry 4.0 production systems based on the available renewable energy
[ "cs.MA" ]
Industry 4.0 is concerned with sustainable development constraints. In this context, we propose a multi-agent architecture, named EasySched, aiming at elaborating predictive and reactive scheduling as the result of a coordination between systems producing goods and systems producing renewable energy. The validation of this architecture is original, and was conducted in a completely and physically distributed way, using networked embedded systems. This validation was done on a series of instances inspired by the literature. The results showed that EasySched succeeds in adapting the production of goods according to the available renewable energy
cs.MA
cs
EasySched : une architecture multi-agent pour l'ordonnancement prédictif et réactif de systèmes de production de biens en fonction de l'énergie renouvelable disponible dans un contexte industrie 4.0 Maroua Nouiri, Damien Trentesaux, Abdelghani Bekrar LAMIH UMR CNRS 8201, Université Polytechnique Hauts-de-France Le Mont Houy, 59313, Valenciennes, France. Corresponding author: [email protected] Résumé : L'industrie 4.0 s'accompagne de la prise en compte de contraintes de développement durable. Dans ce contexte, nous proposons une architecture multi-agent pour l'ordonnancement prédictif et réactif coordonné entre des systèmes de production de biens et des systèmes de production d'énergie renouvelable, appelée EasySched. La validation de cette architecture est originale, elle est menée de manière complètement et physiquement distribuée en utilisant des systèmes embarqués en réseau. Cette validation est menée sur une série d'instances inspirées de la littérature. Les résultats montrent que les mécanismes proposés permettent d'adapter la production selon l'énergie renouvelable disponible. : production, ordonnancement prédictif, ordonnancement réactif, énergies Mot clés renouvelables, modélisation multi-agent, Optimisation par essaims particulaires, systèmes embarquées 1. Introduction Les enjeux environnementaux, tels que la réduction de la pollution ou des émissions de dioxyde de carbone (CO2) et la maîtrise des changements climatiques prennent une importance croissante. L'industrie 4.0 se doit d'assurer un équilibre entre un accroissement des besoins énergétiques, et la réduction de l'impact environnemental des ressources énergétiques utilisées (Cardin et al., 2017), (Trentesaux et al., 2017). Le système énergétique mondial subit des transformations en profondeur de par l'avènement des énergies renouvelables. Néanmoins, la disponibilité de ce type d'énergie est fortement variable et difficilement prévisible (Prabhu et al., 2015). Afin de pallier ce problème, il est primordial de mettre en place et d'optimiser une coopération entre la source (les fournisseurs d'énergies) et le client (les usines de production) (Trentesaux et al., 2016). Cette coopération doit être réactive pour pouvoir faire face à des événements difficilement prévisibles, de fréquence et d'importance variées. 1 Dans ce contexte, nous proposons EasySched, une architecture multi agent pour l'ordonnancement prédictif et réactif de systèmes de production de biens (consommateur d'énergie) en fonction des contraintes issues de systèmes de production d'énergie renouvelables (fournisseurs) dans un contexte Industrie 4.0. L'ordonnancement est en effet une fonction de la production qui doit désormais être abordée en tenant compte d'aspects relatifs au développement durable et à la gestion de l'énergie (Giret et al., 2015). Pour ce faire, un mécanisme de coopération entre ces systèmes de production est proposé. Il concerne le calcul (en prédictif) et l'ajustement (en réactif) de l'ordonnancement de la production de biens vis-à-vis de la consommation d'énergie. La production d'énergie de type renouvelable est difficilement prédictible car fortement dépendante de conditions non contrôlables (par exemple, les conditions météorologiques). L'originalité de cette architecture réside dans le fait que l'élaboration de l'ordonnancement se fait en tenant compte des besoins en production et du niveau dynamique d'énergie renouvelable disponible. La validation de cette architecture a été faite de manière complètement distribuée, en intégrant à la fois du matériel et du logiciel. Dans cet article, et pour illustrer nos propos, deux sources d'énergie (éolienne et photovoltaïque) sont considérées et les systèmes de production considérés sont de type job-shop, la variable d'ajustement sur la consommation étant la vitesse des machines de production. Notre approche ambitionne ainsi d'adapter en temps réel la production, et donc la consommation d'énergie dynamiquement à l'apport énergétique. Dans ce qui suit, nous présentons en premier lieu un état de l'art relatif à la production sous contrainte énergétique ou en environnement perturbé. Les détails de notre architecture seront présentés dans la section 3. La section 4 présentera les divers tests réalisés et les résultats d'expérimentation. Une conclusion et des perspectives seront fournies dans la section 5. 2. État d'art Nos travaux relèvent de la problématique scientifique suivante : une production de biens doit être ordonnancée de manière prédictive et réactive en tenant compte de l'évolution prévisionnelle et en temps réel de l'énergie renouvelable dont la disponibilité est incertaine. Il existe de nombreuses approches relevant de ce contexte. Sans vouloir être exhaustif, nous présentons dans cette partie un ensemble de références qu'il nous semble important d'étudier et que nous avons regroupées en trois catégories. Une première catégorie traite de cette problématique de manière complètement statique. Par exemple, Mikhaylidi et al., (2015) ont considéré un problème de contrôle des opérations de fabrication avec des prix de l'électricité connus variant dans le temps sur un horizon de planification fini. L'objet est de déterminer la date à laquelle chaque opération doit être effectuée dans l'horizon temporel donné afin de minimiser la consommation totale d'électricité et les coûts liés aux pénalités de retard des opérations. Les auteurs ont proposé une solution de type programmation dynamique. Gahm et al., (2016) ont défini un ordonnancement économe en énergie, avec un objectif d'amélioration de l'efficacité énergétique. Pour évaluer leur travail, ils 2 ont pris en compte non seulement les processus et les systèmes de production, mais également les processus et les systèmes d'approvisionnement en énergie. Fang et al., (2011) ont présenté un modèle de programmation mathématique du problème d'ordonnancement d'ateliers qui prend en compte la charge de pointe, la consommation d'énergie et l'empreinte carbone associée, en plus du temps de cycle. Le modèle est illustré à l'aide d'une étude de cas simple : un atelier de fabrication où deux machines sont utilisées pour produire une variété de pièces. Le problème d'ordonnancement proposé considère la vitesse de fonctionnement comme une variable indépendante, qui peut être modifiée pour affecter la charge de pointe et la consommation d'énergie. Gonzalez et al., (2017) ont suggéré une méta-heuristique hybride associant un algorithme génétique à une nouvelle méthode de recherche locale et une approche de programmation linéaire pour améliorer le coût énergétique d'un ordonnancement d'atelier de type job shop. He et al., (2015) ont conçu une méthode d'optimisation économe en énergie en tenant compte de la sélection de la machine et de la séquence de fonctionnement. Tonelli et al., (2016) ont proposé un modèle centralisé et distribué pour trouver l'ordonnancement prédictif hors ligne. Plitsos et al., (2017) ont défini un système d'aide à la décision (DSS) composé d'un algorithme de recherche local qui offre une optimisation hiérarchique (basée sur plusieurs objectifs) de la planification de la production. L'énergie est considérée sous la forme de contraintes. Lamy., (2017) a élaboré un modèle mathématique et une méta-heuristique Greedy Randomized Adaptive Search Procedure (GRASP) pour résoudre le problème de job-shop avec contrainte énergétique. Dans cette catégorie, tous les travaux présentés ont porté sur des modèles d'ordonnancement statique avec optimisation de la consommation d'énergie. Plusieurs sortes d'aléas peuvent arriver en cours de la production et peuvent être de différentes origines (Chaari et al., 2014). Ceci complexifie les problèmes d'ordonnancement. La solution produite doit en effet prendre en compte les perturbations de l'environnement, tout en assurant de bonnes performances. Dans ce contexte, une seconde catégorie de méthodes a été développée pour prendre en compte la résolution du problème d'ordonnancement. Chaari et al., (2014) ont suggéré une classification qui positionne les différentes méthodes d'ordonnancement sous incertitudes. Celle-ci comporte trois types : les approches proactives, réactives et hybrides. Cette dernière regroupe les approches prédictives- réactives et les approches proactives-réactives. Les approches prédictives réactives sont constituées de deux phases : la première phase consiste à construire un ordonnancement déterministe hors-ligne ne prenant pas en considération les événements imprévisibles. Par exemple, les opérations prévues sont toutes connues dès le départ, les temps de traitement ont été préalablement déterminés et temps durant l'ordonnancement. Durant la deuxième phase, cet ordonnancement est utilisé en ligne. Il est adapté en temps réel pour tenir compte des perturbations (Chaari et al., 2014). Au delà du mécanisme de réactivité qui doit être fourni par la méthode d'ordonnancement, un objectif de durabilité doit aussi être visé dès la phase de conception. Par exemple, Salido et al., (2016) se sont concentrés sur le problème de ré-ordonnancement d'ateliers dynamiques où les machines peuvent fonctionner à des vitesses différentes. Les auteurs ont proposé une nouvelle technique les machines sont disponibles tout l'incertitude lors de le 3 basée sur un algorithme génétique pour trouver un ordonnancement avec un temps assurant la minimisation de la consommation d'énergie. Zhang et al., (2013) ont défini un nouveau modèle mathématique pour résoudre le problème de job-shop flexible qui prend en compte simultanément la consommation d'énergie et l'efficacité de la planification. Ils ont également proposé une méthode de ré-ordonnancement basée sur un algorithme génétique. Les travaux précédemment cités proposent des méthodes de ré-ordonnancement en tenant compte de la consommation d'énergie face à une classe de perturbations de type « panne machine » ou « attribution d'une tâche aléatoire ». Cependant, ils ne tiennent pas compte de la variation dynamique de la disponibilité énergétique. La troisième et dernière catégorie de travaux relève de cet aspect. Par exemple Pach et al., (2015) ont proposé une méthode qui considère la variation de la consommation d'énergie comme contrainte mais aussi comme étant une source d'incertitude. Les auteurs ont proposé une approche basée sur les champs de potentiel pour activer / désactiver les ressources de manière réactive en fonction de la situation du système de fabrication flexible (FMS) afin de réduire la perte d'énergie. Le contrôle de la consommation électrique globale a alors été introduit durant la fabrication afin de respecter un seuil d'énergie disponible déterminé dynamiquement et a priori inconnu. Dans (Trentesaux et al., 2017), une architecture multi-agent prédictive et réactive intégrant consommateurs d'énergie et producteurs d'énergie a été spécifiée, cependant aucune modélisation n'a été proposée. En se basant sur ce travail, Nouiri et al., (2018) ont élaboré un modèle MA-EAPSRS (Multi Agent-Energy Aware Production Scheduling and Rescheduling System) en décrivant les différents agents et leurs comportements. Des protocoles de négociation ont été proposés et validés pour calculer de manière prédictive une production durable. Cependant, aucun mécanisme de décision réactive n'a été proposé. De notre point de vue, quelle que soit la catégorie de contribution concernée, les travaux restent à un niveau de validation très conceptuel, au mieux, en simulation et considèrent très peu une variabilité dans la disponibilité de l'énergie alors que les énergies renouvelables se développent de plus en plus. Il nous semble ainsi important de proposer des algorithmes pour ordonnancer de manière prédictive et réactive des centres de production de bien, consommateurs d'énergie, en tenant compte de contraintes issues de centres de production d'énergie renouvelables. Une validation sur des expérimentations plus réalistes de ces algorithmes est également souhaitable. Ces deux points font l'objet de cet article. Plus précisément, notre contribution porte sur l'enrichissement, au travers d'une architecture multi-agent expérimentale qu'il est possible de valider de manière complètement distribué, intégrant matériel et logiciel, de l'architecture précédemment proposée MA-EAPSRS. Cet enrichissement porte sur l'intégration de mécanismes réactifs permettant d'adapter la production à l'énergie disponible. Afin de valider cette architecture multi-agent, des expérimentations seront proposées pour planifier en temps réel, la consommation énergétique des usines connectées à un réseau intelligent tenant compte d'une fluctuation de production énergétique. La validation aura ainsi lieu sur les parties prédictives et réactives. 4 Nous présentons dans la suite tout d'abord le modèle multi-agent support de l'architecture et la contribution scientifique concernant la dimension réactive avant de présenter sa réalisation logicielle et matérielle qui nous permettra de tester et valider les mécanismes de coopération proposés. 3. Proposition d'un modèle multi-agent support de l'architecture 3.1 Hypothèses de travail Les décisions prises par les systèmes de production que nous étudions sont des décisions d'ordonnancement prédictif et réactif. Il s'agit de programmer l'exécution d'un ensemble de tâches à des dates spécifiques, tenant compte d'une contrainte énergétique communiquée en temps réel. Les contraintes considérées lors de l'établissement de l'ordonnancement sont présentées figure 1. Ces contraintes peuvent être classées selon leur nature déterministe (contrainte de précédence par exemple) ou dynamique, prenant en considération la disponibilité des machines au fil du temps, par exemple. Figure 1. Contraintes dans un problème d'ordonnancement. Notre objectif est d'optimiser la date de réalisation de la production (makespan) tout en assurant l'efficience de celle-ci par la minimisation de la consommation énergétique des ressources de fabrication (soit usine à l'échelle macroscopique, soit machines à l'échelle microscopique intra-usine). Nous ne considérons pas les autres consommateurs d'énergie (systèmes de transport, chauffage, etc.). La méthode proposée est hybride et comporte deux phases. Elle est basée sur une coopération entre les systèmes consommateurs d'énergie et les systèmes producteurs d'énergie. La phase prédictive de la méthode proposée consiste à calculer hors ligne un ordonnancement pour une consommation d'énergie déterminée (cette phase a été décrite dans (Nouiri et al., 2018)). La deuxième phase, réactive, est détaillée dans cet article. Elle a pour objectif l'ajustement, en temps réel, des plans de planification en tenant compte des évènements non 5 prévus. Ces évènements peuvent êtres internes comme les pannes de machines ou externes (ordres urgents). La figure 2 illustre les différents types de fournisseurs et consommateurs d'énergie qu'il est possible de considérer, que ce soit au niveau des systèmes de production consommateurs d'énergie (en production manufacturière : single machine, flow shop, ateliers flexibles, etc.) ou au niveau des fournisseurs d'énergie renouvelable (énergie éolienne, photovoltaïque, etc.). Figure 2. Différents types de fournisseurs et consommateurs d'énergie. Dans le cadre de cet article, nous considérons que les usines sont composées de systèmes de production de type job-shop avec pour chacun, la possibilité de faire varier les vitesses de fonctionnement des machines (ce qui modifie leur consommation énergétique) et deux sources d'énergie uniquement de type renouvelable, éolien et photovoltaïque. Le changement de vitesse des machines fait référence à la variation de leur cadence et non à un arrêt total pendant une période de temps. Dans ce qui suit, nous détaillons les types d'agents, leurs comportements et décrivons les types de perturbations considérées. 3.2 Types d'agents et comportements L'approche multi-agent permet de mettre en oeuvre des mécanismes de type prédictif (en intégrant par exemples des algorithmes d'optimisation) et réactif (par interaction dynamique) (Whitrook et al., 2018). C'est cette capacité qui a guidé notre choix d'une approche multi- agent. Il existe de nombreuses manières de définir, structurer et articuler les interactions entre agents dans un contexte de couplage entre une phase prédictive et une phase réactive (Jimenez et al., 2017). Dans le cadre de nos travaux, l'architecture multi-agent proposée est complètement distribuée afin de faciliter la réactivité face à une variété d'événements imprévus. Elle a été conçue selon la méthodologie de conception Go-Green ANEMONA (Giret et al., 2017). Elle est constituée d'agents spécialisés qui représentent d'une part les systèmes de production de bien et d'autre part les fournisseurs d'énergie. Les rôles de ces agents sont articulés selon ces deux phases (prédictives et réactives). Nous associons un agent à chaque usine de production : chaque 6 usine est ainsi représentée par un agent nommé "Agent Ordonnanceur d'usine" (AOU). Chaque fournisseur d'énergie est représenté de manière symétrique par un agent nommé "Agent Ordonnanceur d'énergie" (AOE). Un agent nommé " Agent Contrôleur Energie" (ACE) est également proposé. Son rôle est de contrôler en temps réel les consommations d'énergie des usines connectées. La figure 3 schématise les rôles des différents agents de l'architecture proposée appelée EasySched (Energy-Aware production SYstem SCHEDuling). Nous détaillerons dans ce qui suit les agents AOU et AOE. Figure 3. Rôles des agents dans l'architecture EasySched 3.2.1. Agent Ordonnanceur de fournisseur d'énergie (AOE) L'Agent Ordonnanceur de fournisseur d'énergie a pour rôle de :  Valider les ordonnancements prédictifs et les demandes en énergie envoyées par les usines connectées. (hors ligne)  Contrôler la disponibilité de l'énergie renouvelable. (en ligne) Le rôle en mode hors ligne consiste à valider les ordonnancements prédictifs. La validation porte sur les demandes en consommation en énergie et leurs capacités à être satisfaites ou non (elles sont dès lors refusées). Le rôle du mode en ligne est relatif au contrôle et au suivi, en temps réel de la disponibilité de l'énergie renouvelable. Il s'agit d'un comportement cyclique qui permet de collecter les données des capteurs spécifiques à chaque type de ressource (par exemple, de température, d'humidité, de luminosité, du vent, etc.). Les données ainsi collectées seront utilisées pour alimenter les processus de prise de décision de ré-ordonnancement. Des boucles de rétroaction plus complexes 7 peuvent être créées sur la base des données sensorielles obtenues. Les données ainsi collectées sont exploitées pour contrôler la consommation d'énergie des usines connectées. Si aucune perturbation n'est détectée, l'agent AOE envoie un message indiquant l'absence de la fluctuation de l'énergie aux agents AOU. Si une variation de l'énergie est détectée, l'AOE calcule tout d'abord le taux d'énergie tauxEnergy % à réduire. Un ordre Reschedule qui précise le temps de ré-ordonnancement et la contrainte énergétique à respecter est alors envoyé. La réception de ce type de message implique que les AOU doivent exécuter une technique de ré-ordonnancement permettant d'obtenir un nouvel ordonnancement adapté aux changements imposés par les fournisseurs d'énergie. 3.2.2 Agent Ordonnanceur d'usine (AOU) L'Agent Ordonnanceur d'usine a pour rôle de :  Calculer un ordonnancement prédictif moyennant une méthode d'optimisation. (hors ligne)  Exécuter une technique de ré-ordonnancement suite aux événements aléatoires perçus moyennant des stratégies de négociation. (en ligne)  Contrôler et détecter localement les perturbations de production. (en ligne) Dans ce travail, l'ordonnancement prédictif est déterminé par un algorithme de type PSO repris de (Nouiri et al., 2018) où une particule représente une solution potentielle au problème. Chacune de ces particules est dotée par un vecteur de position, une vitesse qui permet à la particule de se déplacer et un voisinage c'est-à-dire un ensemble de particules (Neighbours) qui interagissent directement sur la particule, en particulier celle qui a le meilleur critère. La fonction objective eq. (1) utilisée pour évaluer les solutions combine à la fois le makespan ( ) et l'énergie totale ). Comme les deux objectives ne sont pas de même grandeur ni unité, une phase de normalisation est exigée. Un facteur de pondération permet de fixer le degré d'importance de chaque objectif. (1) Si, durant la phase prédictive, l'AOU reçoit un message de l'AOE indiquant le refus de sa demande d'énergie issue du calcul initial, l'algorithme PSO est exécuté à nouveau mais avec une nouvelle valeur . Ce facteur de pondération sera réduit par une valeur α favorisant ainsi la réduction de la consommation énergétique au détriment de l'efficacité de l'ordonnancement. La figure suivante illustre le pseudo code du comportement en ligne de l'agent AOU. Il s'agit d'un comportement cyclique lancé périodiquement, la période étant notée p3. Si le message reçu de la part de l'AOE ne fait référence à aucune situation perturbante, l'ordonnancement est appliqué selon le plan initial. Si ce n'est pas le cas, une technique de ré-ordonnancement est exécutée. 8 Figure 4. Pseudo code du comportement en ligne de l'agent AOU Nous détaillons dans ce qui suit les méthodes de ré-ordonnancement utilisées par les AOU en cas de réception d'une alerte de la part de l'AOE indiquant une fluctuation de l'énergie disponible. Plusieurs méthodes de ré-ordonnancement ont été proposées. Par exemple, pour le problème de type job shop classique, nous avons identifié la méthode de décalage à droite, le ré- ordonnancement total et le ré-ordonnancement partiel (Nouiri et al., 2017). Avant de présenter la technique de ré-ordonnancement proposée, nous détaillons le type de perturbation considéré. 3.3 Type de perturbation considéré La figure 5 illustre les différents paramètres composant une perturbation. Générer une perturbation revient à déterminer la ressource affectée, la date d'occurrence de la perturbation, la durée et son type (par exemple, réparable ou non réparable). La ressource affectée peut être soit renouvelable soit consommable. Dans notre travail, nous nous intéressons à la variation de la disponibilité de l'énergie renouvelable comme source d'évènement perturbant dans le système. Figure 5. Types de perturbation 9 3.4 Les techniques de ré-ordonnancement proposées l'efficience lors de tiennent rarement compte de Plusieurs techniques de ré-ordonnancement ont été proposées dans la littérature pour résoudre le problème de job shop dynamique. Vieira et al., (2003) ont classé ces méthodes en trois groupes : méthode de décalage à droite, ré-ordonnancement total et ré-ordonnancement partiel. Ces méthodes la sélection du nouvel ordonnancement. Dans ce travail, nous avons proposé deux techniques de ré-ordonnancement ayant comme objectif d'assurer l'efficience en respectant un seuil énergétique communiqué en temps réel par les agents AOE. Les techniques de ré-ordonnancement sont exécutées par les agents AOU. Nous rappelons que nous supposons dans cet article que les systèmes de production de ces usines sont de type job-shop. La première étape de la technique de ré-ordonnancement proposée consiste à déterminer les opérations affectées par la panne à partir de l'ordonnancement prédictif. La figure 6 illustre l'organigramme de la première méthode de ré-ordonnancement proposée. Figure 6. La technique 1 de ré-ordonnancement proposée La méthode est basée sur le changement de vitesse des machines des opérations affectées qui est, nous le rappelons, la variable d'ajustement choisie dans cet article. L'ordre de passage des opérations sur les machines reste identique à celui qui est fixé par l'ordonnancement prédictif afin de maintenir la solution la plus stable possible. À chaque itération, la vitesse de chaque opération affectée est changée et la nouvelle consommation énergétique est alors calculée. Si la nouvelle consommation respecte le taux envoyé par les AOE alors la solution est considérée comme la meilleure. Sinon, ce processus est répété sur toutes les autres opérations affectées. Si à la dernière itération, le taux énergétique demandé n'est pas respecté, alors une pénalité est associée à l'ordonnancement réactif trouvé. Dans ce cas la deuxième méthode de ré- ordonnancement est utilisée. Cette dernière se base sur le changement de séquencements, 10 jusque-là invariants. La solution obtenue risque dès lors d'être très différente de la solution initiale, le résultat risque ainsi d'être moins stable en terme de changements dans la séquence. La figure 7 illustre l'organigramme de la deuxième méthode. L'ordre de passage des opérations aux machines est ainsi ici changé. Dans cette méthode, la recherche s'effectue à partir de permutations entre opérations et les vitesses des machines. À chaque fois, la consommation d'énergie est calculée pour choisir la meilleure solution respectant au mieux la contrainte énergétique. Figure 7. La technique 2 de ré-ordonnancement proposée 4. Implémentation physiquement distribuée de l'architecture multi-agent Comme expliqué, l'architecture EasySched est composée de plusieurs AOU, plusieurs AOE et un ACE. La validation par simulation sur un seul calculateur, de manière centralisée est possible. Toutefois, ce type de validation reste partiel. Réaliser une validation réellement distribuée, sur différents systèmes, intégrant les éléments physiques (hardware) et logiciels et capteurs connectés (IOT) est proposé dans cet article. Ces éléments sont connectés en réseaux, ce qui permet un retour d'expérience plus pertinent, notamment dans l'objectif d'appliquer l'architecture sur un système réel, tel que la cellule AIP-PRIMECA de l'Université Polytechnique Hauts-de-France. La figure 8 schématise cette implémentation. L'évolution d'une implémentation centralisée vers l'implémentation proposée dans cet article y est mise en évidence. Dans un contexte multi agent, la vie d'un agent exige la présence d'un conteneur. Un conteneur est une classe abstraite qui contient tous les services nécessaires à l'hébergement et la gestion des agents durant l'exécution de leur programme. Ces conteneurs d'agents peuvent être répartis sur le réseau. Les agents créés sont par défaut localisés dans le même "Main container". Avant d'être déployé sur le système physiquement distribué composé de systèmes embarqués connectés entre eux, un conteneur est créé pour chaque agent distant. « Usine Container i » et « 11 Energy Provider Container i » sont ainsi des conteneurs alloués respectivement aux agents AOU, AOE, ACE (voir la figure 8). Des systèmes embarqués ARM A7 sont utilisés pour embarquer les containers AOE1, AOE2, AOU1, AOU2 et ACE. Figure 8. Implémentation physiquement distribuée de EasySched La quantité d'énergie renouvelable reste totalement simulée. Cependant, pour prendre en compte sa forte imprévisibilité, nous avons choisi d'utiliser des capteurs ambiants de température, d'humidité et de luminosité. Les sorties de ces capteurs (qu'il est facile de modifier) représentent le suivi de la variation des grandeurs dont dépend la puissance délivrée par les deux ressources de production d'énergie. Par exemple, la variation de l'éclairement qui influe systématiquement sur la variation de la puissance délivrée par toute centrale photovoltaïque est facilement simulée en masquant plus ou moins le capteur de lumière. De même la puissance délivrée par une centrale éolienne est dépendante de la température et de l'humidité. Elle est modifiable facilement en influençant sur le capteur de température et d'humidité. La figure suivante contient le pseudo code qui permet aux AOE de détecter une perturbation sur la puissance fournie. Il s'agit d'un comportement cyclique qui se répète chaque période fixée p1. 12 Figure 9. Pseudo code du comportement « Acquisition données » d'AOE P(t) et P(0) sont les puissances calculées à partir de valeur de température et d'humidité collectés. Dans le contexte de cet article, nous avons choisi d'utiliser le modèle proposé par (Marshall and Plumb., 2008), où la puissance électrique délivrée par une éolienne peut être calculée comme suit : Avec S est la surface de l'éolienne, V vitesse de vent et est la masse volumique de l'air calculée comme suit : avec T et sont la température et l'humidité récupéré à partir des capteurs et , la pression de l'air. Si le rapport P(t) / P(0) est inferieur à 1, la production de l'énergie diminue. La variable "Alarm" déterminant l'état de système est alors mise à jour. Afin de limiter le bruit de capteur sur les signaux et ainsi éviter de considérer chaque évolution de la valeur des signaux comme une perturbation, nous avons ajouté un algorithme artificiel de filtrage. Pour cela, nous avons contraint le choix de la période de comportement cyclique (p2) plus grande que celle de l'acquisition des données des divers capteurs. La figure suivante contient le pseudo code de ce comportement. La période p2 est alors modifiée quand l'AOE détecte une anomalie (voir figure 10). Ceci a pour premier objectif d'éviter le lancement successif de signaux de ré-ordonnancement et pour second objectif d'espacer les horizons de ré- ordonnancement. La figure suivante 11 illustre la différence entre les différentes périodes. Figure 10. Pseudo code du comportement « vérification Fausse Alarme » d'AOE 13 Figure 11. Valeurs initiales des périodes des comportements cycliques 5. Expérimentations et interprétation Pour tester l'efficacité et l'architecture au la performance de travers de son implémentation distribuée, nous avons exécuté différents jeux de test construits à partir de trois différents benchmarks de type job-shop composé de machines avec des vitesses variables avec des tailles d'instance (machines x Vmax x Pi) (3x3x10), (3x25x100) et (7x10x100). Les détails des instances sont fournis dans (Salido et al., 2016). Chaque instance est exécutée 5 fois. L'implémentation distribuée est constituée d'un PC et de cinq systèmes embarqués ARM A7 (AOE1, AOE2, AOU1, AOU2 et ACE). Le PC dispose d'un processeur Intel "Core2Duo" cadencé à 2, 4 GHz et 8 Go de RAM. La carte intégrée fonctionne à 900 Mhz avec 1Go de RAM. Le système embarqué cible exécute la version Debian de Linux. Toutes les machines exécutent Java SE Embedded. Un LAN est utilisé pour la communication entre tous les composants de l'implémentation distribuée. Pour nos expérimentations, les périodes p1, p2, p3 sont initialement fixées à 3, 6 et 8 s respectivement. La figure 12 contient différentes photos prises de notre implémentation distribuée (au sein du LAMIH). L'expérimentation est composée de deux étapes : la première permet de valider la partie prédictive de EasySched tandis que la deuxième permet de valider la partie réactive. Figure 12. Implémentation distribuée de EasySched 14 5. 1 Evaluation de la partie prédictive de l'architecture EasySched Dans cette partie, nous calculons et évaluons la solution fournie dans la partie prédictive. Le tableau 1 contient le résultat des essais. La première colonne représentant l'instance à tester, la deuxième la qualité de la solution fournie par l'AOU1, AOU2 en termes de Makespan (Mk, en s) et l'énergie consommée (E en wh), tout en précisent la valeur du facteur de pondération et le message envoyé par le AOE1 et 2 (deux états : oui ou non) qui permettra d'arrêter ou non la recherche prédictive de la solution. Chaque AOU envoie une demande de besoin énergétique après avoir calculé un ordonnancement prédictif en utilisant le PSO. Si l'AOE dispose de suffisamment d'énergie, celui-ci va envoyer un message « Oui » indiquant qu'il est possible de procéder avec cet ordonnancement. Si non, il envoie un message « Non » à l'agent AOU pour forcer le calcul d'une autre solution. Dans ce cas, l'AOU va exécuter le PSO de nouveau mais en réduisant la valeur du facteur de pondération, ce qui favorisera une réduction de la consommation d'énergie jusqu'à l'obtention d'une solution satisfaisante, correspondante à l'envoi du message « Oui ». Ces résultats illustrent le bon fonctionnement du mécanisme de coopération qui se met en place entre les consommateurs et les fournisseurs d'énergie pour converger vers des ordonnancements acceptables. Bien évidemment, d'autres tests sont à mener pour conclure de manière plus crédible sur ce bon fonctionnement. Des comparaisons avec les méthodes existantes doivent également être menées. Tableau 1 : Résultats- partie prédictive Instance AOU 1 AOE1 AOU 2 Mk E Message envoyé Mk E AOE1 Message envoyé 3x5x10 1 0.9 0.8 0.7 41 41 42.2 45.3 145.8 Non 133.7 Non 123.5 Non 112.6 Oui 7x10x100 1 625.9 2773.4 Non 3x25x100 0.9 626 2560.7 Oui - 1 0.9 0.8 0.7 - - - 1711.8 6797.2 Non 1732.2 6311 Non 1791.4 5726.2 Non 1943.7 5097.4 Non 1 0.9 - - 1 0.9 0.8 1 0.9 0.8 0.7 41 41 - - 145.8 Non 133.2 Oui - - - - 625.9 2773.4 Non 626 2560.7 Non 642.4 2418.9 Oui 1711.8 6797.2 Non 1732.2 6311 Non 1791.4 5726.2 Non 1886.3 6107.7 Non 15 0.6 0.5 2118.3 4617.4 Non - - - 0.6 0.5 2197.6 4547.9 Non 2317.1 4257.3 Oui 5. 2 Evaluation de la partie réactive de l'architecture EasySched Dans cette partie, nous testons le comportement réactif de l'architecture EasySched face à une fluctuation de l'énergie renouvelable disponible chez les AOE. La figure suivante illustre la solution prédictive délivrée par l'AOU1 connecté avec le fournisseur d'énergie que nous utiliserons. Le makespan trouvé est égal à 44 s avec une consommation d'énergie égale à 133 Wh. La particule (PSO) correspondante à cette solution ainsi que le diagramme de Gantt sont donnés dans la figure 13. Figure 13. Diagramme de Gantt de l'ordonnancement prédictif trouvé par AOU1 La figure 14 contient la courbe de la variation de température et d'humidité collectée par l'AOE à partir des capteurs nous permettant de simuler en temps réel et de manière complètement imprévisible les conditions météorologiques. Par exemple, à l'instant 22 s, la valeur de la température est « 28 » et celle de l'humidité « 33 ». La valeur de la puissance à cet instant est alors plus petite que celle à l'instant initial (T=19, H=36). Le rapport de P(t)/P(0) est égal à 0,711. Par conséquent, une alerte est délivrée aux AOU indiquant qu'il faut recalculer une nouvelle solution présentant une consommation d'énergie réduite de 26%. 16 Figure 14. Diagramme de Gantt de l'ordonnancement réactif trouvé par AOU1 La consommation d'énergie de l'ordonnancement réactif trouvé est désormais réduite pour être égale à 94Wh après la perturbation alors que le makespan se dégrade et vaut désormais 53 s. Dans ce scenario, l'adaptation de la consommation d'énergie des usines pour respecter le seuil énergétique 26% a engendré une dégradation de performance sous la forme d'une augmentation de la date de réalisation de la production. Il faut noter que même si l'on peut s'attendre à ce que ce type de comportement se reproduise dans d'autres situations (dégradation du makespan pour tenir compte d'une plus faible disponibilité énergétique), la quantification de cette dégradation dépend des modèles utilisés pour la production et la consommation d'énergie. Cette solution est trouvée en utilisant la première méthode de ré-ordonnancement proposée qui cherche à préserver la stabilité et ne changer que les vitesses des machines jusqu'à satisfaire la contrainte énergétique. Les vitesses des machines M1, M2, M3 sont ainsi changées à partir de l'instant de ré-ordonnancement. Le tableau suivant contient d'autres résultats de simulation. Les taux d'énergie délivrés par les AOE sont précisés. Dans notre cas, le pourcentage envoyé par l'AOE photovoltaïque est fixe et égal à 10 %. L'expérimentation se conclut ainsi favorablement, la réactivité de notre architecture multi-agent étant mise en évidence sur ce cas d'étude. Tout comme pour la partie prédictive, des études complémentaires doivent être menées au niveau réactif pour pouvoir conclure de manière plus générale sur l'efficacité de la méthode proposée. Des protocoles expérimentaux rigoureux sont en cours de développement. Des tests statistiques devront être menés. Cependant, les résultats obtenus et présentés dans cet article nous confortent dans cette efficacité. 17 Tableau 2 : Résultats- partie réactive Instance AOU 1 AOE1 AOU 2 AOE1 Initial Mk, E Mk 3x5x10 44, 133 53 E 94 7x10x100 626,2773 703 2099 3x25x100 1711, 6797 2056 4742 Taux E% Initial Mk, E Mk E Taux E% 26 22 28 41,145.8 42 123 626,2773 642 2418 1711,6797 1854 5466 10 10 10 6. Conclusion travail nous avons proposé EasySched, une architecture multi-agent pour Dans ce l'ordonnancement prédictif et réactif de la production en fonction d'une énergie renouvelable disponible difficilement prévisible. Nous avons proposé une implémentation distribuée originale de l'architecture qui permet de valider ces mécanismes sur des instances issues de la littérature. Une première perspective concerne l'intégration d'un mécanisme permettant de basculer entre les différentes sources d'énergie disponible au travers d'un pourcentage déterminé par négociation entre agents. Une deuxième perspective consiste à proposer une architecture holonique multicouche pour généraliser EasySched. Dans ce cas, l'agent ordonnanceur représentant l'usine connecté serait un holon récursivement composé par un ensemble d'holons représentant chacun une machine ou un produit intelligent dans l'industrie. Remerciements Le projet ELSAT2020 est cofinancé par l'Union Européenne avec le Fond européen de développement régional (FEDER), par l'Etat et la Région Hauts de France. Références Cardin, O., Ounnar, F., Thomas, A., Trentesaux, D., Future industrial systems: best practices of the intelligent manufacturing and services systems (IMS2) French Research Group, IEEE Transactions on Industrial Informatics, 13(2), 704-713, 2017. Carlier, J., Chrétienne, P., Problèmes d'ordonnancement Algorithmes, Éditions Masson, 1988. : Modélisation, Complexité, Esquirol, P., Lopez, P., L'ordonnancement, Collection Gestion, série : Production et techniques quantitatives appliquées à la gestion, Economica, 1999. Fang, K., Uhan, N., Zhao, F., Sutherland, J. W., A new approach to scheduling in manufacturing for power consumption and carbon footprint reduction, Journal of Manufacturing Systems, 30(4), 234-240, 2011. 18 Gahm, C., Denz, F., Dirr, M., Tuma, A., Energy-efficient scheduling in manufacturing companies: a review and research framework, European Journal of Operational Research, 248(3), 744-757, 2016. Giret, A., Trentesaux, D., Prabhu, V., Sustainability in manufacturing operations scheduling: A state of the art review, Journal of Manufacturing Systems, 37, 126-140, 2015. Giret, A., Trentesaux, D., Salido, M. A., Garcia, E., Adam, E., A holonic multi-agent methodology to design sustainable intelligent manufacturing control systems, Journal of cleaner production, 167, 1370-1386, 2017. González, M. Á., Oddi, A., Rasconi, R., Multi-objective optimization in a job shop with energy costs through hybrid evolutionary techniques, In Twenty-Seventh International Conference on Automated Planning and Scheduling, 2017. He, Y., Li, Y., Wu, T., Sutherland, J. W., An energy-responsive optimization method for machine tool selection and operation sequence in flexible machining job shops, Journal of Cleaner Production, 87, 245-254, 2015. Jimenez, J. F., Bekrar, A., Zambrano-Rey, G., Trentesaux, D., Leitão, P., Pollux: a dynamic hybrid control architecture for flexible job shop systems, International Journal of Production Research, 55(15), 4229-4247, 2017. Marshall, J., Plumb, R. A., Atmosphere, ocean and climate dynamics: an introductory text International Geophysics series, a series of monographs and textbooks, 93, 2008. Lamy D., Méthodes et outils pour l'ordonnancement d'ateliers avec prise en compte des contraintes additionnelles : énergétiques et environnementales, thèse de doctorat, Université Clermont Auvergne, 2017. Mikhaylidi, Y., Hussein, N., Yedidsion. L., Operations scheduling under electricity time-varying prices, Journal of Production Research, 53(23), 7136-7157, 2015. Nouiri, M., Bekrar, A., Jemai, A., Trentesaux, D., Ammari, A. C., Niar, S., Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns, Computers and Industrial Engineering, 112, 595-606, 2017. Nouiri, M., Trentesaux, D., Bekrar, A., Giret, A., Salido, M. A., Cooperation Between Smart Manufacturing Scheduling Systems and Energy Providers: A Multi-agent Perspective, In International Workshop on Service Orientation in Holonic and Multi-Agent Manufacturing, Studies in Computational Intelligence, 803, Springer, 197-210, 2018. Pach, C., Berger, T., Sallez, Y., Bonte, T., Adam, E., Trentesaux, D., Reactive and energy-aware scheduling of flexible manufacturing systems using potential fields, Computers in Industry, 65(3), 434-448, 2015. 19 Pach, C., Berger, T., Sallez, Y., Trentesaux, D., Reactive control of overall power consumption in flexible manufacturing systems scheduling: A Potential Fields model, Control Engineering Practice, 44, 193-208, 2014. Plitsos, S., Repoussis, P. P., Mourtos, I., Tarantilis, C. D., Energy-aware decision support for production scheduling, Decision Support Systems, 93, 88-97, 2017. Prabhu, V., Trentesaux, D., Taisch, M., Energy-aware manufacturing operations, Journal of Production Research, 53(23), 6994-7004, 2015. Raileanu, S., Anton, F., Iatan, A., Borangiu, T., Anton, S., Morariu, O., Resource scheduling based on energy consumption Intelligent Manufacturing, 28(7), 1519-1530, 2017. for sustainable manufacturing, Journal of Salido, M. A., Escamilla, J., Barber, F., Giret, A., Rescheduling in job-shop problems for sustainable manufacturing systems, Journal of cleaner production, 162, S121-S132, 2016. Trentesaux, D., Giret, A., Tonelli, F., Skobelev, P., Emerging key requirements for future energy-aware production scheduling systems: a multi-agent and holonic perspective, In International Workshop on Service Orientation in Holonic and Multi-Agent Manufacturing, Studies in Computational Intelligence, Springer, 694, 127-141, 2016. Trentesaux, D., Borangiu, T., Thomas, A., Emerging ICT concepts for smart, safe and sustainable industrial systems, Computers in Industry, 81, 1-10, 2016. Tonelli, F., Bruzzone, A. A. G., Paolucci, M., Carpanzano, E., Nicolò, G., Giret, A., Salido, M., Trentesaux, D., Assessment of mathematical programming and agent-based modeling for off-line scheduling: application to energy aware manufacturing, CIRP Annals Manufacturing Technology, 65(1), 405-408, 2016. Vieira, G. E., Herrmann, J. W., Lin, E., Rescheduling manufacturing systems: a framework of strategies, policies, and methods, Journal of scheduling, 6(1), 39-62, 2003. Whitbrook, A., Meng, Q., Chung, P. W., Reliable, distributed scheduling and rescheduling for time-critical, multiagent systems, IEEE Transactions on Automation Science and Engineering, 15(2), 732-747, 2018. Zhang, L., Li, X., Gao, L., Zhang, G., Dynamic rescheduling in FMS that is simultaneously considering energy consumption and schedule efficiency, The International Journal of Advanced Manufacturing Technology, 87(5-8), 1387-1399, 2013. 20
1801.07747
1
1801
2018-01-23T19:51:58
Quantified Degrees of Group Responsibility (Extended Abstract)
[ "cs.MA", "cs.AI" ]
This paper builds on an existing notion of group responsibility and proposes two ways to define the degree of group responsibility: structural and functional degrees of responsibility. These notions measure the potential responsibilities of (agent) groups for avoiding a state of affairs. According to these notions, a degree of responsibility for a state of affairs can be assigned to a group of agents if, and to the extent that, the group has the potential to preclude the state of affairs.
cs.MA
cs
Quantified Degrees of Group Responsibility (Extended Abstract)1 Vahid Yazdanpanah Mehdi Dastani Utrecht University, The Netherlands 1 Introduction This paper builds on an existing notion of group responsibility in [2] and proposes two ways to define the degree of group responsibility: structural and functional degrees of responsibility. These notions measure the potential responsibilities of (agent) groups for avoiding a state of affairs. According to these notions, a degree of responsibility for a state of affairs can be assigned to a group of agents if, and to the extent that, the group has the potential to preclude the state of affairs. 2 Preliminaries In this work, the behaviour of the multi-agent system is modelled in a Concurrent Game Structure (CGS) [1] which is a tuple M = (N, Q, Act, d, o), where N = {1, . . . , k} is a set of agents, Q is a set of states, Act is a set of actions, function d : N × Q → P(Act) identifies the set of available actions for each agent in N at each state q ∈ Q, and o is a transition function that assigns a state q(cid:48) = o(q, α1, . . . , αk) to a state q and an action profile (α1, . . . , αk) such that all k agents in N choose actions in the action profile respectively. Finally, a state of affairs refers to a set S ⊆ Q and ¯S denotes the set Q \ S. In the rest of this paper, we say C ⊆ N is (weakly) q-responsible for S iff it can preclude S in q (see [2] for formal details). Let M be a multi-agent system, S a state of affairs in M, C ⊆ N an arbitrary group, and C be a (weakly) q-responsible for S in M. Definition 1 (Power measures) We say that the structural power difference of C and C in q ∈ Q with ( C, C), is equal to cardinality of C\C. Moreover, we say that C respect to S in M, denoted by ΘS,M has a power acquisition sequence (cid:104) ¯α1, . . . , ¯αn(cid:105) in q ∈ Q for S in M iff for qi ∈ Q, o(qi, ¯αi) = qi+1 for 1 ≤ i ≤ n such that q = q1 and qn+1 = q(cid:48) and C is (weakly) q(cid:48)-responsible for S in M. q 3 Structural Degree of Responsibility In our conception of Structural Degree of Responsibility (SDR), we say that any (agent) group that shares members with the responsible groups, should be assigned a degree of responsibility that reflects its proportional contribution to the responsible groups. Accordingly, the relative size of a group and its share in the responsible groups for the state of affairs are substantial parameters in our formulation of the structural responsibility degree. We would like to emphasize that this concept of responsibility degree is supported by the fact that beneficiary parties, e.g., lobbyists in the political context, do proportionally invest their limited resources on the groups that can play a role in some key decisions. Definition 2 (Structural degree of responsibility) Let WS,M denote the set of all (weakly) q-responsible groups for state of affairs S in multi-agent system M, and C ⊆ N be an arbitrary group. In case q 1The full version of this paper appears in [4]. = ∅, the structural degree of q-responsibility of any C for S in M is undefined; otherwise, the WS,M structural degree of q-responsibility of C for S in M denoted SDRS,M (C), is defined as follows: q q SDRS,M q (C) = max C∈WS,M q ({i i = 1 − ΘS,M q ( C, C) C }) Intuitively, SDRS,M q (C) measures the highest contribution of a group C in a (weakly) q-responsible C for S. Hence, structural degree of responsibility is in range of [0, 1]. 4 Functional Degree of Responsibility Functional Degree of Responsibility (FDR) addresses the dynamics of preclusive power of a group of agents (in the sense of [3]) with respect to a given state of affairs. We deem that a reasonable differentiation could be made between the groups which do have the chance of acquiring the preclusive power and those they do not have any chance of power acquisition. This notion addresses the eventuality of a state in which a group possesses the preclusive power regarding the state of affairs. This degree is formulated based on the notion of power acquisition sequence (Definition 1) by tracing the number of necessary state transitions from a source state, in order to reach a state in which the group in question is responsible for the state of affairs. Definition 3 (Functional degree of responsibility) Let PS,M (C) denote the set of all power acquisi- tion sequences of C ⊆ N in q for S in M. Let also (cid:96) = min ({i i = length(k)}) be the length k∈PS,M of a shortest power acquisition sequence. The functional degree of q-responsibility of C for S in M, denoted by FDRS,M (C), is defined as follows: (C) q q q FDRS,M q (C) = (C) = ∅ if PS,M otherwise q (cid:26) 0 1 ((cid:96)+1) The notion of FDRS,M q (C) is formulated based on the minimum length of power acquisition se- quences, which taken to be 0 if C is a (weakly) q-responsible for S. Hence, the functional degree of q-responsibility of such a C for S is equal to 1. If there exists no power acquisition sequence for C, then the minimum length of a power acquisition sequence is taken to be ∞ and the functional degree of q-responsibility of C for S becomes 0. In other cases FDRS,M 5 Conclusion (C) is strictly between 0 and 1. q The proposed notions can be used as a tool for analyzing the potential responsibility of agent groups towards a state of affairs. In our approach, the structural degree of responsibility captures the respon- sibility of an agent group based on the accumulated preclusive power of the included agents while the functional degree of responsibility captures the responsibility of a group of agents due to the potentiality of reaching a state in which it has the preclusive power. In the full version of the paper, we specify pertinent properties of the notions and consider additional semantics. References [1] Rajeev Alur, Thomas A. Henzinger, and Orna Kupferman. Alternating-time temporal logic. J. ACM, 49(5):672 -- 713, 2002. [2] Nils Bulling and Mehdi Dastani. Coalitional responsibility in strategic settings. In Proceedings of 14th International Workshop on Computational Logic in Multi-Agent Systems (CLIMA-2013), pages 172 -- 189, 2013. [3] Nicholas R Miller. Power in game forms. Springer, 1982. In Power, voting, and voting power, pages 33 -- 51. [4] Vahid Yazdanpanah and Mehdi Dastani. Quantified degrees of group responsibility. In Coordina- tion, Organizations, Institutions, and Normes in Agent Systems XI - COIN 2015, Revised Selected Papers, pages 418 -- 436, 2015.
1402.4303
2
1402
2016-03-02T17:01:37
Finding Preference Profiles of Condorcet Dimension $k$ via SAT
[ "cs.MA", "cs.AI", "cs.LO" ]
Condorcet winning sets are a set-valued generalization of the well-known concept of a Condorcet winner. As supersets of Condorcet winning sets are always Condorcet winning sets themselves, an interesting property of preference profiles is the size of the smallest Condorcet winning set they admit. This smallest size is called the Condorcet dimension of a preference profile. Since little is known about profiles that have a certain Condorcet dimension, we show in this paper how the problem of finding a preference profile that has a given Condorcet dimension can be encoded as a satisfiability problem and solved by a SAT solver. Initial results include a minimal example of a preference profile of Condorcet dimension 3, improving previously known examples both in terms of the number of agents as well as alternatives. Due to the high complexity of such problems it remains open whether a preference profile of Condorcet dimension 4 exists.
cs.MA
cs
Finding Preference Profiles of Condorcet Dimension k via SAT Christian Geist Technische Universität München Munich, Germany [email protected] 6 1 0 2 r a M 2 ] A M . s c [ 2 v 3 0 3 4 . 2 0 4 1 : v i X r a ABSTRACT Condorcet winning sets are a set-valued generalization of the well-known concept of a Condorcet winner. As supersets of Condorcet winning sets are always Condorcet winning sets themselves, an interesting property of preference profiles is the size of the smallest Condorcet winning set they admit. This smallest size is called the Condorcet dimension of a preference profile. Since little is known about profiles that have a certain Condorcet dimension, we show in this paper how the problem of finding a preference profile that has a given Condorcet dimension can be encoded as a satisfiability problem and solved by a SAT solver. Initial results include a minimal example of a preference profile of Condorcet dimen- sion 3, improving previously known examples both in terms of the number of agents as well as alternatives. Due to the high complexity of such problems it remains open whether a preference profile of Condorcet dimension 4 exists. 1. INTRODUCTION The contribution of this paper is twofold. Firstly, we pro- vide a practical implementation for finding a preference pro- file for a given Condorcet dimension by encoding the prob- lem as a boolean satisfiability (SAT) problem [2], which is then solved by a SAT solver. This technique has proven use- ful for a range of other problems in social choice theory (see, e.g., [9, 7, 4, 3]) and can easily be adapted. For instance, only little needs to be altered in order answer similar questions for dominating sets rather than Condorcet winning sets. Sec- ondly, we give an answer to an open question by Elkind et al. [5] and provide a minimal example of a preference profile of Condorcet dimension 3, which we computed using our im- plementation. This profile involves 6 alternatives and agents only, improving the size of previous examples both in terms of agents and alternatives.1 The formalization in SAT turns out to be efficient enough, not only to discover this partic- ular profile of Condorcet dimension 3, but also to show its minimality. 1For instance, the example in Elkind et al. [5] required 15 alternatives and agents. Appears in: Proceedings of the 13th International Confer- ence on Autonomous Agents and Multiagent Systems (AA- MAS 2014), Lomuscio, Scerri, Bazzan, Huhns (eds.), May, 5 -- 9, 2014, Paris, France. Copyright c(cid:13) 2014, International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. 2. PRELIMINARIES Let A be a set of m alternatives and N = {1, . . . , n} a set of agents. The preferences of agent i ∈ N are represented by a linear (i.e., reflexive, complete, transitive, and antisym- metric) preference relation Ri ⊆ A × A. The interpretation of (a, b) ∈ Ri, usually denoted by a Ri b, is that agent i values alternative a at least as much as alternative b. A preference profile R = (R1, . . . , Rn) is an n-tuple containing a preference relation Ri for each agent i ∈ N . Let R be a preference profile. As introduced by Elkind et al. [5], we now define the notion of a Condorcet win- ning set through an underlying covering relation between sets of alternatives and alternatives: A set of alternatives X θ-covers an alternative y (short: X ≻θ R y) if {i ∈ N ∃x ∈ X such that x Ri y} > θn. A set of alternatives X is called a Condorcet winning set if for each alternative y /∈ X the set X 1 2 -covers y. The set of all Condorcet winning sets of R will be denoted by C(R). The Condorcet dimension dimC(R) is defined as the size of the smallest Condorcet winning set the profile R admits, i.e., dimC (R) := min{k ∈ N k = S and S ∈ C(R)}. Example 1. Consider the preference profile R depicted in Figure 1. As R does not have a Condorcet winner dimC (R) ≥ 2. It can easily be checked that {a, b} (like any other two-element set in this case) is a Condorcet winning set of R and, thus, dimC(R) = 2. 1 1 1 c a b b c a c a b Figure 1: A preference profile of Condorcet dimension 2. In this work, we address the computational problem of finding a preference profile of a given Condorcet dimension. To this end, we define the problem of checking whether for a given number of agents n and alternatives m there exists a preference profile R with dimC (R) = k. Name: Check-Condorcet-Dimension-k Instance: A pair of natural numbers n and m. Question: Does there exist a preference profile R with n agents and m alternatives that has Condorcet dimension of at least k? Preference profiles n = 3 n = 5 n = 6 n = 7 n = 10 n = 15 m = 5 m = 6 m = 7 m = 10 ∼ 1.7 · 106 ∼ 2.5 · 1010 ∼ 3.0 · 1012 ∼ 3.6 · 1014 ∼ 6.2 · 1020 ∼ 1.5 · 1031 ∼ 3.7 · 108 ∼ 1.9 · 1014 ∼ 1.4 · 1017 ∼ 1.0 · 1020 ∼ 3.7 · 1028 ∼ 7.2 · 1042 ∼ 1.3 · 1011 ∼ 3.3 · 1018 ∼ 1.6 · 1022 ∼ 8.3 · 1025 ∼ 1.1 · 1037 ∼ 3.4 · 1055 ∼ 4.8 · 1019 ∼ 6.3 · 1032 ∼ 2.3 · 1039 ∼ 8.3 · 1045 ∼ 4.0 · 1065 ∼ 2.5 · 1098 Table 1: Number of objects involved in the Check-Condorcet-Dimension-3 problem. For k = 3 the subsets of size 2 are the candidates for Condorcet winning sets. Note that the following simple observation can be used to prune the search space in terms of the number of alterna- tives. Observation 1. If there is a preference profile R of Con- dorcet dimension dimC (R) involving m alternatives, then there is also one of the same dimension involving m + 1 alternatives. Proof. Let R be a preference profile on a set of m alter- natives A with dimC(R). We need to construct a preference profile R′ on a set of m + 1 alternatives A′ = A ∪ {a′} with a′ /∈ A such that dimC (R′) = dimC (R). For each i, define R′ i := Ri ∪ {(x, a′) x ∈ A}, i.e., add a′ in the last place of agent i's preference ordering. It is then immediately clear that C(R) ⊆ C(R′), which establishes dimC(R) ≥ dimC (R′). On the other hand, if we assume dimC (R) > dimC (R′), then there exist a Condorcet winning set S′ for R′ of size k := S′ < dimC(R). This set, however, must -- by the con- struction of R′ -- also be a Condorcet winning set for R; a contradiction. 3. METHODOLOGY The number of objects potentially involved in the Check- Condorcet-Dimension-k problem are given in Table 1 for k = 3. It is immediately clear that a naıve algorithm will not solve the problem in a satisfactory manner. This section describes our algorithmic efforts to solve this problem for reasonably large instances. 3.1 Translation to propositional logic (SAT) In order to solve the problem Check-Condorcet- Dimension-k for arbitrary k ∈ N, we follow a similar ap- proach as Brandt et al. [4]: we translate the problem to propositional logic (on a computer) and use state-of-the-art SAT solvers to find a solution. At a glance, the overall solv- ing steps are shown in Algorithm 1. Generally speaking, the problem at hand can be under- stood as the problem of finding a preference profile that satisfies certain conditions -- here: having a Condorcet di- mension of at least k). Thus, a satisfying instance of the propositional formula to be designed should represent a pref- erence profile. To capture this, a formalization based on two types of variables suffices. The boolean variable ri,a,b rep- resents a Ri b, i.e., agent i ranking alternative a at least as high as alternative b; and the variable cS,y stands for the set S covering alternative y. In more detail, the following conditions/axioms need to be formalized:2 2The further axiom for neutrality is not required for correct- ness, but speeds up the solving process. It is discussed in Section 3.2. Input: positive integers n and m Output: whether there exists a preference profile R with n agents and m alternatives and dimC(R) ≥ k /* Encoding of problem in CNF File cnfFile; foreach agent i do */ cnfFile += Encoder.reflexivePreferences(i); cnfFile += Encoder.completePreferences(i); cnfFile += Encoder.transitivePreferences(i); cnfFile += Encoder.antisymmetricPreferences(i); foreach set S ⊆ A with S = k − 1 do cnfFile += Encoder.noCondorcetWinningSet(S); /* Symmetry breaking cnfFile += Encoder.neutrality(); /* SAT solving satisfiable = SATsolver.solve(cnfFile); if instance is satisfiable then return true; else return false */ */ Algorithm 1: SAT-Check-Condorcet-Dimension-k 1. All n agents have linear orders over the m alternatives as their preferences (short: linear preferences) 2. For each set S ⊆ A with S = k − 1, it is not the case that S is a Condorcet winning set (short: no Condorcet set) For the first axiom, we encode reflexivity, completeness, transitivity, and anti-symmetry of the relation Ri for all agents i. The complete translation to CNF (conjunctive normal form, the established standard input format for SAT solvers) is given exemplarily for the case of transitivity; the other axioms are converted analogously. In formal terms transitivity can be written as (∀i)(∀x, y, z) (x Ri y ∧ y Ri z → x Ri z) ≡ (∀i)(∀x, y, z) (ri,x,y ∧ ri,y,z → ri,x,z) ≡ ^i ^x,y,z ≡ ^i ^x,y,z (¬ (ri,x,y ∧ ri,y,z) ∨ ri,x,z) (¬ri,x,y ∨ ¬ri,y,z ∨ ri,x,z) , which then translates to the pseudo code in Algorithm 2 for generating the CNF file. The key in the translation of the inherently higher order axioms to propositional logic is (as pointed out by Geist and Endriss [7] already) that because of finite domains, all quantifiers can be replaced by finite conjunctions or disjunctions, respectively. In all algorithms, a subroutine r(i, x, y) takes care of the foreach agent i do foreach alternative x do foreach alternative y do foreach alternative z do variable not(r(i, x, y)); variable not(r(i, y, z)); variable(r(i, x, z)); newClause; Algorithm 2: Encoding of transitivity of individual pref- erences compact enumeration of variables.3 The axiom "no Condorcet set" can be formalized in a sim- ilar fashion, but requires further subroutines to avoid an exponential blow-up of the size of the formula in CNF. In short, the axiom can be written as (∀S ⊆ A) (S = k − 1 → S /∈ C(R)) ≡ (∀S ⊆ A)(cid:16)S = k − 1 → (∃y /∈ X)S ⊁θ ≡ ^S⊆A S=k−1 _y /∈X ¬cS,y. R y(cid:17) It remains as part of this axiom to define a sufficient con- dition for S ≻θ R y. In the following, we denote the small- est number of agents required for a strict θ-majority by m(n) := ⌊θk⌋ + 1. In formal terms, we write for each set S ⊆ A with S = k − 1 and each alternative y /∈ X: S ≻θ R y ← ((∃M ⊆ N )M = m(n)∧ (∀i ∈ M )(∃x ∈ S)x Ri y) ≡ S ≻θ R y ∨ ((∀M ⊆ N )M = m(n) → (∃i ∈ M )(∀x ∈ S)¬x Ri y) ≡ cS,y ∨  ^M ⊆N M =m(n) _i∈M ^x∈S ¬ri,x,y  . In order to avoid an exponential blow-up when converting this formula to CNF, variable replacement (a standard pro- cedure also known as Tseitin transformation) is applied. In our case, we replaced Vx∈S ¬ri,x,y by new variables of the form hS,y,i and introduced the following defining clauses:4 S=k−1 ^y∈A ^i∈N hS,y,i → ^x∈S ^S⊆A S=k−1 ^y∈A ^i∈N ¬hS,y,i ∨ ^x∈S ≡ ^S⊆A S=k−1 ^y∈A ^i∈N ^x∈S ≡ ^S⊆A ¬ri,x,y! ¬ri,x,y! (¬hS,y,i ∨ ¬ri,x,y) . In this case, the helper variables even have an intuitive meaning as hS,y,i enforces that for no alternative x ∈ S it is the case that agent i prefers alternative y over alternative x, i.e., agent i does not contribute to S θ-covering y. Note that the conditions like S = k − 1 can easily be fulfilled during generation of the corresponding CNF formula on a computer. For enumerating all subsets of alternatives of a given size we, for instance, used Gosper's Hack [8]. The corresponding pseudo code for the "no Condorcet set" axiom can be found in Algorithm 3. foreach set S ⊆ A with S = k − 1 do foreach alternative y /∈ S do variable not(c(S, y)); newClause; /* Definition of variable cS,y foreach set M ⊆ N with M = m(n) do */ variable(c(S, y)); foreach agent i ∈ M do variable(h(S, y, i)); newClause; /* Definition of auxiliary variable hS,y,i foreach agent i ∈ N do */ foreach x ∈ S do variable not(r(i, x, y)); variable not(h(S, y, i)); newClause; Algorithm 3: Encoding of the axiom "no Condorcet set" With all axioms formalized in propositional logic, we are now ready to search for preference profiles R of Condorcet dimension dimC(R) ≥ k. Before we do so, however, we de- scribe a (standard) optimization technique called symmetry breaking, which speeds up the solving process of the SAT solver. 3.2 Optimized computation Observe that from a given example of a preference profile R with dimC(R) ≥ k we can always generate further exam- ples simply by permuting the (names of the) alternatives. One could say that all positive witnesses to the SAT-Check- Condorcet-Dimension-k problem are invariant under per- mutations of the alternatives. Therefore, we implemented a standard technique in SAT solving called symmetry break- ing; here in the form of setting agent 1's preferences to a fixed preference ordering, for instance to lexicographic pref- erences. This trims the search space for the SAT solver and therefore reduces the runtime of the solving process. An en- coding can be achieved simply by adding a subformula of the form r(n1, x, y), ^x<y which sets the first agents preferences to lexicographic or- dering. 3The DIMACS CNF format only allows for integer names of variables. But since we know in advance how many agents and alternatives there are, we can simply use a standard enumeration method for tuples of objects. 4Note that one direction of the standard bi-implication suf- fices here. 4. INITIAL RESULTS All computations were run on a Intel Core i5, 2.66GHz (quad-core) machine with 12 GB RAM using the SAT solver plingeling [1]. 1 a b c d e f 1 1 1 c d b d f c b e f e d a a e f a b c 1 1 f e e a d a b b c c f d Figure 2: A smallest preference profile of Condorcet dimen- sion 3 (with n = 6 agents m = 6 alternatives). When called with the parameters n = m = 6, our im- plementation of SAT-Check-Condorcet-Dimension-k re- turns the preference profile Rdim3 within about one second. Rdim3 is a smallest preference profile of Condorcet dimension 3 and is shown in Figure 2.5 Furthermore, it turns out that this preference profile is a smallest profile of Condorcet dimension 3. All strictly smaller profiles (i.e., with less agents and at most as many alternatives, or with less alternatives and at most as many agents) can be shown to have a Condorcet dimension of at most 2 via SAT-Check-Condorcet-Dimension-3.6 An overview of further (preliminary) results can be found in Table 2. Model (decoding of satisfying assignment) found: Agent 0: 0 > 1 > 2 > 3 > 4 > 5 Agent 1: 2 > 3 > 5 > 0 > 4 > 1 Agent 2: 5 > 4 > 0 > 1 > 2 > 3 Agent 3: 3 > 5 > 1 > 4 > 0 > 2 Agent 4: 4 > 0 > 3 > 1 > 2 > 5 Agent 5: 1 > 2 > 4 > 3 > 5 > 0 does not have a Condorcet winning set of size 2 (6 agents and 6 alternatives). Witnesses: {0, 1} does not cover alternative(s): 5 {0, 2} does not cover alternative(s): 4 {1, 2} does not cover alternative(s): 0 {0, 3} does not cover alternative(s): 4 {1, 3} does not cover alternative(s): 0 {2, 3} does not cover alternative(s): 0 {0, 4} does not cover alternative(s): 5 {1, 4} does not cover alternative(s): 5 {2, 4} does not cover alternative(s): 1 {3, 4} does not cover alternative(s): 2 {0, 5} does not cover alternative(s): 3 {1, 5} does not cover alternative(s): 3 {2, 5} does not cover alternative(s): 1 {3, 5} does not cover alternative(s): 2 {4, 5} does not cover alternative(s): 3 Figure 3: Output of SAT-Check-Condorcet-Dimension- 3 for n = 6 agents and m = 6 alternatives. 5The witnesses for all sets S ⊆ A with S = 2 not being Condorcet winning sets are also returned by SAT-Check- Condorcet-Dimension-3 and can be obtained from the output in Figure 3. That there is a larger set (e.g., {a, b, c}) which forms a Condorcet winning set can easily be con- firmed manually (or by calling SAT-Check-Condorcet- Dimension-4). 6The running time to check all cases again is only a few seconds. m\n 1 1 2 3 4 5 6 7 8 9 10 -- -- -- -- -- -- -- -- -- -- 2 -- -- -- -- -- -- -- -- -- -- 3 -- -- -- -- -- -- -- -- -- -- 4 -- -- -- -- -- -- -- 5 6 7 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- + -- -- + + + 8 -- -- -- -- -- 9 10 11 12 -- -- -- -- -- -- -- -- -- -- -- -- -- + + + + -- -- -- -- -- -- -- -- -- -- -- + + + + + Table 2: Preliminary collection of results obtained with SAT-Check-Condorcet-Dimension-3 for different num- bers of alternatives m and voters n. A plus (+) stands for a preference profile found; a minus ( -- ) for the fact that all preference profiles have a Condorcet winning set of size 2. 5. OUTLOOK AND FUTURE WORK Our implementation might be useful to find preference profiles of Condorcet dimension 4, a problem that has been raised by Elkind et al. [5]. Even though with the current formalization the solving process did not terminate within a reasonable amount of time, we intend to further pursue this direction in future work. Adding further symmetry break- ing clauses (which make use of anonymity in addition to neutrality) could be a first step in this direction. Furthermore, one could extend the notion of Condorcet dimension to other individual preferences, e.g., with agents having weak (i.e., ties are allowed) or even incomplete pref- erences. Because of the high flexibility of our SAT formal- ization, one can easily apply the same method to analyze these related concepts and questions.7 A formalization with other solving techniques, e.g., ASP [6], might be another way to achieve the desired perfor- mance. Acknowledgments This material is based upon work supported by Deutsche Forschungsgemeinschaft under grant BR 2312/9-1. The au- thor thanks Felix Brandt and Hans Georg Seedig for helpful discussions and their support. REFERENCES [1] A. Biere. Lingeling, Plingeling and Treengeling entering the SAT competition 2013. In Proceedings of the SAT Competition 2013, pages 51 -- 52, 2013. [2] A. Biere, M. Heule, H. van Maaren, and T. Walsh, edi- tors. Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications. IOS Press, 2009. [3] F. Brandt and C. Geist. Finding strategyproof social choice functions via SAT solving. Journal of Artificial Intelligence Research, 55:565 -- 602, 2016. [4] F. Brandt, C. Geist, and H. G. Seedig. Identify- In Proceed- ing k-majority digraphs via SAT solving. ings of the 1st AAMAS Workshop on Exploring Beyond 7For the two suggested variants, deleting axioms from the formalization suffices. the Worst Case in Computational Social Choice (EX- PLORE), 2014. [5] E. Elkind, J. Lang, and A. Saffidine. Choosing collec- tively optimal sets of alternatives based on the condorcet criterion. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI), pages 186 -- 191. AAAI Press, 2011. [6] M. Gebser, R. Kaminski, B. Kaufmann, and T. Schaub. Answer set solving in practice. Synthesis Lectures on Artificial Intelligence and Machine Learning, 6(3):1 -- 238, 2012. [7] C. Geist and U. Endriss. Automated search for impossi- bility theorems in social choice theory: Ranking sets of objects. Journal of Artificial Intelligence Research, 40: 143 -- 174, 2011. [8] D. E. Knuth. Combinatorial Algorithms, volume 4A, part 1 of The Art of Computer Programming. Addison- Wesley, 2011. [9] P. Tang and F. Lin. Computer-aided proofs of Arrow's and other impossibility theorems. Artificial Intelligence, 173(11):1041 -- 1053, 2009.
1902.05943
1
1902
2019-02-15T18:52:26
Privacy of Existence of Secrets: Introducing Steganographic DCOPs and Revisiting DCOP Frameworks
[ "cs.MA", "cs.AI", "cs.CR" ]
Here we identify a type of privacy concern in Distributed Constraint Optimization (DCOPs) not previously addressed in literature, despite its importance and impact on the application field: the privacy of existence of secrets. Science only starts where metrics and assumptions are clearly defined. The area of Distributed Constraint Optimization has emerged at the intersection of the multi-agent system community and constraint programming. For the multi-agent community, the constraint optimization problems are an elegant way to express many of the problems occurring in trading and distributed robotics. For the theoretical constraint programming community the DCOPs are a natural extension of their main object of study, the constraint satisfaction problem. As such, the understanding of the DCOP framework has been refined with the needs of the two communities, but sometimes without spelling the new assumptions formally and therefore making it difficult to compare techniques. Here we give a direction to the efforts for structuring concepts in this area.
cs.MA
cs
Privacy of Existence of Secrets: Introducing Steganographic DCOPs and Revisiting DCOP Frameworks Viorel D. Silaghi and Marius C. Silaghi and Ren´e Mandiau Florida Institute of Technology University of Valenciennes [email protected], [email protected], [email protected] Abstract Here we identify a type of privacy concern in Dis- tributed Constraint Optimization (DCOPs) not pre- viously addressed in literature, despite its importance and impact on the application field: the privacy of ex- istence of secrets. Science only starts where metrics and assumptions are clearly defined. The area of Dis- tributed Constraint Optimization has emerged at the intersection of the multi-agent system community and constraint programming. For the multi-agent commu- nity, the constraint optimization problems are an ele- gant way to express many of the problems occurring in trading and distributed robotics. For the theoretical constraint programming community the DCOPs are a natural extension of their main object of study, the constraint satisfaction problem. As such, the under- standing of the DCOP framework has been refined with the needs of the two communities, but sometimes with- out spelling the new assumptions formally and there- fore making it difficult to compare techniques. Here we give a direction to the efforts for structuring concepts in this area. Introduction We identify the "privacy of existence of secrets" as a not yet formally explored issue in the area of the Dis- tributed Constraint Optimization problems (DCOPs). In order to scientifically draw conclusions about a con- cept or procedure, it is essential to formally define the involved concepts, metrics, and assumptions. Conse- quently, we also revisit some common concepts to sug- gest a direction for the possible structuring of DCOP frameworks. The distributed constraint optimization has emerged at the confluence of research in Multi-Agent Systems and research in Constraint Programming. The multi- agent community has found in the DCOP framework an elegant way to specify requirements existing in the area of cooperating robot teams, negotiation, and trad- ing. For the Constraint Programming community, the DCOP is a natural extension of a framework that is at the center of their field, the constraint satisfaction problem (CSP). The reasons and the expectations from the new DCOP framework are slightly different for the researchers in the involved areas, differences that for various reasons are sometimes not spelled formally in- side the DCOP definitions, making comparison and ref- erence difficult and error-prone for new researchers in this booming area. The Constraint Programming community has devel- oped an impressive body of knowledge and set of tech- niques focused on improving the efficiency of problems represented as constraint satisfaction problems (CSP) and for various extensions of such problems includ- ing the egalitarian Fuzzy CSPs (FCSPs), Probabilistic CSPs (PCSPs), dynamic CSPs (DCSPs), the utilitar- ian Weighted CSPs (WCSPs), and the general Valued CSPs (VCSPs) (Schiex et al. 1995) and Semiring based CSPs (Bistarelli et al. 1999). The Constraint Program- ming community is careful in formally defining each ex- tension to CSPs and clearly stating each framework by specifying formally and exactly the inputs and unam- biguously defining outputs and evaluation metrics. This allows for work in the Constraint Programming field to be largely unambiguously comparable, and technol- ogy transfer between extensions to be possible with- out need of repeating work. However, most research in that area concerns efficiency while privacy and se- crecy of constraints are generally not part of the CSP community criteria. An early set of extensions of the CSP family to the multi-agent world addressed paral- lelism (Kasif 1990), and continued to be focused solely on efficiency, as constraint were considered shared be- tween agents. The seminal work in (Yokoo et al. 1992) brought the concept of a distribution of CSPs where privacy was mentioned as a motivation, besides natural distribu- tions of the constraints and control of variables to agents, as a reason to not attempt sharing constraints except on a need basis during a distributed backtrack- ing effort. While this is also seen as an extension of the CSP family, the efficiency was no longer a sufficient criteria and direct comparison with traditional central- ized constraints was seen as irrelevant, despite a lack of formal specification of the impediments to additional constraint sharing in terms of either technical cost or quantified privacy constraints. This lack of specifica- tion gave birth to a flurry of works exploiting various amounts of constraint information without quantifica- tion and with efficiency gains whose trade-off was not al- ways clear (Silaghi, Sam-Haroud, and Faltings 2000a) in terms of the privacy or in terms of the technical cost of constraint data centralization. In a concern to make the field coherent and easily maintain scientific soundness, the constraint commu- nity recommended at the CP2000 distributed constraint satisfaction workshop panel to name the new family of extensions by appending distributed in front of each CSP extension, yielding: • distributed constraint satisfaction (DisCSP) • distributed fuzzy constraint satisfaction (DisFCSP) • distributed probabilistic constraint satisfaction (Dis- PCSP) • distributed dynamic constraint satisfaction (DisD- CSP or DisDyCSP) • distributed weighted constraint satisfaction (Dis- WCSP) • distributed valued constraint satisfaction (DisVCSP) • distributed semiring-based constraint satisfaction (DisSCSP) Works had started to confusingly use the acronym DCSP for distributed CSPs, conflicting with the acronym for dynamic CSPs. It was recommended for the new frameworks to use the prefix "Dis" rather than "D" as a way to differentiate from dynamic CSPs which were intensively studied at the time. It was suggested that the latter be referred as DyCSP to further reduce confusion. Later, additional types of problem emerged, highlighting the wisdom of the suggestion, namely: • dynamic distributed constraint satisfaction (Dy- DisCSP) • dynamic distributed dynamic constraint satisfaction (DyDisDyCSP) where besides a dynamism in constraint emergence there also exist a dynamism in agent involve- ment redistribu- tion (Silaghi et al. 2001; Silaghi and Faltings 2002b). in constraint (i.e., churning) or However, while privacy was already a stated motiva- tion for distributed CSPs, (and by extension assumed present in all these frameworks), it remained unspeci- fied formally, perpetuating the difficulty of correct com- parison and evaluation of proposed techniques. Meanwhile, the multi-agent community adopted the new direction and developed techniques coining the name "distributed constraint optimization" (DCOP) for a framework of distributed weighted constraints. For the early DCOPs definitions, privacy was also not formally stated, and the names DCOP and Dis- WCSP coexisted for a while until the community largely adopted the DCOP acronym. Extensions in this com- munity are built on the DCOP concept, such as in the case of Leximin DCOPs (Matsui et al. 2018). to fix the problem either Further research noticed the negative effects from lack of formal definitions and quantification of pri- vacy criteria in the distributed CSP family. At- tempts redefined the framework (Silaghi et al. 2005) without changing its name/acronym (in an effort to redeem or adopt ear- lier work that stressed privacy), or alternatively pro- posed new names and acronyms. New proposed names/acronyms appeared in the case of distributed Privacy CSPs (DisPrivCSPs) or distributed privacy DCOPs (DisPrivCOPs) (Doshi et al. 2008) and Util- itarian CSPs (UCSPs) or Utilitarian DCOPs (UD- COP) (Savaux et al. 2016; Savaux et al. 2017). Work has also addressed the classification of the nature of privacy concerns, as in (L´eaut´e and Faltings 2013). In this work, privacy is defined as a value: Definition 1 Privacy is the utility that agents draw from conserving the secrecy of their personal informa- tion. In the Background section, we review the original and main formal definitions of distributed constraint satisfaction (DisCSP) and distributed constraint op- timization problems (DCOPs/DisWCSPs), as well as the main informal privacy classifications in literature. We also introduce the concept of steganography, which is more intensively studied in the area of Cryptol- ogy. In the Steganographic DCOP section we then present motivation and define formally the Stegano- graphic DCOPs. Further in the Frameworks Disam- biguation section we propose a direction for the struc- ture of the nomenclature and definitions for various con- cepts in the DCOP areas. We conclude with a summary of the contributions. Background We start by reviewing the main constraint optimiza- tion frameworks as emerging from constraint satisfac- tion. Later we review the various classifications of pri- vacy found in literature, and the definitions we used for privacy and steganography. Formal Distributed Constraint Optimization Frameworks Several distributed CSPs are based on the CSP frame- work: Definition 2 (CSP (Yokoo et al. 1998)) A CSP consists of n variables x1, x2, ..., xn, whose values are taken from finite, discrete domains D1, D2, ..., Dn respectively, and a set of constraints on their values. A constraint is defined by a predicate. That is, the con- straint pk(xk1, ..., xkj ) is a predicate that is defined on the Cartesian product Dk1 × ... × Dkj. This predicate is true iff the value assignment of these variables satisfies this constraint. Solving a CSP is equivalent to finding an assignment of values to all variables such that all constraints are satisfied. The first distributed CSP definition from (Yokoo et al. 1992; Yokoo et al. 1998) is: 1, 2, ..., m. Definition 3 (DCSP (Yokoo et al. 1998)) There exist m agents: Each variable xj be- longs to one agent i (this relation is represented as belongs(xj, i)). Constraints are also distributed among agents. The fact that an agent l knows a constraint predicate pk is represented as known(pk, l). A Distributed CSP is solved iff the following condi- tions are satisfied: ∀i, ∀xj where belongs(xj, i), value dj, is the value of xj assigned to some and ∀l, ∀pk where known(pk, l), pk is true under the assignment xj = dj. As observed, even as (Yokoo et al. 1998) has a sec- tion dedicated to privacy motivations, the formal def- inition does not specify a way to quantify privacy re- quirements and costs. Further, the semantic of variable ownership specified with the belongs predicate is not further formally defined except as implied by the fact that in the proposed algorithms, new assignments for a variable are only proposed by the agents to which the variable belongs. that While equals this definition assumes the num- the number of variables, ber of agents the domain of with each agent keeping secret exactly one variable, other versions studied the case of unequal numbers of variables and agents with no con- straints (Silaghi, Sam-Haroud, and Faltings 2000b). secret domains but with secret Definition 4 (DisCSP (Silaghi and Faltings 2005)) Distributed constraint satisfaction problems (DisCSPs) is defined by: • a set of n variables X = {x1, ..., xn}, • a set of n domains, D = {d1, ..., dn}, for the vari- ables, • a set of t constraints, C = {c1 = (xi, xj, ...), ..., ct}, each of which is a subset of the set of variables, linked with a relation, and • a set of t relations, R = {r1, ..., rt}. ri gives the al- lowed value combinations for the corresponding con- straint ci. • a set of m independent but communicating agents A = {A0, .., Am} • an ownership mapping M : X ∪ C → P(A) that assigns each variable or constraint to the subset of agents that own it. P(A) is a common notation for the set of subsets of A. A solution to a CSP is an assignment of values from the corresponding domains to each variable such that for all constraints, the combination of assigned values is allowed by the corresponding relation. The Distributed Constraint Optimization Framework was introduced in (Modi et al. 2002). Definition 5 (DCOP (Modi et al. 2002)) A Dis- tributed Constraint Optimization Problem (DCOP) consists of n variables V = {x1, x2, ...xn}, each assigned to an agent, where the values of the variables are taken from finite, discrete domains D1, D2, ...Dn, respectively. Only the agent who is assigned a variable has control of its value and knowledge of its domain. The goal is to choose values for variables such that an objective function is minimized or maximized. The objective function described is addition over costs, but can be any associative, commutative, monotonic ag- gregation operator defined over a totally ordered set of valuations, with minimum and maximum element (described by Schiex, Fargier and Verfaillie as Valued CSPs (Schiex et al. 1995)). The definition in (Modi et al. 2002) makes a formal link to the Weighted CSP instance of the Valued CSP framework while claiming generality in terms of appli- cation to remaining CSP extensions. However, while further stressing the control of values, it limits input secrecy to domains and does not further quantify effects of privacy loss or penalties for discus- sions by agents about values that they do not "control". Despite the framework not quantifying privacy, measurements of privacy loss based on qualitative com- parisons were made in (Silaghi and Faltings 2002a), and based on using assumptions from informa- tion theory, standard DCOP def- (Freuder, Minca, and Wallace 2001; initions, Wallace and Silaghi 2004; Franzin et al. 2002; Maheswaran et al. 2006) in (Greenstadt, Pearce, and Tambe 2006; Faltings, L´eaut´e, and Petcu 2008). outside and the in An effort to redefine DisCSPs to formalize privacy requirements is in (Silaghi et al. 2005): Definition 6 (DisCSP (Silaghi et al. 2005)) A [Cryptographic] Distributed CSP (DisCSP) is defined by six sets (A, X, D, C, I, O) and an algebraic structure F . A = {A1, ..., An} is a set of agents. X, D, and the solution are defined like for CSPs. I = {I1, ..., In} is a set of secret inputs. Ii is a tuple of αi secret inputs (defined on F ) from the agent Ai. Each input Ii belongs to F αi. Like for CSPs, C is a set of constraints. There may exist a public constraint in C, φ0, defined by a predicate φ0(ε) on tuples of assignments ε, known to everybody. However, each constraint φi, i > 0, in C is defined as a set of known predicates φi(ε, I) over the secret inputs I, and the tuples ε of assignments to all the variables in a set of variables Xi, Xi ⊆ X. O = {o1, ..., on} is the set of outputs to the different agents. Let m be the number of variables. oi : D1 × ... × Dm → F ωi is a function receiving as parameter a solution and returning ωi secret outputs (from F ) that will be revealed only to the agent Ai. This definition uses the same name and acronym as previously encountered definitions of distributed CSPs, but formally specifies that solutions may only be revealed to specific agents (introducing a con- cept now referred in literature as privacy of deci- sion (L´eaut´e and Faltings 2013)). The formulation re- quires that there should not be any kind of privacy loss, being mainly appropriate for cryptographic techniques. The extension of such privacy formalization to DCOPs is reported in (Silaghi 2005a): Definition 7 (DisWCSP (Silaghi 2005a)) A dis- tributed constraint satisfaction problem (DisWCSP) is defined by six sets (A, X, D, C, I, O), an arithmetic structure F , and a set of acceptable solution qualities B, that can be often represented as an interval [B1, B2]. A = {A1, ..., An} is a set of agents. X = {x1, ..., xm} is a set of variables and D = {D1, ..., Dm} is a set of finite domains such that xi can take values only from Di = {vi 1, ..., vi di}. An assignment is a pair hxi, vi ki meaning that the variable xi is assigned the value vi k. A tuple is an ordered set. I = {I1, ..., In} is a set of secret inputs. Ii is a tuple of αi secret inputs (defined on a set F ) from the agent Ai. Each input Ii belongs to F αi. C = {φ0, ..., φc} is a set of constraints. A constraint φi weights the legality of each combination of assign- ments to the variables of an ordered subset Xi of the variables in X, Xi ⊆ X. φ0 is a public constraint de- fined by a function φ0(ε) on tuples of assignments ε, known to everybody. Each constraint φi, i > 0, in C is defined as a known function φi(ε, I) over the secret inputs I, and the tuples ε of assignments to all the vari- ables in a set of variables Xi, Xi ⊆ X. The projection of a tuple ε of assignments over a tuple of variables Xi is denoted εXi. A solution is: ε∗ = argminε∈D1×...×Dn φi(εXi), c Xi=1 i=1 φi(ε∗ Xi ) ∈ [B1...B2]. if Pc O = {o1, ..., on} is the set of outputs to the different agents. oi : I × D1 × ... × Dm → F ωi is a function receiving as parameter the inputs and a solution, and returning ωi secret outputs (from F ) that will be re- vealed only to the agent Ai. The problem is to generate O. The above DCOP framework was designed to be ad- dressed with cryptographic protocols and allows for chaining multiple DCOPs for solving complex problems such as Vickrey Auctions (Silaghi 2005a). It does not support non-cryptographic privacy aware solvers as it does not model costs for partial privacy leaks, for DCOP With Privacy for Frameworks Non-cryptographic quantifica- tion of privacy in distributed CSPs is introduced in (Savaux et al. 2016), to enable the evaluation of non-cryptographic solvers: Solvers The Definition 8 (UDCSP) A UDisCSP is formally de- fined as a tuple hA, V, D, C, U, Ri where: • A = hA1, ..., Ani is a vector of n agents • V = hx1, ..., xni is a vector of n variables. Each agent Ai controls the variable xi. • D = hD1, ..., Dni where Di is the domain for the vari- able xi, known only to Ai, and a subset of {1, ..., d}. • C = {C1, ..., Cm} is a set of interagent constraints. • U = {u1,1, ..., un,d} is a matrix of privacy costs where ui,j is the cost of agent Ai for revealing whether j ∈ Di. • R = hr1, ..., rni is a vector of rewards, where ri is the reward agent Ai receives if an agreement is found. An agreement as a set of assignments for all the vari- ables with values from their domain, such that all the constraints are satisfied. The state of agent Ai includes the subset of Di that it has revealed, as well as the achievement of an agree- ment. The problem is to define a set of communication actions and a policy for each agent such that their util- ity is maximized. Another framework that allows for privacy loss but quantifies it was proposed in (Doshi et al. 2008). It is defined formalizing the concept of revelation: Definition 9 (Revelation) Given a set of Boolean (propositional) secrets S and a set of agents A, a possi- ble revelation R(A, S) is a function R(A, S) : A × S → [0, 1] which maps each peer agent and a secret to the probability learned by that agent about the secret. Definition 10 (DPCOP (Doshi et al. 2008)) A (minimization) Distributed Private Constraint Optimization Problem (DPCOP) is defined by a tuple (A, X, D, C, P, U ). A is a set of agents {A1, ..., AK}. X is a set of variables {x1, ..., xn}, and D is a set of domains {D1, ..., Dn} such that each variable xi may take values only from the domain Di. The variables are subject to a set C of sets of weighted constraints {C0, C1, ..., CK}, where Ci = {φ1 i } holds the secret weighted constraints of agent Ai, and C0 holds the public constraints. Each weighted constraint is defined as a function φi : Xi → R+ where Xi ⊆ X. The value of such a function in an input point is called constraint entry, and each Ci can be seen as a set Ci of such constraint entries. P is a set of privacy loss cost functions {P1, ..., PK }, one for each agent. Pi defines the cost inflicted to Ai by each revelation r of its secrets, i.e., Pi(r) : R(A, Ci) → R+. U is a set {U1, ..., UK}. Ui is the reward received by Ai if a solution is found (used for deciding to abandon the search). i , ..., φci A solution is an agreement between agents in A on a tuple ǫ∗ of assignments of values to variables that min- imizes the total cost: ǫ = argminǫXi  Xj φj (ǫ) (ǫ)!  + Pi Yi where Qi(ǫ) is the revelation R(A, Ci) during the pro- cess leading to the agreement on the assignments ǫ. This definition quantifies privacy and drops the con- cept of control by agents on variables, which we de- scribe as unclear in previous definitions. A vari- ant related to UDCSP is described and evaluated in (Savaux et al. 2017). Privacy Classifications There concepts tion (L´eaut´e and Faltings 2013). distributed several efforts are in classify to constraint privacy optimiza- • Domain Privacy As Existence of Values The ex- planation in (Yokoo et al. 1998) concerning the first distributed CSP definition can be interpreted as de- scribing a privacy concerning the very existence of values in domains. This goes to the point where the constraints of other agents cannot be defined exten- sionally due to the impossibility to enumerate these domains (e.g., impossibility to enumerate all meeting places that an agent controlling the corresponding variable may think about). This kind of domain pri- vacy was highlighted in (Brito and Meseguer 2003). • Domain Privacy As Unary Constraint The first types of privacy mentioned in (Yokoo et al. 1998) are domain and constraint privacy. Domain pri- vacy is frequently understood as a unary constraint on the values of a variable (Yokoo et al. 1998). This interpretation is assumed in many subse- quent works, where agents' constraints are assumed to be extensionally defined using mutual knowl- edge of the values in domains of each others' variables (Silaghi, Sam-Haroud, and Faltings 2000b; Modi et al. 2002). • Constraint Privacy for focusing controlling Constraint privacy is linked to the knows pred- in the original distributed CSP defini- icate Later work propose tion (Yokoo et al. 1998). assumptions to drop the variable in exchange on constraint pri- (Silaghi, Sam-Haroud, and Faltings 2000a; vacy Silaghi, Sam-Haroud, and Faltings 2000b). Inter- mediary frameworks allowing for some constraint privacy by distribution in order to maintain the notion of control of variables have also been proposed by splitting binary constraints into private halves, but it is unclear if the under-defined control of variables offers a tradeoff for the reduced constraint privacy. • Privacy of Existence of Solution The fact that the problem in not solvable may in itself be a secret and impact on revelation of information. This privacy was addressed first in (Silaghi 2005b), based on stochastically discarding solutions even in problems found solvable by systematic solvers, to hide solution existence. • Privacy of Decision The decision, as to what value is assigned to an individual variable in the final so- lution, only needs to be revealed to a predefined set of agents, and this was introduced in (Silaghi 2004b; Silaghi et al. 2005). • Privacy of Assignments The individual values being tried during search by an agent can be secret and certainly reveal secrets about unary constraint of the proposer. This privacy is arguably at least partially achieved by the original ABT algorithm in (Yokoo et al. 1992) where assignments are only announced to relevant agents. A twist where values are only revealed by relation was sometimes also claimed to increase this pri- (Silaghi, Sam-Haroud, and Faltings 2000b; vacy Brito and Meseguer 2003). unclear whether cryptographic algorithms offer this pri- vacy or it as in them (Silaghi 2004a; no proposal is made Silaghi and Mitra 2004). simply irrelevant them, for It is is • Privacy of Algorithms The privacy of algorithm is typically defined as a pri- vacy with respect to what reasoning processes are performed by an agent, other than the constraints on possible messages enforced by the commonly agreed solver protocol. Such privacy of algorithms is de- scribed in (Silaghi and Faltings 2002a). In solutions based on cryptographic protocols the equivalent con- cept for enforcing privacy of algorithm is introduced in (Silaghi and Friedrich 2005; Silaghi 2005a), allow- ing for the definition of a stronger level of privacy: requested privacy. Definition 11 (requested privacy) Given secret inputs σ, the prior knowledge Γ of t colluders and a multi-party computation process Π with answer α that can be decomposed in a desired data α∗ and an algo- rithmic dependent unrequested data ¯α, we say that an algorithm A achieves requested t-privacy if the proba- bility distribution of the secrets that an attacker con- trolling any at most t participants can learn is condi- tionally independent on Π, A and ¯α given requested data α∗ and prior knowledge Γ. P (σ α, Γ, Π, A) = P (σ α∗, Γ) This concept of requested privacy is the strongest known relevant privacy concept and can be relaxed for computational purposes to: Definition 12 (non-uniform requested privacy) Given secret inputs σ, the prior knowledge Γ of t colluders and a multi-party computation process Π with answer α that can be decomposed in a desired data α∗ and an algorithmic dependent unrequested data ¯α, we say that an algorithm A achieves non-uniform requested t-privacy if for any secret ¯σ ∈ σ that is not deterministically revealed given requested data α and prior knowledge Γ, it is also not deterministically revealed given Π, A, and ¯α, to any attacker controlling any at most t participants. ∀¯σ ∈ σP (¯σ α∗, Γ) < 1 ⇒ P (¯σ α, Γ, Π, A) < 1 • Privacy of Constraint Topology in was shown It (Silaghi 2004a; Silaghi, Faltings, and Petcu 2006) that erasing topological information information by combining all constraints into a big n-ary function maximizes privacy. the protection of topological information can be a secret in itself, with application to protecting trade secrets, as in (Silaghi et al. 2001; Silaghi and Faltings 2002c). Further, • Agent Identity Privacy Hiding the real identity of the agents participating in a DCOP is a concern discussed in (L´eaut´e and Faltings 2013). This refers to the general concept of anonymity, where software agents cannot be linked to human owners. Steganographic DCOPs Besides the previous types of privacy, we raise the next one: • Privacy of Existence of Secrets In an observation we introduce here, note that for many of the studied DCOP frameworks, the agents that participate in the computation may need to suggest or admit that there exist secrets involved in the computation, without which the additional costs of the setup and execution would not be warranted. But admitting that secrets may be involved is some- times a significant privacy loss in itself, for example when agents want to claim openness for political rea- sons. This concept is introduced in this paper, with the Steganographic DCOP. Steganography is the area of cryptography concerned with hiding of the existence of secret information. While the oldest example of steganography dates from Histaeus' 499BC message tattooed under the hair of a slave's head, as described by Herodotus, the best known modern techniques range from invisible ink to hiding of data in poetry and images. Steganography is more appropriate then cryptogra- phy for the case of secrets with social impact, as is often the case with distributed constraint optimiza- tion (DCOP). With social impacts, an agent may lose status simply by stating that it has secrets, and trying to safeguard them. Politicians (and not only them) try to claim openness and lack of secrets. In our experience, the need to protect existence of secrets proved to be a key impediment to the large scale adoption of cryptographic DCOP solvers, since many potential users find it difficult to publicly admit a need, or to call for secret problem solving. In this work we identify the steganographic potential of traditional DCOP solvers where the technical dis- tribution of the problem can be claimed as the unique cause of avoiding decentralization and straightforward full revelation, allowing to hide privacy needs. The basic framework recommended for stegano- graphic DCOPs, rephrasing variable ownership require- ments as unary constraint, is: Definition 13 (StegDomDCOP) A Steganographic Domain Distributed Constraint Optimization Problem (StegDomDCOP) consists of n agents A = {a1, ..., an} and n variables V = {x1, x2, ...xn}. Each agent ai has a unary constraint on xi and its domain Di. Agents know weighed constraints on subsets of these variables, specifying costs and rewards induced by assignments to concerned variables. Each agent can also identify, for each cost it associates with a total assignment, a secret reward for not revealing it. The goal is to choose values for variables such that an objective function is minimized or maximized, while each agent's participation is rational, performing only acts with positive expected sum of costs and rewards. The objective function described is addition over costs, but can be any associative, commutative, monotonic ag- gregation operator defined over a totally ordered set of valuations, with minimum and maximum elements. The requirement of having the number of vari- ables equal the number of agents can be dropped, together with the requirement that each agent has a unary constraint on a distinct variable, ob- framework that maps eas- taining an equivalent ier to the problems in (Silaghi, Sam-Haroud, and Faltings 2000b): to certain problems, like Definition 14 (StegCosDCOP) A Steganographic Cost Distributed Constraint Optimization Problem (StegCosDCOP) consists of m agents A = {a1, ..., am} and n variables V = {x1, x2, ...xn}. Agents know weighed constraints on subsets of these variables, specifying costs and rewards induced by assignments to concerned variables. Each agent can also identify, for each cost it associates with a total assignment, a secret reward for not revealing it. The goal is to choose values for variables such that an objective function is minimized or maximized, while each agent's participation is rational, performing only acts with positive expected sum of costs and rewards. The objective function described is addition over costs, but can be any associative, commutative, monotonic ag- gregation operator defined over a totally ordered set of valuations, with minimum and maximum elements. in the of fact that the last The power theory expression two frameworks are guaranteed equivalent by dual CSP conver- sions (Bacchus and Van Beek 1998). However, mod- eling strategies and solvers may perform significantly better with one rather than the other approach, since the transformation between representations can be laborious. primal is The StegDCOP framework has the advantage that its agent problems can be masqueraded as instances of any common DCOP framework, and can be used in asynchronous search protocols to protect privacy without making other agents suspicious, as in (Silaghi and Faltings 2002a). The framework enables the support of privacy of con- straints and privacy of domains in a similar way to UD- COP and DCSPs. Frameworks Disambiguation Distributed Constraint Optimization Frameworks can be classified along the following independent dimen- sions: • X1 Boolean, Fuzzy, semiring/value system: Weighted, Probabilistic • X2 structure of the problem: Static, Dynamic Local (D L), Dynamic Topology (D T) • X3 whether domains are known only by some agents, by everyone with variable ownership (enabling exten- sional constraint representation), or with distribution of constraints. Combinations are possible. The corre- sponding distribution reasons are named: Domains, Variables, Costs, Domains Costs (D C), ... • X4 privacy of decision specification, for opening all assignments in the adopted solution to everyone, or only to specified agents: Open, Closed • X5 privacy management, where participants claim no privacy and do not secretly quantify privacy con- cerns, where participants claim privacy and secretly quantify its loss, where participants claim no pri- vacy but secretly quantify privacy concerns, and where secrecy is admitted and enforced with cryp- tography: Public, Quantified, Steganographic, Cryptographic1 • X6 optimization function with utilitarian summa- tion of constraints, egalitarian Leximin, or egalitarian Theil index2: Utilitarian, Leximin, Theil A nomenclature can be designed to easily differen- tiate between the different types of frameworks, or to enable studies of framework relations and hierarchy. To maximize compatibility with past practice and the logic of the framework design, the proposed name struc- ture is: X6X5X4DisX3X2X1COP (1) where each of the names can be in camel case on any unambiguous prefix of the above properties, to enable disambiguation and easy extensions. The new nomenclature (1) is long and shorter versions can be obtained by selecting as defaults: X6=Utilitarian, X5=Public, X4=Open, X3=Domain, X2=Static, X1=Weighted. Each default parameter can be skipped if all other parameters it separates from the base string "Dis" are at their default value. Further, the Boolean- COP can also be historically named as CSP. With these conventions, for example: 1See (Yokoo, Suzuki, and Hirayama 2002; Silaghi 2003; Grinshpoun et al. 2019; Silaghi and Mitra 2004; Grinshpoun and Tassa 2016) 2See (Matsui et al. 2018; Netzer and Meisels 2011) • DCOP. The common DCOP in Defini- tion 5 (Modi et al. 2002) becomes Utilitarian- Public-Open-Dis-Domains-Static-Weighted-COP or shorter UPODisDSWCOP With the use of defaults, the acronym becomes DisCOP. • UDCOP. UDCOPs (Savaux et al. 2017) with full camel case specifiers becomes Utilitarian- Quantified-Open-Dis-Domains-Static-Weighted- COP or shorter, UQODisDSWCOP. With the use of defaults, the acronym becomes QODisCOP. • The new StegDomDCOP framework in Defini- tion 13 becomes Utilitarian-Steganographic- Open-Dis-Domains-Static-Weighted-COP. With the use of defaults, the acronym becomes SODisCOP. • The new StegCosDCOP framework in Defini- tion 14 becomes Utilitarian-Steganographic- Open-Dis-Costs-Static-Weighted-COP. With the use of defaults, the acronym becomes SODisCCOP. • DisWCSP. The DisWCSP (Silaghi 2005a) becomes tion 7 Cryptographic-Closed-Dis-Costs-Static- Weighted-COP or UCCDisCSWCOP. With the use of defaults, the acronym becomes CCDisCCOP. Defini- in Utilitarian- • DCSP. With this proposal, the original DCSP is denoted in Definition 3 (Yokoo et al. 1992) Utilitarian-Public-Open-Dis-Domains-Static- Boolean-COP or UPODisDSBCOP. With the use of defaults, acronym becomes DisCSP, as that acronym was used in several previous works (Silaghi, Sam-haroud, and Faltings 2001). the • DisCSP With the use of defaults, 4 private constraints (Silaghi and Faltings 2005) SPs with tion Utilitarian-Public-Open-Dis-Domains Costs- Static-Boolean-COP or UPODisD CSBCOP and would be denoted shortly DisD CCSP. the DisC- from Defini- denoted is We note that the term "Open" that we pro- pose for specifying the publication of the final de- cisions, has been used in the past as synonym for dynamism (Silaghi and Faltings 2002b). The term "Utilitarian" DCOP has been used for specifying ex- plicit representation of Privacy, but also to express util- itarian maximization of social welfare (Walras 1896). However, the possible acronyms in the new nomencla- ture will not conflict with prior notations (that did not already have conflict, like DCSP). Conclusion We have identified a new type of privacy relevant to Distributed Constraint Optimization, namely privacy of existence of secrets, leading to the formal introduc- tion of the Steganographic DCOPs. The new framework allows for disambiguate between problems where pri- vacy is public but quantified and when privacy require- ments are hidden (steganography). We review existing frameworks offering privacy in constraint optimization to position the new type of privacy in the literature, and propose a new nomenclature system that, if adopted, can help disambiguate all privacy frameworks found in use. Further, the obtained classification can be used to identify gaps in the literature as well as valuable new frameworks to study. References [Bacchus and Van Beek 1998] Bacchus, and Van Beek, P. 1998. On the conversion between non-binary and binary constraint satisfaction prob- lems. In AAAI/IAAI, 310 -- 318. F., [Bistarelli et al. 1999] Bistarelli, S.; Montanari, U.; Rossi, F.; Schiex, T.; Verfaillie, G.; and Fargier, H. Semiring-based csps and valued csps: Frameworks, properties, and comparison. Constraints 4(3):199 -- 240. 1999. [Brito and Meseguer 2003] Brito, I., and Meseguer, P. 2003. Distributed forward checking. In International Conference on Principles and Practice of Constraint Programming, 801 -- 806. Springer. [Doshi et al. 2008] Doshi, P.; Matsui, T.; Silaghi, M.; Yokoo, M.; and Zanker, M. 2008. Distributed pri- vate constraint optimization. In Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Volume 02, 277 -- 281. IEEE Computer Society. [Faltings, L´eaut´e, and Petcu 2008] Faltings, B.; L´eaut´e, T.; and Petcu, A. 2008. Privacy guarantees through distributed constraint satisfaction. In Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT'08. IEEE/WIC/ACM International Conference on, vol- ume 2, 350 -- 358. IEEE. [Franzin et al. 2002] Franzin, M. S.; Freuder, E.; Rossi, F.; and Wallace, R. 2002. Multi-agent meeting schedul- ing with preferences: efficiency, privacy loss, and solu- tion quality. In Proceedings of the AAAI Workshop on Preference in AI and CP. [Freuder, Minca, and Wallace 2001] Freuder, E. C.; Minca, M.; and Wallace, R. J. 2001. Privacy/efficiency tradeoffs scheduling by constraint-based agents. IJCAI DCR, 63 -- 72. in distributed meeting In Proc. [Greenstadt, Pearce, and Tambe 2006] Greenstadt, R.; Pearce, J. P.; and Tambe, M. 2006. Analysis of privacy loss in distributed constraint optimization. In AAAI, volume 6, 647 -- 653. [Grinshpoun and Tassa 2016] Grinshpoun, and Tassa, T. 2016. P-syncbb: A privacy preserving branch and bound dcop algorithm. Journal of Artificial Intelligence Research 57:621 -- 660. T., [Grinshpoun et al. 2019] Grinshpoun, T.; Tassa, T.; Levit, V.; and Zivan, R. 2019. Privacy preserving re- gion optimal algorithms for symmetric and asymmetric dcops. Artificial Intelligence 266:27 -- 50. [Kasif 1990] Kasif, S. 1990. On the parallel complex- ity of discrete relaxation in constraint satisfaction net- works. Artificial Intelligence 45(3):275 -- 286. [L´eaut´e and Faltings 2013] L´eaut´e, T., and Faltings, B. 2013. Protecting privacy through distributed computa- tion in multi-agent decision making. Journal of Artifi- cial Intelligence Research 47:649 -- 695. [Maheswaran et al. 2006] Maheswaran, R. T.; Pearce, J. P.; Bowring, E.; Varakantham, P.; and Tambe, M. 2006. Privacy loss in distributed constraint reasoning: A quantitative framework for analysis and its applica- tions. Autonomous Agents and Multi-Agent Systems 13(1):27 -- 60. [Matsui et al. 2018] Matsui, T.; Matsuo, H.; Silaghi, M.; Hirayama, K.; and Yokoo, M. 2018. Leximin asymmet- ric multiple objective distributed constraint optimiza- tion problem. Computational Intelligence 34(1):49 -- 84. [Modi et al. 2002] Modi, P. J.; Shen, W.-M.; Tambe, M.; and Yokoo, M. 2002. An asynchronous complete method for general distributed constraint optimization. In Proc of Autonomous Agents and Multi-Agent Sys- tems Workshop on Distributed Constraint Reasoning. [Netzer and Meisels 2011] Netzer, A., and Meisels, A. 2011. Social dcop-social choice in distributed con- straints optimization. In Intelligent Distributed Com- puting V. Springer. 35 -- 47. [Savaux et al. 2016] Savaux, J.; Vion, J.; Piechowiak, S.; Mandiau, R.; Matsui, T.; Hirayama, K.; Yokoo, M.; El- mane, S.; and Silaghi, M. 2016. Discsps with privacy recast as planning problems for self-interested agents. In Web Intelligence (WI), 2016 IEEE/WIC/ACM In- ternational Conference on, 359 -- 366. IEEE. [Savaux et al. 2017] Savaux, J.; Vion, J.; Piechowiak, S.; Mandiau, R.; Matsui, T.; Hirayama, K.; Yokoo, M.; El- mane, S.; and Silaghi, M. 2017. Utilitarian approach to privacy in distributed constraint optimization prob- lems. In The Thirtieth International Flairs Conference. [Schiex et al. 1995] Schiex, T.; Fargier, H.; Verfaillie, G.; et al. 1995. Valued constraint satisfaction prob- lems: Hard and easy problems. IJCAI 95:631 -- 639. [Silaghi and Faltings 2002a] Silaghi, M.-C., and Falt- ings, B. 2002a. A comparison of distributed constraint satisfaction techniques with respect to privacy. In AA- MAS DCR Workshop. [Silaghi and Faltings 2002b] Silaghi, M.-C., and Falt- ings, B. 2002b. Openness in asynchronous constraint satisfaction algorithms. In 3rd DCR-02 Workshop, 156 -- 166. [Silaghi and Faltings 2002c] Silaghi, M.-C., and Falt- ings, B. V. 2002c. Self reordering for security in gener- alized english auctions (gea). In Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, 459 -- 460. ACM. [Silaghi and Faltings 2005] Silaghi, M.-C., and Faltings, B. 2005. Asynchronous aggregation and consistency discsp solvers for generalized vickrey auctions, complete and stochastic secure techniques. In In IJCAI05 DCR Workshop. Citeseer. [Silaghi 2005b] Silaghi, M.-C. 2005b. Hiding absence of solution for a distributed constraint satisfaction prob- lem. In FLAIRS Conference, 854 -- 855. [Wallace and Silaghi 2004] Wallace, R., and Silaghi, M. C. 2004. Using privacy loss to guide decisions in distributed csp search. In FLAIRS04. [Walras 1896] Walras, L. 1896. ´El´ements d'´economie politique pure, ou, Th´eorie de la richesse sociale. F. Rouge. [Yokoo et al. 1992] Yokoo, M.; Ishida, T.; Durfee, E. H.; and Kuwabara, K. 1992. Distributed constraint sat- isfaction for formalizing distributed problem solving. In 1992 12th International Conference on Distributed Computing System, 614 -- 621. IEEE. [Yokoo et al. 1998] Yokoo, M.; Durfee, E. H.; Ishida, T.; and Kuwabara, K. 1998. The distributed con- straint satisfaction problem: Formalization and algo- rithms. IEEE Transactions on knowledge and data en- gineering 10(5):673 -- 685. [Yokoo, Suzuki, and Hirayama 2002] Yokoo, M.; Secure dis- Suzuki, K.; and Hirayama, K. tributed constraint satisfaction: Reaching agreement without revealing private information. In International Conference on Principles and Practice of Constraint Programming, 387 -- 401. Springer. 2002. in distributed constraint satisfaction. Artificial Intelli- gence 161(1-2):25 -- 53. 2005. [Silaghi and Friedrich 2005] Silaghi, M. C., and Friedrich, G. Secure stochastic multi-party computation for combinatorial problems and a privacy concept that explicitely factors out knowledge about the protocol. Cryptology ePrint Archive, Report 2005/154. https://eprint.iacr.org/2005/154. [Silaghi and Mitra 2004] Silaghi, M.-C., and Mitra, D. Distributed constraint satisfaction and op- 2004. In Intelli- timization with privacy enforcement. gent Agent Technology, 2004.(IAT 2004). Proceedings. IEEE/WIC/ACM International Conference on, 531 -- 535. IEEE. [Silaghi et al. 2001] Silaghi, M.-C.; Sam-Haroud, D.; Calisti, M.; and Faltings, B. 2001. Generalized english auctions by relaxation in dynamic distributed csps with private constraints. In Proceedings of the IJCAI-2001 Workshop on Distributed Constraint Reasoning, 45 -- 54. Citeseer. [Silaghi et al. 2005] Silaghi, M.-C.; Abhyankar, A.; Zanker, M.; and Bart´ak, R. 2005. Desk-mates (sta- ble matching) with privacy of preferences, and a new distributed csp framework. AAAI Press. [Silaghi, Faltings, and Petcu 2006] Silaghi, M.-C.; Falt- ings, B.; and Petcu, A. 2006. Secure combinatorial optimization simulating dfs tree-based variable elimi- nation. In ISAIM. [Silaghi, Sam-Haroud, and Faltings 2000a] Silaghi, M. C.; Sam-Haroud, D.; and Faltings, B. 2000a. Dis- tributed asynchronous search with private constraints. In Proceedings of the fourth international conference on Autonomous agents, 177 -- 178. ACM. [Silaghi, Sam-Haroud, and Faltings 2000b] Silaghi, M.- C.; Sam-Haroud, D.; and Faltings, B. 2000b. Asyn- chronous search with aggregations. In AAAI/IAAI, 917 -- 922. [Silaghi, Sam-haroud, and Faltings 2001] Silaghi, M.- C.; Sam-haroud, D.; and Faltings, B. 2001. Abt with asynchronous reordering. In Intelligent Agent Tech- nology: Research and Development. World Scientific. 54 -- 63. [Silaghi 2003] Silaghi, M.-C. 2003. Arithmetic circuit for the first solution of distributed csps with cryptographic multi-party computations. In IAT, 609 -- 613. [Silaghi 2004a] Silaghi, M.-C. 2004a. Meeting schedul- ing guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any discsp). In Web Intelligence, 2004. WI 2004. Proceedings. IEEE/WIC/ACM Inter- national Conference on, 711 -- 715. IEEE. [Silaghi 2004b] Silaghi, M.-C. 2004b. Secure multi-party computation for selecting a solution according to a uni- form distribution over all solutions of a general combi- natorial problem. Cryptology ePrint Archive, Report 2004/333. https://eprint.iacr.org/2004/333. [Silaghi 2005a] Silaghi, M. C. 2005a. Using secure
1604.08226
1
1604
2016-04-27T20:22:27
Influence of Agents Heterogeneity in Cellular Model of Evacuation
[ "cs.MA" ]
The influence of agents heterogeneity on the microscopic characteristics of pedestrian flow is studied via an evacuation simulation tool based on the Floor-Field model. The heterogeneity is introduced in agents velocity, aggressiveness, and sensitivity to occupation. The simulation results are compared to data gathered during an original experiment. The comparison shows that the heterogeneity in aggressiveness and sensitivity occupation enables to reproduce some microscopic aspects. The heterogeneity in velocity seems to be redundant.
cs.MA
cs
Influence of Agents Heterogeneity in Cellular Model of Evacuation Pavel Hrab´aka,∗, Marek Buk´acekb aBrno University of Technology, Faculty of Civil Engineering, Vever´ı 331/95, 602 00 Brno, bCzech Technical University in Prague, Faculty of Nuclear Sciences and Physical Engineering, Trojanova 13, 120 00 Prague, Czech Republic Czech Republic Abstract The influence of agents heterogeneity on the microscopic characteristics of pedes- trian flow is studied via an evacuation simulation tool based on the Floor-Field model. The heterogeneity is introduced in agents velocity, aggressiveness, and sensitivity to occupation. The simulation results are compared to data gathered during an original experiment. The comparison shows that the heterogeneity in aggressiveness and sensitivity occupation enables to reproduce some microscopic aspects. The heterogeneity in velocity seems to be redundant. Keywords: Travel time, Floor-Field model, Aggressiveness, Bonds principle, Heterogeneity, Pedestrian dynamics 1. Introduction The presented study of the heterogeneity in CA models directly extends the contribution on aggressiveness presented in [1]. Detailed study of the het- erogeneity in more aspects of agents in Floor-Field model is based on empir- ical observations related to variety of experiments conducted by our research group [2, 3, 4]. We aim to investigate, whether some microscopic aspects of the pedestrian flow can be mimicked introducing heterogeneity to some parameters of Floor-Field model. The experiments mentioned above were designed to study the boundary induced phase transition, which has been analysed theoretically in [5] for Floor- Field model. The object of such study is a rather small room with one exit and one multiple entrance, which may be considered as one segment of a large network. During the experiment, an important aspect of pedestrian behaviour has been observed: participants have different ability to push through the crowd, ∗Corresponding author. Tel.: +420 224 358 567; fax: +420 234 358 643 Email addresses: [email protected] (Pavel Hrab´ak), [email protected] (Marek Buk´acek) Preprint submitted to Journal of Computational Science July 29, 2021 what leads to significant variance in the time spent by the pedestrian in the room. The presented cellular model is based on the Floor-Field Model [6, 7, 8] with adaptive time-span [9] and principle of bonds [10]. The adaptive time span en- ables to model heterogeneous stepping velocity of pedestrians; the principle of bonds helps to mimic collective behaviour of pedestrians in lines. For compre- hensive summary of Floor-Field model modifications capturing different aspects of pedestrian flow and evacuation dynamics we refer the reader to [11]. In this article we focus on the heterogeneity in three aspects of the pedes- trian flow: the desired velocity, aggressiveness (or ability to win conflicts), and sensitivity to occupancy (related to line formation). 2. Experiment Presented simulation study leans over the experiment "passing-through", which set-up is schematically depicted in in Figure 1. Detailed analyses of the experiment with respect to microscopic aspects of pedestrian flow can be found in [3, 4]. Selected results of the above mentioned studies are summarized in this section. Videos capturing some aspects of the experiment are available at http://gams.fjfi.cvut.cz/peds. Figure 1: Taken from [3]. Left: Setting of the experiment, a = 7.2 m, b = 4.4 m. Right: sketch of pedestrian's hat used for automatic image recognition. In the experiment participants were instructed to walk through the rect- angular room with one 60 cm wide exit and multiple entrance. The inflow of pedestrians α [ped/s] has been artificially controlled in order to investigate the boundary induced phase transition, which is not the subject of this article. Nevertheless, thanks to that the pedestrian behaviour could be observed under variety of conditions. The size of the crowd in front of the exit played the main role. During each run of the experiment, pedestrians were passing repeatedly through the room in order to keep stable inflow for sufficiently long time. Due to that there are 20 to 40 records for each participant. Moreover, the unique codes assigned to all participants enabled the study of individual properties of the pedestrians under variety conditions. 2 26252423222120control bitbinary codecentre of massrecognitionmark Usually the maximal outflow/capacity is related to bottleneck width b. In [12] the dependence is suggested Jmax = 1.9 · b. Here we note that the measured ca- pacity of the bottleneck in the experiment was approximately 1.4 ped/s, which is higher than suggested. It was caused by high motivation of pedestrians to exit the room nad by the fact that the narrowing was fallowed by a slightly wider corridor. Despite that the motion of pedestrians within the following corridor was strictly one-lane without overtaking. 2.1. Travel-Time The key investigated quantity is the travel time T T denoting the time in- terval between the entrance at Tin and the egress at Tout of each pedestrian, i.e., T T = Tout − Tin. To capture the pedestrians behaviour under variety of conditions, the travel time is investigated with respect to the average number of pedestrians in the room Nmean defined as Nmean = 1 Tout − Tin(cid:90) Tout Tin N (t)dt , (1) where N (t) stands for the number of pedestrians in the room at time t. As expected the average T T increases with respect to the number of pedestrians in the room N , referred further as the occupancy. Surprisingly, the variance of the T T increases dramatically with occupancy as well. Figure 2: Taken from [4]. Scatter plot of the travel time T T with respect to the occupancy Nmean extracted from the experiment. Three participants are highlighted. Their travel time is approximated by the piecewise linear model (2). We can see that Ped. 2 has lower desired velocity in free regime but higher ability to push through the crowd in comparison to Ped. 4. Figure 2 shows the scatter plot of all pairs (Nmean, T T ) gathered over all runs of experiment and all participants. Records corresponding to three chosen pedestrians are highlighted. We can observe that the reaction of participants to the occupancy N significantly differs. The mean travel time in the free-flow regime (0 - 7 pedestrians) reflects the pedestrian desired velocity; the slope of the travel-time dependence on the occupation N in the congested regime (10 - 3 0510152025303540455001020304050N_mean [peds]TT [s] Ped. 17 dataPed. 17 modelPed. 4 dataPed. 4 modelPed. 2 dataPed. 2 model 45 pedestrians) reflects the pedestrian ability to push through or walk around the crowd. This observation corresponds to the piece-wise linear model for each pedestrian S v0(i) T T = + 1{N >7}(N − 7) · slope(i) + noise (2) where S = 7.2 m, v0(i) is the free-flow velocity of the pedestrian i, slope(i) is the unique coefficient of the linear model for pedestrian i. The breakpoint N = 7 depends from the room geometry. The weighted mean of the R2 value of the model (2) is 0.688. 2.2. Heterogeneity and Travel-Time The high variance of the T T caused by the heterogeneous reaction to crowd is reflected in the distribution of the relative travel-time T TR, i.e., normalized T T with respect to the average of records corresponding to similar occupancy Nmean. Figure 3 present the histograms of T TR for free flow regime (0-7 pedestrians) and for congested regime (30-50 pedestrians). Figure 3: Taken from [4]. Realative travel-time in free-flow 0-7 ped (left) and congested regime 30-45 ped (right). There are two aspects explaining the high variance of the T T accompanied with extremely low and high values in congested regime: the aggressiveness and better path choice. We have observed that some of the pedestrians were pushing effectively through the crowd in order to get to the exit. This caused that some less aggressive pedestrians stayed trapped within the crowd or on its edge for significantly longer time. Furthermore, observing the path choice of "fast" and "slow" pedestrians we can make a conclusion that the lower travel-time was reached by walking around the crowd as well, see Figure 4. 3. Model Definition The model used for this study comes out from the Floor-Field cellular model with several modifications introduced in [10, 9] and studied in more detail in [13] extended by the aggressiveness element [1]. The playground of the model is represented by the rectangular two-dimensional lattice L ⊂ Z2 consisting of cells x = (x1, x2). Every cell may be either occupied by one agent or empty. 4 00.511.522.533.5020406080TT_R00.511.522.533.5050100150TT_R Figure 4: Taken from [4]. Trajectories of pedestrians in front of the exit grouped according to the related travel-time, high T T left and low T T right. Agents are moving along the lattice by hopping from their current cell x ∈ L to a neighbouring cell y ∈ N (x) ⊂ L, where the neighbourhood N (x) is Moore neighbourhood, i.e., N (x) = {y ∈ L; maxj=1,2 xj − yj ≤ 1} . 3.1. Choice of the New Target Cell Agents choose their target cells y from N (x) stochastically according to probabilistic distribution P (y x; state of N (x)), which reflects the "attrac- tiveness" of the cell y to the agent. Part of the "attractiveness" is expressed by means of the static field S, where S(y) =(cid:112)y12 + y22 is the distances of cell y ∈ L to the exit cell E = (0, 0) acting as the common target for all agents. As usual, P (y x) ∝ exp{−kSS(y)}, for y ∈ N (x), where kS ∈ [0, +∞) denotes the parameter of sensitivity to the field S. The probabilistic choice of the target cell is further influenced by the occu- pancy of neighbouring cells and by the diagonality of the motion. An occupied cell is considered to be less attractive, nevertheless, it is meaningful to allow the choice of an occupied cell while the principle of bonds is present (explanation of the principle of bonds follows below). Furthermore, the movement in diagonal direction is penalized in order to suppress the zig-zag motion in free flow regime and support the symmetry of the motion with respect to the lattice orientation. Technically this is implemented as follows. Let Ox(y) be the identifier of agents occupying the cell y from the point of view of the agent sitting in cell x, i.e. Ox(x) = 0 and for y (cid:54)= x Ox(y) = 1 if y is occupied and Ox(y) = 0 if y is empty. Then P (y x) ∝ (1 − kOOx(y)), where kO ∈ [0, 1] is again the parameter of sensitivity to the occupancy (kO = 1 means that occupied cell will never be chosen). Similarly can be treated the diagonal motion defining the diagonal movement identifier as Dx(y) = 1 if (x1 − y1) · (x2 − y2) (cid:54)= 0 and Dx(y) = 0 otherwise. Sensitivity parameter to the diagonal movement is denoted by kD ∈ [0, 1] (kD = 1 implies that diagonal direction is never chosen). The probabilistic choice of the new target cell can be than written in the final form P (y x) = exp(cid:8) − kSS(y)(cid:9)(cid:0)1 − kOOx(y)(cid:1)(cid:0)1 − kDDx(y)(cid:1) (cid:80)z∈N (x) exp(cid:8) − kSS(z)(cid:9)(cid:0)1 − kOOx(z)(cid:1)(cid:0)1 − kDDx(z)(cid:1) . (3) It is worth noting that the site x belongs to the neighbourhood N (x), therefore the equation (3) applies to P (x x) as well. 5 Figure 5: Choice of the target cell with respect to sensitivity to occupancy. Left: kO = 0, bond is created. Right: kO = 1, motion to second most attractive cell. 3.2. Updating Scheme The used updating scheme combines the advantages of fully-parallel up- date approach, which leads to necessary conflicts, and the asynchronous clocked scheme [14] enabling the agents to move at different rates. Each agent carries as his property the own period denoted as τ , which rep- resents the minimal time between two steps, leading to desired times of update to be t = kτ , k ∈ Z. The time-line is divided into isochronous intervals of the length h > 0. During each algorithm step k ∈ Z such agents are updated, whose desired time of the next actualization lies in the interval(cid:2)kh, (k + 1)h(cid:1). A wise choice of the interval length h in dependence on the distribution of τ enables to model heterogeneous velocity of agents while keeping sufficient number of conflicts. Here we note that we use the concept of adaptive time-span, i.e., the time of the desired actualization is recalculated after each update of the agent, since it can be influenced by the essence of the motion, e.g., diagonal motion leads to a time-penalization, since it is √2 times longer. For more detail see e.g. [9]. This is an advantage over the probabilistic approach introduced in [15]. 3.3. Principle of Bonds and Sensitivity to Occupation The principle of bonds is closely related to the possibility of choosing an occupied cell. An agent who chooses an occupied cell builds a bond to the agent sitting in there. This bond lasts until the motion of the blocking agent or until the next activation of the bonded agent. The idea is that the bonded agents attempt to enter their chosen cell immediately after it becomes empty. The parameter kO (sensitivity to occupation) influences the willingness of agents to bond. The effect of different occupancy values is illustrated in Figure 5. If kO = 0, agents choose the next target cell regardless whether it is occupied or empty, i.e, in case the most attractive cell (closer to the exit) is occupied, the agent creates a bond to the occupying agent assuming his motion within the step. This strategy supports the motion in lines and can lead to fluent flow through the bottleneck. On the other hand, the ignorance of occupancy leads to the increase of conflicts, which may block the motion in front of the 6 000111Figure5:Occupancy.3.2.UpdatingSchemeTheusedupdatingschemecombinestheadvantagesoffully-parallelup-dateapproach,whichleadstonecessaryconflicts,andtheasynchronousclockedscheme[16]enablingtheagentstomoveatdifferentrates.Eachagentcarriesashispropertytheownperioddenotedasτ,whichrep-130resentstheminimaltimebetweentwosteps,leadingtodesiredtimesofupdatetobet=kτ,k∈Z.Thetime-lineisdividedintoisochronousintervalsofthelengthh>0.Duringeachalgorithmstepk∈Zsuchagentsareupdated,whosedesiredtimeofthenextactualizationliesintheinterval(cid:2)kh,(k+1)h(cid:1).Awisechoiceoftheintervallengthhindependenceonthedistributionofτenablesto135modelheterogeneousvelocityofagentswhilekeepingsufficientnumberofcon-flicts.Herewenotethatweusetheconceptofadaptivetime-span,i.e.,thetimeofthedesiredactualizationisrecalculatedaftereachupdateoftheagent,sinceitcanbeinfluencedbytheessenceofthemotion,e.g.,diagonalmotionleadstoatime-penalization,sinceitis√2timeslonger.Formoredetailseee.g.[11].140Thisisanadvantageovertheprobabilisticapproachintroducedin[17].3.3.PrincipleofBondsandSensitivitytoOccupationTheprincipleofbondsiscloselyrelatedtothepossibilityofchoosinganoccupiedcell.Anagentwhochoosesanoccupiedcellbuildsabondtotheagentsittinginthechosencell.Thisbondlastsuntilthemotionoftheblockingagent145oruntilthenextactivationofthebondedagent.Theideaisthatthebondedagentsattempttoentertheirchosencellimmediatelyafteritbecomesempty.TheparameterkO(sensitivitytooccupation)influencesthewillingnessofagentstobond.TheeffectofdifferentoccupancyvaluesisillustratedinFigure5.IfkO=0,agentschoosethenexttargetcellregardlesswhetheritisoccupied150orempty,i.e,incasethemostattractivecell(closertotheexit)isoccupied,theagentcreatesabondtotheoccupyingagentassuminghismotionwithinthestep.Thisstrategysupportsthemotioninlinesandcanleadtofluentflowthroughthebottleneck.Ontheotherhand,theignoranceofoccupancyleadstotheincreaseofconflicts,whichmayblockthemotioninfrontofthe155exit.HereitisimportanttomentionthattheparameterkO<1influencesthecellattractivenessbeforethenormalization.Therefore,incaseofextremely6 Figure 6: Conflict solution for γ1 < γ2. Left: More aggressive wins the conflict over two less aggressive. Right: The conflict of two more aggressive can resolve by the blocking of the movement. exit. Here it is important to mention that the parameter kO < 1 influences the cell attractiveness before the normalization. Therefore, in case of extremely attractive cell (e.g. the exit), the probability distribution of choosing the next target cells does not change dramatically. 3.4. Solution of Conflicts and Aggressiveness The in essence parallel updating scheme is inevitable accompanied by con- flicts, when more agents decide to enter the same cell. In such case, one of the agents is usually chosen at random to win the conflict. There are more ap- proaches, how the randomness is executed, e.g. uniformly, or proportionally to the hopping probabilities [6]. Important role in models of pedestrian evacuation play the unresolved conflicts, i.e., the aim to attempt the same cell leads to the blocking of the motion. This is captured by the friction parameter µ denoting the probability that none of the agent wins the conflict. An improvement is given by the friction function [16], which raises the friction according to the number of conflicting agents. For purposes of this article, we introduce the choice of the winning agent based on his ability to win conflicts represented by an additional parameter γ ∈ [0, 1], which is referred to as the aggressiveness. Similar heterogeneity in agents behaviour has been used in [17], where the "aggressiveness" has been represented by the willingness to overtake. The conflict is always won by agents with highest γ among conflicting agents. If there are two or more agents with the highest γ, the friction parameter µ plays a role. In this article we assume that the higher is the aggressiveness γ, the less should be the probability that none of the agents wins the conflict. Therefore, the conflict is not solved with probability µ(1 − γ) (none of the agents move). With complement probability 1− µ(1− γ) the conflict resolves to the motion of one of the agents. This agent is chosen randomly with equal probability from all agents involved in the conflict having the highest γ. The conflict solution among heterogeneous group of agents is depicted in Figure 6. 7 6P.Hrab´akM.Buk´acekIftherearetwoormoreagentswiththehighestγ,thefrictionparameterµplaysarole.Inthisarticleweassumethatthehigheristheaggressivenessγ,thelessshouldbetheprobabilitythatnoneoftheagentswinstheconflict.Therefore,theconflictisnotsolvedwithprobabilityµ(1−γ)(noneoftheagentsmove).Withcomplementprobability1−µ(1−γ)theconflictresolvestothemotionofoneoftheagentswithhighestγ.Thisagentischosenatrandom.Themechanismofthefrictioncanbeeasilymodified.AnexampleofconflictsolutionisdepictedinFigure3.γ2γ1γ1γ2γ1γ1γ1γ2γ2µ(1−γ2)γ1γ2γ21−µ(1−γ2)2γ1γ2γ21−µ(1−γ2)2γ1γ2γ2Fig.3.Conflictsolutionforγ1<γ2.Left:Moreaggressivewinstheconflictovertwolessaggressive.Right:Theconflictoftwomoreaggressivecanresolvebytheblockingofthemovement.4ImpactoftheAggressivenessElementTheeffectoftheaggressivenesshasbeenstudiedbymeansofthesimulation.ResultsstressedinthisarticlecomefromthesimulationswithparametersgivenbyTable1.Thevaluesofτandγaredistributedamongagentsuniformlyandindependentlyoneachother.Table1.Valuesofparametersusedforsimulation.kSkOkDhµτγ3.510.70.1s0.5{.25,.4}{0,1}Thesimulationset-uphasbeendesignedaccordingtotheexperiment,i.e.,theroomofthesize7.2m×4.4mhasbeenmodelledbytherectangularlat-tice18siteslongand11siteswide.Thesizeofonecellthereforecorrespondsto0.4m×0.4m.Theexitisplacedinthemiddleoftheshorterwall,theopenboundaryismodelledbyamultipleentranceontheoppositewall.Newagentsareenteringthelatticestochasticallywiththemeaninflowrateα[pedes- 4. Simulation Setting Main goal of this article is to study the influence of heterogeneity in chosen parameters. In this article we focus on the heterogeneity in free-flow velocity (represented by own frequency), aggressiveness, and sensitivity to occupation. In order to have comparable results to the experiment, the parameters have been calibrated to give similar values of important macroscopic quantities as free flow velocity (1.57 m/s in experiment) and maximal outflow (1.4 ped/s in experiment). The used set of parameters is given in Table 1. Table 1: Parameter values and description Parameter Value ∆x [cm] kS kD µ h [s] τ [s] 40 3.5 0.7 0.9 0.2 0.2 {0.15, 0.4} 0.14 {0, 1} 0.9 {0.1, 0.95} γ kO Range Description Lattice constant Sensitivity to potential Penalization of diag. motion Friction parameter [0,∞) [0, 1] [0, 1] (0,∞) Length of one time step (0,∞) Homogeneous own period Heterogeneous own period Homogeneous aggressiveness [0, 1] Heterogeneous aggressiveness Homog. sensitivity to occupation Heter. sensitivity to occupation [0, 1] The free flow simulation (without interactions) is directly influenced by kS, kD and τ . The diagonal penalization kD together with time penalization of diagonal motion have been tested in previous research. The values of kS and τ have been chosen to agree with the mean and variance of the free-flow veloc- ity. Here we note that the pedestrians in the experiment walked relatively fast (1.57 m/s), which motivated us to set the algorithm step h = 0.2 s of real time to balance significant decrease of velocity in congested regime. The motion of agents in crowd is influenced by parameters µ, γ, and kO. These parameters have been calibrated by means of the maximal outflow from the exit in congested situation, i.e, the exit capacity (1.4 ped/s). The significant decrease of velocity in crowd is modelled by means of relatively high friction µ = .9. Here we note that such high friction is necessary to compensate the conflict solution mechanism related to aggressiveness and the motion in lines related to the sensitivity to occupation. Our goal is to illustrate the effects of heterogeneity in chosen parameters. Therefore, the values of outflow had not been calibrated directly to the value 1.4 m/s, but sufficiently close to it, see Figure 7. Such approach enables to fit the homogeneous and heterogeneous values of each parameter independently and therefore can be used in all considered scenarios -- 1: hom (homogeneous in all parameters), 2: tau (heterogeneous in velocity), 3: agr (heterogeneous in aggressiveness), 4: obs (heterogeneous in sensitivity to occupation), 5: agr,obs 8 Figure 7: The box-plots of outflow Jout from the congested room (N = 50) measured for 20 runs of the simulation experiment for each parameter set. (heterogeneous in aggressiveness and occupation independently), 6: agr+obs (heterogeneous in aggressiveness and occupation with dependence, i.e., more aggressive is more sensitive to occupation). The simulation has been performed for system with periodic boundaries, i.e., the egress of an agent causes the entrance of another one (contrary to [1], where open boundaries were used giving the same results). The properties of agents (τ, γ, kO) were drawn from uniform distribution on the groups of parameters. For each set of parameters the simulation was performed for the occupancy N ∈ {1, 3, 5, 7, 10, 12, 14, 17, 20, 30, 40, 45, 50, 75, 100}. The simulation was performed until 1000 agents walked through the exit and it was repeated 20 times. All quantities are averaged. 5. Simulation Results In Table 2 the measured values of free flow velocity v0 (velocity for agents under the occupancy N ≤ 4), maximal outflow Jout, and average travel-time T T N for all 6 settings are compared to the experimental values. From the values we can see that the average travel-time is slightly, but not significantly, overestimated by the model. The lower free-flow velocity in case 2: tau is caused by the heterogeneity in velocity. The used set of parameters did not allow to fit both, the free-flow velocity and the outflow in this case. The reason lies in the synchronous update with h = 0.2 s. As will be discussed below, the heterogeneity in velocity defined by the own frequency is not desirable for the presented model with respect to the performed experiment. Table 2: Average quantities measured for different parameter settings. v0 [m/s] Jout [ped/s] T T 45 [s] T T 100 [s] Exp. 1.57 1.40 24.31 -- 1:hom 2:tau 1.57 1.39 30.76 66.83 1.11 1.42 30.74 67.74 3:agr 1.57 1.37 30.72 67.84 4:obs 1.57 1.38 31.17 67.52 5:agr,obs 1.57 1.35 32.01 67.63 6:agr+obs 1.57 1.30 33.05 70.59 9 1: hom2: tau3: agr4: obs5: agr, obs6: agr+obs1.21.31.41.5Jout [ped/s] The main stress is given to the travel-time study and dependence on the average occupancy Nmean, which reflects the heterogeneity in the reaction to the crowd. The T T − Nmean plots for studied parameter sets are given in Figure 8. In the graphs the mean travel time is plotted according by groups with the same parameters, the overall mean and quantiles are present for completeness. From the graphs is evident that the model is able to mimic the piecewise linear dependence (2) of T T on Nmean, which is present in the experimental study. The break-point of the model is in agreement with the experimental observation N = 7. We can see quite good agreement with the experiment regarding the trend of the dependence of T T on the occupancy not only in average but also in the minimal and maximal measured values, see Figure 2. Due to to significantly lower volume of data from the experiment it is reasonable to compare the 0.1 and 0.9 quantiles. Here we note that the lower average T T in experiment (24.31 s) than produced by the model (approx. 30 s) is caused by the small volume of data related to N ≈ 45 in the experiment -- such crowded conditions were kept for relatively short time due to the small number of participants (75). We can see that the differences in the slope of the linear dependence can be observed in all heterogeneous scenarios. Nevertheless, for further studies we have neglected the heterogeneity in the own updating period τ , related to veloc- ity. Even the homogeneous setting of free-flow velocity can reproduce variances in the free-flow travel-time in sufficient manner due to the stochastic nature of Floor-Field model. Therefore, another heterogeneity in the parameter τ is redundant. On the other hand, the concept can be used in case of evident heterogeneity where the desired velocity significantly differs [18, 19]. The heterogeneity in aggressiveness parameter γ becomes evident in occu- pancy N ∈ (10, 50), the effect does not rise significantly for higher occupancy, see sub-figure 3. Complementary evinces itself the heterogeneity in sensitiv- ity to occupancy kO (sub-figure) 4, which becomes most evident for occupancy N > 50. Interesting results brings the combination of these two parameters. The scenario 5 shows that the heterogeneity in γ and kO combines both effects from 3 and 4 in superposition manner. The main differences in the slope of T T shows the scenario 6, where the aggressiveness and occupancy are dependent, i.e., the more aggressive agents are more sensitive to occupation. Here we note that the sensitivity to occupation should be interpreted as the willingness to join an existing queue in order to move along this queue. It is therefore reasonable to suppose that the aggressive behaviour is related to the willingness to overtake, i.e., kO → 1 For further comparison let us focus on the distribution of the relative travel time T TR. In Figure 9 we can see the histograms of T TR for scenarios 1, 3, and 6, i.e., with increasing heterogeneity. We can make a conclusion that with increasing heterogeneity increases the relative frequency of low values of T TR (first bin). Similarly, the modus of the distribution is closer to lower values for higher heterogeneity (bins 4, 3, 2). Looking at the histograms of T TR related to heterogeneous scenarios, we conclude that the final distribution can be considered as a mixture of two uni- 10 Figure 8: Average travel against mean occupancy plotted by groups. Black line represents the mean over all entries, gray lines correspond to 0.1, 0.5, and 0.9 quantils. 11 020406080100050100150TT [s]1: hom hommean0204060801000501001502: tau tau=.15tau=.40mean020406080100050100150TT [s]3: agr agr=0agr=1mean0204060801000501001504: obs obs=.10obs=.95mean020406080100050100150Nmean [ped]TT [s]5: agr, obs a=0, o=.1a=0, o=.95a=1, o=.1a=1, o=.95mean020406080100050100150Nmean [ped]6: agr+obs a=0, o=.1a=1, o=.95mean modal distribution corresponding to two groups of agents, which seems to be the case of the experiment as well, see Figure 3. Figure 9: normalized histograms of relative travel-time T TR for scenarios 1: hom, 3: agr, and 6: agr+obs. Although some differences between scenarios 3 and 6 six are evident, they might be considered as marginal in comparison with the homogeneous case 1. Let us therefore focus on another aspect observed during the experiment -- In Figure 10 we can see the snapshots from the simulation the path choice. showing a representing situation of the simulation. In scenario 3, the more aggressive agents are more successful in pushing through the crowd, but they do not evince any preference in path-choice. In scenario 6, the aggressive agents prefer walking around the crowd and hopping to the exit from the left or right. As a consequence, less aggressive agents standing in lines remain often trapped few cell away from the exit, as often observed during the experiment. Figure 10: Snapshots from the simulation of scenarios 1: hom, 3: agr, and 6: agr+obs approximately 60 s after initiation. By red dots are marked more aggressive pedestrians. 6. Summary and Conclusions The article focuses on the heterogeneity in three parameters of the original cellular model based on Floor-Field model. These parameters are then consid- 12 0123400.010.020.030.040.050.06TTR1: hom all0123400.010.020.030.040.050.06TTR3: agr allagr=0agr=10123400.010.020.030.040.050.06TTR6: agr+obs allagr=0, obs=.1agr=1, obs=.9502468101214161820051015Time = 34.8, Occupancy = 50, A = 5002468101214161820051015Time = 68.4, Occupancy = 50, A = 5002468101214161820051015Time = 40.6, Occupancy = 50, A = 50 ered as the properties carried by individual agents, specifically the heterogeneity in own period (velocity), aggressiveness, and sensitivity to occupancy is studied. It is important to mention that the introduced concept of aggressiveness and principle of bonds can be used in other rule-based cellular model of pedestrian dynamics. The introduction of heterogeneity into the model has been inspired by the results of conducted experiments. It has been show that pedestrians react dif- ferently to the crowd: some are able to push through the crowd effectively, some remain trapped in front of the exit. Moreover, this is not a property of individual trajectories, but this ability is closely related to the pedestrians. In this study we aim to show that the heterogeneity in the ability to win con- flicts is necessary to reproduce the above mentioned effects in cellular models. Such property can be useful for proper modelling of an evacuation of a complex structure, where the heterogeneity in the ability to win conflicts is expected. In such cases a group of people can remain trapped within the facility for un- justifiable long time, although the average flows and evacuation times fulfil the expectations. The introduced aspects of heterogeneity can be summarized as follows: 1. Velocity: The heterogeneity in velocity causes undesired bi-modal his- togram in the free-flow regime. The observed heterogeneity in pedestrian sample can be sufficiently modelled by the stochastic nature of the de- cisions, the variance in the travel time is then related to the number of deviations from the direct path. Nevertheless, the concept can be used in dramatically heterogeneous scenario where the average speed of one group of pedestrians is two times higher than the average velocity of other group. 2. Aggressiveness: This conflict-solution method, where the conflict is won by the agent with higher value of aggressiveness, seems to be very effective in the reproduction of high variance of the T T in the congested regime. In combination with the heterogeneity of the velocity we are able to sim- ulate a situation when slower agent is more aggressive than a fast one. It is important to note that the term aggressiveness may be a little bit misleading, since it corresponds to the ability to win conflicts, which may be given by some rules of preference as well. 3. Sensitivity to Occupancy: This aspect influences mainly the space usage by the agent in given conditions. The lower the sensitivity is, the higher is the average T T for the agent, since he waits in lines and can be overtaken and trapped in front of the exit. This parameter plays very important role in combination with the parameter of aggressiveness. Acknowledgements This work was supported by the Czech Science Foundation grant GA15- 15049S and by the Czech Technical University grant SGS15/214/OHK4/3T/14. 13 References References [1] P. Hrab´ak, M. Buk´acek, Conflict solution according to "aggressiveness" of agents in floor-field-based model, in: R. Wyrzykowski (Ed.), PPAM 2015, Part II, Vol. 9574 of Lecture Notes in Computer Science, Springer International Publishing Switzerland, 2016, pp. 1 -- 10. [2] M. Buk´acek, P. Hrab´ak, M. Krb´alek, Experimental analysis of two- dimensional pedestrian flow in front of the bottleneck, in: M. Chraibi, M. Boltes, A. Schadschneider, A. Seyfried (Eds.), Traffic and Granular Flow '13, Springer International Publishing, 2015, pp. 93 -- 101. [3] M. Buk´acek, P. Hrab´ak, M. Krb´alek, Experimental study of phase transi- tion in pedestrian flow, in: W. Daamen, D. C. Duives, S. P. Hoogendoorn (Eds.), Pedestrian and Evacuation Dynamics 2014, Vol. 2 of Transportation Research Procedia, Elsevier Science B.V., 2014, pp. 105 -- 113. [4] M. Buk´acek, P. Hrab´ak, M. Krb´alek, Individual microscopic results of bot- tleneck experiments, in: Traffic and Granular Flow '15, Springer Interna- tional Publishing, to be published, arXiv:1603.02019 [physics.soc-ph]. [5] T. Ezaki, D. Yanagisawa, K. Nishinari, Analysis on a single segment of evacuation network, Journal of Cellular Automata 8 (5-6) (2013) 347 -- 359. [6] C. Burstedde, K. Klauck, A. Schadschneider, J. Zittartz, Simulation of pedestrian dynamics using a two-dimensional cellular automaton, Physica A: Statistical Mechanics and its Applications 295 (3-4) (2001) 507 -- 525. [7] A. Kirchner, A. Schadschneider, Simulation of evacuation processes using a bionics-inspired cellular automaton model for pedestrian dynamics, Physica A: Statistical Mechanics and its Applications 312 (12) (2002) 260 -- 276. [8] T. Kretz, Pedestrian traffic, simulation and experiments, Ph.D. thesis, Uni- versitat Duisburg-Essen, Germany (2007). [9] M. Buk´acek, P. Hrab´ak, M. Krb´alek, Cellular model of pedestrian dynam- ics with adaptive time span, in: R. Wyrzykowski (Ed.), PPAM 2015, Part II, Vol. 8385 of Lecture Notes in Computer Science, Springer Berlin Hei- delberg, 2014, pp. 669 -- 678. [10] P. Hrab´ak, M. Buk´acek, M. Krb´alek, Cellular model of room evacuation based on occupancy and movement prediction: Comparison with experi- mental study, Journal of Cellular Automata 8 (5-6) (2013) 383 -- 393. [11] A. Schadschneider, D. Chowdhury, K. Nishinari, Stochastic Transport in Complex Systems: From Molecules to Vehicles, Elsevier Science B. V., Amsterdam, 2010. 14 [12] A. Seyfried, O. Passon, B. Steffen, M. Boltes, T. Rupprecht, W. Klingsch, New insights into pedestrian flow through bottlenecks, Transportation Sci- ence 43 (3) (2009) 395 -- 406. [13] M. Buk´acek, P. Hrab´ak, Case study of phase transition in cellular models of pedestrian flow, in: J. Was, G. Sirakoulis, S. Bandini (Eds.), Cellular Automata, Vol. 8751 of Lecture Notes in Computer Science, Springer In- ternational Publishing AG, 2014, pp. 508 -- 517. [14] D. Cornforth, D. G. Green, D. Newth, Ordered asynchronous processes in multi-agent systems, Physica D 204 (1-2) (2005) 70 -- 82. [15] S. Bandini, L. Crociani, G. Vizzari, Heterogeneous pedestrian walking speed in discrete simulation models, in: M. Chraibi, M. Boltes, A. Schad- schneider, A. Seyfried (Eds.), Traffic and Granular Flow '13, Springer In- ternational Publishing, 2015, pp. 273 -- 279. [16] D. Yanagisawa, A. Kimura, A. Tomoeda, R. Nishi, Y. Suma, K. Ohtsuka, K. Nishinari, Introduction of frictional and turning function for pedestrian outflow with an obstacle, Phys. Rev. E 80 (2009) 036110. [17] X. Ji, X. Zhou, B. Ran, A cell-based study on pedestrian acceleration and overtaking in a transfer station corridor, Physica A: Statistical Mechanics and its Applications 392 (8) (2013) 1828 -- 1839. [18] P. Kleczek, J. Was, Simmulation of pedestrian behavior in shopping mall, in: J. Was, G. Sirakoulis, S. Bandini (Eds.), Cellular Automata, Vol. 8751 of Lecture Notes in Computer Science, Springer International Publishing AG, 2014, pp. 650 -- 659. [19] E. Spartalis, I. Georgoudas, G. Sirakulis, Ca crowd modeling for a retire- ment house evacuation with guidance, in: J. Was, G. Sirakoulis, S. Bandini (Eds.), Cellular Automata, Vol. 8751 of Lecture Notes in Computer Science, Springer International Publishing AG, 2014, pp. 481 -- 491. 15
1505.02595
1
1505
2015-05-11T13:07:43
Multi-Agent Distributed Coordination Control: Developments and Directions
[ "cs.MA", "eess.SY" ]
In this paper, the recent developments on distributed coordination control, especially the consensus and formation control, are summarized with the graph theory playing a central role, in order to present a cohesive overview of the multi-agent distributed coordination control, together with brief reviews of some closely related issues including rendezvous/alignment, swarming/flocking and containment control.In terms of the consensus problem, the recent results on consensus for the agents with different dynamics from first-order, second-order to high-order linear and nonlinear dynamics, under different communication conditions, such as cases with/without switching communication topology and varying time-delays, are reviewed, in which the algebraic graph theory is very useful in the protocol designs, stability proofs and converging analysis. In terms of the formation control problem, after reviewing the results of the algebraic graph theory employed in the formation control, we mainly pay attention to the developments of the rigid and persistent graphs. With the notions of rigidity and persistence, the formation transformation, splitting and reconstruction can be completed, and consequently the range-based formation control laws are designed with the least required information in order to maintain a formation rigid/persistent. Afterwards, the recent results on rendezvous/alignment, swarming/flocking and containment control, which are very closely related to consensus and formation control, are briefly introduced, in order to present an integrated view of the graph theory used in the coordination control problem. Finally, towards the practical applications, some directions possibly deserving investigation in coordination control are raised as well.
cs.MA
cs
MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 1 Multi-Agent Distributed Coordination Control: Developments and Directions Xiangke Wang1∗, Xun Li1, Yirui Cong12, Zhiwen zeng1 and Zhiqiang Zheng12 1College of Mechantronic Engineering and Automation, National University of Defense Technology, 410073, 2 Research School of Engineering, the Australian National University, Canberra ACT 2601, Australia Changsha, China SUMMARY In this paper, the recent developments on distributed coordination control, especially the consensus and formation control, are summarized with the graph theory playing a central role, in order to present a cohesive overview of the multi-agent distributed coordination control, together with brief reviews of some closely related issues including rendezvous/alignment, swarming/flocking and containment control. In terms of the consensus problem, the recent results on consensus for the agents with different dynamics from first- order, second-order to high-order linear and nonlinear dynamics, under different communication conditions, such as cases with/without switching communication topology and varying time-delays, are reviewed, in which the algebraic graph theory is very useful in the protocol designs, stability proofs and converging analysis. In terms of the formation control problem, after reviewing the results of the algebraic graph theory employed in the formation control, we mainly pay attention to the developments of the rigid and persistent graphs. With the notions of rigidity and persistence, the formation transformation, splitting and reconstruction can be completed, and consequently the range-based formation control laws are designed with the least required information in order to maintain a formation rigid/persistent. Afterwards, the recent results on rendezvous/alignment, swarming/flocking and containment control, which are very closely related to consensus and formation control, are briefly introduced, in order to present an integrated view of the graph theory used in the coordination control problem. Finally, towards the practical applications, some directions possibly deserving investigation in coordination control are raised as well. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL Int. J. Robust. Nonlinear Control 2013; 00:2–28 Received . . . Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/rnc KEY WORDS: Multi-agent system; Coordination control; Graph theory; Consensus; Formation control 1. INTRODUCTION Researchers have long noticed and carried on detailed analysis on many coordinated behaviors, for example, the forage for food or defense against predators of insects, birds and fishes in nature, and self-organization or self-excitation of particles in physics [1–5]. These drove researchers to consider seriously why the creature and particles take initiative to coordinate, and motivated the studies and applications on multi-agent coordination. Though it appears to be more complicated than single-agent systems, there are indeed many significant advantages in the coordinations of MAS (multi-agent system) over the single-agent system, for example [6–11]: • distributed sensors and actuators, as well as inherent parallelism; • larger redundancy, higher robustness and great fault tolerance; • performing tasks that single-agent system cannot do; • performing usually the tasks that can be finished by single costly agent with lower cost and higher excellent performance. No doubt that there are more advantages as well. In addition, with the improvements of the embedded computing and communicating technologies, and the developments of distributed and decentralized methodologies, the distributed coordinations of MASs have become easy to materialize. With these inspirations, the problem of distributed coordination control of a network of mobile autonomous agents was of interest in control and robotics in the past decade. ∗Correspondence to: College of Mechantronic Engineering and Automation, National University of Defense Technology, 410073, Changsha, China. E-mail: [email protected]. Contract/grant sponsor: the Research Projection of National University of Defense Technology; contract/grant number: JC13-03-02 Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Prepared using rncauth.cls [Version: 2010/03/27 v2.00] MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 3 Generally speaking, distributed coordination control uses local interactions between agents to achieve collective behaviors of multiple agents, and therefore to accomplish global tasks. It has a broad range of potential applications, such as in military, aerospace, industry, and entertainment. Figure 1 shows some typical applications of multi-agent distributed coordinations. In the military field, multiple mobile robot systems can adopt a proper geometric pattern to perform military tasks for taking the place of human soldiers, such as reconnaissance, searching, mine clearance, and patrol under adverse/hazardous circumstances. Taking the reconnaissance mission as an example, a single robot has limited ability to gain environmental information, however, if multiple robots keep proper formation to cooperatively apperceive the surrounding, they are likely to rapidly and accurately obtain the environmental information. In the aerospace field, satellite formation is the leading technique in the space application in 21th century, which opens up a brand-new direction for the application of satellites, especially for mini-satellites. Satellite formation cannot only greatly reduce the cost and enhance the reliability and survivability, but also broaden and override the function of individual satellites and achieve the tasks that multiple single spacecrafts cannot finish. In the industrial field, multiple mobile robots can deal with some dull, dirty and dangerous work in formation. For example, when multiple robots cooperatively carry large scale goods in a poisonous environment, their positions and orientations are strictly restricted in order to meet the requirements of load balance. In the entertainment field, for example, multiple dancing robots or soccer robots, in order to keep neat or meet tactical needs, must keep some special patterns, and may dynamically switch the patterns for avoiding obstacles. Distributed coordination control of MASs has attracted tremendous attention with various aspects including consensus, formation, rendezvous, alignment, synchronization, swarming, flocking, containment control, gossip, cooperative searching and reconnaissance, cooperative location and mapping, to name a few. A number of methods have been proposed for achieving distributed coordination control of MAsS, and conventional methods include the leader-follower method [12– 16], behavior-based method [17–20], virtual structure method [21–24], graph-based method [6, 7, 25–27], etc. But now, these methods are gradually mixed together, and it is hard to clearly Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 4 X. WANG, ET AL. Figure 1. Some typical applications of multi-agent distributed coordinations distinguish from each other. In particular, the graph-based method has become the dominator, because MASs can be modeled by a graph naturally, and almost all the aspects of coordination control can be then studied by utilizing the graph theory. Therefore, this paper mainly focuses on the recent developments of consensus, formation control, and some closely related topics such as rendezvous/alignment, swarming/flocking and containment control, with the graph theory paying central roles, in order to present a cohesive overview of the multi-agent distributed coordination control. Also, some topics which might be interesting for future investigation are discussed. 2. RECENT DEVELOPMENTS A MAS is in general distinguished with larger scale (often decided by the numbers of agents) and decentralized perception, communication and control structures, and forms inter-connected network between agents consequently. Thus, it can be naturally modeled by a graph with vertices being used to describe agents and the edges being used to represent topological relationships between agents such as perception, communication and control links. Both directed and undirected graphs can be used to describe the MAS. For example, when the ith agent is required to keep the predetermined distance to the jth agent, while the jth agent is not required to keep the distance to the ith agent, the edge ~ij is directed from vertex i to j, and at this time a directed graph is used to model the Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 5 MAS. Conversely, when the interconnection between agents ith and jth is bi-directional, when the ith agent could perceive the jth agent if and only if the jth agent could perceive the ith agent for example, the edge ij is undirected, and at this time the graph is also undirected. After modelled by a graph, as noted above, the mature graph theory can be borrowed to study the coordination control of MASs. In recent years, many monographs about the research results of the graph theory on multi-agent coordination control problems, e.g. [8–11], are published. Therefore, in the sequel, we will mainly pay attention on the survey of recent developments on some typical multi-agent coordination problems, including consensus, formation control, rendezvous/alignment, swarming/flocking and containment control, with graph theory playing a central role. The relationships among the investigated coordination control problems are summarized as Fig. 2. (cid:38)(cid:82)(cid:81)(cid:86)(cid:72)(cid:81)(cid:86)(cid:88)(cid:86) (cid:54)(cid:87)(cid:68)(cid:87)(cid:88)(cid:86)(cid:3) (cid:68)(cid:85)(cid:72)(cid:3) (cid:83)(cid:82)(cid:86)(cid:76)(cid:87)(cid:76)(cid:82)(cid:81)(cid:86) (cid:36)(cid:83)(cid:83)(cid:79)(cid:76)(cid:70)(cid:68)(cid:87)(cid:76)(cid:82)(cid:81)(cid:86) (cid:36) (cid:71) (cid:71) (cid:76) (cid:81) (cid:74) (cid:3) (cid:83) (cid:68) (cid:74) (cid:72) (cid:87) (cid:87) (cid:82) (cid:80) (cid:72) (cid:85) (cid:72) (cid:87) (cid:81) (cid:85) (cid:76) (cid:70) (cid:3) (cid:53)(cid:72)(cid:81)(cid:71)(cid:72)(cid:93)(cid:89)(cid:82)(cid:88)(cid:86)(cid:15) (cid:36)(cid:79)(cid:76)(cid:74)(cid:81)(cid:80)(cid:72)(cid:81)(cid:87)(cid:15) (cid:54)(cid:90)(cid:68)(cid:85)(cid:80)(cid:76)(cid:81)(cid:74)(cid:15) (cid:41)(cid:79)(cid:82)(cid:70)(cid:78)(cid:76)(cid:81)(cid:74)(cid:15) (cid:38)(cid:82)(cid:81)(cid:87)(cid:68)(cid:76)(cid:81)(cid:80)(cid:72)(cid:81)(cid:87)(cid:3) (cid:38)(cid:82)(cid:81)(cid:87)(cid:85)(cid:82)(cid:79) (cid:41)(cid:82)(cid:85)(cid:80)(cid:68)(cid:87)(cid:76)(cid:82)(cid:81)(cid:3) (cid:74)(cid:72)(cid:81)(cid:72)(cid:85)(cid:68)(cid:87)(cid:76)(cid:82)(cid:81)(cid:3) (cid:68)(cid:81)(cid:71) (cid:80)(cid:68)(cid:76)(cid:81)(cid:87)(cid:68)(cid:76)(cid:81)(cid:76)(cid:81)(cid:74) (cid:41)(cid:82)(cid:85)(cid:80)(cid:68)(cid:87)(cid:76)(cid:82)(cid:81)(cid:3) (cid:38)(cid:82)(cid:81)(cid:87)(cid:85)(cid:82)(cid:79) (cid:42)(cid:85)(cid:68)(cid:83)(cid:75)(cid:3)(cid:87)(cid:75)(cid:72)(cid:82)(cid:85)(cid:92) (cid:38)(cid:82)(cid:82)(cid:85)(cid:71)(cid:76)(cid:81)(cid:68)(cid:87)(cid:76)(cid:82)(cid:81)(cid:3)(cid:38)(cid:82)(cid:81)(cid:87)(cid:85)(cid:82)(cid:79) Figure 2. Relationships among consensus, formation control and some closely related topics, i.e., rendezvous, alignment, swarming, flocking and containment control. 2.1. Consensus In the networks of agents, the consensus means to reach an agreement regarding a certain quantity of interest that depends on the states of all agents. A consensus protocol is an interaction rule that specifies the information exchange between an agent and all of its neighbors in the network [28,29]. In general, there are two key elements considered in consensus problems, that is, the dynamics of agents and the communications among agents, as illustrated in Fig. 3. To be more precise, two parts are normally taken into account in the agents’ dynamics, which are the dynamics of the agent Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 6 X. WANG, ET AL. itself and the protocol used among agents. The former is the inherent model of the agents, such as the first/second/high-order models, linear/nonlinear models, and continuous/discrete models; the latter is used to modify the agent inherent model in order to make the MAS achieve a consensus. The communications among agents can also be divided into communicating structures such as the shapes and changing of the communication topology, and data transmissions including time delays and transmission failure. Dynamics Dynamics Agent ( Inherent Models ) Protocals (Modified Models) Communications Communications Structures Data Transmissions Figure 3. Key elements considered in consensus problems On the other hand, the consensus problems can also be divided into two categories by considering the predominance of agents. If an agent has priority so that the other agents must follow its trajectory, then such an agent is called the “leader”; accordingly, if the MAS has at least one leader, then the consensus is leader-follower consensus; otherwise, it is leaderless consensus. Even though it seems there is an obvious difference between leader-follower and leaderless consensus, they have the same foundations, because the topology and consensus protocol can make a common agent act as a leader. Afterwards, we will mainly focus on the developments of leaderless consensus and then point out some important results about leader-follower consensus. The beginning of researches on consensus is [30], in which Vicsek et al. propose a simple discrete- time model of particles all moving in the plane at the same speed but with different headings. Afterwards, the algebraic graph theory, which studies the relationships between the structure of graphs and different matrix representations of graphs, is widely employed in the consensus [31]. The most important concepts of the algebraic graph theory used in MASs are the adjacent matrix and the Laplacian matrix. For a graph G = (V, E) consisting of a nonempty vertex set V = {1, . . . , N } and an edge set E ⊆ V × V, the adjacency matrix A(G) = [aij ] is an N × N matrix given by Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 7 aij = 1, aij > 0 if and only if (i, j) ∈ E, and aij = 0, otherwise. The degree of vertex i is given by di = Pj aij, and the Laplacian matrix of G is Ln(G) = diag(d1, . . . , dN ) − A(G). The pioneering work to deal with consensus by virtue of the Laplacian matrix is literature [18], in which a theoretical explanation for the observed behavior in [30] is provided. After that a large number of literatures use the algebraic graph theory to study the consensus problem, for example, literature [29, 32–40], to name a few. The most basic case of consensus is that the considered agents are governed by linear dynamics, especially by single-integrator dynamics. The theoretical framework for reaching a consensus for networked agents with single-integrator dynamics under fixed/switching communicating topology was introduced by Olfati-Saber and Murray in literature [32], building on their earlier work of [25]. The subsequent studies mainly followed up on the way of [32]. For single-integrator dynamics, the commonly used continuous-time consensus protocol is [29, 32–34, 39] xi(t) = − n X j=1 aij (t)(cid:0)xj (t) − xi(t)(cid:1), i = 1, . . . , n; (1) for first-order discrete systems, the commonly used discrete-time consensus protocol is [18, 29, 34, 40] xi[k + 1] = n X j=1 aij[k]xj[k], i = 1, . . . , n, (2) in which xi(t) and xi[k] represent the states of the ith agent, aij(t) and aij[k] are the (i, j) entry of the adjacent matrix of the associated communication graph of MASs at time t or k(t). Note that protocols (1) and (2) only use the relative state information of the adjacent agent, so it is local and distributed. Then, by using the tools of the algebraic graph theory, different conclusions for different cases are made. Under the condition of the fixed topology, protocols (1) and (2) can guarantee a consensus if the communication graph is connected for an undirected graph or has a rooted spanning tree for a directed graph. By contrast, when the topology is switching, protocols (1) and (2) result in a consensus if there exists an infinite sequence of contiguous, uniformly bounded time intervals, with the property that across each interval, the union of the communication graphs is connected for an undirected case or has a rooted directed spanning tree for a directed case. Furthermore, by Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 8 X. WANG, ET AL. using the maximum and minimum eigenvalues of the Laplacian matrix, the converging rate of the consensus protocol is analyzed [41]. Time delays associated with both message transmission and processing, for instance caused by the communication congestion, are inevitable and also taken into account in consensus problems. Let δij denote the time delay communicated from the jth agent to the ith agent, protocol (1) is modified as xi(t) = − n X j=1 aij (t)(cid:0)xj (t − δij ) − xi(t − δij )(cid:1). (3) Reference [32] investigated the simplest case where δij = δ and the communication topology was fixed, undirected, and connected, and concluded that the consensus was achieved if and only if 0 ≤ δ < π/(2λmax(L)), where L denoted the Laplacian of the communication graph. Along the way developed by [32], different time delays and communication topologies are considered in the consensus problem. If the time delay affects only the state being transmitted, protocol (3) is modified as xi(t) = − n X j=1 aij(t)(cid:0)xj(t − δij) − xi(t)(cid:1), (4) and the consensus for switching directed topologies remains valid for an arbitrary time delay when δij = δ [42]. The constant or time-varying, uniformly or non-uniformly distributed time delays are considered in [43], and sufficient conditions for the existence of average consensus under bounded communication delays are given correspondingly. The consensus problem with noise- perturbed under fixed and switching topologies as well as time-varying communication delays is investigated in [44]. It is shown that the consensus is reached for arbitrarily large constant, time-varying, or distributed delays if consensus is reached without delays [45]. For the discrete consensus protocol (2), conclusions similar to that of the continuous case can be obtained. It is shown in [46] that if a consensus is reached under a time-invariant undirected communication topology, then the presence of communication delays does not affect the consensus. In addition, sufficient conditions for the consensus under dynamically changing communication topologies and bounded time-varying communication delays are shown in reference [47]. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 9 The results of the first-order system have been extended to the consensus of the second-order and high-order linear dynamical MASs, and similar consensus protocols and graph conditions are obtained. Consensus for multiple agents governed by the second-order linear dynamics has been considered by the similar framework of using the algebra graph theory [48–51]. For example, in the representative work [48], a linear distributed consensus protocol for the second-order MAS is designed with aid of the Laplacian matrix without requiring velocity information of neighbors; a variable structure control law is used to design the consensus protocol by taking the second- order system as two cascade fist-order systems in [51]. In terms of high-order consensus problems, the first discussion is completed by W. Ren in [52], where the second-order MAS is generalized to the lth-order integrator MAS. Afterwards, the consensus protocol is modified in [53] and χ- consensus is investigated under undirected communication topology. It should be noted that both the aforementioned literatures have no self-feedback information in the consensus protocols. With adding the self-feedback items, reference [54] investigates the constant-value consensus problem for high-order MASs under fixed and switching directed topology. Based on those meaningful explorations, the robust analysis and the converging results with time delays are further provided, for example, the work in [55–57]. The consensus governed by more complex high-order linear dynamics, such as the SISO (single input single output) and the MIMO (multiple inputs multiple outputs) linear dynamics are also investigated. At the beginning, researcher did not notice the relationship between the consensus in MAS and the controllability in individual agents; therefore, many studies are done with the assumption that the isolated agent is controllable, e.g. the work in [58]. It is proven that this technical assumption is not necessary in [59], excluding the necessity of a sufficient connection of the graph topology is required for consensus stability for a system with unstable agent dynamics. Afterwards, the studies on communication delays and robustness are conducted, e.g. [60, 61]. And further, a necessary and sufficient condition for high-order consensus with unknown communication delays is given for the existence of solution to heterogeneous multi- agent systems in [62]. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 10 X. WANG, ET AL. Considering that most physical systems are inherently nonlinear in nature, the consensus where the agents are governed by nonlinear dynamics has also aroused the attention of some researchers recently. It can be shown, for example, in [63, 64] where the continuously differentiable nonlinear dynamics are considered; in [65–67] where the nonlinear dynamics satisfy the global Lipschitz condition under a directed communicating graph, respectively, without and with a leader agent; and in [68] where an adaptive control method is introduced to study the synchronization of uncertain nonlinear networked systems. 2.2. Formation Control The formation control is that a team comprised of multiple agents keeps a predetermined geometric pattern and adapts to the environmental constraints (e.g. obstacle avoidance) at the same time during the movement towards a specific goal. In general, the main control problems in formation are summarized as follows [69, 70]: • Formation generation: how to design a formation pattern for MASs and then achieve it? • Formation maintaining: how to maintain the formation pattern for MASs during the movement? • Formation transformation: how to transit the formation pattern, which means transiting one formation pattern into another? • Obstacle avoidance with formation: how to change a motion plan or a formation pattern for MASs in order to avoid obstacles during movement? • Self-adaptation: how to automatically change the formation in order to best adapt to the dynamical unknown environment? The graph theory is a powerful tool to study formation control involving all the above five aspects. Firstly, graphs are naturally used to generate and maintain a formation, and consequently to achieve transformation between different formation patterns. In early 2001, directed graphs were used to describe the topologies and patterns of formation, and then study the formation evolution problem [12]. Saber et al adopted the combination graph theory to obtain a unique Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 11 determined formation pattern through designing the weights of edges [71]. Desai et al in [13] further adopted directed acyclic graphs to represent the control graph between agents, and designed the control strategy, afterwards, through enumerating all possible control graphs to realize transformation between any two formation patterns. It is worthy pointing out that by adding a pre-specified geometric pattern, the formation generation and maintaining can also be achieved in the corresponding consensus problem, which is usually known as consensus-based formation control, e.g., in [72,73]. Consequentially, the algebra graph theory is widely employed in formation control too. As aforementioned, the neighbors of vertex i in the graph represented MAS is exactly the collection of agents that have a topological relationship such as perception with the ith agent. Therefore, by using the properties of the Laplacian matrix, local, distributed and scalable formation controllers can be designed, and their stabilities can also be verified by virtue of the eigenvalue of the Laplacian matrix, for a typical example, the work in the classic literature [26]. And then, Fax and Murray set up the relation between the formation controller and the topological structure of the communicating network with the Laplacian matrix, and proved that if the local controller was stable, then the stability of formation with linear dynamics depended on the stability of the information flow [25]; Lin et. al proved that if and only if there is a global accessible vertex in the perception graph, the formation is stable by using tools of the algebraic graph theory [74]. In addition, the formation stability concepts are defined with the aid of the graph theory. Tanner et. al defined the leader-to-formation stability notion based on the graph and input-to-state stability concept, which includes both transient and steady-state errors [75]. In contrast, the pairwise asymptotic stability is defined based on directed graphs by involving a single pair of neighboring agents in [76], which implies that any two agents can asymptotically achieve and maintain a desired relative attitude and position though the pair of agents which may not be neighbors and do not interact with each other directly. Another important tool of the graph theory employed in multi-agent formation control is the rigid graph theory. An undirected graph is rigid if for almost every structure, the only possible continuous moves are those which preserve every inter-agent distance; further, an undirected graph Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 12 X. WANG, ET AL. is called minimally rigid if it is rigid and if there exists no rigid graphs with the same number of vertices and a smaller number of edges (see Fig. 4 for more illustrations of rigid and minimally rigid graphs). The main tools of rigid graphs are Henneberg sequence and Laman’s theorems [77]. Figure 4. (a) rigid graph (b) minimally rigid graph (c) non-rigid graph The former was raised by Henneberg to construct two-dimensional minimally rigid graphs, and the latter were raised by Laman in 1970 to verify if a two-dimensional graph was rigid [78]. With the concepts of rigid graphs, some primitive operators are defined to deal with the operations such as splitting and restructuring of rigid formation [71, 79]; also, a formation control law is proposed by only using the distances between agents in order to ensure rigidity or generic rigidity of formation [25]. Note that the concept of rigidity is mainly for the undirected graph, which means the interrelations between vertices are bi-directional. However, in practical applications, the MAS is often modeled by a directed graph for reducing the cost of communication and perception. Hence on the basis of rigidity, a group led by Prof. Brian D.O. Anderson at the Australian National University developed a “directed rigidity” concept, named persistence. A directed graph is persistent if and only if its underlying graph is rigid, and itself is constraint consistent [27], as illustrated in Fig. 5 †. Similar to a minimally rigid one, a graph is minimally persistent if it is persistent and if no single edge can be removed without losing persistence. The main difference between rigidity and persistence is that rigidity assumes all the constraints are satisfied, as if they were enforced by an external agency or through some mechanical properties, while persistence considers each † In R2, the graph represented in (a) is not persistent. For almost all uncoordinated displacements of 2, 3 and 4 (even if they satisfy their constraints), 4 is indeed unable to satisfy its three constraints. This problem cannot happen for the graph represented in (b), which is persistent however. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 13 constraint to be the responsibility of a single agent. Based on the concept of persistence, many (cid:20) (cid:21) (cid:20) (cid:21) (cid:22) (cid:23) (cid:22) (cid:23) Figure 5. (a) nonpersistent graph in R2 (b) persistent graph in R2 works have been investigated by the group led by Prof. Brian D.O. Anderson, such as developing the persistent/minimum persistent notions from the rigid/minimum rigid concepts [27]; fixing the transformation, splitting and reconstruction of formation in a two-dimensional space through defining three primitive graph operators by virtue of Henneberg sequence [80, 81]; designing a formation control law to keep the persistence for formation in two-dimensional space [82]; and further proposing distributed formation control laws in order to keep the minimum persistence for two kinds (leader-remote-follower and coleader) of formation with small perturbations [83]. It is worthy pointing out that the persistence notions have been applied to practical multiple robots systems. For example, B. Smith et al designed an automatic generation algorithm of persistent formations for multiple robots under distance and communication constraints [84], and a method for accomplishing such persistent formations was presented and further demonstrated with a prototype network of robots in a NASA project for researches in Antarctica [85]. 2.3. Some closely related issues 2.3.1. Rendezvous/Alignment The rendezvous problem refers to designing a distributed local control strategy to make multiple agents reach the same specified position at the same time. To some extent, rendezvous can be taken as the application of consensus in actual systems, such as robots and spacecrafts [86]. This problem was firstly proposed in literature [87], in which a distributed simple memoryless point rendezvous algorithm was proposed with proven convergence. And then, literature [88] and [89] extended this algorithm to a “stop-and-go” strategy under synchronous Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 14 X. WANG, ET AL. and asynchronous situations, respectively, and analyzed the convergence of the strategies. Similar to other multi-agent coordinations, the graph theory also played key roles in the research of the rendezvous problem. Cortes et. al presented a robust rendezvous algorithm in an arbitrarily dimensional space with the aid of the proximity graph [90]; and a connectivity-preserving protocol consisting of a set of distributed control rules was proposed in the case of the link in communication graph failure in literature [91]. In addition, in view of different kinds of practical systems, the rendezvous problem has received extensive researches. For multiple omni-directional mobile robots equipped with line-of-sight limited-range sensors moving in a connected, nonconvex, unknown environment, literature [92] presented a perimeter minimizing rendezvous algorithm by using the notions of connectivity-preserving constraint sets and proximity graphs. For multiple nonholonomic unicycles, a discontinuous and time-invariant rendezvous algorithm was designed with tools from the nonsmooth Lyapunov theory and the graph theory [93]. The discontinuous rendezvous policies were further investigated in literature [94], in which the new proposed sufficient conditions for characterizing the control policies were less restrictive than those presented in the above-mentioned literature. For a multiple agent system moving like a Dubins car, a simple quantized control law was designed with three values to make agents achieve rendezvous given a connected initial assignment with minimalism in sensing and control [95]. The attitude alignment problem, sometimes called attitude consensus or attitude synchronization problem, also received extensive attention in multi-agent fields, especially multiple spacecrafts [96], multiple satellites [97] and multiple marine robots [98]. Similar to the rendezvous problem, the attitude alignment is required to design a distributed control strategy to make the attitude of multiple agents tend to be consistent simultaneously. Lawton et al [99] adopted the behavior-based method to design two kinds of control strategies that made a group of aircrafts achieve attitude alignment; and further, this work was extended to more general scenes which did not need bi- directional communication [96]. For the attitude alignment with limited communication and no reference signal, Sarlette et al proposed attitude alignment strategies based on artificial potential methods [100]. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 15 2.3.2. Swarming/Flocking The swarming is often inspired by biological and physical systems, which refers to the prevalent collective behavior and the self-organization phenomenon, such as ant colonies, bee colonies, flocks of birds and schools of fishes [2–4]. And recently it has emerged in MAS with focuses on physical embodiment and realistic interactions among the individuals themselves and also between the individuals and the environment [101]. Generally speaking, swarming is characterized by the following: 1) flexibility: adaptability to the environment; 2) robustness: anti-jamming to the internal and external disturbances; 3) dispersion: dynamical behavior based on individuals; 4) self organization: obvious overall system properties in evolution, namely emerging [102]. As a special case of swarming, the flocking refers to the phenomena that the MAS (usually with the second-order integrator dynamics) presents certain coordinated behaviors by decentralized control with the aid of local perception and reaction between individuals. The classical flocking model is proposed by Reynolds in [103], in which the animation of flocking behaviors, such as bird flock and fish school, are realized through three rules, i.e. collision avoidance, velocity matching and flock centering. These three rules can make the distance between agents converge to an expected value, the speed of agents tend to be consistent, and agents cannot collide with each other. After then, for the linear systems with the second-order integrator dynamics, flocking algorithms are usually designed by local artificial potential fields integrated with the graph theory [104–106]. In [104], a theoretical framework based on the algebraic graph theory and the spatially induced graphs is provided for the design and analysis of scalable flocking algorithms under a connected topology. Further, this work was extended in [105] from two directions: one is the case where only a fraction of agents are informed and the other is that where the velocity of the virtual leader is varying. In [106], the stability properties of a group of agents governed by decentralized, nearest-neighbor interaction rules are analyzed. The flocking problem without considering collision between multi- agents has also got extensive attentions in recent years, e.g. in [107,108]. While little work has been done on flocking with nonlinear dynamics, except that Dong proposed a backsteping based control Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 16 X. WANG, ET AL. law design method for the flocking of multiple nonholonomic wheeled mobile robots with directed topology in [109]. 2.3.3. Containment control The containment control can be taken as an expansion of consensus or flocking with pinning control, which refer to designing a distributed control law to drive the states of the followers to the convex hull spanned by the states of multiple leaders. In particular, when the multiple leaders are moving, some literature call it as set tracking problem [110]. In early 2005, the simplest containment control, which took two agents as leaders and drove the rest converge to the line decided by the two leaders, was discussed in [26]. For the containment control with the first-order dynamics under fixed undirected graphs, a simple “stop-and-go” strategy is proposed and analyzed in literature [111]. Further, the containment control with single- or double- integrator dynamics was studied in [111–115], of which, literature [114] proposed two containment control algorithms via only position measurements where the leaders were neighbors of only a subset of the followers, and literature [115] examined the containment control for a second-order multi-agent system with random switching topologies. Moreover, the containment control strategy for multiple Lagrangian system in directed topological structure was proposed in [116]; and the containment control of multiple rigid-body systems with uncertainty was studied in [117]. For the more general nonlinear dynamics, G. Shi et al [110] investigated the distributed set tracking problem with unmeasurable velocities under switching directed topologies, and provided the necessary and sufficient conditions for set input-to-state stability and set integral input-to-state stability. Remark 1 The studies on coordination control are still ongoing, both in depth and width. On the one hand, the studied agents are found with more and more complicated dynamics and limited perceptions, for example, from high-order dynamics [62] to complex environmental constraints [118], again to communication bandwidth limitation [119–121], and quantitative communication [122]. On the other hand, more and more attention has been paid to various practical multi-robot systems, Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 17 for example, multiple micro-satellites [123], multiple spacecrafts [124, 125], multiple marine robots [126], multiple wheeled mobile robots [127, 128], and multiple Lagrangian systems [129]. 3. DIRECTIONS The theoretical work on multi-agent coordination control has made significant achievements in the past decade, which have however rare practical applications. In fact, the behaviors of actual robots are much more complicated than those considered in the existing work. Therefore, how to promote the theoretical work for serving in practice in order to shrink the gap between theory and practice is still an open problem which should be considered seriously. In the authors’ opinion, towards this direction, there are several topics deserving further investigation in the study of multi-agent coordination control, which listed as follows: 1) Coordination control with strongly nonlinear dynamics The existing coordination control often considers the agents governed by linear dynamics, especially by the single- or double-integrator dynamics; however, most physical systems are inherently nonlinear in nature. At present, coordination control with nonlinear dynamics has received seldom consideration, and few related work assume the nonlinear dynamics to be continuously differentiable [63, 64] or globally Lipschitz [65, 66]. In contrast, the dynamics of robots, vehicles or UAVs in practice are generally found with strong nonlinearities, which are hard to be described simply by using single/double-integrator or continuously differentiable/global Lipschitz continuous function. So it is necessary and beneficial to study multi-agent coordination control in the presence of the nonlinearities by means of the nonlinear control theory. Literature [130,131] carried on some preliminary research on this way via the input-to-state stability concept, but more problems, such as the finite time convergence, converging rate analysis, with topological switching and time-delay, are still worthy of further exploration. 2) Coordination control in three-dimensional space The existing work about multi-agent coordinations usually considers agents in a plane; while the coordinations in the more general three-dimensional space, composed of three rotational and Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 18 X. WANG, ET AL. three translational degrees of freedoms, are not extensively investigated. In essence, any general rigid motion (including rotation and translation) is described in three-dimensional space and its subspaces, and the coordination control in a plane is just a special case in three-dimensional space. Moreover, the applications of multi-agent coordination control are not confined to be in the plane. For instance, in the applications of multiple spacecraft formation flights [123], multiple marine robots cooperative exploration [126], flight array [132], and multiple flying vehicles cooperative handling objects [124] or playing tennis [125], the coordination controls are required to be considered in the three-dimensional space with attitude and position control simultaneously. Such problems are worthwhile to be solved, in the authors’ opinion, for coordination control in three- dimensional space include two aspects: a) the graph theory in three-dimensional space. As noted above, the graph theory is an important tool used in multi-agent coordination control, however, the existing results on the graph theory cannot be directly extended to the three-dimensional space. For example, Laman’s theorem and Henneberg sequence in three-dimensional space are still open problems [82]. Improving and expanding the existing foundations of the graph theory in order to make them valid in three-dimensional space is still a problem that has not been effectively solved. b) designing the coordination control law in a three-dimensional space. In recent years, different mathematical tools have been used to study the multi-agent coordination control in the three- dimensional space, such as the decoupling method (namely carrying on the attitude control and the position control independently) [123, 125], the Lie-group abstraction [133], the homogeneous transformation matrix [134, 135], and the dual quaternion approach [76], etc. Whatever, the above methods are still not systematic, and it is necessary to combine with the graph theory to further design coordination control laws under different topology structures, with different dynamic models and adaptation to external disturbances. 3) Coordination control with practical constraints In practice, there are many constraints for the coordinations of MASs, such as non-ideal communications and perceptions, and heterogeneous dynamics. Challenges from pure theories to Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 19 practical applications should be attached with more extensive concern, in order to shrink the gap between theories and applications. Communications are very important for multi-agent coordinations. Communications for actual systems are usually not ideal.For example, time-delays, unstable signals, and limited bandwidth are inevitable in the actual systems. Therefore, multi-agent coordination control with non-ideal communication is a challenging problem, and many work can be further considered, such as the design of fault tolerance topological structure which is robustness against the loss of communicating nodes or links, coordination algorithms with limited communicating bandwidth or quantitative communication, or even without communications, and underlying communication protocols with reliable robustness. In addition, it is usually the ideal perceptions that is considered by the existing MASs, which means agents can obtain all the required information in real-time. However in practice, sensors equipped by agents certainly have some perceptional limitations. For example, the commonly used cameras have conical perceptional fields, and the laser ranging sensor (typically the Hokuyo’s series products) can only perceive the information in a sector. Meanwhile, the perceived information is usually accompanied by noise and time-delay, and further more information, such as other agents’ relative velocities and accelerations, is generally difficult to obtain precisely. Therefore, the coordination control with perceptional constraints is also a problem that requires to be fixed, such as coordination control with perceptional directions, coordination control without velocity measurement, and coordination control with time-delay and noisy information. Thirdly, in the existing work on coordination control, the agents are usually considered to be isomorphic, which means all agents are found with the same dynamics. However, in many practical applications, for example, in the cooperative reconnaissance carried out by manned/unmanned aerial vehicles, and the cluster spacecraft system, the dynamics between agents are quite different. So, the coordination control for heterogeneous MASs is also a direction worth to pay attentions to in the future. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 20 X. WANG, ET AL. Finally, most of the existing theoretical results are only verified by simulations, rather than by actual systems, partly due to the high cost and various restrictions of the experiments. Therefore, to verify and apply the theoretical results to actual multi-robot systems is a most pressing issue too. 4) Combination with other collective behaviours For the last ten years, the work on coordination control in fact has led the research of the distributed networked system and provided some necessary supports to different types of collective behaviors, for e.g. the wireless sensor network. Therefore, how to expand and fuse the existing results of coordination control to other collective behaviours such as wireless sensor network is also a notable direction. 4. CONCLUSION This paper reviews the recent developments on multi-agent coordination control with focus on the consensus, formation control, and some closely related topics including rendezvous/alignment, swarming/flocking and containment control, with the graph theory playing a central role, in order to present a cohesive overview of the multi-agent distributed coordination control, and further provides some directions possibly deserving to be investigated in coordination control. The work on coordination control involves extremely extensive contents, and the authors believe that in the coming decade, more problems related to coordination control will be solved along with the developments of other related disciplines and technologies, and will also get more practical applications in more fields. REFERENCES 1. Hubbard S, Babak B, Sigurdsson ST, Magnusson KG. A model of the formation of fish schools and migrations of fish. Ecological Modelling 2004; 174(4):359–374. 2. Toner J, Tu Y. Hydrodynamics and phases of flocks. Annals of Physics 2005; 318(1):170–244. 3. Janson S, Middendorf M, Beekman M. Honey bee swarms: How do scouts guide a swarm of uninformed bees? Animal Behaviour 2005; 70(2):349–358. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 21 4. Couzin ID, Krause J, Franks NR, Levin SA. Effective leadership and decision-making in animal groups on themove. Nature 2005; 433(3):513–516. 5. Levine H, Rappel WJ. Self organization in systems of self-propelled particles. Physical Review E 2001; 63(1):208– 211. 6. Ren W, Beard RW, Atkins EM. Information consensus in multivehicle cooperative control. IEEE Control System Magazine 2007; 27(2):71–82. 7. Anderson BDO, Yu C, Fidan B, Hendrickx JM. Rigid graph control architecture for autonomous formation. IEEE Control System Magazine 2008; 28(6):48–63. 8. Lin Z, Francis B, Maggiore M. Distributed Control and Analysis of Coupled Cell Syatems. VDM Verlag: Germany, 2008. 9. Ren W, Beard R. Distributed Consensus in Multi-vehicle Cooperative Control. Spring: New York, 2008. 10. Bullo F, Cortes J, Martinez S. Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms. Princeton University Press: Princeton and Oxford, 2009. 11. Mesbahi M, Egerstedt M. Graph Theoretic Methods in Multiagent Networks. Princeton University Press: Princeton and Oxford, 2010. 12. Desai JP, Ostrowski JP, Kumar V. Modeling and control of formations of nonholonomic mobile robots. IEEE Transactions on Robotics and Automation 2001; 17(6):905–908. 13. Desai JP. A graph theoretic approach for modeling mobile robot team formations. Journal of Robotic Systems 2002; 19(11):511–525. 14. Consolini L, Morbidi F, Prattichizzo D, Tosques M. Leader-follower formation control of nonholonomic mobile robots with input constraints. Automatica 2008; 44(5):1343–1349. 15. Dimarogonasa DV, Tsiotrasb P, Kyriakopoulosc KJ. Leader-follower cooperative attitude control of multiple rigid bodies. Systems & Control Letters 2009; 58(6):429–435. 16. Chen J, Sun D, Yang J, Chen H. Leader-follower formation control of multiple non-holonomic mobile robots incorporating a receding-horizon scheme. International Journal of Robotics Research 2010; 29(6):727–747. 17. Balch T, Arkin RC. Behavior-based formation control for multirobot teams. IEEE Translations on Robotics and Automation 1998; 14(6):926–939. 18. Jadbabaie A, Lin J, Morse AS. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Transactions on Automatic Control 2003; 48(6):988–1001. 19. Antonelli G, Arrichiello F, Chiaverini S. Experiments of formation control with multirobot systems using the null-space-based behavioral control. IEEE Transactions on Control Systems Technology 2009; 17(5):1173–1182. 20. Arrichiello F, Chiaverini S, Indiveri G, Pedone P. The null-space based behavioral control for mobile robots with velocity actuator saturations. International Journal of Robotics Research 2010; 29(10):1317–1337. 21. Lewis MA, Tan KH. High precision formation control of mobile robots using virtual structures. Autonomous Robots 1997; 4(4):387–403. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 22 X. WANG, ET AL. 22. Ren W, Beard RW. Decentralized scheme for spacecraft formation flying via the virtual structure approach. Journal of Guidance, Control, and Dynamics 2004; 27(1):73–82. 23. Li NHM, Liu HHT. Formation UAV flight control using virtual structure and motion synchronization. Proceedings of the 2008 American Control Conference, Washington, USA, 2008; 1782–1787. 24. van den Broek THA, van de Wouw N, Nijmeijer H. Formation control of unicycle mobile robots: a virtual structure approach. Proceedings of the Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference, Shanghai, China, 2009; 8328–8333. 25. Fax JA, Murray RM. Information flow and cooperative control of vehicle formations. IEEE Transactions on Automatic Control 2004; 49(9):1465–1476. 26. Lin Z, Francis B, Maggiore M. Necessary and sufficient graphical conditions for formation control of unicycles. IEEE Transactions on Automatic Control 2005; 50(1):121–127. 27. Yu C, Hendrickx JM, Fidan B, Anderson BDO, Blondel VD. Three and higher dimensional autonomous formations: rigidity, persistence and structure persistence. Automatica 2007; 43(3):387–402. 28. Olfati-saber R, Fax JA, Murray RM. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE 2007; 95(1):215–233. 29. Ren W, Beard W, Atkins EM. Information consensus in multivehicle cooperative control. IEEE Control Systems Magazine 2007; 27(2):71–82. 30. Vicsek T, Czirook A, Ben-Jacob E, Cohen I, Shochet O. Novel type of phase transition in a system of self-deriven particles. Physical Review Letter 1995; 75(6):1226–1229. 31. Godsil C, Royle G. Algebraic Graph Theory. Springer-Verlag: New York, 2004. 32. Olfati-Saber R, Murray RM. Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions on Automatic Control 2004; 49(9):1520–1553. 33. Lin Z, Broucke M, Francis B. Local control strategies for groups of mobile autonomous agents. IEEE Transactions on Automatic Control 2004; 49(4):622–629. 34. Ren W, Beard RW. Consensus seeking in multiagent systems under dynamically changing interaction topologies. IEEE Transactions on Automatic Control 2005; 50(5):655–661. 35. Zelazo D, Mesbahi M. Edge agreement: Graph-theoretic performance bounds and passivity analysis. IEEE Transactions on Automatic Control 2011; 56(3):544–555. 36. Lin Z, Francis B, Maggiore M. State agreement for continuous-time coupled nonlinear system. SIAM Journal on Control and Optimization 2007; 46(1):288–307. 37. Cao M, Morse AS, Anderson BDO. Reaching a consensus in a dynamically changing environment: A graphical approach. SIAM Journal on Control and Optimization 2008; 47(2):575–600. 38. Rahmani A, Ji M, Mesbahi M, Egerstedt M. Controllability of multi-agent systems from a graph-theoretic perspective. SIAM Journal on Control and Optimization 2009; 48(1):162–186. 39. Su Y, Huang J. Stability of a class of linear switching systems with applications to two consensus problems. IEEE Transactions on Automatic Control 2012; 57(6):1420–1430. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 23 40. Moreau L. Stability of multiagent systems with time-dependent communication links. IEEE Transactions on Automatic Control 2005; 50(2):169–182. 41. Xiao L, Boyd S. Fast linear iterations for distributed averaging. Systems & Control Letters 2004; 53(1):65–78. 42. Moreau L. Stability of continuous-time distributed consensus algorithms. Proceedings of 43th IEEE Conference on Decision and Control, Paradise Island, Bahamas, USA, 2004; 3998C4003. 43. Blimana PA, Ferrari-Trecateb G. Average consensus problems in networks of agents with delayed communications. Automatica 2008; 44(3):1985–1995. 44. Sun Y, Zhao D, Ruan J. Consensus in noisy environments with switching topology and time-varying delays. Physica A: Statistical Mechanics and its Applications 2010; 389(19):4149–4161. 45. Munz U, Papachristodoulou A, Allgower F. Consensus in multi-agent systems with coupling delays and switching topology. IEEE Transactions on Automatic Control 2011; 56(12):2976–2982. 46. Tanner HG, Christodoulakis DK. State synchronization in local-interaction networks is robust with respect to time delays. Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference, Seville, Spain, 2005; 4945–4950. 47. Xiao F, Wang L. State consensus for multi-agent systems with switching topologies and time-varying delays. International Journal of Control 2006; 79(10):1277–1284. 48. Xie G, Wang L. Consensus control for a class of networks of dynamic agents. International Journal of Robust and Nonlinear Control 2007; 17(10-11):941–959. 49. Su H, Wang X, Lin Z. Synchronization of coupled harmonic oscillators in a dynamic proximity network. Automatica 2009; 45(10):2286–2291. 50. Qin J, Zheng WX, Gao H. Consensus of multiple second-order vehicles with a time-varying reference signal under directed topology. Automatica 2011; 47(9):1983–1991. 51. Cao Y, Ren W. Distributed coordinated tracking with reduced interaction via a variable structure approach. IEEE Transactions on Automatic Control 2012; 57(1):33–48. 52. Ren W, Moore K, Chen YQ, Ieee. High-order consensus algorithms in cooperative vehicle systems. Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, 2006; 457–462. 53. Jiang FC, Xie GM, Long W, Chen XJ. The chi-consensus problem of high-order multi-agent systems with fixed and switching topologies. Asian Journal of Control 2008; 10(2):246–253. 54. Jiang FC, Wang L. Consensus seeking of high-order dynamic multi-agent systems with fixed and switching topologies. International Journal of Control 2010; 83(2):404–420. 55. Liu Y, Jia YM. Consensus problem of high-order multi-agent systems with external disturbances: An H-infinity analysis approach. International Journal of Robust and Nonlinear Control 2010; 20(14):1579–1593. 56. Mo L, Jia Y. H-infinity consensus control of a class of high-order multi-agent systems. IET Control Theory and Applications 2011; 5(1):247–253. 57. Lin P, Li Z, Jia Y, Sun M. High-order multi-agent consensus with dynamically changing topologies and time- delays. IET Control Theory and Applications 2011; 5(8):976–981. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 24 X. WANG, ET AL. 58. Seo JH, Shim H, Back J. Consensus of high-order linear systems using dynamic output feedback compensator: Low gain approach. Automatica 2009; 45(11):2659–2664. 59. Xi J, Cai N, Zhong Y. Consensus problems for high-order linear time-invariant swarm systems. Physica A- Statistical Mechanics and Its Applications 2010; 389(24):5619–5627. 60. Liu Y, Jia YM. H-infinity consensus control for multi-agent systems with linear coupling dynamics and communication delays. International Journal of Systems Science 2012; 43(1):50–62. 61. Zhang Y, Tian YP. Allowable delay bound for consensus of linear multi-agent systems with communication delay. International Journal of Systems Science 2013; . 62. Tian YP, Zhang Y. High-order consensus of heterogeneous multi-agent systems with unknown communication delays. Automatica 2012; 48(6):1205–1212. 63. Zhao Y, Li B, Qin J, Gao H, Karimi HR. H∞ consensus and synchronization of nonlinear systems based on a novel fuzzy model. IEEE Transactions on Cybernetics 2013; in Press. 64. Li H, Liao X, Huang T. Second-order locally dynamical consensus of multiagent systems with arbitrarily fast switching directed tpologies. IEEE Transactions on Cybernetics 2013; in Press. 65. Yu W, Chen G, Cao M, Kurths J. Second-order consensus for multiagent systems with directed topologies and nonlinear dynamics. IEEE Trans. Syst. Man Cybern. Part B 2010; 40(3):881–891. 66. Song Q, Cao J, Yu W. Second-order leader-following consensus of nonlinear multi-agent systems via pinning control. Systems & Control Letters 2010; 59(9):553–562. 67. Song Q, Liu F, Cao J, Yu W. M-matrix strategies for pinning-controlled leader-following consensus in multiagent systems with nonlinear dynamics. IEEE Transactions on Cybernetics 2013; in Press. 68. Das A, Lewis FL. Cooperative adaptive control for synchronization of sencond-order systems with unknown nonlinearities. International Journal of Robust and Nonlinear Control 2011; 21(13):1509–1524. 69. Lemay M, Michaud F, Letourneau D, marc Valin J. Autonomous initialization of robot formations. Proceedings of the IEEE International Conference on Robotics and Automation, New Orleans, LA, 2005; 3018–3023. 70. Ren D, Lu G. Thinking in formation control. Control and Decision 2005; 20(6):601–606. 71. Olfati-Saber R, Murray RM. Graph rigidity and distributed formation stabilization of multi-vehicle systems. Proceedings of the IEEE International Conference on Decision and Control, Las Vegas, Nevada, USA, 2002; 2965–2971. 72. Ren W. Consensus based formation control strategies for multi-vehicle systems. Proceedings of the 2006 American Control Conference, Minneapolis, Minnesota, USA, 2006; 4237–4242. 73. Wu Z, Guan Z, Wu X, Li T. Consensus based formation control and trajectory tracing of multi-agent robot systems. Journal of Intelligent Robot System 2007; 48(3):397–410. 74. Lin Z, Broucke M, Francis B. Local control strategies for groups of mobile autonomous agents. IEEE Transactions on Automatic Control 2004; 49(4):622–629. 75. Tanner HG, Pappas GJ, Kumar V. Leader-to-formation stability. IEEE Transactions on Robotics and Automation 2004; 20(3):443–455. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 25 76. Wang X, Yu C, Lin Z. A dual quaternion solution to attitude and position control for rigid-body coordination. IEEE Transactions on Robotics 2012; 28(5):1162–1170. 77. Graver J, Servatius B, Servatius H. Combinatorial Rigidity (Graduate Studies in Mathematics). American Mathematical Society: New York, USA, 1994. 78. Laman G. On graphs and rigidity of plane skeletal structures. Journal of Engineering Mathematical 1970; 4(4):331–340. 79. Eren T, Anderson B, AMorse, Whiteley W, PBelhumeur. Operations on formations of autonomous agents. Communications in Information and Systems 2004; 3(4):223–258. 80. Hendrickx JM, Fidan B, Yu C, Anderson BDO, Blondel VD. Formationa reorganization by primitive operations on directed graphs. IEEE Transactions on Automation 2008; 53(4):968–979. 81. Hendrickx JM, Anderson BDO, Delvenne JC, Blondel VD. Directed graphs for the analysis of rigidity and persistence in autonomous agent system. International Journal of Robust and Nonlinear Control 2007; 17(10 - 11):960–981. 82. Yu C, Anderson BDO, Dasgupta S, Fidan B. Control of minimally persistent formations in the plane. SIAM Journal of Control Optimal 2009; 48(1):206–233. 83. Summers TH, Yu C, Dasgupta S, Anderson BDO. Control of minimally persistent leader-remote-follower and coleader formations in the plane. IEEE Transactions on Automatic Control 2011; 56(12):2778–2792. 84. Smith BS, Egrstedt MB, Howard A. Automatic generation of persistent formations for multi-agent networks under range constrains. Mobile Networks and Applications 2009; 14(3):322–335. 85. Smith BS, Wang J, Egrstedt MB. Persistent formation control of multi-robot networks. Proceeding of the 47th IEEE Conference on Decision and Control, Cancun, Mexico, 2008; 471–476. 86. Kranakis E, Krizanc D, Rajsbaum S. Mobile agent rendezvous: A survey. Structural Information and Communication Complexity, vol. 4056/2006. Springer Berlin / Heidelberg: New York, 2006; 1–9. 87. Ando H, Oasa Y, Suzuki I, Yamashita M. Distributed memoryless point convergence algorithm for mobile robots with limited visibility. IEEE Transactions on Robotics and Automation 1999; 15(5):818–828. 88. Lin J, Morse AS, Anderson BDO. The multi-agent rendezvous problem. part 1: The synchronous case. SIAM Journal of Control Optimal 2007; 46(6):2096–2119. 89. Lin J, Morse AS, Anderson BDO. The multi-agent rendezvous problem. part 2: The asynchronous case. SIAM Journal of Control Optimal 2007; 46(6):2120–2147. 90. Cortes J, Martinez S, Bullo F. Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions. IEEE Transactions on Automatic Control 2006; 51(8):1289–1298. 91. Xiao F, Wang L, Chen T. Connectivity preservation for multi-agent rendezvous with link failure. Automatica 2012; 48(1):25–35. 92. Ganguli A, Cortes J, Bullo F. Multirobot rendezvous with visibility sensors in nonconvex environments. IEEE Transctions on Robotics 2009; 25(2):340–352. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 26 X. WANG, ET AL. 93. Dimarogonas DV, Kyriakopoulos KJ. On the rendezvous problem for multiple nonholonomic agents. IEEE Transactions on Automatic Control 2007; 52(5):916–922. 94. Conte G, Pennesi P. The rendezvous problem with discontinuous control policies. IEEE Transactions on Automatic Control 2010; 55(1):279–283. 95. Yu J, LaValle SM, Liberzon D. Rendezvous without coordinates. IEEE Transactions on Automatic Control 2012; 57(2):421–434. 96. Ren W. Formation keeping and attitude alignment for multiple spacecraft through local interactions. Journal of Guidance, Control and Dynamics 2007; 30(2):633–638. 97. Bondhus AK, Pettersen KY, Gravdahl JT. Leader/follower synchronization of satellite attitude without angular velocity measurements. Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 2005, Seville, Spain, 2005; 7270–7277. 98. Smith TR, Hanssmann H, Leonard NE. Orientation control of multiple underwater vehicle with symmetry- breaking potentials. Proceedings of the 40th IEEE Conference on Decision and Control, Orlando, Florida, USA, 2001; 4598–4603. 99. Lawton JR, Beard RW. Synchronized multiple spacecraft rotations. Automatica 2002; 38(8):1359–1364. 100. Sarlette A, Sepulchre R, Leonard NE. Autonomous rigid body attitude synchronization. Automatica 2009; 45(2):572–577. 101. Barca JC, Sekercioglus YA. Swarm robotics reviewed. Robotica 2013; 31(3):349 – 359. 102. Cheng D, Chen H. From swarm to social behavior control. Science & Technology Review 2004; (8):4–7. 103. Reynolds CW. Flocks, herds, and schools: A distributed behavioral model. Computer Graphics 1987; 21(4):25–34. 104. Olfati-Saber R. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Transations on Automatic Control 2006; 51(3):401–420. 105. Su H, Wang X, Lin Z. Flocking of multi-agents with a virtual leader. IEEE Transactions on Automatic Control 2009; 54(2):293–307. 106. Tanner HG, Jadbabaie A, Pappas GJ. Flocking in fixed and switching networks. IEEE Transations on Automatic Control 2007; 52(5):863–868. 107. Lee D, Spong MW. Stable flocking of multiple inertial agents on balanced graphs. IEEE Transations on Automatic Control 2007; 52(8):1469–1475. 108. Moshtagh N, Jadbabaie A. Distributed geodesic control laws for flocking of nonholonomic agents. IEEE Transations on Automatic Control 2007; 52(4):681–686. 109. Dong W. Flocking of multiple mobile robots based on backstepping. IEEE Transations on System, Man and Cybernetics: Part B 2011; 41(2):414–424. 110. Shi G, Hong Y, Johansson KH. Connectivity and set tracking of multi-agent systems guided by multiple moving leaders. IEEE Transactions on Automatic Control 2012; 57(3):663–676. 111. Ji M, Ferrari-Trecate G, Egerstedt M, Buffa A. Containment control in mobile networks. IEEE Transactions on Automatic Control 2008; 53(5):1972–1975. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc MULTI-AGENT DISTRIBUTED COORDINATION CONTROL: DEVELOPMENTS AND DIRECTIONS 27 112. Cao Y, Stuart D, Ren W, Meng Z. Distributed containment control for multiple autonomous vehicles with doubleintegrator dynamics: Algorithms and experiments. IEEE Transactions on Control Systems Technology 2011; 19(4):929–938. 113. Cao Y, Ren W. Containment control with multiple stationary or dynamic leaders under a directed interaction graph. Proceedings of the IEEE Conference on Decision Control, Shanghai, China, 2009; 3014–3019. 114. Li J, Ren W, Xu S. Distributed containment control with multiple dynamic leaders for double-integrator dynamics using only position measurements. IEEE Transactions on Automatic Control 2012; 57(6):1553–1559. 115. Lou Y, Hong Y. Target containment control of multi-agent systems with random switching interconnection topologies. Automatica 2012; 48(5):879–885. 116. Mei J, Ren W, Ma G. Distributed containment control for lagrangian networks with parametric uncertainties under a directed graph. Automatica 2012; 48(4):653–659. 117. Meng Z, Ren W, You Z. Distributed finite-time attitude containment control for multiple rigid bodies. Automatica 2010; 46(12):2092–2099. 118. Ganguli A, Cortses J, Bullo F. Multirobot rendezvous with visibility sensors in nonconvex environments. IEEE Transactions on Robotics 2009; 25(2):340–352. 119. Li T, Xie L. Distributed consensus over digital networks with limited bandwidth and time-varying topologies. Automatica 2011; 47(9):2006–2015. 120. Li T, Xie L, Zhang J. Distributed consensus with limited communication data rate. IEEE Transactions on Automatic Control 2011; 56(2):279–292. 121. Lavaei J, Murray RM. Quantized consensus by means of gossip algorithm. IEEE Transactions on Automatic Control 2012; 57(1):19–32. 122. Kashyap A, Basar T, Srikant R. Quantized consensus. Automatica 2007; 43(7):1192–1203. 123. Schlanbusch R, Nicklasson PJ. Synchronization of target tracking cascadeded leader-follower spacecraft formation. Advances in Spacecraft Technologies, Hall J (ed.). 2011; 563–584. 124. Michael N, Fink J, Kumar V. Cooperative manipulation and transportation with aerial robots. Auton Robot 2011; 30(1):73–86. 125. Muller M, Lupashin S, D’Andrea R. Quadrocopter ball juggling. Proceedings of the 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, USA, 2011; 5113–5120. 126. Girdhar Y, Xu A, Dey BB, Meghjani M, Shkurti F, Rekleitis I, Dudek G. Mare: Marine autonomous robotic explorer. Proceedings of the 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, USA, 2011; 5048–5053. 127. Dong W. Tracking control of multiple-wheeled mobile robots with limited information of a desired trajectory. IEEE Transactions on Robotics 2012; 28(1):262–268. 128. Consolini L, Morbidi F, Prattichizzo D, Tosques M. On a class of hierarchical formations of unicycles and their internal. IEEE Transactions on Automatic Control 2012; 57(4):845–859. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc 28 X. WANG, ET AL. 129. Mastellone S, Mejia JS, Stipanovi DM, Spong MW. Formation control and coordinated tracking via asymptotic decoupling for lagrangian multi-agent systems. Automatica 2011; 47(12):2355–2363. 130. Shi G, Hong Y. Set-tracking of multi-agent systems with variable topologies guided by moving multiple leaders. Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, GA, 2010; 2245–2250. 131. Wang X, Liu T, Qin J. Second-order consensus with unknown dynamics via cyclic-small-gain method. IET Control Theory and Application 2012; 6(18):2748–2756. 132. Oung R, D’Andrea R. The distribute flight array. Mechatronics 2011; 21(5):908–917. 133. Nathan M, Vijay K. Planning and control of ensembles of robots with nonholonomic constraints. The International Journal of Robotics Research 2009; 28(8):962–975. 134. Igarashi Y, Hatanaka T, Fujita M, Spong MW. Passivity-based attitude synchronization in SE(3). IEEE Transactions on Control Systems Technology 2009; 17(5):1119–1134. 135. Hatanaka T, Igarashi Y, Fujita M, Spong MW. Passivity-based pose synchronization in three dimensions. IEEE Transactions on Automatic Control 2012; 57(2):360–375. Copyright c(cid:13) 2013 John Wiley & Sons, Ltd. Int. J. Robust. Nonlinear Control (2013) Prepared using rncauth.cls DOI: 10.1002/rnc
1802.08020
4
1802
2018-11-20T12:55:09
On Rational Delegations in Liquid Democracy
[ "cs.MA", "cs.GT" ]
Liquid democracy is a proxy voting method where proxies are delegable. We propose and study a game-theoretic model of liquid democracy to address the following question: when is it rational for a voter to delegate her vote? We study the existence of pure-strategy Nash equilibria in this model, and how group accuracy is affected by them. We complement these theoretical results by means of agent-based simulations to study the effects of delegations on group's accuracy on variously structured social networks.
cs.MA
cs
On Rational Delegations in Liquid Democracy ∗ Daan Bloembergen1, Davide Grossi2, and Martin Lackner3 1Centrum Wiskunde & Informatica, Amsterdam, The Netherlands 2Bernoulli Institute, University of Groningen, The Netherlands 3TU Wien, Vienna, Austria [email protected], [email protected], [email protected] November 21, 2018 Abstract Liquid democracy is a proxy voting method where proxies are delegable. We propose and study a game-theoretic model of liquid democracy to address the following question: when is it rational for a voter to delegate her vote? We study the existence of pure-strategy Nash equilibria in this model, and how group accuracy is affected by them. We complement these theoretical results by means of agent-based simulations to study the effects of delegations on group's accuracy on variously structured social networks. 1 Introduction Liquid democracy (Blum & Zuber, 2016) is an influential proposal in recent debates on democratic reforms in both Europe and the US. Several grassroots campaigns, as well as local parties, experimented with this novel type of decision making procedure. Examples include the German Piratenpartei1 and the EU Horizon 2020 project WeGovNow (Boella et al., 2018), which have incorporated the LiquidFeedback2 platform in their decision making, as well as grass-roots organizations such as the Democracy Earth Foundation3. Liquid democracy is a form of proxy voting (Miller, 1969; Tullock, 1992; Alger, 2006; Green-Armytage, 2015; Cohensius et al., 2017) where, in contrast to classical proxy voting, proxies are delegable (or transitive, or transferable). Suppose we are voting on a binary issue, then each voter can either cast her vote directly, or she can delegate her vote to a proxy, who can again either vote directly or, in turn, delegate to yet another proxy, and ∗This paper (without Appendix) appears in the proceedings of AAAI'19. We are indebted to the anonymous reviewers of IJCAI/ECAI'18 and AAAI'19 for many helpful comments on earlier versions of this paper. We are also grateful to the participants of the LAMSADE seminar at Paris Dauphine University, and the THEMA seminar at University Cergy-Pontoise where this work was presented, for many helpful comments and suggestions. Daan Bloembergen has received funding in the framework of the joint programming initiative ERA-Net Smart Energy Systems' focus initiative Smart Grids Plus, with support from the European Union's Horizon 2020 research and innovation programme under grant agreement No 646039. Davide Grossi was partially supported by EPSRC under grant EP/M015815/1. Martin Lackner was supported by the European Research Council (ERC) under grant number 639945 (ACCORD) and by the Austrian Science Foundation FWF, grant P25518 and Y698. 1https://www.piratenpartei.de/ 2https://liquidfeedback.org/ 3https://www.democracy.earth/ 1 so forth. Ultimately, the voters that decided not to delegate cast their ballots, which now carry the weight given by the number of voters who entrusted them as proxy, directly or indirectly. Contribution The starting point of our analysis is an often cited feature of liquid democ- racy: transitive delegations reduce the level of duplicated effort required by direct voting, by freeing voters from the need to invest effort in order to vote accurately. The focus of the paper is the decision-making problem that voters, who are interested in casting an accurate vote, face between voting directly, and thereby incurring a cost in terms of effort invested to learn about the issue at hand, or delegating to another voter in their network, thereby avoiding costs. We define a game-theoretic model, called delegation game, to represent this type of interaction. We establish pure strategy Nash equilibrium existence results for classes of delegation games, and study the quality of equilibria in terms of the average accuracy they enable for the population of voters, both analytically and through simulations. Proofs of the two main results (Theorems 1 and 2) are presented in full, while we provide proofs of the simpler secondary results as an Appendix only. By means of simulations we also study the effects of different network structures on delegation games in terms of: performance against direct voting, average accuracy and the probability of a correct majority vote, the number and quality of voters acting as ultimate proxies (so-called gurus) and, finally, the presence of delegation cycles. To the best of our knowledge, this is the first paper providing a comprehensive study of liquid democracy from a game-theoretic angle. Related Work Although the idea of delegable proxy was already sketched by Dodg- son (1884), only a few very recent papers have studied aspects of liquid democracy in the (computational) social choice theory (Brandt et al., 2016) literature. Kling et al. (2015) provide an analysis of election data from the main platform implementing a liquid democracy voting system (Liquid Feedback) for the German Piratenpartei. They focus on network theoretic properties emerging from the structure of delegations -- with partic- ular attention to the number of highly influential gurus or 'super-voters'. Inspired by their experimental analysis, Golz et al. (2018) propose and analyze a variant of the liquid democracy scheme able to restrict reliance on super-voters. Skowron et al. (2017) study an aspect of the Liquid Feedback platform concerning the order in which proposals are ranked and by which they are brought to the attention of the community. Boldi et al. (2011) investigate applications of variants of the liquid democracy voting method (called viscous democracy) to recommender systems. Brill (2018) presents some research direc- tions in the context of liquid democracy. A general, more philosophical discussion of liquid democracy is provided by Blum & Zuber (2016). More directly related to our investigations is the work by Christoff & Grossi (2017) and, especially, by Kahng et al. (2018). The first paper studies liquid democracy as an aggregator -- a function mapping profiles of binary opinions to a collective opinion -- in the judgment aggregation and binary voting tradition (Grossi & Pigozzi, 2014; Endriss, 2016). The focus of that paper are the unintended effects that transferable proxies may have due to delegation cycles, and due to the failure of rationality constraints normally satisfied by direct voting. The second paper addresses one of the most cited selling arguments for liquid democ- racy: delegable proxies guarantee that better informed agents can exercise more weight on group decisions, thereby increasing their quality. Specifically, Kahng et al. (2018) study the level of accuracy that can be guaranteed by liquid democracy (based on vote delega- 2 tion with weighted majority) vs. direct voting by majority. Their key result consists in showing that no 'local' procedure to select proxies can guarantee that liquid democracy is, at the same time, never less accurate (in large enough graphs) and sometimes strictly more accurate than direct voting. In contrast to their work, we assume that agents incur costs (effort) when voting directly, and on that basis we develop a game-theoretic model. Also, we assume agents aim at tracking their own type rather than an external ground truth, although we do assume such a restriction in our simulations to better highlight how the two models are related and to obtain insights applicable to both. 2 Preliminaries 2.1 Types, Individual Accuracy and Proximity We are concerned with a finite set of agents (or voters, or players) N = {1, . . . , n} having to decide whether x = 1 or x = 0. For each agent one of these two outcomes is better, but the agent is not necessarily aware which one. We refer to this hidden optimal outcome as the type of agent i and denote it by τi ∈ {0, 1}. Agents want to communicate their type truthfully to the voting mechanism, but they know it only imperfectly. This is captured by the accuracy qi of an agent i: qi determines the likelihood that, if i votes directly, she votes according to her type τi. We assume that an agent's accuracy is always ≥ 0.5, i.e., at least as good as a coin toss. We distinguish two settings depending on whether the agents' types are deterministic or probabilistic. A deterministic type profile T = (cid:104)τ1, . . . , τn(cid:105) simply collects each agent's type. In probabilistic type profiles types are independent random variables drawn according to a distribution P. Given a probabilistic type profile, the likelihood that any two agents i, j ∈ N are of the same type is called the proximity pi,j where pi,j = P(τ (i) = τ (j)) = P(τ (i) = 1) · P(τ (j) = 1) + (1 − P(τ (i) = 1)) · (1 − P(τ (j) = 1)). In the probabilistic setting we assume agents know such value although, importantly, they do not know P. In a deterministic type profile, we have pi,j = 1 if τi = τj and pi,j = 0 otherwise. Following standard equilibrium theory, our theoretical results assume agents act as if they have access to the accuracy of each agent. More realistically, in our simulations we assume agents have access to such information only with respect to neighbors on an underlying interaction structure. 2.2 Interaction Structure and Delegations Agents are nodes in a network (directed graph) represented by a relation R ⊆ N 2. For i ∈ N the neighborhood of i in (cid:104)N, R(cid:105) is denoted R(i), i.e., the agents that are directly connected to i. Agents have the choice of either voting themselves, thereby relying solely on their own accuracy, or delegating to an agent in their neighborhood. A delegation profile is a vector d = (cid:104)d1, . . . , dn(cid:105) ∈ N n. Given a delegation profile d we denote by di the proxy selected by i in d. Clearly a delegation profile can be viewed as a functional graph on N or, equivalently, as a map in d : N → N where d(i) = di. When the iterated application of d from i reaches a fixed point we denote such fixed point as d∗ i and call it i's guru (in d). In the following, we write N∗ to denote the set of voters whose delegation does not lay on a path ending on a cycle, i.e., the set of voters i for which d∗ i exists. We write d(cid:48) = (d−i, j) as a short form for d(cid:48) = (cid:104)d1, . . . , di−1, j, di+1, . . . , dn(cid:105). As agents may only be able to observe and interact with their direct network neighbors, structural properties of the interaction network may play a role in the model dynamics. In 3 our simulations we will focus on undirected graphs (that is, R will be assumed to be sym- metric, as social ties are normally mutual) consisting of one single connected component (that is, N 2 is included in the reflexive transitive closure of R). Under these assumptions, we consider four typical network structures that are well represented in the literature on social network analysis (cf. Jackson 2008): 1) the random network, in which each pair of nodes has a given probability of being connected (Erdos & R´enyi, 1959); 2) the regular network, in which all nodes have the same degree; 3) the small world network, which features a small average path length and high clustering (Watts & Strogatz, 1998); and 4) the scale free network, which exhibits a power law degree distribution (Barab´asi & Albert, 1999).4 3 A Model of Rational Delegations 3.1 Individual Accuracy under Delegable Proxy Each agent i has to choose between two options: either to vote herself with accuracy qi or to delegate, thereby inheriting the accuracy of another voter (unless i is involved in a delegation cycle). These choices are recorded in the delegation profile d and can be used to compute the individual accuracy for each agent i ∈ N∗ as follows: if i ∈ N∗ if i /∈ N∗ i ) · (1 − pi,d∗ i ) i · pi,d∗ 0.5 i + (1 − qd∗ (cid:26)qd∗ ∗ i (d) = q (1) In Equation (1) i's accuracy equals the likelihood that i's guru has the same type and votes accurately plus the likelihood that i's guru has the opposite type and fails to vote accurately. Note that if i votes directly, i.e., di = i, then q∗ i (d) = qi. Observe that if i's delegation leads to a cycle (i /∈ N∗), i's accuracy is set to 0.5. The rationale for this assumption is the following. If an agent delegates into a cycle, even though she knows her own accuracy and she actively engages with the voting mechanism by expressing a delegation, she fails to pass information about her type to the mechanism. No information is therefore available to decide about her type. It may be worth observing that, by Equation (1), in a deterministic type profile we i ); have that pi,j ∈ {0, 1} and therefore i's accuracy reduces to: qd∗ 1 − qd∗(i) if i ∈ N∗ and τ (i) (cid:54)= τ (d∗ i ); and 0.5 if i /∈ N∗. i if i ∈ N∗ and τ (i) = τ (d∗ Before introducing our game theoretic analysis, we make the following observation. Agents have at their disposal an intuitive strategy to improve their accuracy: simply delegate to a more accurate neighbor. We say that a delegation profile d is positive if for j (d) > qj. Furthermore, we say that a delegation from i to a all j ∈ N either dj = j or q∗ neighbor j is locally positive if qj · pi,j + (1 − qj) · (1 − pi,j) > qi. Proposition 1. Let d be a positive delegation profile. Further, let s, t ∈ N , ds = s, and d(cid:48) = (d−s, t), i.e., agent s votes directly in d and delegates to t in d(cid:48). If the delegation from s to t is locally positive, then d(cid:48) is positive (proof in Appendix A). However, locally positive delegations do not necessarily correspond to optimal del- egations. This can be easily seen in an example where agent i is not a neighbor of a very competent agent j, but would have to delegate via an intermediate agent k (who delegates to j). If this intermediate agent k has a lower accuracy than i, then the dele- gation from i to k would not be locally positive, even though it is an optimal choice. So 4Although random and regular graphs are not generally applicable to real-world settings, they serve as a useful baseline to illustrate the effects of network structure on delegations. 4 utility-maximization may require information which is inherently non-local (accuracy of 'far' agents). 3.2 Delegation Games We assume that each agent i has to invest an effort ei to manifest her accuracy qi. If she delegates, she does not have to spend effort. Agents aim therefore at maximizing the trade-off between the accuracy they can achieve (either by voting directly or through proxy) and the effort they spend. Under this assumption, the binary decision set-up with delegable proxy we outlined above can be used to define a natural game -- called delegation game -- G = (cid:104)N, P, R, Σi, ui(cid:105), with i ∈ N , where N is the set of agents, P is the (possibly degenerate) distribution from which the types of the agents in N are drawn, R the underlying network as defined above, Σi ∈ N is the set of strategies of agent i (voting, or choosing a specific proxy), and (cid:40) q∗ i (d) qi − ei ui(d) = if di (cid:54)= i if di = i (2) is agent i's utility function. The utility i extracts from a delegation profile equals the accuracy she inherits through proxy or, if she votes, her accuracy minus the effort spent.5 In delegation games we assume that qi − ei ≥ 0.5 for all i ∈ N . This is because if qi − ei < 0.5, then i would prefer a random effortless choice over taking a decision with effort. A few comments about the setup of Equation (2) are in order. First of all, as stated earlier, we assume agents to be truthful. They do not aim at maximizing the chance their type wins the vote, but rather to relay their type to the mechanism as accurately as possible.6 Secondly, notice that the utility an agent extracts from a delegation profile may equal the accuracy of a random coin toss when the agent's delegation ends up into a delegation cycle (cf. Equation (1)). If this happens the agent fails to relay information about her type, even though she acted in order to do so. This justifies the fact that 0.5 is also the lowest payoff attainable in a delegation game. The following classes of delegation games will be used in the paper: games with de- terministic profiles, i.e., where P is degenerate and all players are assigned a crisp type from {0, 1}; homogeneous games, where all players have the same (deterministic) type;7 and effortless voting games, where for each i ∈ N we have ei = 0. As an example, a homogeneous game in matrix form is given in Table 1, where N = {1, 2}, R = N 2 and the distribution yields the deterministic type profile T = (cid:104)1, 1(cid:105). Interestingly, if we assume that qi − ei > 0.5 with i ∈ {1, 2}, and that8 q−i > qi − ei (i.e., the opponent's accuracy is higher than the player's individual accuracy minus her effort), then the game shares the ordinal preference structure of the class of anti-coordination games: players need to avoid coordination on the same strategy (one should vote and the other delegate), with two coordination outcomes (both players voting or both delegating) of which the second (the delegation cycle) is worst for both players. Notice that, were the 5No utility is accrued for gaining voting power in our model. 6Notice however that our modeling of agents' utility remains applicable in this form even if agents are not truthful but the underlying voting rule makes truthfulness a dominant strategy -- such as majority in the binary voting setting used here. normally assumed by jury theorems (Grofman et al., 1983). 7This is the type of interaction studied, albeit not game-theoretically, by Kahng et al. (2018) and 8We use here the usual notation −i to denote i's opponent. 5 vote delegate (to 2) vote q1−e1, q2−e2 q2, q2 − e2 delegate (to 1) q1 − e1, q1 0.5, 0.5 Table 1: A two-player delegation game. The row player is agent 1 and the column player is agent 2. underlying network not complete (i.e., R ⊂ N 2), the matrix would be shrunk by removing the rows and columns corresponding to the delegation options no longer available. The introduction of effort has significant consequences on the delegation behavior of voters, and we will study it in depth in the coming sections. It is worth noting immediately that the assumptions of Proposition 1 no longer apply, since agents may prefer to make delegations that are not locally positive due to the decreased utility of voting directly. 3.3 Existence of Equilibria in Delegation Games In this section we study the existence of pure strategy Nash Equilibria (NE) in two classes of delegation games. NE describe how ideally rational voters would resolve the effort/accuracy trade-off. Of course, such voters have common knowledge of the delega- tion game structure -- including, therefore, common knowledge of the accuracies of 'distant' agents in the underlying network. Our simulations will later lift some of such epistemic assumptions built into NE. Deterministic Types deterministic type profiles. In the following we provide a NE existence result for games with Theorem 1. Delegation games with deterministic type profiles always have a (pure strat- egy) NE. Proof. First of all, observe that since the profile is deterministic, for each pair of agents i and j, pi,j ∈ {0, 1}. The proof is by construction. First, we partition the set of agents N into N1 = {i ∈ N τ (i) = 1} and N0 = {i ∈ N τ (i) = 0}. We consider these two sets separately; without loss of generality let us consider N1. Further we consider the network R1 = {(i, j) ∈ N1 × N1 : (i, j) ∈ R}. Since (N1, R1) can be seen as a directed graph, we can partition it into Strongly Connected Components (SCCs). If we shrink each SCC into a single vertex, we obtain the condensation of this graph; note that such a graph is a directed acyclic graph (DAG). We construct a delegation profile d by traversing this DAG bottom up, i.e., starting with leaf SCCs. Let S ⊆ N1 be a set of agents corresponding to a leaf SCC in the condensation DAG. We choose an agent i in S that has maximum qi − ei. Everyone in S (including i) delegates to i. Now let S ⊆ N1 be a set of agents corresponding to an inner node SCC in the condensation DAG and assume that we have already defined the delegation for all SCCs that can be reached from S. As before, we identify an agent i ∈ S with maximum qi − ei. Further, let T ⊆ N1 \ S be the set of all voters j that can be reached from S in (N1, R1), and for which q∗ j > qi−ei. We distinguish two cases. (i) If T (cid:54)= ∅, then we choose an agent k ∈ T with q∗ j and all agents in S directly or indirectly delegate to k. (ii) If T = ∅, all agents in S delegate to i. This concludes our construction (as for N0 the analogous construction applies); let d be the corresponding delegation profile. It remains to verify that this is indeed a NE: Let i be some agent in an SCC S, and, without loss of generality, let i ∈ N1. Observe that since we have a deterministic k = maxj∈T q∗ 6 j (d) > q∗ i ∈ S but di (cid:54)= i, and (3) d∗ profile, if agent i changes her delegation to j, then i's utility changes to q∗ j (d) if i ∈ N1 and 1 − q∗ j (d) if i ∈ N0. First, note that for all agents k ∈ N , q∗ k(d) ≥ qk − ek ≥ 0.5. Hence, we can immediately exclude that for agent i delegating to an agent in j ∈ N0 is (strictly) beneficial, as it would yield an accuracy of at most 1 − q∗ j ≤ 0.5. Towards a contradiction assume there is a beneficial deviation to an agent j ∈ N1, i.e., there is an agent j ∈ R(i) ∩ N1 with q∗ i (d). Let us now consider the three cases: (1) di = i, (2) d∗ i /∈ S. In case (1), everyone in S delegates to i. Hence, if j ∈ S, a cycle would occur yielding a utility of 0.5, which is not sufficient for a beneficial deviation. If a delegation to j /∈ S is possible but was not chosen, then by construction q∗ j ≤ qi − ei and hence this deviation is not beneficial. We conclude that in case (1) such an agent j cannot exist. In case (2), everyone in S delegates to d∗ i . Hence, if j ∈ S, then d∗ j = d∗ i , a contradiction. If j /∈ S, the same reasoning as before applies and hence also here we obtain a contradiction. In case (3), by construction, d∗ i /∈ S had been chosen to maximise accuracy, hence j ∈ S. Since for all k ∈ S, d∗ i , only a deviation to i itself can be beneficial, i.e., j = i. However, since d∗ d∗(i) > qi − ei, no beneficial deviation is possible. i was chosen because q∗ k = d∗ It follows that also homogeneous games always have NE. Effortless Voting Effortless voting (ei = 0 for all i ∈ N ) is applicable whenever effort is spent in advance of the decision and further accuracy improvements are not possible. Theorem 2. Delegation games with effortless voting always have a (pure strategy) NE. Proof. We prove this statement by showing that the following procedure obtains a NE: We start with a strategy profile in which all players vote directly, i.e., player i's strategy is i. Then, we iteratively allow players to choose their individual best response strategy to the current strategy profile. Players act sequentially in arbitrary order. If there are no more players that can improve their utility by changing their strategy, we have found a NE. We prove convergence of this procedure by showing that a best response that increases the player's utility never decreases the utility of other players. We proceed by induction. Assume that all previous best responses have not reduced any players' utility (IH). Assume player i now chooses a best response that increases her utility. Let d be the delegation profile; further, let d∗ i = s. By assumption, i's utility started with qi−ei = qi and has not decreased since, i.e., ui(d) ≥ qi. Since i's best response strictly increases i's utility, it cannot be a delegation to herself. So let a delegation to j (cid:54)= i be i's best response and consider profile d(cid:48) = (d−i, j). Further, let d∗ j = t, i.e., i now delegates to j and by transitivity to t, i.e., d(cid:48)∗ j = t. Let k be some player other than i. We define the delegation path of k as the sequence (d(k), d(d(k)), d(d(d(k))), . . . ). If k's delegation path does not contain i, then k's utility remains unchanged, i.e., uk(d(cid:48)) ≥ uk(d). If k's delegation path contains i, then k now delegates by transitivity to t, i.e., we have d∗ k = s and d(cid:48)∗ k = t. By Equation (2), we have i = d(cid:48)∗ uk(d) = qs · pk,s + (1 − qs) · (1 − pk,s) ) = qt · pk,t + (1 − qt) · (1 − pk,t). uk(d (cid:48) and (3) (4) We have to show that k's utility does not decrease, i.e., uk(d(cid:48)) ≥ uk(d), under the as- sumption that i chooses a best response, i.e., ui(d(cid:48)) > ui(d), with: ui(d) = qs · pi,s + (1 − qs) · (1 − pi,s) ) = qt · pi,t + (1 − qt) · (1 − pi,t). ui(d (cid:48) and (5) (6) 7 In the following we will often use the fact that, for a, b ∈ [0, 1], if ab + (1− a)(1− b) ≥ 0.5, then either a, b ∈ [0, 0.5] or a, b ∈ [0.5, 1]. By IH, since accuracies are always at least 0.5, it holds that ui(d) ≥ qi ≥ 0.5 and by Equation (5) we have qs · pi,s + (1− qs)· (1− pi,s) ≥ 0.5 and hence pi,s ≥ 0.5. Analogously, Equation (3) implies that pk,s ≥ 0.5. Furthermore, we use the fact that pk,i = pk,sps,i + (1 − pk,s)(1 − ps,i) + (−2(2xk − 1) · (2xi − 1) · (xs − 1)xs) (7) where xj = P(τ (j) = 1) for j ∈ {k, i, s}. Observe that, by the definition of utility in Equation (2), the assumptions made on d and d(cid:48), and the fact that for a, b ∈ [0, 1], if ab + (1 − a)(1 − b) ≥ 0.5, then either a, b ∈ [0, 0.5] or a, b ∈ [0.5, 1]. So we have that either xj ≥ 0.5 for j ∈ {k, i, s}, or xj ≤ 0.5 for j ∈ {k, i, s}. We work on the first case. The other case is symmetric. Let also γk,s,i = −2(2xk − 1) · (2xi − 1) · (xs − 1)xs. From the above it follows that 0.5 ≥ γk,i,s ≥ 0. Furthermore, given that pi,s = ps,i ≥ 0.5, we can also conclude that pk,i ≥ 0.5. Now by substituting pk,s = pk,ipi,s + (1 − pk,i)(1 − pi,s) + (−2(2xk − 1) · (2xs − 1) · (xi − 1)xi (cid:124) (cid:123)(cid:122) γk,i,s (cid:125) ) (8) in Equation (3), we obtain (cid:122) (cid:122) (cid:125)(cid:124) ui(d) (cid:125)(cid:124) ui(d(cid:48)) (cid:123) (cid:123) uk(d) = (2pk,i − 1)( 2qspi,s − qs − pi,s + 1) + 1 − pk,i + γk,i,s(2qs − 1). Similarly, using the appropriate instantiation of Equation (7) for xj with j ∈ {k, i, t}, by substituting pk,i · pi,t + (1 − pk,i)(1 − pi,t) + γk,i,t for pk,t in Equation (4) we obtain (cid:48) uk(d ) = (2pk,i − 1) · ( 2qtpi,t − qt − pi,t + 1) + 1 − pk,i + γk,i,t(2qt − 1). (9) Now observe that, since pk,i ≥ 0.5 we have that (2pk,i − 1) ≥ 0. It remains to compare γk,i,s(2qs − 1) with γk,i,t(2qt − 1), showing the latter is greater than the former. Observe that both expressions have a positive sign. We use the fact that ab + (1 − a)(1 − b) < cd + (1 − c)(1 − d) implies cd > ab under the assumption that a, b, c, d ∈ [0.5, 1]. On the basis of this, and given that ui(d(cid:48)) > ui(d), we obtain that qs · pi,s < qt · pi,t and therefore that qs · xs < qt · xt, from which we can conclude that (cid:122) (cid:0) <(cid:0) (cid:124) (cid:125)(cid:124) γk,i,s (cid:123)(cid:122) γk,i,t −2(2xk − 1) · (2xs − 1) · (xi − 1)xi −2(2xk − 1) · (2xt − 1) · (xi − 1)xi · (2qs − 1) · (2qt − 1). (cid:123) (cid:1) (cid:1) (cid:125) It follows that the assumption ui(d(cid:48)) > ui(d) (player i chose a best response that increased her utility) together with Equations (8) and (9) implies that uk(d(cid:48)) > uk(d) (and a fortiori that uk(d(cid:48)) ≥ uk(d)). We have therefore shown that if some player chooses a best response, the utility of other players does not decrease. This completes the proof. Discussion The existence of NE in general delegation games remains an interesting open problem. It should be noted that the proof strategies of both Theorems 1 and 2 do not work in the general case. Without a clear dichotomy of type it is not possible to assign delegations for all agents in an SCC (as we do in the proof of Theorem 1). And the key 8 property upon which the proof of Theorem 2 hinges (that a best response of an agent does not decrease the utility of other agents) fails in the general case due to the presence of non- zero effort. Finally, it should also be observed that Theorem 2 (as well as Proposition 1) essentially depend on the assumption that types are independent random variables. If this is not the case (e.g., because voters' preferences are correlated), delegation chains can become undesirable. Example 1. Consider the following example with agents 1, 2 and 3. The probability distribution P is defined as P(τ (1) = 1 ∧ τ (2) = 1 ∧ τ (3) = 0) = 0.45, P(τ (1) = 0 ∧ τ (2) = 1 ∧ τ (3) = 1) = 0.45, and P(τ (1) = 1 ∧ τ (2) = 1 ∧ τ (3) = 1) = 0.1. Consequently, p1,2 = 0.55, p2,3 = 0.55, and p1,3 = 0.1. Let us assume that the agents' accuracies are q1 = 0.5001, q2 = 0.51, and q3 = 0.61. A delegation from agent 1 to 2 is locally positive as q2 · p1,2 + (1− q2)· (1− p1,2) = 0.501 > q1. Furthermore, a delegation from 2 to 3 is locally positive as q3 · p2,3 + (1 − q3) · (1 − p2,3) = 0.511 > q2. However, the resulting delegation from 1 to 3 is not positive since q3 · p1,3 + (1 − q3) · (1 − p1,3) = 0.412. 3.4 Quality of Equilibria in Delegation Games In delegation games players are motivated to maximize the tradeoff between the accuracy they acquire and the effort they spend for it. A natural measure for the quality of a delegation profile is, therefore, how accurate or informed a random voter becomes as a result of the delegations in the profile, that is, the average accuracy (i.e., ¯q∗(d) = i (d)) players enjoy in that profile. One can also consider the utilitarian social i∈N ui(d) of a delegation profile d. This relates to average accuracy (cid:80) welfare SW(d) =(cid:80) i∈N q∗ 1 n as follows: ∗ ¯q (d) = id(i)=i ei . SW(d) +(cid:80) n It can immediately be noticed that equilibria do not necessarily maximize average accuracy. On the contrary, in the following example NE yields an average accuracy of close to 0.5, whereas an average accuracy of almost 1 is achievable. Example 2. Consider an n-player delegation game where all players have the same type and (i, j) ∈ R for all j and all i > 1, i.e., player 1 is a sink in R and cannot delegate to anyone, but all others can delegate to everyone. Further, we have e1 = 0 and ei = 0.5 −  for i ≥ 2. The respective accuracies are q1 = 0.5 + 2 and qi = 1. If player i ≥ 2 does not delegate, her utility is 0.5 + . Hence, it is always more desirable to delegate to player 1 (which yields a utility of 0.5 + 2 for i). Consider now the profiles in which all players delegate to player 1 (either directly or transitively). Player 1 can only vote directly (with utility 0.5 + 2). All such profiles are NE with average accuracy 0.5 + 2. If, however, some player j ≥ 2 chose to vote herself, all players (except 1) would delegate to j thereby obtaining an average accuracy of 1 − 0.5−2 , which converges to 1 for n → ∞. This is not a NE, as j could increase her utility by delegating to 1. n The findings of the example can be made more explicit by considering a variant of the price of anarchy for delegation games, based on the above notion of average accuracy. That is, for a given delegation game G, the price of anarchy (PoA) of G is given by PoA(G) = maxd∈N n ¯q∗(d) mind∈NE(G) ¯q∗(d) , where NE(G) denotes the set of pure-strategy NE of G. 9 Fact 1. PoA is bounded below by 1 and above by 2 (see Apendix A). An informative performance metrics for liquid democracy is the difference between the group accuracy after delegations versus the group accuracy achieved by direct voting. This measure, called gain, was introduced and studied by Kahng et al. (2018). Here we adapt it to our setting as follows: G(G) =(cid:0)mind∈NE(G) ¯q∗(d)(cid:1) − ¯q where ¯q = ¯q∗((cid:104)1, . . . , n(cid:105)). That is, the gain in the delegation game G is the average accuracy of the worst NE minus the average accuracy of the profile in which no voter delegates. It turns out that the full performance range is possible: Fact 2. G is bounded below by −0.5 and above by 0.5 (see Apendix A). The above bounds for PoA and gain provide only a very partial picture of the perfor- mance of liquid democracy when modeled as a delegation game. The next section provides a more fine-grained perspective on the effects of delegations. 4 Simulations We simulate the delegation game described above in a variety of settings. We restrict ourselves to homogeneous games. This allows us to relate our results to those of Kahng et al. (2018). Our experiments serve to both verify and extend the theoretical results of the previous section. In particular we simulate the best response dynamics employed in the proof of Theorem 2 and show that these dynamics converge even in the setting with effort, which we could not establish analytically. In addition, we investigate the dynamics of a one-shot game scenario, in which all agents need to select their proxy simultaneously at once. Setup We generate graphs of size N = 250 of each of the four topologies random, regular, small world, and scale free, for different average degrees, while ensuring that the graph is connected. Agents' individual accuracy and effort are initialized randomly with qi ∈ [0.5, 1] and qi − ei ≥ 0.5. We average results over 2500 simulations for each setting (25 randomly generated graphs × 100 initializations). Agents correctly observe their own accuracy and effort, and the accuracy of their neighbors. The game is homogeneous, so proximities are 1. Each agent i selects from her neighborhood R(i) (which includes i herself) the agent j that maximizes her expected utility following Equation (2). We compare two scenarios. The iterated best response scenario follows the procedure of the proof of Theorem 2, in which agents sequentially update their proxy to best-respond to the current profile d using knowledge of their neighbors' accuracy q∗ i (d). In the one-shot game scenario all agents choose their proxy only once, do so simultaneously, and based only on their neighbors' accuracy. The latter setup captures more closely the epistemic limitations that agents face in liquid democracy. 4.1 Iterated Best Response Dynamics These experiments complement our existence theorems. They offer insights into the effects of delegations on average voter's accuracy in equilibrium, and on the effects of different network structures on how such equilibria are achieved. We initialize qi ∼ N (0.75, 0.05) and first investigate the case in which ei = 0 for all i (effortless voting). Across all combinations of network types and average degrees ranging from 4 to 24, we find that the best response dynamics converges, as predicted by 10 Table 2: Total number of best response updates by individual agents and corresponding full passes over the network required for convergence. Reported are the mean (std.dev.) over all network types. Note: not all agents update their delegation at each full pass, but any single update requires an additional pass to check whether the best response still holds. Degree BR updates (effortless) Full passes (effortless) BR updates (with effort) Full passes (with effort) 4 298.1 (18.2) 3.6 (0.5) 294.7 (18.4) 3.6 (0.5) 8 261.7 (11.1) 3.0 (0.1) 259.4 (10.6) 3.0 (0.3) 12 254.2 (6.9) 2.9 (0.2) 252.9 (6.6) 2.8 (0.6) 16 251.6 (4.5) 2.8 (0.4) 250.9 (4.8) 2.6 (0.8) 20 250.6 (3.3) 2.7 (0.5) 250.2 (4.9) 2.4 (0.9) 24 250.0 (2.6) 2.5 (0.5) 249.9 (4.3) 2.4 (1.0) Table 3: Comparing the maximum accuracy across all agents and the mean accuracy under delegation d for different network degrees, averaged across network types. The differences are statistically significant (paired t-test, p = 0.05). Degree maxj qj ¯q∗(d) 4 0.8908 0.8906 8 0.8908 0.8903 12 0.8904 0.8897 16 0.8909 0.8899 20 0.8904 0.8890 24 0.8910 0.8893 Theorem 2, and does so optimally with d∗ i = arg maxj qj for all i. We observe minimal differences between network types, but see a clear inverse relation between average degree and the number of iterations required to converge (Table 2, top). Intuitively, more densely connected networks facilitate agents in identifying their optimal proxies (further details are provided in Appendix B). We accumulate results across all network types and compare the effortless setting to the case in which effort is taken into account. When we include effort ei ∼ N (0.025, 0.01), we still observe convergence in all cases and, interestingly, the number of iterations required does not change significantly (Table 2, bottom). Although the process no longer results in an optimal equilibrium, each case still yields a single guru j with qj ≈ maxk qk (less than 1% error) for all k ∈ N . In this scenario, the inclusion of effort means that a best response update of agent i no longer guarantees non-decreasing accuracy and utility for all other agents, which was a key property in the proof of Theorem 2. This effect becomes stronger as the average network degree increases, and as a result higher degree networks allow a greater discrepancy between the maximal average accuracy achievable and the average accuracy obtained at stabilization (Table 3). In lower degree graphs (e.g. degree 4) we further observe differences in convergence speed between the four different network types which coincide with differences between the average path lengths in those graphs: a shorter average distance between nodes yields a lower number of best response updates. This is intuitive, as larger distances between nodes mean longer delegation chains, but we have not yet conducted statistical tests to verify this hypothesis. 11 Figure 1: Top: Without effort. Bottom: With effort ei ∼ N (0.025, 0.01). Left: mean accuracy under liquid democracy, ¯q∗(d). The solid (dashed) line shows the mean (std. dev.) of the initial accuracy q; the dotted line shows maxi qi. Right: probability of a correct majority vote under d. 4.2 One-Shot Delegation Games Here we study one-shot interactions in a delegation game: all agents select their proxy (possibly themselves) simultaneously among their neighbors; no further response is possi- ble. This contrasts the previous scenario in which agents could iteratively improve their choice based on the choices of others. While Kahng et al. (2018) study a probabilistic model, we instead assume that agents deterministically select as proxy the agent j ∈ R(i) that maximizes their utility, as above. We compare ¯q and ¯q∗ (the average network accuracy without and with delegation, respectively), as well as the probability of a correct major- ity vote under both direct democracy PD and liquid democracy PL where gurus carry as weight the number of agents for whom they act as proxy. The difference PL − PD is again similar to the notion of gain (Kahng et al., 2018). In line with Condorcet's jury theorem (see for instance Grofman et al. 1983) PD → 1 as N → ∞, and indeed for N = 250 we obtain PD ≈ 1. First we again look at the effortless setting. Figure 1 (top) shows both metrics for the four different network types and for different average degrees. We observe that while ¯q∗(d) increases as the network degree increases (and in fact is always higher than ¯q without 12 tancebetweennodesyieldsalowernumberofbestresponseupdates.9Thisisintuitive,aslargerdistancesbetweennodesmeanlongerdelegationchains,butwehavenotyetcon-ductedstatisticalteststoverifythishypothesis.One-ShotDelegationGamesHerewestudyone-shotinteractioninadelegationgame:allagentsselecttheirproxy(possiblythemselves)simulta-neouslyamongtheirneighbors;nofurtherresponseispos-sible.Thiscontraststhepreviousscenarioinwhichagentscoulditerativelyimprovetheirchoicebasedonthechoicesofothers.WhileKahng,Mackenzie,andProcaccia(2018)studyaprobabilisticmodel,weinsteadassumethatagentsdeterministicallyselectasproxytheagentj2R(i)thatmaximizestheirutility,asabove.Wecompare¯qand¯q⇤(theaveragenetworkaccuracywithoutandwithdelegation,re-spectively),aswellastheprobabilityofacorrectmajorityvoteunderbothdirectdemocracyPDandliquiddemocracyPLwhereguruscarryasweightthenumberofagentsforwhomtheyactasproxy.ThedifferencePLPDistheno-tionofgain(Kahng,Mackenzie,andProcaccia2018).InlinewithCondorcet'sjurytheorem(seeforinstanceGrof-man,Owen,andFeld1983)PD!1asN!1,andin-deedforN=250weobtainPD⇡1.Firstweagainlookattheeffortlesssetting.Figure1(top)showsbothmetricsforthefourdifferentnetworktypesandfordifferentaveragedegrees.Weobservethatwhile¯q⇤(d)increasesasthenetworkdegreeincreases(andinfactisal-wayshigherthan¯qwithoutdelegation),theprobabilityofacorrectmajorityoutcome,PL,simultaneouslydecreases.ThisconfirmstheanalysisofKahng,Mackenzie,andPro-caccia(2018).Wealsoobservethatthenumberofgurusdecreasesexponentiallyasthedegreeincreases(Figure2,left).Simplyput,givingallvotingweighttoasmallgroupofgurusincreasesthechanceofanincorrectmajorityvote,assumingthatgurushavealessthanperfectaccuracy.Whenweincludeeffort(Figure1,bottom),therebymov-ingawayfromthemodelofKahng,Mackenzie,andProcac-cia(2018),weobserveadrasticdecreaseinaveragenetworkaccuracycombinedwithalowerprobabilityofacorrectma-jorityoutcomeunderliquiddemocracy,withbothdecreas-ingasnetworkdegreeincreases.Themainreasonistheex-istenceofdelegationcyclesinthiscase.Thiscontraststhebestresponsesettingabovewhereagentscoulditerativelyreconsidertheirchoiceofproxyandthusavoidcycles.Now,evenwithrelativelyloweffort(mean0.025),uptohalfofallagentsarestuckinacycle(andtherebyfailtopassinforma-tionabouttheirtype)whendegreeincreases.ThisconfirmsresultsontheprobabilityofdelegationcyclesfromChristoffandGrossi(2017)andstressestheimportanceofcyclereso-lutioninconcreteimplementationsofliquiddemocracysuchasLiquidFeedback.Finally,Figure1highlightsdifferencesbetweenthefournetworktypes.Scalefreenetworksyieldalowerprobabilityofacorrectmajorityoutcomeacrossalldegrees,aswellasalargernumberofguruswithaloweraverageaccuracyand9Moredetailedresultssupportingthisfindingarepresentedinthesupplementarymaterial,AppendixB.4812162024Degree0.60.650.70.750.80.850.90.95Mean network accuracy4812162024Degree0.750.80.850.90.9511.05Prob. correct majorityRandomRegularSmall WorldScale Free4812162024Degree0.60.650.70.750.80.850.90.95Mean network accuracy4812162024Degree0.750.80.850.90.9511.05Prob. correct majorityRandomRegularSmall WorldScale Free4812162024Degree0.60.650.70.750.80.850.90.95Mean network accuracy4812162024Degree0.750.80.850.90.9511.05Prob. correct majorityRandomRegularSmall WorldScale FreeFigure1:Top:Withouteffort.Bottom:Witheffortei⇠N(0.025,0.01).Left:averagenetworkaccuracyunderliq-uiddemocracy.Thesolid(dashed)lineshowsthemean(std.dev.)ofq;thedottedlineshowsmaxiqi.Right:probabilityofacorrectmajorityvoteunderliquiddemocracy.4812162024Degree00.050.10.150.20.250.3Percentage of gurus4812162024Degree11.21.41.61.82Mean distance to guruRandomRegularSmall WorldScale FreeFigure2:Percentageofgurunodesunderd(left)andmeandistancebetween(non-guru)nodesandtheirgurus(right).longerdelegationchains(Figure2,right).Intuitively,thisindicatesthatone-shotinteractioninscalefreenetworksismorelikelytoendupinalocaloptimum.Incontrast,smallworldnetworkshaveshortaveragedistancesandthusagentsaremorelikelytobeclosetotheiroptimalguru.ConclusionsandFutureWorkThepaperintroduceddelegationgamesasafirstgame-theoreticmodelofliquiddemocracy.Bothourtheoreticalandexperimentalresultsshowedthatvotingeffortisakeyingredientforunderstandinghowdelegationsformandwhattheireffectsare.Ourempiricalfindingsprovidedfurtherin-sightsintotheinfluenceofinteractionnetworksonthequal-ityofcollectivedecisionsinliquiddemocracy.Thepaperopensupseveraldirectionsofresearch.Agen-eralNEexistencetheoremisthemainopenquestion.Theframeworkcanthenbegeneralizedalongnaturallines,e.g.: Figure 2: Percentage of guru nodes under d (left) and mean distance between (non-guru) nodes and their gurus (right). delegation), the probability of a correct majority outcome, PL, simultaneously decreases. This confirms the analysis of Kahng et al. (2018). We also observe that the number of gurus decreases exponentially as the degree increases (Figure 2, left). Simply put, giving all voting weight to a small group of gurus increases the chance of an incorrect majority vote, assuming that gurus have a less than perfect accuracy. When we include effort (Figure 1, bottom), thereby moving away from the model of Kahng et al. (2018), we observe a drastic decrease in average network accuracy combined with a lower probability of a correct majority outcome under liquid democracy, with both decreasing as network degree increases. The main reason is the existence of delegation cycles in this case. This contrasts the best response setting above where agents could iteratively reconsider their choice of proxy and thus avoid cycles. Now, even with relatively low effort (mean 0.025), up to half of all agents are stuck in a cycle (and thereby fail to pass information about their type) when the degree increases. This confirms results on the probability of delegation cycles from Christoff & Grossi (2017) and stresses the importance of cycle resolution in concrete implementations of liquid democracy. Figure 1 further highlights differences between the four network types. Scale free networks yield a lower probability of a correct majority outcome across all degrees, as well as a larger number of gurus with a lower average accuracy and longer delegation chains (Figure 2, right). Intuitively, this indicates that one-shot interactions in scale free networks are more likely to end up in a local optimum. In contrast, small world networks have short average distances and thus agents are more likely to be close to their optimal guru. Finally, our experiments highlight a key feature of liquid democracy: the trade-off between a reduction in (total) effort against a loss in average voting accuracy. 5 Conclusions and Future Work The paper introduced delegation games as a first game-theoretic model of liquid democ- racy. Both our theoretical and experimental results showed that voting effort is a key ingredient for understanding how delegations form and what their effects are. Our em- pirical findings provided further insights into the influence of interaction networks on the quality of collective decisions in liquid democracy. The paper opens up several directions of research. A general NE existence theorem 13 4812162024Degree00.050.10.150.20.250.3Percentage of gurus4812162024Degree11.21.41.61.82Mean distance to guruRandomRegularSmall WorldScale Free is the main open question. Our model can then be generalized in many directions, e.g.: by making agents' utility dependent on voting outcomes; by dropping the independence assumption on agents' types; or by assuming the voting mechanism has better than 0.5 accuracy in identifying the types of agents involved in cycles. References Alger, D. (2006). Voting by proxy. Public Choice, 126 (1-2), 1 -- 26. Barab´asi, A.-L. & Albert, R. (1999). Emergence of scaling in random networks. science, 286 (5439), 509 -- 512. Blum, C. & Zuber, C. I. (2016). Liquid democracy: Potentials, problems, and perspectives. Journal of Political Philosophy, 24 (2), 162 -- 182. Boella, G., Francis, L., Grassi, E., Kistner, A., Nitsche, A., Noskov, A., Sanasi, L., Savoca, A., Schifanella, C., & Tsampoulatidis, I. (2018). WeGovNow: A map based platform to engage the local civic society. In WWW '18 Companion: The 2018 Web Conference Companion, (pp. 1215 -- 1219)., Lyon, France. International World Wide Web Conferences Steering Committee. Boldi, P., Bonchi, F., Castillo, C., & Vigna, S. (2011). Viscous democracy for social networks. Communications of the ACM, 54 (6), 129 -- 137. Brandt, F., Conitzer, V., Endriss, U., Lang, J., & Procaccia, A. D. (Eds.). (2016). Hand- book of Computational Social Choice. Cambridge University Press. Brill, M. (2018). Interactive democracy. In Proceedings of the 17th International Confer- ence on Autonomous Agents and MultiAgent Systems, (pp. 1183 -- 1187). International Foundation for Autonomous Agents and Multiagent Systems. Christoff, Z. & Grossi, D. (2017). Binary voting with delegable proxy: An analysis of liquid democracy. In Proceedings of TARK'17, volume 251, (pp. 134 -- 150). EPTCS. Cohensius, G., Mannor, S., Meir, R., Meirom, E., & Orda, A. (2017). Proxy voting for In Proceedings of the 16th Conference on Autonomous Agents and better outcomes. MultiAgent Systems, (pp. 858 -- 866). International Foundation for Autonomous Agents and Multiagent Systems. Dodgson, C. L. (1884). The Principles of Parliamentary Representation. Harrison and Sons. Endriss, U. (2016). Judgment aggregation. In F. Brandt, V. Conitzer, U. Endriss, J. Lang, & A. D. Procaccia (Eds.), Handbook of Computational Social Choice. Cambridge Uni- versity Press. Erdos, P. & R´enyi, A. (1959). On random graphs, I. Publicationes Mathematicae (Debre- cen), 6, 290 -- 297. Golz, P., Kahng, A., Mackenzie, S., & Procaccia, A. D. (2018). The fluid mechanics of liquid democracy. In WADE'18, arXiv:1808.01906. Green-Armytage, J. (2015). Direct voting and proxy voting. Constitutional Political Economy, 26 (2), 190 -- 220. 14 Grofman, B., Owen, G., & Feld, S. (1983). Thirteen theorems in search of truth. Theory and Decision, 15, 261 -- 278. Grossi, D. & Pigozzi, G. (2014). Judgment Aggregation: A Primer. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool Publishers. Jackson, M. O. (2008). Social and Economic Networks. Princeton University Press. Kahng, A., Mackenzie, S., & Procaccia, A. (2018). Liquid democracy: An algorithmic perspective. In Proc. 32nd AAAI Conference on Artificial Intelligence (AAAI'18). Kling, C. C., Kunegis, J., Hartmann, H., Strohmaier, M., & Staab, S. (2015). Voting behaviour and power in online democracy: A study of liquidfeedback in germany's pirate party. In Ninth International AAAI Conference on Web and Social Media. Miller, J. C. (1969). A program for direct and proxy voting in the legislative process. Public choice, 7 (1), 107 -- 113. Skowron, P., Lackner, M., Brill, M., Peters, D., & Elkind, E. (2017). Proportional rank- ings. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017, (pp. 409 -- 415). Tullock, G. (1992). Computerizing politics. Mathematical and Computer Modelling, 16 (8- 9), 59 -- 65. Watts, D. J. & Strogatz, S. H. (1998). Collective dynamics of 'small-world' networks. Nature, 393 (6684), 440. 15 A Proofs of Proposition 1, Fact 1, and Fact 2 Here we provide the proofs op Proposition 1, Fact 1, and Fact 2. Proof of Proposition 1. First we show that q∗ s (d) = qs. If dt = t, the statement holds since the delegation from s to t is locally positive. Otherwise, let dt = r. Since d is positive, we know that s (d(cid:48)) > q∗ q ∗ t (d) = qr · pt,r + (1 − qr) · (1 − pt,r) > qt. Now let xi = P(τ (i) = 1) for i ∈ {s, t, r}. Since types are independent random variables, it holds that pi,j = xixj + (1 − xi)(1 − xj). Using this fact, we can verify that ps,r = ps,tpt,r + (1 − ps,t)(1 − pt,r) + (−2(2xs − 1) · (2xr − 1) · (xt − 1)xt). We now want to prove that −2(2xs − 1) · (2xr − 1) · (xt − 1)xt ≥ 0. (10) (11) First note that a locally positive delegation from i to j implies that pi,j ≥ 0.5 (since qi, qj ≥ 0.5); hence ps,t ≥ 0.5 and pt,r ≥ 0.5. Second, observe that for any a, b ∈ [0, 1], if ab + (1 − a)(1 − b) ≥ 0.5, then either a, b ∈ [0, 0.5] or a, b ∈ [0.5, 1]. Now, since ps,t = xsxt + (1 − xs)(1 − xt) ≥ 0.5 and pt,r = xtxr + (1 − xt)(1 − xr) ≥ 0.5, we conclude that either xs, xt, xr ∈ [0, 0.5] or xs, xt, xr ∈ [0.5, 1]. In both cases Equation (11) holds. From Equation (11) and Equation (12) it follows that: ps,r ≥ ps,tpt,r + (1 − ps,t)(1 − pt,r) = 2ps,tpt,r − ps,t − pt,r + 1. (12) Thus we obtain: (cid:48) ∗ s (d q ) = qrps,r + (1 − qr)(1 − ps,r) = 2qrps,r − qr − ps,r + 1 (2ps,tpt,r − pt,r − ps,t + 1 ≥ ps,r by Equation (12) ≥ 2qr(cid:124)(cid:123)(cid:122)(cid:125)≥1 (cid:124) (cid:123)(cid:122) (cid:125) ) − qr − (2ps,tpt,r − pt,r − ps,t + 1) + 1 = 4qrps,tpt,r − 2qrpt,r − 2qrps,t + 2qr − qr − 2ps,tpt,r + pt,r + ps,t − 1 + 1 = 4qrps,tpt,r − 2ps,tpt,r − 2qrps,t + 2ps,t − 2qrpt,r + qr + pt,r − 1 + 1 − ps,t = (2ps,t − 1 )(2qrpt,r − qr − pt,r + 1 ) + 1 − ps,t (cid:125) (cid:124) (cid:123)(cid:122) >0 (cid:125) > qt since d is positive (cid:124) (cid:123)(cid:122) (cid:123)(cid:122) (cid:125) > (2ps,t − 1)qt + 1 − ps,t = 2qtps,t − qt − ps,t + 1 (cid:124) > qs as d(cid:48) s = t is locally positive > qs. We conclude that q∗ holds that q∗ fact that the delegations from z to s and from s to r are positive. Hence d(cid:48) is positive. s (d(cid:48)) > qs. It remains to show that for an agent z with dz = s, it still z (d(cid:48)) > qz. This can be shown by the same argument as above, now using the 16 Proof of Fact 1. For the upper bound of 2, Example 2 shows that maximal average accu- racy can be made arbitrarily close to 1, while the average accuracy of a worse NE can be made arbitrarily close to 0.5. For the lower bound of 1 it suffices to consider any delegation game were R = ∅ (that is, no delegation is possible). Proof of Fact 2. For the lower bound we can use again Example 2, where the average accuracy of the worse NE can be made arbitrarily close to 0.5, and the average accuracy of direct voting (which given the structure of the example is maximized by direct voting) can be made arbitrarily close to 1. For the upper bound, consider an effortless homogeneous game where q1 = 1, and qi = 0.5 +  for any i (cid:54)= 1 in N . Assume furthermore that R is such that any agent can delegate only to 1. In such a game, the average accuracy of the unique NE is 1, while the average accuracy of direct voting can be made arbitrarily close to 0.5. We thereby obtain the desired bound of 0.5. B Additional Simulation Results Detailed results for the "Simulations" subsection "Iterated Best Response Dynamics". Figure 3 shows convergence speed results in the effortless setting for different network types. The larger differences between the required number of best response updates for lower degree graphs of different types (e.g. degree 4) coincide with differences between the mean distance between nodes in those graphs: a shorter average distance yields a lower number of best response updates. The latter is shown in Table 4. Figure 3: Total number of best response updates of the individual agents (left) and corresponding number of full iterations over the network (right) for different network types and degrees in the effortless setting. Table 4: Mean distance between nodes and required number of best response updates for degree-4 networks of different types, sorted from high to low. Type Mean distance BR updates Small World 4.97 317.88 Regular 4.39 308.98 Random 4.03 287.88 Scale Free 3.41 277.55 17 4812162024Degree240250260270280290300310320Number of BR updatesRandomRegularSmall WorldScale Free4812162024Degree2.42.62.833.23.43.63.84Number of iterations
0902.4218
1
0902
2009-02-24T19:10:41
On graph theoretic results underlying the analysis of consensus in multi-agent systems
[ "cs.MA", "cs.DM", "math.CO", "math.OC" ]
This note corrects a pretty serious mistake and some inaccuracies in "Consensus and cooperation in networked multi-agent systems" by R. Olfati-Saber, J.A. Fax, and R.M. Murray, published in Vol. 95 of the Proceedings of the IEEE (2007, No. 1, P. 215-233). It also mentions several stronger results applicable to the class of problems under consideration and addresses the issue of priority whose interpretation in the above-mentioned paper is not exact.
cs.MA
cs
On graph theoretic results underlying the analysis of consensus in multi-agent systems = ,...,1 n i - tx )( & i (1) Pavel Chebotarev1 Institute of Control Sciences of the Russian Academy of Sciences 65 Profsoyuznaya Street, Moscow 117997, Russia Key words: consensus algorithms, cooperative control, flocking, graph Laplacians, networked multi-agent systems The objective of this note is to give several comments regarding the paper [1] published in the Proceedings of the IEEE. As stated in the Introduction of [1], “ Graph Laplacians and their spectral properties […] are important graph-related matrices that play a crucial role in convergence analysis of consensus and alignment algorithms.” In particular, the stability properties of the distributed consensus algorithms ( ) = (cid:229) txta tx ,)( )( )( i ij j iNj for networked multi-agent systems are completely determined by the location of the Laplacian eigenvalues of the network. The convergence analysis of such systems is based on the following lemma [1, p. 221]: Lemma 2: (spectral localization) Let G be a strongly connected digraph on n nodes. Then rank( L) = n − 1 and all nontrivial eigenvalues of L have positive real parts. Furthermore, suppose G has c ‡ 1 strongly connected components, then rank(L) = n − c. Here, L = [lij] is the Laplacian matrix of G, i.e., L = D – A, where A is the adjacency matrix of G, and D is the diagonal matrix of vertex out-degrees. Four comments need to be made concerning this lemma. First, the last statement of the lemma is not correct. Indeed, recall that the strongly connected components (SCC) of a digraph G are its maximal strongly connected subgraphs. For instance, if G is a converging tree , i.e., G is a directed tree with root r such that every vertex of G can be linked to r via a directed path, and n > 1, then G has c = n strongly connected components, but rank(L) = n − 1 > n − c = 0. The statement under consideration becomes valid if one replaces strongly connected components with weakly connected components (WCC) and additionally requires that these WCC’s are strong. A weakly connected component of G is a maximal subgraph of G whose vertices are mutually reachable by violating the edge directions. A more general correct statement results by substituting, in the same place, sink SCC’s, where a sink strongly connected component is an SCC having no edges directed outwards. This result was proved in [2] as well as some other Laplacian related results applicable to the cooperative control. Second, the proof of the rank property (the first statement of Lemma 2) is attributed in [1] to [3]. Let me note that a stronger fact was proved earlier in [2]. More specifically, Proposition 11 of [2] states that rank(L) = n – d, where d is the so-called in-forest dimension of G, i.e., the minimum possible number of converging trees in a spanning converging forest of G. It was also shown (Proposition 6) that the in-forest dimension of G is equal to the number of its sink SCC’s and that the forest dimension of a strongly L) = n − 1, connected digraph is one (Proposition 7). Consequently, for a strongly connected digraph, rank( which coincides with the first statement of Lemma 2. In addition, according to Proposition 8, “the forest dimension of a digraph is no less than its number of weak components 2 and does not exceed the number of its strong components and the number of its unilateral components.” 1 E-mail: [email protected]; [email protected] . 2 A weak component = a weakly connected component; a strong component = a strongly connected component. - , , + = kx ( i kx )( i + + )1 = i = ,...,1 n where (3) (2) Third, Remark 1 given after the proof of Lemma 2 says 3: “Lemma 2 holds under a weaker condition of existence of a directed spanning tree for G. […] This type of condition on existence of directed spanning trees have appeared in [4]–[6].” Here, by Lemma 2 the authors conceivably mean the conclusion that rank(L) = n − 1. Let us observe that the existence of a directed spanning tree for G implies that d = 1, so this statement follows from Proposition 11 of [2]. Fourth, the statement of Lemma 2 that “all nontrivial eigenvalues of L have positive real parts” holds true in the general case, and not only for strongly connected digraphs or digraphs that contain directed spanning trees. This was shown in [7, Proposition 9]. In Section II.C of [1] a discrete-time counterpart of the consensus algorithm (1) is considered: n ( ) (cid:229) kxa kx ,)( )( e i ij j j 1 = is the step size. In the matrix form, (2) is represented as follows: kx kxP ( )( )1 0>e IP L is referred to in [1] as the Perron matrix with parameter e of G. where e-= IP L e-= were studied in [2] and [7]; in particular, (i) of Lemma 3 in [1] coincides with The matrices Proposition 12 of [2]. The asymptotic behavior of the process (3) is determined by the properties of the sequence P, P2, P3,…. If the stochastic matrix P is primitive, i.e., it has only one eigenvalue with modulus 1, P = vw lim k T , where v and w are the right and left eigenvectors of P then, as stated in Lemma 4 of [1], k ¥fi 1=wvT . In the case of a corresponding to the eigenvalue 1, respectively, with a normalization that provides general nonnegative Perron matrix P, the sequence P, P2, P3,… need not have a limit, so the long-run m (cid:229) = ¥P always exists and, by the P m P lim k 1 - ¥ = transition matrix is considered. The matrix m ¥fi k 1 normalized matrix J of maximal in- Markov chain tree theorem proved in [8], [9], it coincides with the forests of G. J is the eigenprojector of L; by Proposition 11 of [2] rank ( J = d, where d is the in-forest ) J are the eigenvectors of L corresponding to the eigenvalue 0; dimension of G. The columns of consequently, they determine the consensus trajectories of the process (1) and the flocking trajectories [10]. The elements of J were characterized in Theorems '2 and 3 of [2]. An algebraic method for calculating J was presented in [7]. As has been shown above, [2] and [7] contained a number of results on the Laplacians of directed graphs which were useful for the cooperative control of multi-agent systems. A number of additional results were presented in [11] and [12]. Some of them are surveyed in [13]. In January 2001 Alex Fax, one of the authors of [1], sent me a message, where he asked about the eigenstructure of digraph Laplacians and requested to send copies of related papers. During the subsequent correspondence, later in 2001, I sent him [2] and [7]. Recently, I was pleased to familiarize myself with [1] and to learn that our early results proved to be useful in the analysis of consensus and cooperation algorithms of decentralized control. However, I was surprised that, instead of references to [2] and [7], this article contained references to papers published several years later. 3 The bibliographic references are redirected here to the list of references of this note. REFERENCES [1] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proc. IEEE. vol. 95, pp. 215–233, Jan. 2007. [2] R. P. Agaev and P. Yu. Chebotarev, “The matrix of maximum out forests of a digraph and its applications,” Automation and Remote Control, vol. 61, pp. 1424-1450, Sept. 2000. [3] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1520–1533, Sep. 2004. [4] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile autonomous agents using nearest neighbor rules,” IEEE Trans. Autom. Control, vol. 48, pp. 988–1001, June 2003. [5] L. Moreau, “Stability of multiagent systems with time-dependent communication links,” IEEE Trans. Autom. Control, vol. 50, pp. 169–182, 2005. [6] W. Ren and R. W. Beard, “Consensus seeking in multiagent systems under dynamically changing interaction topologies,” IEEE Trans. Autom. Control, vol. 50, pp. 655–661, 2005. [7] R. P. Agaev and P. Yu. Chebotarev, “Spanning forests of a digraph and their applications,” Automation and Remote Control, vol. 62, pp. 443–466, March 2001. [8] A. D. Wentzell and M. I. Freidlin, “On small random perturbations of dynamical systems,” Russian Mathematical Surveys, vol. 25, no. 1, pp. 1–55, 1970. [9] T. Leighton and R. L. Rivest, “The Markov chain tree theorem,” Computer Science Technical Report MIT/LCS/TM–249, Laboratory of Computer Science, MIT, Cambridge, Mass., 1983. [10] J. J. P. Veerman, G. Lafferriere, J. S. Caughman, and A . Williams, “Flocks and formations,” J. Statistical Physics, vol. 121, no. 5–6, pp. 901–936, 2005. [11] P. Chebotarev and R. Agaev, “Forest matrices around the Laplacian matrix,” Linear Algebra and Its Applications, vol. 356, pp. 253–274, 2002. [12] R. Agaev and P. Chebotarev, “On the spectra of nonsymmetric Laplacian matrices,” Linear Algebra and Its Applications, vol. 399, pp. 157–168, 2005. [13] P. Yu. Chebotarev and R. P. Agaev, “Coordination in multiagent systems and Laplacian spectra of digraphs,” Automation and Remote Control, vol. 70, no. 3, March 2009. In press.
1801.00743
1
1801
2018-01-02T17:45:28
Um Sistema Multiagente no Combate ao Braqueamento de Capitais
[ "cs.MA", "cs.AI" ]
Money laundering is a crime that makes it possible to finance other crimes, for this reason, it is important for criminal organizations and their combat is prioritized by nations around the world. The anti-money laundering process has not evolved as expected because it has prioritized only the signaling of suspicious transactions. The constant increasing in the volume of transactions has overloaded the indispensable human work of final evaluation of the suspicions. This article presents a multiagent system that aims to go beyond the capture of suspicious transactions, seeking to assist the human expert in the analysis of suspicions. The agents created use data mining techniques to create transactional behavioral profiles; apply rules generated in learning process in conjunction with specific rules based on legal aspects and profiles created to capture suspicious transactions; and analyze these suspicious transactions indicating to the human expert those that require more detailed analysis.
cs.MA
cs
Um Sistema Multiagente no Combate ao Branqueamento de Capitais Claudio Alexandre, João Balsa [email protected], [email protected]. Faculdade de Ciências da Universidade de Lisboa, BioISI-MAS, Campo Grande, 1749-016, Lisboa, Portugal DOI: 10.17013/risti.25.1-17 Resumo: Branqueamento de capitais é um crime que possibilita o financiamento de outros crimes, por isso ele é importante para as organizações criminosas e seu combate é motivo de mobilização das nações do mundo inteiro. O processo de anti- branqueamento de capitais não evoluiu como esperado pois tem priorizado a sinalização de transações suspeitas. O crescente aumento no volume de transações tem sobrecarregado o indispensável trabalho humano de avaliação final das sinalizações. Este artigo apresenta um sistema multiagente que objetiva ir além da captura de transações suspeitas, buscando auxiliar o especialista humano na análise das suspeições. Os agentes criados utilizam técnicas de data mining para criação de perfis de comportamento transacional; aplicam as regras obtidas no aprendizado em conjunto com regras especificas baseadas em aspectos legais e nos perfis criados para captura de transações suspeitas; e analisam estas transações sinalizadas indicando ao especialista humano aquelas que necessitam de análise mais detalhada. Palavras-chave: Sistemas multiagente; agentes inteligentes; data mining; anti- branqueamento de capitais. A Multi-Agent System in the Combat Against Money Laundering Abstract: Money laundering is a crime that makes it possible to finance other crimes, for this reason, it is important for criminal organizations and their combat is prioritized by nations around the world. The anti-money laundering process has not evolved as expected because it has prioritized only the signaling of suspicious transactions. The constant increasing in the volume of transactions has overloaded the indispensable human work of final evaluation of the suspicions. This article presents a multiagent system that aims to go beyond the capture of suspicious transactions, seeking to assist the human expert in the analysis of suspicions. The agents created use data mining techniques to create transactional behavioral profiles; apply rules generated in learning process in conjunction with specific rules based on legal aspects and profiles created to capture suspicious transactions; and analyze these suspicious transactions indicating to the human expert those that require more detailed analysis. Keywords: multi-agent systems; intelligent agents; data mining; anti-money laundering. RISTI, N.º 25, 12/2017 1 1. Introdução Ações de prevenção e combate ao crime de branqueamento de capitais (BC) são priorizadas por quase todos os governos do mundo, no mínimo, no mesmo nível das grandes questões globais (Madinger, 2012). BC é tipicamente um crime que consiste em tornar lícita a origem ilícita de um determinado ganho financeiro. A estimativa global anual de BC é em torno de 2% a 5% do Produto Interno Bruto Global (UNODC, 2014). Sobre fraude financeira, somente a América do Norte estima que sua perda passe de $3,1 mil milhões em 2017 para $4,8 mil milhões em 2018 (Cser, 2017). Este volume financeiro perdido anualmente já é motivo suficiente para o assunto ser tratado com prioridade, no entanto, outro fator leva os governos a priorizarem o combate a este crime: a sua comprovada ligação com outras práticas criminosas como narcotráfico, fraude, corrupção, sequestro, terrorismo, contrabando de armas, entre outros (Schott, 2006). As instituições financeiras, em sua maioria, já utilizam processos semi-automatizados para sinalização de transações suspeitas de BC, baseados em informações de cadastro, médias, desvios padrões e regras fixas pré-estabelecidas, geralmente oriundas de observações empíricas ou da experiência humana dos Analistas de anti-branqueamento de capitais (ABC). Porém, o crescente aumento no volume das transações realizadas, aliado à frequente publicação de novas regulamentações, nacionais e internacionais, acabam por provocar ineficiência neste processo de sinalização. Visando tornar o processo de ABC mais ágil e eficiente, este artigo apresenta a estrutura de um sistema multiagente para suporte à tomada de decisão neste contexto. Os agentes inteligentes utilizam técnicas de data mining para a criação de perfis de comportamento transacionais históricos, analisam e sinalizam transações suspeitas e auxiliam o Analista de ABC na tomada de decisão sobre as sinalizações. O modelo BDI (Belief, Desire, Intention) incorporado pela metodologia de desenvolvimento adotada (Prometheus), permite utilizar os perfis comportamentais encontrados, bem como possibilita a implementação de regras especificas em função do risco envolvido. Estas características, dentre outros benefícios, aumentam a eficiência do processo, enfrentando o aumento no volume de transações com a redução gradativa da intervenção humana. Este artigo segue a seguinte organização: indicação dos trabalhos relacionados com propostas de mineração de dados e arquiteturas de sistemas que buscam o ABC; apresentação da estratégia baseada no comportamento transacional dos atores para combate a este tipo de fraude; descrição da abordagem conservadora adotada no tratamento do risco envolvido; detalhamento do sistema e dos agentes definidos; apresentação dos resultados obtidos e as conclusões. 2. Trabalhos Relacionados A capacidade de adaptação do modus operandi dos fraudadores e a falta de informação sistematizada que associe as transações suspeitas com a comprovação do crime, são obstáculos para um avanço mais rápido da automatização do processo de prevenção e combate ao crime de branqueamento de capitais (BC). 2 RISTI, N.º 25, 12/2017 O primeiro sistema amplamente divulgado na área do anti-branqueamento de capitais (ABC) foi o FinCEN Artificial Intelligence System (FAIS) (Senator et al., 1995), desenvolvido e utilizado pelo Financial Crimes Enforcement Network (FinCEN), órgão do Departamento do Tesouro dos Estados Unidos. Em seguida, a Subcomissão Permanente de Investigações do Comitê do Senado Americano para Assuntos Governamentais solicitou ao Office of Technology Assessement (OTA)1 avaliação sobre a utilização de técnicas de pesquisa baseadas em inteligência artificial (IA), visando monitorizar o tráfego e transferências bancárias com o propósito de reconhecer transações suspeitas. Em seu relatório de 1995, o OTA concluiu que "o conceito original na sua formulação mais simples – o monitoramento do tráfego de transferência bancária, de forma contínua e em tempo real, usando técnicas de inteligência artificial – não é viável". Contudo, ponderou que existiam alternativas na tecnologia da informação a serem utilizadas para apoiar e reforçar a aplicação da lei contra o BC. Sugeriu, então, a utilização de técnicas tais como: knowledge acquisition, machine learning, clustering, knowledge sharing e data transformation (OTA, 1995). Em 1998, por orientação do relatório do United States General Accounting Office (GAO), a gestão decidiu pela não implementação de novos produtos utilizando técnicas de IA. Curiosamente, desde então, os estudos têm direcionado propostas para utilização das técnicas recomendadas buscando a identificação de anomalias ou situações suspeitas, conforme bem demonstrado em Chandola et al. (2009) e Sabau (2012). Contudo, conforme será comentado na seção 2.2, são poucas as propostas de sistemas baseados em agentes inteligentes para suportar todo o processo de ABC. 2.1. Mineração de Dados As técnicas de data-mining, machine learning e clustering têm sido fortemente utilizadas na tentativa de identificar casos suspeitos de BC. Em Zhang et al. (2003) um conjunto de dados são discretizados, mapeados para espaço dimensional Euclidiano, projetados numa linha de tempo discretizada, formando um histograma. Os clusters são criados, utilizando o algoritmo K-means, com base nos segmentos do histograma. Análises de correlação locais e globais são então aplicadas para detectar padrões suspeitos. É uma boa abordagem para a análise de comportamentos individuais e/ou de grupo baseado em picos anormais no histograma. No entanto, na análise de grande quantidade de clientes e transações durante longo período de tempo, a detecção de casos suspeitos pode ser dificultada, pois podem existir poucos ou nenhum pico no histograma. Em Kingdon (2004), é proposta a utilização de técnicas de IA e de uma máquina de vetores de suporte (Support Vector Machine-SVM) numa perspectiva diferente daquela até então utilizada, ou seja, montar o perfil histórico dos clientes e buscar utilizações fora do padrão ao invés de focar em comportamento suspeito baseado apenas em perfil cadastral. Independente da tecnologia utilizada, esta proposta fortalece o conceito da política Know Your Customer (KYC) e torna-se ainda mais útil se aplicada de forma incremental e constante. 1 http://ota.fas.org/ - escritório do Congresso Americano que funcionou de 1972 a 1995. RISTI, N.º 25, 12/2017 3 Em Tang & Yin (2005) os autores propõem outra extensão da SVM para analisar as transações dos clientes e detectar comportamento fora do padrão. É apresentada uma combinação de um kernel com melhoramentos do Radial Basis Function (RBF) Scholkopf et al. (2001) com definição de distâncias distintas e algoritmos SVM supervisionados e não- supervisionados. Uma vantagem desta abordagem é ela conseguir lidar com conjuntos de dados heterogêneos, porém, a avaliação de desempenho foi feita apenas com dados de simulação. Combinar a técnica de clustering com Multilayer Perceptron (MLP) foi a proposta de Le- Khac et al. (2009). O algoritmo K-means, é utilizado para formação dos clusters e esta técnica baseia-se em duas características principais (fundo de investimento e investidor) que, em seguida, são usados como entrada do processo de formação de um MLP. Os resultados apresentados mostram que a sua abordagem é eficiente. No entanto, o número de características, o número de padrões de treinamento utilizados foi pequeno e isso pode afetar a precisão. Outros métodos estatísticos foram propostos, como em Liu & Zhang (2010) que utiliza scan statistics, onde as transações realizadas num período de tempo são selecionadas aleatoriamente e agrupamentos incomuns são buscados. Adequado para trabalhos de auditoria em função da aleatoriedade adotada, no entanto, para um processo cotidiano de ABC nenhuma transação pode ser desprezada. Em Le-Khac & Kechadi (2010) os autores apresentam um estudo de caso em que aplicam uma solução para geração de uma base de conhecimento, combinando técnicas de mineração de dados, clustering utilizando K-means, redes neurais e algoritmos genéticos para detectar padrões de BC. Analisando somente por este documento, a solução pode apresentar um baixo custo benefício, considerando a alta complexidade da implementação proposta. Larik & Haider (2011) focam seu trabalho nas informações de débito e crédito realizadas pelos clientes de numa instituição financeira, visando identificar transações suspeitas. Propõem um novo algoritmo e um índice para avaliar e classificar as transações. Uma boa ideia, porém, limitada pela utilização somente das informações de débito e crédito. 2.2. Arquiteturas de Sistemas Em Gao et al. (2006), uma arquitetura de sistema é definida utilizando um conjunto de agentes especializados, tais como: agentes de coleta de dados (sistemas internos e informações externas); agentes de monitoramento para acompanhamento do perfil cadastral do cliente e das transações realizadas; e um agente que emite relatórios e alertas sobre possíveis operações de BC. Apesar da boa proposta de arquitetura, o problema crucial do volume de análises submetidas ao analista humano não é enfrentando, aliás, pode até ser agravado com a automatização da fase de sinalização de transações suspeitas. Outra abordagem baseada em agentes foi apresentada em Xuan & Pengzhu (2007). A arquitetura proposta é semelhante à descrita em Gao et al. (2006), porém, com evolução dos agentes incluindo as características de negociação, diagnóstico e autoaprendizagem. As 4 RISTI, N.º 25, 12/2017 características dos agentes é o ponto forte desta proposta, contudo, também encerra sua contribuição nas sinalizações para o analista humano. Em Xu & Gao (2010) os autores propõem uma alteração na arquitetura apresentada anteriormente, incorporando as fases e técnicas de um modelo de tomada de decisão, aplicado em tempo real. A arquitetura do sistema proposto anteriormente foi melhorada, mas em termos de processo não houve avanços, persistindo a falta de apoio aos analistas humanos. Rajput et al. (2014) utilizam ontologias e regras na criação de um sistema especialista para detecção de transações suspeitas de BC. Uma boa abordagem para a criação das regras a serem aplicadas, testada com um volume significativo de dados, contudo, a quantidade de 2% de transações suspeitas detectadas numa base real torna-se inviável num processo rotineiro que necessita da validação do especialista humano. 3. Estratégia de Combate a Fraudes A política Know Your Customer (KYC) definida pelo Comitê de Basiléia2 é um guia de melhores práticas no combate a fraudes, pois detalha os procedimentos a serem seguidos. Baseado nestes documentos e no benchmark realizado pela Hewlett-Packard (Laxman, 2014) foi criado um fluxo genérico de combate a fraudes ou burla no setor financeiro (Figura 1), quando realizadas em processos total ou parcialmente automatizados. Figura 1 – Fluxo Genérico de Combate a Fraudes O branqueamento de capitais (BC) é considerado um crime adjacente. Em Canas (2004) é explicado que "para haver Branqueamento teria de haver um crime anterior que proporcionasse ilicitamente ao seu autor proventos que posteriormente ele, ou outrem, 2 http://www.bis.org/publ/bcbs85.pdf e http://www.bis.org/publ/bcbs04a.htm RISTI, N.º 25, 12/2017 5 pretendessem camuflar", na sua essência é possível afirmar que ele é uma instância do fluxo genérico de fraude. Dessa forma, a atividade de anti-branqueamento de capitais (ABC) pode ser vista como sendo o fluxo genérico mostrado na Figura 1, aplicado ao setor financeiro. Um típico fluxo de ABC praticado pelas instituições financeiras foi mostrado e detalhado em Alexandre & Balsa (2015). Porém, mesmo sem a utilização de técnicas como mineração de processo (Norambuena & Zepeda, 2017), é fácil observar que o fluxo de ABC sendo tratado como uma instância do fluxo genérico de combate a fraudes é ineficiente, pois ele falha na identificação e sinalização das situações suspeitas. Casos não identificados impedem análise detalhada e a consequente geração de novas normas e recomendações, surgindo, dessa forma, o risco de uma falha sistêmica no processo geral de ABC. A Figura 2 mostra uma nova versão do fluxo geral de combate a fraudes, cujo objetivo é mitigar o risco identificado. A criação de perfis dos atores participantes da atividade, baseados no histórico completo das operações realizadas; a substituição dos atuais parâmetros fixos por regras de produção, embasadas nestes perfis e nas normas e recomendações existentes; a eliminação da utilização de somente operações mais recentes; e o uso de inteligência em alguns pontos do processo eleva qualitativamente o nível na captura de operações suspeitas e, principalmente, da tomada de decisão pelo especialista (Pinto et al., 2014). Figura 2 – Novo Fluxo Genérico de Combate a Fraudes 3.1. Abordagem baseada no comportamento transacional Uma base com dados reais refletindo o comportamento transacional de clientes, possui uma significativa quantidade de atributos necessários para o controle e gestão do negócio envolvido, sendo que nem todos são relevantes para uma busca de transações suspeitas. A seleção dos atributos relevantes e a possível geração de novos atributos, reflete a importância da fase de pré-processamento, que será descrita na seção seguinte. 6 RISTI, N.º 25, 12/2017 Os atributos selecionados ou gerados, precisam refletir as principais características do universo de dados onde a anomalia é buscada, no caso, devem refletir a base de transações e permitir identificar comportamentos suspeitos (Paula et al., 2016). Neste trabalho é proposta a criação de vários atributos, que agregam quantidades e segmentam características, com o objetivo de estabelecer um perfil do comportamento transacional, dentro de um ciclo temporal, para cada ator do processo. O ciclo temporal tem relação direta com a natureza do negócio envolvido, apresentando a duração máxima possível (trimestral, semestral, anual, etc.). 3.2. Pré-processamento dos dados e formação dos perfis Neste trabalho são utilizados dados reais de um banco brasileiro, referente a dois anos de transações do produto contas correntes. As contas dos 5,2 milhões de correntistas deste banco recebem, em média, 85 milhões de transações anuais. A análise da base de dados mostrou que menos de 10% dos clientes são constituídos por pessoas jurídicas (empresas comerciais, industrias, governos, etc.), no entanto, são responsáveis por mais de 90% dos valores totais envolvidos. Desta forma, visando uma melhor caracterização dos clientes, foi realizada a divisão da base de dados: uma somente com clientes singulares e outra com clientes tipo pessoa jurídica. Todo o procedimento descrito foi executado separadamente para cada base e está representado na Figura 3. Entrada: Base Total de Transações-BTT 1 Transações Relevantes-TR  análise da BTT 2 Perfis de Clientes-PC  seleção/geração de atributos da TR 3 Número de Clusters-k  Número de Atributos de PC – 1 (Passo 1) (Passo 2) (Passo 3) 4 enquanto k > 1 faça 5 Conjunto de Clusters-Cl  Algoritmo de Classificação ( algc(PC , k) ) 6 Vetor Erro1-E1(k)  Calcula Erro na Classificação ( algr1(Cl) ) 7 Vetor Erro2-E2(k)  Calcula Erro na Classificação ( algr2(Cl) ) k  k - 1 8 9 fim enquanto 10 Índice do Menor Erro-idx  Encontra o Menor (E1) 11 Classificação Final-CF  algc(PC, idx) 12 Conjunto de Regras1-R1  algr1(CF) 13 Índice do Menor Erro-idx  Encontra o Menor (E2) 14 Conjunto de Regras2-R2  algr2(CF) 15 retorna CF, R1, R2 Figura 3 – Algoritmo do Processo de Aprendizagem (Passo 4) (Passo 5) RISTI, N.º 25, 12/2017 7 De cada base foram excluídas as transações cujas características impedem a prática de branqueamento de capitais (tarifas, comissões, juros, impostos, etc.) (Figura 3 - Passo 1). A soma final das bases resultou em 35 milhões de transações relevantes. Um ano de transações foi utilizado para a geração do perfil de comportamento transacional, ou seja, para cada cliente presente na base de transações foram agrupadas informações tais como: idade da conta; quantidade de movimentos gerados e de serviços utilizados; percentual de transferência de recursos para outros bancos e para contas do próprio banco; além da quantidade de movimentos agregados em 6 faixas de valores. O 12º atributo, denominado percentual de débito, representa, de forma ponderada no período analisado, o tempo que o recurso permaneceu na conta do cliente (Alexandre & Balsa, 2016) (Figura 3 - Passo 2). 3.3. Aprendizagem e geração de regras A tabela de perfis dos clientes ativos no ano analisado ficou com 2,4 milhões de linhas, cada linha representando univocamente a tripla cliente, agência e conta. Esta tabela foi utilizada num processo de aprendizado indutivo não-supervisionado com clustering, para formação de grupos de clientes com características semelhantes e mutuamente exclusivos. O algoritmo K-means (algc) foi utilizado para classificação e os algoritmos PART e J48 (algr1 e algr2) para geração das regras de produção, executados 11 vezes (número de atributos menos 1) (Figura 3 - Passo 3). O modelo de cluster utilizado mostrou-se adequado ao permitir a interpretação dos agrupamentos sem a utilização de sofisticados esquemas de visualização (Castillo-Rojas et al., 2017). Dois conjuntos de regras, um de cada algoritmo utilizado, com a menor quantidade de instâncias incorretamente classificadas foram selecionados (Figura 3 - Passo 4) e conjuntamente com os clusters que originaram essas regras representam o resultado final do processo (Figura 3 - Passo 5). 4. Abordagem Conservadora com Relação a Risco A análise dos clusters gerados, para os dois segmentos de clientes, permitiu a identificação de características tais como: grande movimentação de valores elevados, com transferência integral para outras instituições financeiras (risco 3); ou movimentação de valores próximos do limite de comunicação aos órgãos reguladores (risco 2). Desta análise resultou a classificação mostrada na Tabela 1. Com esta classificação é possível definir uma melhor estratégia, oferecendo tratamento diferenciado aos grupos de clientes, conforme seu nível de risco. Apesar do ótimo nível de acerto obtido na avaliação das regras geradas, em torno de 99% para ambos os segmentos de clientes, um por cento de erro representa mais de 26 mil transações e não podem ser desprezadas. A matriz de confusão gerada pelos algoritmos identificou as regras que por serem aplicáveis a dois ou mais grupos de clientes compõem o 1% de erro mencionado. Ou seja, regras classificam clientes como pertencentes a mais de um perfil. A decisão foi então reclassificar os perfis que não representam risco ou têm baixo risco (perfis 1, 2 e 3), conforme mostra a 8 RISTI, N.º 25, 12/2017 Tabela 1. Dessa forma, a transação que pertencer a um desses 3 grupos será reclassificada, somente para efeito de análise, para uma regra nos perfis de risco mais elevado que satisfaça a condição. Por exemplo, na base de dados utilizada para data mining, 33 regras classificam os clientes pessoas singulares como pertencentes aos perfis de risco 2 e 3, correspondendo a 1,85% do total. Contudo, estas regras também classificam 0,06% de clientes originalmente pertencentes ao perfil padrão. A reclassificação consiste em, durante o processo de busca por transação suspeita, considerar esses clientes padrão como pertencentes aos grupos de risco, sem modificar a classificação original. 4.1. Criação de regras normativas e baseadas no comportamento A classificação dos perfis também permite a criação de regras especificas, quer sejam baseadas nos normativos vigentes, quer sejam inspiradas no comportamento transacional. Conforme já mencionado, este trabalho utilizou um ano de informações para geração dos perfis, obtendo totais mensais e permitindo selecionar valores máximos dentro do ano para cada atributo relevante. Foi estabelecido que a busca por transações suspeitas retroagirá sempre um mês a partir da data solicitada para análise, desta forma será sempre utilizado o comportamento de 1 mês de transações para efeito de comparação com os perfis. Para os perfis de risco, as regras utilizarão sempre cálculos em torno do maior valor mensal encontrado para cada atributo e, para os demais perfis, será utilizado como limite o valor total anual, conforme consta da Tabela 1. Tabela 1 – Classificação dos perfis gerados Perfil Pessoa Singular Outro Tipo de Cliente Reclassifica Perfil Valor Limite 1. Baixa Utilização Cluster4 2. Cliente Padrão Cluster2 Cluster4 Cluster1 3. Risco 1 (baixo) Cluster1 - 4. Risco 2 (médio) Cluster5 5. Risco 3 (alto) Cluster3 Cluster3 Cluster2 Sim Sim Sim Não Não Total anual Total anual Máximo mensal Máximo mensal Máximo mensal O banco de regras criado deve ser o mais estável possível, posto que se transformará em crenças a serem utilizadas pelos agentes, possibilitando tomada de decisão consistentes e coerentes. No entanto, é possível que a instituição financeira utilizadora do sistema deseje, numa determinada análise, ser mais rigorosa quanto aos valores limites, o que levaria, inevitavelmente, a modificação nas regras. Para contornar esta situação, foi parametrizado um percentual intitulado Margem Adicional de Risco (MAR), cuja atribuição ficará a critério da instituição utilizadora e que aplicado sobre os valores limites reduzem-no pelo percentual indicado. Nos testes realizados para este artigo, referido percentual foi mantido em zero. RISTI, N.º 25, 12/2017 9 A Figura 4 mostra que quando a MAR é maior que zero (o que está indicado em setembro, e no Total) os perfis de risco 2 e 3 têm seu limite reduzido pelo percentual indicado. O mesmo ocorre com os demais perfis, sendo que estes em relação ao valor total anual. O perfil de risco 1, por ser perfil de alerta, não é afetado pela MAR. Quando a MAR é igual a zero os perfis de risco utilizam o mesmo valor limite e os demais perfis utilizam o valor total anual, sem reduções. Figura 4 – Aplicação da Margem Adicional de Risco 5. Modelo dos Agentes A maioria dos sistemas existentes atualmente para suportar o processo de anti- branqueamento de capitais (ABC), concentra-se na fase do processo referente a captura de transações suspeitas, transferindo para o Analista de ABC a tarefa de comprovação da suspeição. Além disso, boa parte dessas soluções são fortemente baseadas em parametrizações que, basicamente, aplicam os normativos vigentes. O desempenho desses sistemas está refletido no resultado da pesquisa realizada em 2014 com 317 profissionais especialistas em ABC e técnicos de conformidade, de instituições financeiras de 48 países, mostrando que apenas 58% acreditam que os sistemas existentes 10 RISTI, N.º 25, 12/2017 em suas organizações são capazes de monitorar adequadamente as transações ocorridas nas diversas linhas de negócios3. Esta situação motiva este trabalho na proposição de uma solução que integra técnicas de data mining a um sistema multiagente com o propósito de capturar transações suspeitas de branqueamento de capitais e auxiliar o Analista de ABC na tomada de decisão. Na modelagem do sistema foi utilizada a metodologia Prometheus (Padgham & Winikoff, 2004). A implementação está sendo realizada no framework JaCaMo (Boissier et al., 2013) que utiliza a linguagem Jason (Bordini, Hübner & Wooldridge, 2007). A Figura 5 mostra, de forma simplificada, um dos diagramas da Prometheus Design Tool4(PDT), com a arquitetura final do sistema. O diagrama ressalta os agentes, as bases de dados externas (DB), as bases de conhecimento (KB) e a interação dos agentes com o ambiente e os Analistas de ABC. O grupo de agentes responsáveis pela captura de transação suspeita (CTS) que são especializados por produto da linha de negócios de uma instituição financeiro (contas correntes, câmbio, fundos de investimento, empréstimos, etc.). Esta especialização oferece duas grandes vantagens: a primeira é que cada agente pode ser aprimorado com as especificidades do produto e dos perfis dos clientes, que podem mudar em cada produto; a segunda diz respeito aos princípios de manutenibilidade e de escalabilidade, ou seja, um produto vigente pode ser descontinuado (morte de um CTS) e um novo produto pode ser criado (novo CTS) sem que isso interfira no funcionamento dos demais agentes. Na análise das transações os CTS utilizam as regras de produção vigentes, geradas com base nos perfis dos clientes, nos normativos sobre ABC e nas normas internas da instituição financeira. Atuam em duas modalidades: busca por transação ou busca por cliente. Na busca por transação a base histórica de transações é analisada integralmente, dentro do período informado, enquanto na busca por cliente, somente as transações relacionadas ao cliente informado são analisadas. Um agente é responsável pela gerencia da captura de transações (GCT), ele pode receber uma solicitação externa de análise e comandar para execução pelo CTS especialista ou comandá-la autonomamente. Ao receber a informação de um CTS de que uma transação suspeita foi identificada, comanda uma análise na modalidade busca por cliente para os demais CTSs responsáveis por produtos que constem do perfil do referido cliente. Somente o GCT tem conhecimento de quantos e quais são os CTSs existentes. Após todos os CTSs acionados terem enviado mensagens de resposta ao comando de análise, o GCT comunica ao agente auxilia processo decisório (APD) a existência de transações suspeitas. O agente APD é responsável por aprofundar a análise e decidir sobre a suspeição da transação, confirmando-a ou não. A utilização de conhecimento específico sobre o produto e de uma matriz de decisão baseada no histórico de decisões tomadas, permitem ao agente decidir sobre a suspeição ou, quando não é possível chegar a uma decisão, sinalizar para o 3https://home.kpmg.com/xx/en/home/insights/2014/01/global-anti-money-laundering- survey.html 4 https://sites.google.com/site/rmitagents/software/prometheusPDT RISTI, N.º 25, 12/2017 11 Analista de ABC sobre a existência de um caso complexo. As decisões tomadas pelo agente, bem como aquelas informadas pelo Analista, são guardadas no histórico de decisões e são utilizadas no aprendizado para evolução da matriz de decisão. Este agente também sugere alterações na matriz de decisão e pela atualização desta base de conhecimento, após as sugestões serem validadas. Figura 5 – Arquitetura do Sistema Proposto O agente evolui base de perfis (EBP) atua na análise do histórico de transações para geração de perfis de clientes e posterior comparação com a base de perfis existente. Este processo pode ser acionado por uma solicitação do usuário ou de forma autônoma pelo agente. Os possíveis novos perfis surgidos são sugeridos para o Analista de ABC, para análise. O agente EBP atualiza a base de perfis com os perfis que forem validados. As evoluções das bases de conhecimento e o aprendizado previstos no sistema visam, primordialmente, mitigar o risco da ocorrência de falso positivo e/ou falso negativo, existente em sistema baseados unicamente em um conjunto de regras e padrões de comportamento (Gao et al., 2006) e (Le-Khac & Kechadi, 2010). 6. Análise dos Resultados Os dados reais utilizados neste trabalho referem-se a 2 anos, com 30,5 milhões e 35,2 milhões de transações relevantes, respectivamente. Os perfis de comportamento transacionais dos clientes foram gerados a partir dos dados do primeiro ano, constituindo a base de referência. A busca por transações suspeitas foi realizada em um mês de 12 RISTI, N.º 25, 12/2017 GCTCTSAPDEBP transações relevantes do segundo ano, resultando em 2,6 milhões de transações. Sobre estas transações foram gerados 516.942 perfis de comportamento transacionais dos clientes no período. O processo de busca por transações suspeitas, implementado até o momento, pode ser dividido em 3 fases: a reclassificação dos perfis ou ajuste da matriz de confusão; a captura das transações suspeitas; e a análise das transações capturadas. A Figura 6 mostra um resumo com informações do ambiente e a quantidade de transações suspeitas. Figura 6 – Resultado Fases 1 e 2 O sistema utiliza como crenças um conjunto de 129 regras, bem como a classificação dos clientes nos perfis indicados. Essas crenças são reavaliadas uma única vez, ocasião em que 418 perfis foram reclassificados, saindo do perfil Padrão para perfis de risco, somente nesta análise. No final 182 perfis são indicados como suspeitos e suas transações precisam ser analisadas. O resultado da fase 3 do processo é mostrado na Figura 7. A distribuição dos suspeitos por perfil, com seu respectivo percentual, alerta para a concentração de 52% dos suspeitos no perfil de risco 3 (Alto Risco). Com o objetivo de auxiliar o especialista na análise das RISTI, N.º 25, 12/2017 13 transações, os suspeitos são agrupados pela regra acionada na sua captura (mais de uma regra pode ser acionada para o mesmo perfil). Figura 7 – Resultado Fase 3 Em função do sigilo legal envolvido nas informações, a Figura 7 mostra apenas dois perfis com parte dos detalhes envolvidos, devidamente descaracterizados. No entanto, é possível observar o texto de algumas regras que ressaltam a relevância das suspeitas, como por exemplo a regra legal BCXX2016003, originada no normativo do Banco Central Brasileiro que sinaliza uma queda acentuada na movimentação de um perfil que, normalmente, tem alta movimentação. Os normativos dos bancos centrais dos países, geralmente, recomendam investigar esta mudança de comportamento pois pode representar a parada de um período no qual ocorreu o branqueamento de capital. O percentual de 0,0409% de suspeitos, para um mês de transações, mostra-se exequível para a análise humana. O sistema atualmente em utilização na instituição financeira fornecedora dos dados é fortemente baseado em valores limites pré-fixados e informações cadastrais, tipo renda/faturamento e atividade econômica. Assim sendo, as transações suspeitas agora indicadas incluem apenas algumas das suspeitas efetivamente identificadas e comunicadas 14 RISTI, N.º 25, 12/2017 aos órgãos de controle. As suspeitas baseadas no comportamento transacional dos clientes estão em análise visando atestar seu grau de precisão. 7. Conclusões É crescente a preocupação da indústria financeira e dos governos com o crime de branqueamento de capitais, quer seja pelos recursos perdidos, quer seja pelas consequências deste crime que, normalmente, financiam outros crimes. Os sistemas atualmente em utilização pelas instituições financeiras são fortemente baseados em informações cadastrais, a proposta aqui apresentada analisa o comportamento transacional dos clientes, estabelece um perfil e utiliza-o como balizador para comportamento futuro. Os resultados obtidos mostram a viabilidade de utilização sistemática e estabelece nova frente de combate a este crime. A verificação real das suspeitas sinalizadas estão em andamento e o próximo passo é fazer com que o agente de auxílio ao processo decisório aprenda com as decisões tomadas pela Analista de Anti-Branqueamento de Capitais e passe a sinalizar somente os casos inéditos. Referências Alexandre, C., & Balsa, J. (2015). A Multiagent Based Approach to Money Laundering Detection and Prevention. In Proceedings of the ICAAI. 1, pp. 230-235. Lisbon: SciTePress. doi:10.5220/0005281102300235 Alexandre, C., & Balsa, J. (2016). Integrating Client Profiling in an Anti-money Laundering in Information Systems and Multi-agent Based System. In New Advances Technologies (pp. 931-941). doi:10.1007/978-3-319-31232-3_88 Boissier, O., Bordini, R. H., Hübner, J. F., Ricci, A., & Santi, A. (2013, June). Multi-agent Oriented Programming with JaCaMo. Sci. Comput. Program., 78, 747-761. doi:10.1016/j.scico.2011.10.004 Bordini, R. H., Hübner, J. F., & Wooldridge, M. (2007). Programming Multi-Agent Systems in AgentSpeak Using Jason (Wiley Series in Agent Technology). John Wiley & Sons. Canas, V. (2004). O Crime de Branqueamento: Regime de Prevenção e de Repressão. (L. Almedina, Ed.) Coimbra-PT. Castillo-Rojas, Wilson, Medina-Quispe, Fernando, & Vega-Damke, Juan. (2017). Esquema de Visualización para Modelos de Clústeres en Minería de Datos. RISTI, (21), 67-80. https://dx.doi.org/10.17013/risti.21.67-80. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey. ACM Comput. Surv., 41, 15:1--15:58. doi:10.1145/1541880.1541882 Cser, A., Kount Inc. (Producer). (2017). The Truth About Machine Learming in Fraud from Retrieved March [Video Prevention http://info.kount.com/webinar/machine-learning. webinar]. 23, 2017, RISTI, N.º 25, 12/2017 15 Gao, S., Xu, D., Wang, H., & Wang, Y. (2006). Intelligent Anti-Money Laundering System. Service Operations and Logistics, and Informatics, 2006. IEEE International Conference on, (pp. 851-856). doi:10.1109/SOLI.2006.328967 Kingdon, J. (2004). AI fights money laundering. Intelligent Systems, IEEE, 19, 87-89. doi:10.1109/MIS.2004.1 Larik, A. S., & Haider, S. (2011). Clustering based anomalous transaction reporting. Procedia Computer Science, 3, 606-610. doi: 10.1016/j.procs.2010.12.101 Laxman, S. (2014). The Fight Against Fraud. Retrieved March, 2017, from https://iaonline.theiia.org/the-fight-against-fraud Le-Khac, N., Markos, S., & Kechadi, M. T. (2009). Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank. ICDF2C (pp. 77-84). doi:10.1007/978-3-642-11534-9_8 Le-Khac, N., & Kechadi, M. T. (2010). Application of Data Mining for Anti-money Laundering Detection: A Case Study. In Proceedings of the 2010 IEEE ICDMW (pp. 577-584). doi:10.1109/ICDMW.2010.66 Liu, X., & Zhang, P. (2010). A Scan Statistics Based Suspicious Transactions Detection Model for Anti-money Laundering (AML) in Financial Institutions. Mediacom 2010 (pp. 210-213). doi:10.1109/MEDIACOM.2010.37 Madinger, J. (2012). Money Laundering: A Guide for Criminal Investigators (Third ed.). Taylor & Francis Group. Norambuena, Brian Keith, & Zepeda, Vianca Vega. (2017). Minería de procesos de software: una revisión de experiencias de aplicación. RISTI, (21), 51-66. https://dx.doi.org/10.17013/risti.21.51-66. OTA. (1995). Information Technologies for the Control of Money Laundering (2 ed., Vol. from 2). Washington, DC: Congress of the U.S. Retrieved March, 2017, https://books.google.pt/books?id=TPdkrX2qkEAC Padgham, L., & Winikoff, M. (2004). Developing Intelligent Agent Systems: A Practical Guide. New York, NY, USA: John Wiley & Sons Inc. Paula, E., Ladeira, M., Carvalho, R., & Marzagão, T. (2016). Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering. 15th IEEE ICMLA (pp. 954-960). doi:10.1109/ICMLA.2016.0172 Pinto, T., Vale, Z., Sousa, T., Praça, I., Santos, G., & Morais, H. (2014). Adaptive learning in agents behaviour: A framework for electricity markets simulation. Integrated Computer-Aided Engineering, 21, 399-415. doi:10.3233/ICA-140477 Rajput, Q., Khan, N. S., Larik, A. S., & Haider, S. (2014). Ontology Based Expert-System for Suspicious Transactions Detection. Computer and Information Science, 7, 103-114. Retrieved March, 2017, from doi:10.5539/cis.v7n1p103 16 RISTI, N.º 25, 12/2017 Sabau, A. S. (2012). Survey of Clustering based Financial Fraud Detection Research. (I. Economicá, Ed.) Informatica Economica, 16, 110-122. Scholkopf, B., Platt, J. C., Shawe-Taylor, J. C., Smola, A. J., & Williamson, R. C. (2001). Estimating the Support of a High-Dimensional Distribution. Neural Computing, 13, 1443-1471. doi:10.1162/089976601750264965 Schott, P. A. (2006). Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism: Second Edition and Supplement on Special Recommendation IX. Washington, DC: The World Bank and The IMF. Senator, T. E., Goldberg, H. G., Wooton, J., . . . Wong, R. W. (1995). The Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions. AI Magazine, 16, 21-39. Retrieved March, 2017, from doi:10.1609/aimag.v16i4.1169 Tang, J., & Yin, J. (2005). Developing an intelligent data discriminating system of anti- money laundering based on SVM. Proceedings of 2005 International Conference on, 6, pp. 3453-3457. doi:10.1109/ICMLC.2005.1527539 UNODC. (2014). United Nations Office on Drugs and Crime - Annual Report 2014. Retrieved March, 2017, from https://www.unodc.org/documents/AnnualRepo rt2014/Annual_Report_2014_WEB.pdf Xu, D., & Gao, S. (2010). Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti- Money Laundering Domains. 43rd HICSS, (pp. 1-10). doi:10.1109/HICSS.2010.314 Xuan, L., & Pengzhu, Z. (2007). An Agent Based Anti-Money Laundering System (pp. 5472-5475). for Financial Supervision. WiCom 2007 Architecture doi:10.1109/WICOM.2007.1340 Zhang, Z., Salerno, J. J., & Yu, P. S. (2003). Applying Data Mining in Investigating Money Laundering Crimes. In Proceedings of the Ninth ACM SIGKDD (pp. 747-752). New York, NY, USA: ACM. doi:10.1145/956750.956851 RISTI, N.º 25, 12/2017 17
1907.00327
1
1907
2019-06-30T06:12:48
Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning
[ "cs.MA", "cs.AI", "cs.CV" ]
There are many AI tasks involving multiple interacting agents where agents should learn to cooperate and collaborate to effectively perform the task. Here we develop and evaluate various multi-agent protocols to train agents to collaborate with teammates in grid soccer. We train and evaluate our multi-agent methods against a team operating with a smart hand-coded policy. As a baseline, we train agents concurrently and independently, with no communication. Our collaborative protocols were parameter sharing, coordinated learning with communication, and counterfactual policy gradients. Against the hand-coded team, the team trained with parameter sharing and the team trained with coordinated learning performed the best, scoring on 89.5% and 94.5% of episodes respectively when playing against the hand-coded team. Against the parameter sharing team, with adversarial training the coordinated learning team scored on 75% of the episodes, indicating it is the most adaptable of our methods. The insights gained from our work can be applied to other domains where multi-agent collaboration could be beneficial.
cs.MA
cs
Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning Niranjan Balachandar, Justin Dieter, Govardana Sachithanandam Ramachandran *all authors contributed equally 9 1 0 2 n u J 0 3 ] A M . s c [ 1 v 7 2 3 0 0 . 7 0 9 1 : v i X r a Abstract There are many AI tasks involving multiple inter- acting agents where agents should learn to coop- erate and collaborate to effectively perform the task. Here we develop and evaluate various multi- agent protocols to train agents to collaborate with teammates in grid soccer. We train and evaluate our multi-agent methods against a team operating with a smart hand-coded policy. As a baseline, we train agents concurrently and independently, with no communication. Our collaborative proto- cols were parameter sharing, coordinated learn- ing with communication, and counterfactual pol- icy gradients. Against the hand-coded team, the team trained with parameter sharing and the team trained with coordinated learning performed the best, scoring on 89.5% and 94.5% of episodes respectively when playing against the hand-coded team. Against the parameter sharing team, with adversarial training the coordinated learning team scored on 75% of the episodes, indicating it is the most adaptable of our methods. The insights gained from our work can be applied to other do- mains where multi-agent collaboration could be beneficial. 1. Introduction There are numerous tasks where collaboration is beneficial: driving, multi-player games, etc. In the future, many of the cars on the road will be autonomous (Heineke et al., 2017), so it would be useful for these cars to learn to collaborate to avoid accidents and improve efficiency. In multi-player games, it would be beneficial for agents to operate under a coordinated protocol that leverages unified strategies with specialization of responsibilities. A good example of such a game is soccer, where players have a common team strategy while performing individual roles. While learning to collaborate for these tasks seems intuitive to humans, for a given task, it is unclear how to most ef- fectively balance AI collaboration with specialization. We might consider treating the entire multi-agent system as a single agent and train this agent with a centralized controller. However, for a centralized controller the state and action spaces rise exponentially with the number of sub-agents, so this would not be logistically practical or computationally tractable when the state-space is large or there are many agents. Thus, decentralized methods that are capable of allowing collaboration and communication between agents are de- sirable for these situations. Ideally, the policies learned by the agents via decentralized methods will be adaptable to variations in the policies of collaborating agents, general- izable, and capable of achieving similar performance to a that of a centralized controller. Here we explore and eval- uate various multi-agent reinforcement learning methods in application to grid soccer, a multi-player soccer game (Iravanian), our objective is to train our multi-agent rein- forcement learning teams to defeat a team operating with an intelligent handed-coded strategy. 2. Background/Related Work A number of methods for multi-agent control have been developed in literature. 2.1. Centralized This approach involves a centralized controller that maps states of all the agents to a joint action (an action for each agent) (Gupta et al., 2017). This is a Multi-agent Partially observable Markov decision process (MPOMDP) policy. Advantages: This scheme allows tighter coordination be- tween agents and the dynamics are stationary. Disadvantages: The main disadvantage of the centralized approach is the exponential increase in the state and action spaces with increase in number of agents. Manipulations can be performed to reduce the joint action space size to nA (Moradi, 2016) for a discrete action space. For example, we could reduce the action space by factoring action probability i P (ai) where ai are the individual actions of agents, which reduces the action space from An to nA. as P ((cid:126)a) =(cid:81) Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning However, when there are many collaborating agents, this method may still be impractical. Thus for our paper, we will focus on decentralized methods for multi-agent control. 3. Approach 3.1. Grid Soccer Simulator 2.2. Concurrent Learning In concurrent learning, each agent is independent and learns its own unique policy (Gupta et al., 2017). In this scheme each agent has an independent observation and indepen- dently executes actions based on its observation. Here the reward is shared between all the agents. Agents should learn their individual roles while being evaluated with team performance, so this method should effectively decompose coordination in a distributed way. Advantages: The agents learn heterogeneous policies and the agents take specific roles, for example, in the soccer simulator, an agent could learn to be defender, another can learn to be the striker. Another advantage is the there is no communication between agents, which may be useful in a system where there are bandwidth constraints. Disadvantages: Since the agents do not share their experi- ence with each other, the training of unique policies does not scale with a large number of agents. This adds to the sample complexity of the scheme. Another disadvantage is that since all agents are learning policies independently, from each agent's point of view the dynamics are not stationary. 2.3. State sharing In this scheme, neighboring agents share their observation and action space with each other (Chernova & Veloso, 2008). Here the neighboring agents' actions and observation are stacked as the state space of each agent. This reduces the problem to distributed constraint optimization (DCOP). 2.4. Counterfactual Policy Gradients Counterfactual policy gradients is an actor critic method that leverages the utility of a centralized value approximation network as with parameter sharing but also gives a method for credit assignment to ensure that agents are properly given credit for individual actions rather than the actions of the group and allows for specialization of individual agents (Foerster et al., 2017) . The agents are represented by decentralized policy networks. The counterfactual algorithm uses TD learning to update the centralized critic and gradients of the policy network to perform updates. The policy gradients use a specialized advantage function that analyzes the contributions of each agents individual actions to the overall received reward. Grid Soccer Simulator is a discrete grid simulation of multi- player soccer (Iravanian). We built a python API to interact with this grid soccer simulator. The two teams have 3 play- ers each that play on a grid of size 10 × 18, as shown in Figure 1. Goals are indicated by the bolded lines on the right and left sides of the grids, and at any given timestep, one of the 6 players has the ball. In order to score, a player must physically move to the goal. It is possible (but obviously not advisable) for a player to score in its own goal, thus rewarding the opposing team. At each timestep, players can hold (stay still), move to one of the 8 adjacent grid positions, or pass to a teammate. choosing to move to an invalid position causes a player to remain at the same position. After each goal, a player from the team that did not score starts with the ball. Players can steal (cause a turnover of the ball) by running into a player of the opposing team who has the ball and is not holding or standing in between teammates of the opposing team that are passing to each other. The grid soccer game comes with a team that operates with an intelligent hand-coded strategy that is based on real- world soccer strategies. For example, when the opposing team has the ball and is close to the hand-coded team's goal, the players on the hand-coded team will go towards the hand-coded team's goal to play defense. 3.2. States We intend to leverage the ability of Convolutional Neu- ral Networks to analyze images, so at each timestep, we represent the state of each agent as a 4-channel image S ∈ RH×W×4 where H and W are the height and width of the grid respectively as illustrated in Figure 2. Each pixel of S is a boolean indicating the presence of a certain object. The first channel indicates the agent location: (cid:40) (cid:40) Si,j,1 = 1 0 location of agent is (i, j) otherwise . The second channel indicates the teammates' locations: Si,j,2 = 1 0 location of any teammate is (i, j) otherwise . (cid:40) The third channel indicates the opposing team members' locations: Si,j,3 = 1 0 location of any opposing team member is (i, j) otherwise . Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning Figure 1. Sample rendering of grid soccer game state. Two of our AI teams are playing against each other. Action Index 0 1 2 3 4 5 6 7 8 8 + k for k = 1 to n − 1 Action stay at (i,j) move to (i+1,j) move to (i,j-1) move to (i-1,j) move to (i,j+1) move to (i+1,j+1) move to (i+1,j-1) move to (i-1,j-1) move to (i-1,j+1) pass to teammate k Table 1. possible actions for each agent if current agent location is (i, j) and each team has n players Timestep Result agent own-goal team own-goal agent scored goal team scored goal opponent scored goal opponent own goal agent turns ball over team turns ball over agent steals ball team steals ball agent illegal movement agent successful pass agent hold agent legal movement Reward -100 -75 50 50 -50 10 -10 -10 10 10 -3 -1 -1 -2 Table 2. Rewards for each possible timestep result Figure 2. illustration of state representation as boolean 4-channel images The fourth channel indicates the ball's location: 1 0 location of ball is (i, j) otherwise . (cid:40) Si,j,4 = 3.3. Actions There are a total of n + 8 actions, where n is the number of players per team (n = 3 for our experiments). The possible actions for an agent currently located at (i, j) are listed in Table 1. 3.4. Rewards We constructed a handcrafted reward function to penalize getting scored on, turnovers, and stalling to incentive steal- ing the ball and scoring quickly. At each timestep, all agents in the team receive a reward, which depends on the result of the timestep. The possible results of a timestep and the corresponding rewards are summarized in Table 2. Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning 3.5. Deep Q-Learning Because the state space is very large (around (2n)HW +1 = 6181 for n = 3 players per team, tabular Q-learning is impractical, so we approximate the Q-value with a Convo- lutional Neural Network (CNN). Our CNN takes as input an agent state (H × W × 4) image and outputs a vector of size A of Q-values for each action for the input state. Our CNN has 3 convolutional layers followed by 2 fully connected layers, and the architecture is summarized in Fig- ure 3. Each layer except the final fully connected layer has ReLU activation. For stability, we include a target network as included (Mnih et al., 2015). We update the target net- work weights update after every iteration in which a goal is scored. We optimize the following objective function for gradient descent: Q(s(cid:48), a(cid:48), θ−) − Q(s, a, θ) (cid:17)2 (cid:16) L(θ) = r + γ max a(cid:48) where θ are the network weights and θ− are the target net- work weights, and Q is the feed-forward output of the CNN. During training, we perform an epsilon-greedy exploration with  decayed over time and gradient descent with Adam (Kingma & Ba, 2014). 3.6. Concurrent Learning Our baseline approach is concurrent learning with no com- munication. Here each agent learns its own set Q-network weights. Since this approach has no explicit communica- tion or collaboration protocols, we expect this approach to perform the poorest. 3.7. Parameter Sharing In the parameter sharing scheme, the agents are homoge- neous. This allows model to be trained with experiences of all agents, which makes the algorithm data efficient. Here the learning is centralized while the control is decentral- ized by sharing learned parameters of the model between the agents. The agents still have different behavior since each agent receive different observations. This means a single policy is learned during train time and each agent executes the policy during inference with their independent observation. Advantage: The experience of all agents are used by the learner, hence making them sample efficient. Since the model is learned by a centralized learner and shared across all agents, they are computationally efficient. Computational resources such as GPU can be allocated to the centralized learner and each agent should use only light computational resources since inference is not computationally intensive. Disadvantage: It requires a centralized leaner and all of the agent's observation, reward and action needs to be transmit- ted to the leaner. This might be a limitation for an appli- cation that has limited bandwidth. The model lacks tighter coordination between agents as there is no possibility of communication. Here the model learns co-ordination im- plicitly by learning protocols an individual agent should follow based solely on its state. Here we use Q-Learning to update our value function ap- proximations. State, action, reward and the next sate from agents are transmitted to the centralized learner. For each time step of each agent, the centralized learner computes the Q-learning gradient to update the Q network. All agents share the same Q-network weights. 3.8. Coordinated Learning with Communication The main limitation of parameter sharing is that they lack tight co-ordination between agents. We address this by defin- ing a communication mechanism between agents. Many approaches in the past that use communication for tighter co-ordination, formulate the problem as Distributed Con- straint optimization (DCOP), which involves usage of the whole system or at least a smaller subsystem of agents. This uses significant communication bandwidth and causes la- tency in action selection for each agent. This becomes more intractable as the number of agents in the system increases. We formulate a new form of communication that uses a very small amount of bandwidth where the action selection is decentralized and does not involve computation for a group of agents. We achieved this by defining a joint action with communication a∗: a∗ = (ai, ag) here ai is the action taken by an individual agent. ag is one of a discrete number of communications that is broadcasted to other agents. The communications from neighboring agents are appended to an agents own observation xit, to form the state space sit = xit, ajt∀j, j (cid:54)= i In our DQN, we allow agents to receive this communication by having the following revised agent state representation. Instead of the original 4 channels, there will now be 3+Ag channels. The agent location channel, opponents location channel, and ball location channel remain. But now instead of a teammates locations channel, there will be Ag chan- nels, where channel ag will have a 1 at pixel (i, j) if there is a teammate at (i, j) that broadcasted communication action ag at the most recent timestep. Now our Q-network will output to joint action space instead of action space. Our implementation of coordinated learning also includes param- eter sharing (each agent has the same Q-network weights) for greater sample efficiency. One of the limitations of this approach is that the action space increases to ai × ag. Hence discretion is required Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning Figure 3. Q-value approximation network architecture in choosing the number of available group actions. In our experiments on grid soccer, we achieve this by defining a joint action: a∗ = arg max at Q(st, at) Another limitation is that since each agent is learning to communicate the group actions and since the neighboring agents' group actions are used as part of this agent's state space, the dynamics of the model are not stationary. To mitigate this issue, we use minibatches and a replay buffer for the model updates. For each time step for each agent, we capture experience et = (st, at, rt, st+1) and we update a replay buffer R = e1, e2, ...en. At each epoch, we sample a minibatch from the replay buffer R. Use of minibatch and replay buffer improves stability. Though coordinated learning with communication performs best, it requires a lot of epochs to train. One of the main reasons for this is because, each agents receives the same reward. We address this by using appropriate credit as- signment. The approach we explored is difference reward (Colby et al., 2015), which is defined as Di(z) = G(z) − G(zi + ci) Here G(z) is the global reward of unified state z of the system, zi is the system state without agent i, and ci is the counterfactual term. Since it is non-trivial to estimate G(zi + ci), we formulated a simple strategy for credit assignment. We assign a reward for each agent based on the following: Ri = R.Qi(st, at)( 1 N Qi(sit, ait)) N(cid:88) i=1 Here N is number of agents in the system, R is global re- ward signal, and Qi(sit, ait) is the state action value for agent i at timestep t. The intuition behind this is that if the agent directly contributed to the reward, the correspond- ing Qi would be greater than for an agent which did not contribute to overall performance of the system. 3.9. Counterfactual Policy Gradients The implementation of the counterfactual actor critic policy gradient method works as follows: 3.9.1. CENTRALIZED CRITIC The centralized critic is a function approximator Q : S × A → R where A is the joint action space of all agents. The usual representation of value approximation with a neural network that outputs a vector of size A will not work as A will grow exponentially with the number of agents and will become infeasible to represent as the output of a neural network. Instead, the centralized critic can output a vector of size A to provide the Q values of a single agent where A is the action space of a single agent. As an input, the network takes in the other agents actions as well as a one-hot vector representing which agent Q-values are being produced for. This network structure is demonstrated in Figure 4. The details of the actual model implemented are as follows. The states were represented as a 3 dimensional tensor, with the first two dimensions the dimensions of the grid followed by one channel each for every player on the counterfactual team, a single channel for every player on the opposing team, and a channel for the location of the ball. This was fed into a convolutional layer with 32 output channels, a 3×3 kernel, and a stride of 1. This was then fed into another convolutional layer with 64 output channels, a 4 × 4 kernel, and a stride of 2. This is then flattened and a one hot rep- resentation of u−a as well as a one hot representation of a Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning 3.9.3. ACTOR TRAINING AND COUNTERFACTUAL ADVANTAGES The unique representation of the centralized critic allows for a very useful advantage function to be computed. Aa(s, u) = Q(s, u) −(cid:88) πa(u(cid:48)aτ a)Q(s, (u−a, u(cid:48)a)) u(cid:48)a Figure 4. Structure of the centralized critic for the counterfactual −a algorithm. ut denotes the joint action at timestep t and u t denotes the joint action excluding the action of agent a (Foerster et al., 2017) This counterfactual advantage provides a metric of how much better/worse an agents actions will be compared to if it had chosen a different action with the actions of other agents held fixed. This provides a method of credit assign- ment to ensure that agents are only rewarded for how their actions contribute to the success of the team verses getting rewarded/penalized for results they did not contribute to. This advantage is then fed into the typical policy gradient update rule with advantages: (cid:88) ∆θ = α ∇θlogπa(uaτ a)Aa(s, u) is appended before being processed by two fully connected layers with ReLu activation and respective sizes of 128 and 64. Finally a linear layer is added at the end to output a vec- tor of size A. The network is trained using the SARSA(λ) algorithm which gives a combination of SARSA style re- turns and Monte Carlo returns (Foerster et al., 2017). We used λ = 0.8 to be empirically effective but the model could potentially benefit from more fine tuning of this parameter. 3.9.2. POLICY NETWORK To represent the stochastic policies of the actors, a policy network with a softmax output of dimension A is used. To allow the agents to share what they have learned parameters are shared but a one-hot representation of which agent is using the network is passed as an input to enable special- ization of agents. The exact structure of the neural network is as follows. The state is represented as a 3 dimensional tensor with a channel for the current agent's locations, a channel for the ball's location, a channel for the location of teammates, and a channel for the location of opposing players. This is fed into a convolutional layer with 32 out- put channels, a 3 × 3 kernel, and a stride of 1. This was then fed into another convolutional layer with 64 output channels, a 4 × 4 kernel, and a stride of 2. This is then flat- tened and a one hot representation of a is appended before being processed by two fully connected layers with ReLu activation and respective sizes of 128 and 64. A softmax layer is added at the end to give an output dimension of A. Additionally a decaying randomness factor of  is added such that π(as) = (1 − )π(as) +  to ensure that the agent is exploring sufficiently.  is decayed from 0.5 to 0.05 over 300000 timesteps. a where θ is the parameters of the policy network. α is the learning rate, empirically chosen to be 0.001 for our ex- periments. Also, all the theoretical guarantees of conver- gence with normal actor critic methods hold for this actor critic method with counterfactual advantages (Foerster et al., 2017). 4. Experiment Results The current code for all our simulators, APIs, and learn- ing algorithms is included in https://github.com/ jdietz31/CS234-MultiagentProject. We eval- uate the performance of our algorithms by measuring the "goal ratio", which is the proportion of goals scored by the algorithm's team of the last 200 goals. So the worst possible goal ratio an algorithm can achieve is 0, and the best possi- ble goal ratio an algorithm can achieve is 1. We train each of our methods for hundreds of thousands of iterations. For each of our models, we use a learning rate of 0.001, initial epsilon of 0.5, final epsilon of 0.05, and perform linear ep- silon decay over the course of training. We vary the decay rate to account for differing sample efficiencies. For coordi- nated learning, we set the minibatch size to 1, 000 and replay buffer size to 50, 000. Hyperparameters for Counterfactual are specified in the methods section. We then trained our two best models- parameter sharing vs coordinated learning against each other to further de- lineate performance. The results of this adversarial train- ing are shown in Figure 7. Videos of the parameter shar- ing team playing the coordinated learning team are in- cluded here: https://drive.google.com/open? id=1jntEENSbnW_oyoFZJuCobBHybO_jdpUy. The results in Figure 5 and Figure 6 shows the training per- formance and final performance of all of our different multi- Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning Figure 5. Performance of multiagent models throughout training in terms of ratio of goals scored against the hand-coded team. Figure 6. Performance of multiagent models in the last 1000 iterations of training. Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning Figure 7. Goal ratio of the coordinated learning team when training adversarially against parameter sharing after both are pretrained against the hand-coded team. agent models in terms of the ratio of goals scored against the hand-coded agent. The Concurrent model achieves de- cent performance, but we observe that one of the agents tends to learn offense and defense, while the other two learn very little, so there is almost no teamwork. Counterfactual learns quickly but converges to a local optima where it only plays offense and no defense. Parameter Sharing learns to be almost perfect but is slightly unstable in its performance throughout training. The coordinated model learns the slow- est but is stable and converges to near perfect performance. Also, when allowed to train adversarially against other mod- els after being pretrained against the hand-coded team, coor- dinated learning performs the best as demonstrated in Figure 7. 5. Conclusion Our results show that the model with communication is able to perform the best against both the hand coded agent and against our other reinforcement learning agents. It is a simple enough model that it is able to learn very effectively and its communication model allows it to learn methods of cooperating and team strategy that simpler models cannot compete with. The counterfactual policy gradient method is the most versatile and complex model and with sufficient hyper-parameter tuning it should be able to surpass other models. The complexity of the model makes it promising to be able to learn difficult tasks but also makes it very unstable and not very robust with respect to performing well with a variety of hyper-parameters. Future work can expand on making this counterfactual method more robust and less unstable. Also, our experiments only worked with 3 agents and real world multiagent systems can be composed of many more agents. Future work should investigate into how these models can perform in more complicated scenarios with many more agents. References Chernova, Sonia and Veloso, Manuela. Teaching multi- robot coordination using demonstration of communica- tion and state sharing. In Proceedings of the 7th Inter- national Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3, AAMAS '08, pp. 1183 -- 1186, Richland, SC, 2008. International Foundation for Autonomous Agents and Multiagent Systems. ISBN 978-0-9817381-2-3. URL http://dl.acm.org/ citation.cfm?id=1402821.1402826. Colby, Mitchell K., Curran, William, and Tumer, Ka- gan. Approximating difference evaluations with lo- In Proceedings of the 2015 Interna- cal information. tional Conference on Autonomous Agents and Multia- gent Systems, AAMAS '15, pp. 1659 -- 1660, Richland, SC, 2015. International Foundation for Autonomous Agents and Multiagent Systems. ISBN 978-1-4503-3413- 6. URL http://dl.acm.org/citation.cfm? id=2772879.2773372. Foerster, Jakob N., Farquhar, Gregory, Afouras, Triantafyl- los, Nardelli, Nantas, and Whiteson, Shimon. Counterfac- tual multi-agent policy gradients. CoRR, abs/1705.08926, 2017. Gupta, Jayesh K., Egorov, Maxim, and Kochenderfer, Mykel J. Cooperative multi-agent control using deep Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning reinforcement learning. Workshop, 2017. doi: 10.1007/978-3-319-71682-4 5. In Adaptive Learning Agents Heineke, Kersten, Kampshoff, Philipp, Mkrtchyan, Self-driving car tech- the road? Armen, and Shao, Emily. nology: When will https://www.mckinsey.com/industries/ automotive-and-assembly/our-insights/ self-driving-car-technology-when- will-the-robots-hit-the-road, May 2017. the robots hit Sina. Iravanian, agents. GridSoccerSimulator. and https://github.com/sinairv/ Grid-soccer simulator Kingma, Diederik P. and Ba, Jimmy. Adam: A method for stochastic optimization. CoRR, abs/1412.6980, 2014. Mnih, Volodymyr, Kavukcuoglu, Koray, Silver, David, et al. Human-level control through deep reinforcement learn- ing. Nature, 518(7540):529 -- 533, February 2015. ISSN 00280836. URL http://dx.doi.org/10.1038/ nature14236. Moradi, Milad. A centralized reinforcement learning method for multi-agent job scheduling in grid. CoRR, abs/1609.03157, 2016. URL http://arxiv.org/ abs/1609.03157.
1807.08531
1
1807
2018-07-23T11:10:53
Multisensor Management Algorithm for Airborne Sensors Using Frank-Wolfe Method
[ "cs.MA" ]
This study proposes an airborne multisensor management algorithm for target tracking, taking each of multiple unmanned aircraft as a sensor. The purpose of the algorithm is to determine the configuration of the sensor deployment and to guide the mobile sensors to track moving targets in an optimal way. The cost function as a performance metric is defined as a combination of the D-optimality criterion of the Fisher information matrix. The convexity of the cost function is proved and the optimal solution for deployment and guidance problem is derived by the Frank-Wolfe method, also known as the conditional gradient descent method. An intuitive optimal approach to deal with the problem is to direct the sensor to the optimal position obtained by solving a nonlinear optimization problem. On the other hand, the proposed method takes the conditional gradient of the cost function as the command to the deployed sensors, so that the sensors are guaranteed to be in the feasible points and they achieve the current best performance. Simulation results demonstrate that the proposed algorithm provides better performance than directing each sensor to its optimal position.
cs.MA
cs
Multisensor Management Algorithm for Airborne Sensors Using Frank-Wolfe Method Youngjoo Kim* and Hyochoong Bang Department of Aerospace Engineering, Korea Advanced Institute of Science and Technology *Corresponding author: [email protected] Abstract: This study proposes an airborne multisensor management algorithm for target tracking, taking each of multiple unmanned aircraft as a sensor. The purpose of the algorithm is to determine the configuration of the sensor deployment and to guide the mobile sensors to track moving targets in an optimal way. The cost function as a performance metric is defined as a combination of the D- optimality criterion of the Fisher information matrix. The convexity of the cost function is proved and the optimal solution for deployment and guidance problem is derived by the Frank-Wolfe method, also known as the conditional gradient descent method. An intuitive optimal approach to deal with the problem is to direct the sensor to the optimal position obtained by solving a nonlinear optimization problem. On the other hand, the proposed method takes the conditional gradient of the cost function as the command to the deployed sensors, so that the sensors are guaranteed to be in the feasible points and they achieve the current best performance. Simulation results demonstrate that the proposed algorithm provides better performance than directing each sensor to its optimal position. Keywords: multisensor management; Fisher information matrix; Frank-Wolfe method; conditional gradient descent; convex optimization 1. Introduction Multisensor system has emerged as an important research subject in military as well as civilian applications. Whereas a single sensor generally can obtain limited information, multiple sensors are able to provide sufficient information obtained from different viewpoints and focuses. Given the advancement in sensor technologies, the amount of data the sensors can process has increased. This motivates researches on automatic management of multiple sensors to improve overall perception performance. Multisensor management is formally described as a system or a process that attempts to manage a set of sensors in a dynamic, uncertain environment, to improve the performance of data fusion [1]. Details of purpose, role, architecture, and problem of the multisensor management are well described in [1-3]. Some multisensor management algorithms have been developed within the domain of antisubmarine warfare [4, 5]. In particular, a general methodology for the management of multisensor systems can be found in [4]. Expanding the single-target tracking scheme, a problem of managing an array of sensors in order to track multiple targets was considered in [6, 7]. These works provide convincing answers to this application area in regard to efficient and autonomous deployment of sonobuoy resources in submarine tracking. Important steps of the multisensor management technique are to quantify and control the accuracy of the target state estimation. The Fisher information matrix (FIM) provides the means of achieving this aim in an efficient way [8, 9]. The inverse of the FIM denotes a lower bound on the performance of an estimator. The purpose of this study is to develop a multisensor management algorithm applicable to airborne warfare, considering each unmanned aircraft as a sensor system. Our previous work [10] has attempted to achieve the goal, but it is limited to the management of stationary sensors. One major difference of the unmanned aircraft from the sonobuoys is that the former are mobile sensors. In order to obtain better performance, the sensors can move to appropriate positions to chase the moving targets. The fact calls our attention to the problem in the sensor management as to determining the appropriate positions of the deployed sensors. We have addressed path planning of 2 of 18 a mobile sensor where the location of sensor deployment is different of that of an operational area [11]. Another recent work [12] has addressed control of multiple mobile sensors using a potential field obtained by gradient of a goal function, but it is limited to maneuvers in 2D space without consideration of sensor coverage. An airborne sensor needs to be in the feasible region where the measurement is available. By using FIM to quantify the performance, in this paper, we propose a multisensor management algorithm for determining 1) when a new sensor is required, 2) where to deploy the new sensor, and 3) how to guide the deployed sensors. The first two decisions, of when and where to deploy a new sensor, have been addressed in [10]. In this study, on the other hand, we imposed constraints to the optimization problems. That is, we took sensor coverage in account for making decisions of deployment location and guidance of the sensors. Our contribution lies in the method to provide the guidance command to the deployed sensors. We formulated the problem of finding the best sensor location as a constrained convex optimization problem and provided the negative conditional gradient of the cost function as the guidance command, which is the solution of the subproblem of Frank-Wolfe optimization technique. Solving the subproblem every time step significantly reduced computation time while the sensors approached the optimal location, maintaining the targets in the sensors' coverage. The proposed multisensor management algorithm was verified by numerical simulations with stationary and moving targets. The remainder of the paper is structured as follows. Section 2 presents the problem formulation for which the multisensor management algorithm is designed. Section 3 addresses how to define the performance metric and its convexity is proved therein. In Section 4, the multisensor management algorithm is given. The algorithm consists of determining the configuration of the sensor deployment and generating command to the deployed sensors. Section 5, some examples are given to demonstrate the effectiveness of the proposed algorithm. Summary and conclusions are presented in Section 6. 2. Problem Formulation In this section, we present the problem formulation for the management algorithm for an airborne multisensor system to track multiple ground targets. It is assumed that each ground target is moving independently, and the number of the targets is 𝐿. The number of the unmanned aircraft is 𝑁𝑚𝑎𝑥 and that of the deployed is 𝑁. Suppose that each unmanned aircraft is equipped with a sensor system, which provides angle and range measurements. For example, one can use a radar system, a LIDAR system, or a camera system with terrain elevation data for the framework to be described in this paper. The purpose of the multisensor management is to obtain the best estimate of the target position. Each sensor system in this paper is assumed able to detect the false measurement and distinguish multiple measurements from the multiple targets. The modelling methodology for the false alarms and measurement association, generally considered in radar systems, can be referred to [4, 6, 7]. A major characteristic of the airborne multisensor system is that the sensors are mobile. In this study, we restrict the unmanned aircraft as a rotary-wing type that is able to hover and move to every direction unlike fixed-wing aircraft. This helps us to focus on the multisensor management, not the path planning. A fusion center as a sensor manager, which can be a ground control station or an unmanned aircraft, collects sensory data and determines when, where, and for which target group the unmanned aircraft should be deployed. At the same time, each mobile sensor is directed to chase the moving targets after its deployment by continuously calculating appropriate directions to track the targets to achieve better performance. Within the problem domain described above, there are three inter-related problems to be addressed. The first problem is the time for the new sensors to be deployed, given the current estimate of the target state. The target tracking algorithm is supposed to satisfy a criterion as the lower bound of the state estimate performance. The time will be determined as the time when the accuracy of the state estimate is lower than a prespecified criterion. The second problem is to determine the configuration of the next deployment; the target group to be tracked and the location of the newly deployed sensor. In other words, given a certain time for 3 of 18 the next deployment, and the predicted target state at that time, the algorithm determines which targets should be tracked by the new sensor and where the sensor should be positioned in an optimal way. An optimization problem for maximizing information of targets the new sensor gathers should be solved to determine the configuration of the next deployment. The third problem is the guidance of each sensor to track the moving targets. That is, the direction in which each sensor should move is supposed to be determined by solving the optimization problem. 2.1. Target Model In this paper, the target system is described as a stochastic vector state space model. Each target is assumed to be moving independently with a constant velocity. The system model for each target 𝑙 = 1,2, … , 𝐿 can be described as a near-constant-velocity model [13] by 𝑿𝑘+1 𝑙 = 𝐹𝑘 𝑙𝑿𝑘 𝑙 + 𝐺𝑘 𝑙 𝝂𝑘 𝑙 (1) The target state at time k is defined as 𝑿𝑘 𝑙 = [𝑥𝑘, 𝑦𝑘, 𝑧𝑘, 𝑥𝑘, 𝑦𝑘, 𝑧𝑘]𝑇 = [𝒑𝑘, 𝒗𝑘]𝑇. The process noise 𝑙 obeys a zero-mean Gaussian distribution whose covariance is expressed as 𝝂𝑘 𝑙 = [ 𝑄𝑘 𝑙)2 (𝜎𝑥 0 0 2 0 𝑙 ) (𝜎𝑦 0 0 0 𝑙)2 (𝜎𝑧 ] (2) where [𝜎𝑥 matrices 𝐹𝑘 𝑙 𝜎𝑧 𝑙] 𝑙 𝜎𝑦 𝑙 and 𝐺𝑘 𝑇 denotes the standard deviation of the noise and ∆𝑡 is the sampling interval. The 𝑙 are constructed as 𝑙 = [ 𝐹𝑘 𝐼3×3 03×3 𝐼3×3∆𝑡 𝐼3×3 ] 𝑙 = [ 𝐺𝑘 ∆𝑡2 𝐼3×3 2 𝐼3×3∆𝑡 ] (3) and 𝐼𝑚×𝑛 is an m by n identity matrix. The covariance of 𝐺𝑘 𝑙 𝝂𝑘 𝑙 is 𝐺𝑘 𝑙 𝑄𝑘 𝑙 (𝐺𝑘 𝑙 ) 𝑇 . 2.2. Observation Model Consider the observation model regarding the measurement from the target 𝑙 by the sensor 𝑛 = 1,2, … , 𝑁 given by 𝑛,𝑙 = 𝒉𝑘 𝒁𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) + 𝝎𝑘 𝑛,𝑙 (4) 𝑛 be a set of targets assigned to the sensor n at time 𝑘. Each sensor is supposed to track the 𝑛 and provides measurement to the fusion center. Invalid measurements and Let 𝕋𝑘 target 𝑙 ∈ 𝕋𝑘 measurements from other targets are discarded. Each sensor provides angle measurements in azimuth and elevation, and a range measurement, 𝑛,𝑙 = [𝐴𝑧, 𝐸𝑙, 𝑅]𝑇. Each measurement from the sensor n tracking the target l is expressed as as 𝒁𝑘 𝑥𝑙−𝑥𝑛 𝑦𝑙−𝑦𝑛) tan−1 ( √(𝑥𝑙 − 𝑥𝑛)2 + (𝑦𝑙 − 𝑦𝑛)2 + (𝑧𝑙 − 𝑧𝑛)2] [ 2 +(𝑦𝑙−𝑦𝑛) 2 √(𝑥𝑙−𝑥𝑛) tan−1 ( 𝑧𝑙−𝑧𝑛 ) + 𝝎𝑘 𝑛,𝑙 (5) 𝑛,𝑙 = [ 𝒁𝑘 𝐴𝑧 𝐸𝑙 𝑅 ] + 𝝎𝑘 𝑛,𝑙 = 4 of 18 𝑛,𝑙 is the zero-mean Gaussian measurement noise whose covariance matrix is 𝑅𝑘 𝑛,𝑙 . The where 𝝎𝑘 corresponding observation matrix 𝐻𝑘 𝑛,𝑙 is obtained by 𝑛,𝑙 = 𝐻𝑘 𝜕𝒉𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) 𝑙 𝜕𝑿𝑘 (6) Note that 𝐻𝑘 𝑛,𝑙 = 𝜕𝒉𝑘 𝑛,𝑙 𝜕𝑿𝑘 𝑙 ⁄ has zero elements in the last three columns as 𝑛,𝑙 = [ 𝐻𝑘 𝜕𝒉𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) 𝑙 𝜕𝒑𝑘 𝜕𝒉𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) 𝑙 𝜕𝒗𝑘 ] = [ 𝜕𝒉𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) 𝑙 𝜕𝒑𝑘 03×3] (7) Letting 𝑥 = 𝑥𝑙 − 𝑥𝑛, 𝑦 = 𝑦𝑙 − 𝑦𝑛, 𝑧 = 𝑧𝑙 − 𝑧𝑛, the observation matrix can be expressed as 𝑦 𝑛,𝑙 = 𝐻𝑘 −𝑥𝑧 𝑥2+𝑦2 (𝑥2+𝑦2+𝑧2)√𝑥2+𝑦2 [ √𝑥2+𝑦2+𝑧2 𝑥 −𝑥 𝑥2+𝑦2 −𝑦𝑧 0 1 (𝑥2+𝑦2+𝑧2)√𝑥2+𝑦2 √𝑥2+𝑦2 𝑦 𝑧 √𝑥2+𝑦2+𝑧2 √𝑥2+𝑦2+𝑧2 03×3 (8) ] The measurement is available only when the target 𝑙 is in the coverage of the sensor. For simplifying the problem, assume each sensor always looks downward. The sensor position is restricted as tan−1 ( 𝑥𝑙−𝑥𝑛 𝑧𝑙−𝑧𝑛) < tan−1 ( 𝑧𝑛 > 𝐻𝑚𝑖𝑛 𝜃𝑥 2 𝑦𝑙−𝑦𝑛 𝑧𝑙−𝑧𝑛) < 𝜃𝑦 2 (9) where 𝜃𝑥 and 𝜃𝑦 denote angle of views of the sensor in x and y direction, respectively. 𝐻𝑚𝑖𝑛 denotes the minimum altitude of the sensor. By rearranging (9), a set of linear constraints for the sensor position is obtained as ±(𝑥𝑙 − 𝑥𝑛) − (𝑧𝑙 − 𝑧𝑛) tan 𝜃𝑥 2 ±(𝑦𝑙 − 𝑦𝑛) − (𝑧𝑙 − 𝑧𝑛) tan 𝑛 𝑧𝑛 > 𝐻𝑚𝑖𝑛 for all 𝑙 ∈ 𝕋𝑘 < 0, 𝜃𝑦 2 < 0, (10) The above equations will be used as the constraints of the optimization problems in section 4. 2.3. Sequential Extended Kalman Filter In this paper, we adopted the sequential extended Kalman filter (EKF) to estimate the target state since every measurement and state transition are independent and the observation matrix can be expressed as the first-order derivative of the observation model. Brief introduction to the sequential EKF is given here and the details can be referred to the literature [14]. Its time update step is the same as that of typical EKF. The measurement update step of the sequential EKF is as follows. + 𝐾𝑘+1, 𝑖 (𝒁𝑘+1, 𝑖 − 𝒉𝑖(𝑋𝑘+1, 𝑖−1 + )) + 𝑿 𝑘+1, 𝑖 + = 𝑿 𝑘+1, 𝑖−1 𝑇 + 𝐾𝑘+1, 𝑖 = 𝑃𝑘+1, 𝑖−1 𝑃𝑘+1, 𝑖 + 𝐻𝑘+1, 𝑖 + = 𝑃𝑘+1, 𝑖−1 (𝐻𝑘+1, 𝑖𝑃𝑘+1, 𝑖−1 + 𝑇 𝐻𝑘+1, 𝑖 + 𝑅𝑘+1, 𝑖) + −1 − 𝐾𝑘+1, 𝑖𝐻𝑘+1, 𝑖𝑃𝑘+1, 𝑖−1 (11) + where 𝑿 𝑘+1, 0 available measurement at the time step. − and 𝑿 𝑘+1 + = 𝑿𝑘+1, 𝐼 = 𝑿 𝑘+1 + , and so does for 𝑃 . In the above, 𝑖 = 1,2, … , 𝐼 denotes 3. Performance Metric 3.1. Fisher Information Matrix 5 of 18 After the target state is estimated, the fusion center calculates the FIM for the multisensor system. Let 𝑿𝑘 be an unknown, random state vector to be estimated. Its unbiased estimate is defined as 𝑿 𝑘(𝒁𝑘) when the measurement 𝒁𝑘 is obtained. Then, the posterior Cramer-Rao lower bound (PCRLB) is defined to be the inverse of the FIM 𝐽𝑘. It provides a lower bound of the error covariance matrix of 𝑿 𝑘(𝒁𝑘) as 𝐶𝑘 ≜ 𝔼 {[𝑿 𝑘(𝒁𝑘) − 𝑿𝑘][𝑿 𝑘(𝒁𝑘) − 𝑿𝑘] 𝑇 } ≥ 𝐽𝑘 −1 (12) where 𝔼 denotes expectation over 𝑿𝑘 and 𝒁𝑘 . The inequality in the above equation means that 𝐶𝑘 − 𝐽𝑘 −1 is a positive semi-definite matrix. The posterior FIM 𝐽𝑘+1 can be evaluated by the following formula given in [8, 9] as 𝐽𝑘+1 = (𝑄𝑘 + 𝐹𝑘𝐽𝑘 −1𝐹𝑘 𝑇)−1 + 𝐽𝑍,𝑘+1 (13) The first term of the FIM 𝐽𝑘+1 contains the prior information of the target states at time 𝑘 + 1. The initial FIM is defined as 𝐽0 = (𝑃0)−1. It is assumed that the sensors can identify each target so that the measurement-to-target associations are known. If the association is unknown, its effect to the FIM can be evaluated by an information reduction matrix [6]. Note that the matrix 𝐽𝑍,𝑘+1 in (13) gives the measurement contribution to the FIM. For calculating the measurement contribution to the FIM, consider the observation model regarding the measurement of the target 𝑙 by the 𝑛th sensor given by (5) revisited as 𝑛,𝑙 = 𝒉𝑘 𝒁𝑘 𝑛,𝑙(𝑿𝑘 𝑙 ) + 𝝎𝑘 𝑛,𝑙 (14) 𝑛,𝑙 is a nonlinear function relating the target state and the measurement. 𝝎𝑘 where 𝒉𝑘 Gaussian measurement noise vector whose covariance is 𝑅𝑘 simplifying the measurement contribution given in [4], 𝐽𝑍,𝑘+1 𝑛,𝑙 𝑛,𝑙 is a zero-mean 𝑛,𝑙. By expanding the discussion about can be expressed as 𝑛,𝑙 = (𝐻𝑘+1 𝑛,𝑙 ) 𝐽𝑍,𝑘+1 𝑇 −1 𝑛,𝑙 ) (𝑅𝑘+1 (𝐻𝑘+1 𝑛,𝑙 ) (15) Since the sensors have independent measurement processes, the measurement contribution 𝐽𝑍,𝑘+1 can be written as 𝑙 𝑙 𝐽𝑍,𝑘+1 𝑛 = ∑ 𝑛,𝑙 𝑁 𝐽𝑍,𝑘+1 𝑛=1 𝑙 ≠ 0 and 𝑤𝑘+1 for 𝑙 ∈ 𝕋𝑘+1 (16) 𝑙 denotes the measurement contribution to the FIM of tracking the target 𝑙. We adopted where 𝐽𝑍,𝑘+1 a weight vector 𝒘 to contain tracking priority on each target. For example, 𝒘𝑘 = [2,1,1,0] if an operator attempts to track the first three targets with higher priority on the first target. If a sensor is tracking the fourth target, the information of the fourth target will be ignored. It is important to make the sensor management algorithm predictive because it needs sufficient time to plan and make the deployment. Therefore, if we perform the optimization at time 𝑘, it is necessary to predict the FIM in the subsequent sampling times 𝑘 + 1, … for determining the configuration and the time of the next deployment. Given the FIM 𝐽𝑘 at time 𝑘, we can determine the predictive FIM 𝐽𝑘+𝑟 at each time 𝑘 + 𝑟, 𝑟 = 1,2, … by using the Riccati-like recursion, (13). 3.2. Performance Score 6 of 18 In this section, two kinds of scores are introduced. One is a measure of the amount of information of a certain target the fusion sensor gathers, called 'information score'. The other, called 'performance score', is a measure of the performance of a certain sensor to track the targets assigned to the sensor. Note that the optimization problem in this paper is formulated as a minimization problem, so that the lower score implies better performance. 3.2.1. Information of Each Target Given the FIM, denoted as 𝐽𝑘+𝑟 𝑙 , for tracking the target l at time 𝑘 + 𝑟, the information score for the target position can be defined by using the D-optimality criterion as 𝑙 where Ψ𝑘+𝑟 as 𝑙 = − 𝑙𝑛 𝑑𝑒𝑡(Ψ𝑘+𝑟 𝑐𝑘+𝑟 𝑙 ) (17) is a FIM for target position estimation taken as the first 3 × 3 elements in the FIM 𝐽𝑘+𝑟 𝑙 𝑙 = [ 𝐽𝑘+𝑟 𝑙 Ψ𝑘+𝑟 𝐽21 𝐽12 𝐽22 ] (18) and 𝐽12, 𝐽21, 𝐽22 are 3 × 3 matrices. The D-optimality criterion is based on the determinant of the FIM, which corresponds to the volume of the uncertainty ellipsoid. In addition to this, common criteria for optimal observation can be found in various literature [15, 16]. The individual information score 𝑐𝑘+𝑟 is used in determining the time for the new deployment. 𝑙 3.2.2. Performance of Each Sensor In target state estimation, a general goal is to minimize the target position estimation error. In tracking multiple targets, we are interested in maximizing overall performance of each sensor for tracking targets assigned to it. The performance score will be used in determining both configurations of the new deployment and the guidance command to track the moving targets in an optimal way. The cost function describing the tracking performance is defined based on the measurement contribution to the FIM 𝐽𝑍,𝑘+1 and the observation matrix is calculated as 𝐻𝑘+1 where the state for the FIM is taken as the sensor state 𝑿𝑘+1 𝑛,𝑙 = 𝜕𝒉𝑘+1 𝑛,𝑙 𝜕𝑿𝑘+1 𝑛,𝑙 ⁄ . 𝑛 𝑛 The tracking performance score of the 𝑛th sensor at time 𝑘 + 1 is defined as 𝑛 𝑠𝑍,𝑘+1 where = ∑ 𝑐𝑍,𝑘+1 𝐿 𝑙=1 𝑛,𝑙 𝑙 𝑤𝑘+1 for 𝑙 ∈ 𝕋𝑘+1 𝑛 (19) 𝑛,𝑙 = − ln det(Ψ𝑍,𝑘+1 𝑐𝑍,𝑘+1 𝑛,𝑙 ) (20) 𝑛,𝑙 and Ψ𝑍,𝑘+1 denotes the measurement contribution to the FIM of the senor n estimating the position of the target l at time 𝑘 + 1. Note that, because the measurements have no observability in velocity, 𝐻𝑘+1 has zero columns as (7) and the measurement contribution to the FIM has a form of 𝑛,𝑙 = 𝜕𝒉𝑘+1 𝑛,𝑙 𝜕𝑿𝑘+1 ⁄ 𝑛 𝑛,𝑙 = (𝐻𝑘+1 𝑛,𝑙 ) 𝐽𝑍,𝑘+1 𝑇 −1 𝑛,𝑙 ) (𝑅𝑘+1 𝑛,𝑙 ) = [ (𝐻𝑘+1 𝑛,𝑙 Ψ𝑍,𝑘+1 03×3 03×3 03×3 ] (21) The performance score of the sensor 𝑛, (19), is a function of the sensor position and formulated as a weighted sum of the performance scores of the sensor 𝑛 to track the target 𝑙, denoted as 𝑐𝑍,𝑘+1 . The information of the target whose weight is 0 is discarded. Only the measurement contribution term of (13) is used in defining the cost function because the information affected by the system model is independent of the sensor configuration. Note that as the determinant of the FIM becomes larger, 𝑛,𝑙 7 of 18 the performance scores, (17) and (19), become lower. Thus, the global minimum of (19) is the optimal position of the sensor. 3.2.3. Convexity of the Performance Score Before solving the optimization problem of target tracking, the convexity of the cost function has to be supported by theory. This subsection is dedicated to prove that the performance score of target tracking, 𝑠𝑍,𝑘+1 , is convex. The definitions and theorems introduced in the following paragraphs are adopted from the literature [17-20] and some notations are adjusted according to the conventions of this paper. 𝑛 Definition 1 (Convex set [18]). Let 𝕊 be a subset of ℝ𝑛. We say that 𝕊 is a convex set if 𝛼𝒙 + (1 − 𝛼)𝒚 ∈ 𝕊, 𝑓𝑜𝑟 𝑎𝑙𝑙 𝒙, 𝒚 ∈ 𝕊 𝑎𝑛𝑑 𝛼 ∈ [0, 1]. Definition 2 (Convex function). A function 𝑓 ∶ 𝕊 ⟼ ℝ is called convex over a convex set 𝕊 if 𝑓(𝛼𝒙 + (1 − 𝛼)𝒚) ≤ 𝛼𝑓(𝒙) + (1 − 𝛼)𝑓(𝒚), 𝑓𝑜𝑟 𝑎𝑙𝑙 𝒙, 𝒚 ∈ 𝕊 𝑎𝑛𝑑 𝛼 ∈ [0, 1]. defining the performance of target tracking has its domain, 𝕊, as a set of 𝑛 ∈ 𝕊 = ℝ3. The set 𝕊 is a convex set, and we need to prove the 𝑛 The cost function 𝑠𝑍,𝑘+1 positions of the sensor n, i.e., 𝒑𝑘+1 function 𝑠𝑍,𝑘+1 𝑛 ∶ 𝕊 ⟼ ℝ is convex over 𝕊. 𝑛,𝑙 Firstly, let us deal with the function 𝑐𝑍,𝑘+1 ∶ 𝕊 ⟼ ℝ defined in (20). It has been proved that the D-optimality criterion is convex in general as described in the following theorem. Theorem 1 (Convexity of the D-optimality criterion [20]). The function Λ ∶ Ψ ⟼ − ln det(Ψ) is convex if Ψ is positive semi-definite and strictly convex if Ψ is positive definite. Therefore, it indicates that the function 𝑐𝑍,𝑘+1 𝑛 tracking the target 𝑙 , denoted as Ψ𝑍,𝑘+1 definiteness is introduced below. 𝑛,𝑙 𝑛,𝑙 is convex if the FIM of the observation by the sensor , is positive semi-definite. The definition of positive Definition 3 (Positive definite [17]). A matrix Ψ is positive definite if 𝒂𝑇Ψ𝒂 > 0, and positive semi-definite if 𝒂𝑇Ψ𝒂 ≥ 0 for all 𝒂 ≠ 0. Define 𝑛,𝑙 = [ 𝐻𝑘+1 𝜕𝒉𝑘+1 𝑛 𝑛,𝑙 (𝒑𝑘+1 𝑛 ) 𝜕𝒑𝑘+1 0] = [ 𝑇 𝒉1 ⋮ 𝑇 𝒉𝑚 01×3 ⋮ ] (22) 01×3 where 𝒉𝑖 are 3 × 1 vectors where 𝑖 = 1, … , 𝑚 and 𝑚 is the number of measurements of the sensor 𝑛. Consequently, the measurement contribution to the target position can be expressed as 𝑛,𝑙 = ∑ 𝜎𝑖 Ψ𝑍,𝑘+1 𝑚 𝑖=1 −2𝒉𝑖 𝑇𝒉𝑖 (23) Choose any 3 × 1 vector 𝒂 ∈ ℝ3, 𝒂 ≠ 𝟎, and multiply both sides of Ψ𝑍,𝑘+1 𝑛,𝑙 by 𝒂 as 𝒂𝑇Ψ𝑍,𝑘+1 𝑛,𝑙 𝒂 = ∑ 𝜎𝑖 𝑚 𝑖=1 −2(𝒂𝑇𝒉𝑖)2 ≥ 0 (24) Therefore, Ψ𝑍,𝑘+1 𝑛,𝑙 is positive semi-definite, and we can conclude 𝑐𝑍,𝑘+1 𝑛,𝑙 is convex. By expending the above discussion, it can be shown that the Fisher information matrix is positive semi-definite in general. If Ψ𝑍,𝑘+1 exist a 𝒂 ∈ ℝ3, 𝒂 ≠ 𝟎 such that 𝒂𝑇𝒉𝑖 = 0. Then, 𝜎𝑖 𝑛,𝑙 is full-rank, besides, null ((Ψ𝑍,𝑘+1 𝑛,𝑙 𝑇 ) −2(𝒂𝑇𝒉𝑖)2 > 0 and Ψ𝑍,𝑘+1 ) = ∅. Thus, there does not 𝑛,𝑙 is positive definite. 8 of 18 Lemma 1 (Operation that preserves convexity [19]). If 𝑓1, … , 𝑓𝑚 ∶ 𝕊 ⟼ ℝ are convex, then the following function is convex as well. 𝑋 ⟼ 𝛼1𝑓1(𝑋) + ⋯ + 𝛼𝑚𝑓𝑚(𝑋) for 𝛼1, … , 𝛼𝑚 ≥ 0 𝑛,𝑙 The performance score of the sensor 𝑛, 𝑠𝑍,𝑘+1 shown in (19). Therefore, 𝑠𝑍,𝑘+1 𝑛 𝑠𝑍,𝑘+1 is also a global minimum. 𝑛 𝑛 as is convex as well. It is concluded that there is a local minimum of , is calculated by a convex combination of 𝑐𝑍,𝑘+1 4. Multisensor Management Algorithm The proposed algorithm is described as a block diagram in Fig. 1. A cycle of the loop is executed every time a new measurement is arrived. The first and second steps, estimating target states and calculating the individual information score, are described in section 2 and 3 in detail. In this section, how to determine the configuration of the new sensor and how to guide the deployed sensors will be addressed. Given estimated target states, if any target exists where the information score of the target 𝑙 > 𝑆1, the fusion center prepare a new sensor deployment is larger than a prespecified value, i.e., 𝑐𝑘+𝑟 as follows. Figure 1. Block diagram of the proposed multisensor management algorithm. 4.1. Determining the Configuration of New Deployment The configuration of the deployment means the location of the new sensor and the set of targets to be tracked by the sensor. For L targets, there are possible 2𝐿 − 1 target groups. The number of the candidates can be reduced by selecting the candidate groups which contains the target 𝑙− whose 𝑙− information has been considered insufficient, i.e., 𝑐𝑘+𝑟 > 𝑆1. Also, the target groups whose size is larger than a prespecified value 𝑉 are discarded. The maximum number of targets, 𝑉, reflects the limitation in processing power of sensor systems. Therefore, for each candidate of the target group 𝑁+1,𝑖 and the 𝑁+1,𝑖 ∈ {𝕋𝑘+𝑟 𝕋𝑘+𝑟 corresponding sensor position are determined by solving an optimization problem. The candidate 𝑁+1,𝑖 is identified as the target group to be tracked if the best score of the configuration target group 𝕋𝑘+𝑟 has the largest value among all the candidates. The algorithm for determining the new configuration is as follows. 𝑁+1,𝑖 ≤ 𝑉} where 𝑖 = 1, … , 2𝐿 − 1, the best score 𝑠𝑍,𝑘+𝑟 𝑁+1,𝑖 𝑙− ∈ 𝕋𝑘+𝑟 𝑁+1,𝑖 and 𝕋𝑘+𝑟 9 of 18 Algorithm 1 (Configuration of new deployment). Get a set of candidate target groups: 𝑁+1,𝑖 and 𝕋𝑘+𝑟 𝑁+1,𝑖 𝑙− ∈ 𝕋𝑘+𝑟 𝑁+1,𝑖 ≤ 𝑉} {𝕋𝑘+𝑟 𝑁+1,𝑖, Set the best score 𝑠∗ = ∞ For each 𝕋𝑘+𝑟 Solve Problem 1: ∗ 𝑁+1,𝑖) Get the best score (𝑠𝑍,𝑘+𝑟 , 𝑁+1,𝑖) and the sensor position (𝒑𝑘+𝑟 } , 𝒑∗ = arg 𝑠∗ ∗ ∗ 𝑁+1,𝑖) 𝑠∗ = min {𝑠∗, (𝑠𝑍,𝑘+𝑟 Deploy a new sensor at 𝒑∗ 𝑁 = 𝑁 + 1 END ∗ 𝑁+1,𝑖) = arg(𝑠𝑍,𝑘+𝑟 The convex optimization problem is defined as follows. Problem 1 (Best sensor position). minimize 𝑠𝑍,𝑘+𝑟 subject to 𝒑𝑘+𝑟 𝑁+1,𝑖) 𝑁+1,𝑖(𝒑𝑘+𝑟 𝑁+1,𝑖 ∈ 𝑃𝑘+𝑟 𝑁+1,𝑖 𝑁+1,𝑖 is defined as a set of sensor positions which satisfy the constraints specified in (10). 𝑃𝑘+𝑟 We solve Problem 1 using the conditional gradient method [18], also known as Frank-Wolfe method. The formulation for solving the optimization problem regarding a cost function 𝑠 which is a function of a position 𝒑 is given as follows. In order to generate a feasible direction 𝒑𝑗 − 𝒑𝑗 that satisfies the descent condition ∇𝑠(𝒑𝑗) ∙ (𝒑𝑗 − 𝒑𝑗) < 0, we use the method 𝒑𝑗+1 = 𝒑𝑗 + 𝛼 𝑗(𝒑𝑗 − 𝒑𝑗) (25) which is to solve the optimization problem minimize ∇𝑠(𝒑𝑗) ∙ (𝒑 − 𝒑𝑗) subject to 𝒑 ∈ 𝑃 (26) where 𝛼 𝑗 ∈ (0,1] is the stepsize which can be determined by some rules or set as a constant. Obtain 𝒑𝑗 as the solution, that is, 𝒑𝑗 = arg min 𝒑∈𝑃 ∇𝑠(𝒑𝑗) ∙ (𝒑 − 𝒑𝑗) (27) 𝑁+1,𝑖 at the 𝑗th iteration of the For Problem 1, 𝒑𝑗 in the above equations denotes sensor position 𝒑𝑘+𝑟 optimization, and 𝑠(𝒑) denotes the cost function of tracking performance. 𝒑 is a point of 𝑃 that lies furthest along the negative gradient direction −∇𝑠(𝒑) . Because the subproblem, (26), is to minimize the linear approximation of the problem and 𝑃 is specified by linear constraints, it is a linear program, which is relatively easy to solve. A corollary to Jacobi's formula [21] states that for any invertible matrix Ψ, 𝜕 𝜕𝑡 ln det Ψ(𝑡) = tr (Ψ−1 𝜕 𝜕𝑡 Ψ) (28) where tr(∙) denotes the trace of a matrix. Thus, the gradient of 𝑐𝑛,𝑙 = − ln det Ψ𝑛,𝑙 can be expressed as ∇𝑐𝑛,𝑙 = [ 𝜕𝑐𝑛,𝑙 𝜕𝒑𝑛 ] = − [tr (Ψ−1 𝜕 𝜕𝑥 Ψ) tr (Ψ−1 𝜕 𝜕𝑦 Ψ) tr (Ψ−1 𝜕 𝜕𝑧 Ψ)] (29) 10 of 18 The gradient of the tracking performance ∇𝑠𝑛 is then obtained as a linear combination of ∇𝑐𝑛,𝑙 as ∇𝑠𝑛 = ∑ 𝑤𝑙 𝐿 𝑙=1 ∇𝑐𝑛,𝑙 for 𝑙 ∈ 𝕋𝑛 (30) following the definition of 𝑠𝑛, given in (19). 4.2. Guidance of the Deployed Sensors Since the positions of the targets are changing, the performance of tracking the targets is changing too. An optimal position for tracking a group of targets at a time step will no longer be the best position in next time step. Thus, the fusion center needs to determine the next position of the sensors to chase the moving targets every time the target state is estimated. It is essentially an optimization problem similar to the discussion of the previous subsection. An intuitive way to generate commands to the sensors is to solve the optimization problem and take the solution as the position command as follows. Algorithm 2.1 (Guidance of sensors). For each deployed sensor 𝑛, Solve the following convex optimization problem: 𝑛 𝑛 Take the solution (𝒑𝑘+1 minimize 𝑠𝑍,𝑘+1 subject to 𝒑𝑘+1 (𝒑𝑘+1 ) 𝑛 𝑛 ∈ 𝑃𝑘+1 )∗ as the position command to the sensor 𝑛 END The algorithm given above seems straightforward. It can be solved by the conditional gradient method addressed in (25-27). However, one can imagine that it will take time for the unmanned aircraft to reach the input position. When the targets are not stationary, the optimal position for the sensor is not stationary as well. Thus, the optimal position should be calculated at every time when new measurements are available. Moreover, executing Algorithm 2.1, i.e., solving N nonlinear optimization problems, requires high computational power. An alternative to Algorithm 2.1 is proposed as follows. Algorithm 2.2 (Guidance of sensors - proposed). For each deployed sensor n, Solve the following linear optimization problem: 𝑛 minimize ∇𝑠𝑍,𝑘+1 subject to 𝒑𝑛 ∈ 𝑃𝑛 𝑛 (𝒑𝑘+1 ) ∙ (𝒑𝑛 − 𝒑𝑘+1 𝑛 ) Take the solution 𝒑𝑛 as the position command to the sensor END Note that the linear optimization problem in Algorithm 2.2 is the subproblem of the optimization problem in Algorithm 2.1, revisited as minimize 𝑠𝑍,𝑘+1 subject to 𝒑𝑘+1 (𝒑𝑘+1 ) 𝑛 ∈ 𝑃𝑘+1 𝑛 𝑛 𝑛 (31) Each iteration of the conditional gradient method is executed at every time step for Algorithm 2.2. , is supposed to move toward the furthest feasible point 𝒑𝑛. The sensor, which is currently at 𝒑𝑘+1 The conditional gradient method is still valid even if the sensor couldn't reach the point 𝒑𝑛 at the 𝑛 + next time step. Moving in the feasible direction, each sensor will be positioned at 𝒑𝑘+2 𝛼𝑘+1(𝒑𝑛 − 𝒑𝑘+1 ) where 𝛼𝑘+1 ∈ (0,1]. This way, the sensors always can be at feasible points which are the current best positions, requiring less computation because the algorithm is to solve a set of 𝑛 = 𝒑𝑘+1 𝑛 𝑛 11 of 18 linear programming. Moving along the shortest path to the optimal position, by Algorithm 2.1, would take the minimum time to arrive. However, the points on the shortest path are not guaranteed feasible, so that the sensor may fail to track some targets when moving on the way to the optimal position. The graphical illustration of the guidance algorithms is given in Fig. 2. Given a configuration of the target tracking of a sensor, the performance score can be plotted as a function of the sensor position. For simplicity, the performance score is presented as a function of x-y coordinates. At the bottom of the graph is the contour of the performance score. The solid line and dashed line denote the paths of the sensor guided by Algorithm 2.2 and Algorithm 2.1, respectively. As the dashed arrow shows, Algorithm 2.1 directs the sensor to its optimal position and the sensor is taking the shortest path to its destination. However, sensing on some points on the way may provide the higher (worse) performance and there is a possibility that the sensor is on the infeasible point, at which some of the targets are out of the sensor's coverage. On the other hand, Algorithm 2.2 directs the sensor in the feasible direction at each time step, and finally to the optimal sensor position. Figure 2. Graphical illustration of the guidance algorithms. 5. Simulation We simulated the problem of tracking ground targets by sensors equipped on multiple unmanned aircraft. There are 5 unmanned aircraft and 10 targets, i.e., 𝑁𝑚𝑎𝑥 = 5 and 𝐿 = 10. Fig. 3 shows the targets at their initial positions. The squares denote the targets and their numbers are presented at the upper right side of the squares. The squares drawn with a thinner line denote the targets that the operator attempts not to track. The maximum number of targets a sensor can track is set 𝑉 = 4 and the operator attempts not to track the targets 3, 4, 5, i.e., 𝒘 = [1, 1, 0, 0, 0, 1, 1, 1, 1, 1]. The sensors are not allowed to be below 500 𝑚, i.e., 𝐻𝑚𝑖𝑛 = 500 𝑚. It is assumed that the new deployment is available 5 seconds after the last deployment. The time for the new deployment is determined as the time when the information score is larger than 𝑆1 = 4. The initial information score 𝑙 = is 𝑐0 𝑙 = diag([1, 1, 1]) diag([1, 1, 1, 0.25, 0.25, 0.25]) and therefore the position part of the FIM becomes Ψ0 𝑙)−1. The information score will increase as the time passes if no sensor is tracking the where 𝐽0 𝑙] = target until the score meets 𝑆1 . The standard deviation of accelerometer noise is [𝜎𝑥 [0.1, 0.1, 0.1] 𝑚/𝑠2 and the measurement is assumed to be corrupted by the noise with the standard deviation of [𝜎𝐴𝑧 𝑙 = 0 for each target 𝑙 = 1, … , 𝐿 since the initial covariance matrix for target state is set as 𝑃0 𝑛] = [0.007 𝑟𝑎𝑑, 0.007 𝑟𝑎𝑑, 0.05 𝑚]. 𝑛 , 𝜎𝐸𝑙 𝑛 , 𝜎𝑅 𝑙, 𝜎𝑦 𝑙 , 𝜎𝑧 𝑙 = (𝑃0 12 of 18 Figure 3. The initial configuration of the targets. 5.1. Stationary Targets, no Guidance Firstly, let's see how the management algorithm works in the cases with stationary targets. In the first case, the guidance algorithm (Algorithm 2.2) will not be executed after the configuration of the new sensor is determined by Algorithm 1. Thus, the deployed sensors will remain stationary at their optimal position. Fig. 4 shows the time history of information about each target. Note that lower value of the information score means better tracking performance. The dashed lines denote the threshold set by the operator. If the information score meets the threshold, the fusion center deploys the new sensor. The fusion sensor predicted that the information of the target 1 will be insufficient at 𝑡 = 7.85 𝑠, and consequently the first sensor was deployed at 𝒑𝑛=1 = [−149, 358, 1105]𝑇 𝑚 to track the targets {1, 7, 8, 9} from that time on. It can be observed that the information score of the targets being tracked has decreased after the deployment. That is, the Algorithm 1 determined that the configuration provides the best target tracking performance score. The next deployment was occurred at 𝑡 = 12.85 𝑠. As a result, the final target groups 𝕋𝑓 for all sensors can be expressed as an 𝑁 × 𝐿 matrix as 𝕋𝑓 = [ 1 0 0 0 0 0 1 1 1 0 0 1 0 0 0 1 1 0 0 1 ] (32) where 1 in nth row and lth column in 𝕋𝑓 means that the target l is being tracked by the sensor n. The final configuration is shown in Fig. 5. 13 of 18 Figure 4. The time history of the information score of each target when the targets are stationary and the sensors are deployed at their optimal positions. Figure 5. The final locations of the targets and the deployed sensors for case 5.1. 5.2. Stationary Targets, with Guidance As the second case with the stationary targets, the sensors are deployed at the places that are not optimal for the tracking performance and they are supposed to track the targets assigned as 𝕋0 = [ 1 0 0 0 0 1 1 1 0 0 0 1 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 0 1 1 ] (33) 14 of 18 Throughout the simulation, the sensor movement is assumed as the first-order lag model whose speed is limited by 3 m/s for each axis. By executing the guidance algorithm (Algorithm 2.2), we observe the behavior of the sensors as Fig. 6. The sensors were directed to the optimal position and the performance score has the lower value as each sensor moves toward the optimal position as depicted in Fig. 7. Figure 6. The time history of the sensor positions drawn with their optimal positions when each sensor is deployed at a random position and guided by Algorithm 2.2. Figure 7. The time history of the performance score of each sensor guided by Algorithm 2.2 to track the stationary targets. 5.3. General Case 15 of 18 In this case, each target is moving independently with the speed of 0 -- 3 m/s. Initially, three sensors are assigned to track the targets as 𝕋0 = [ 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 ] (34) The fusion center executes Algorithm 1 (Configuration of new deployment) and Algorithm 2.2 (Guidance of sensors) as depicted in Fig. 1. The resultant information score of the targets are plotted against time as Fig. 8. It is observed that, at 𝑡 = 7.85 𝑠 , the information of the target 10 was considered insufficient and the targets {8, 9, 10} started being tracked by the newly deployed sensor 4. After the deployment, there was no target whose information score is larger than the threshold 𝑆1. The time history of performance score of each sensor is plotted in Fig. 9, compared with those in Algorithm 2.1 and with no guidance command. In the case with no guidance, the sensors are being stationary at their initial position. We observe that the performance scores of the sensors are increasing as the time passes when no guidance algorithm is executed while the sensors guided by Algorithm 2.1 or Algorithm 2.2 provide better (lower) performance scores. Note that Algorithm 2.2 gives better performance than Algorithm 2.1 which solves the optimization problem for the performance score of a sensor and takes the optimal solution as the guidance command. When the targets are moving, the optimal position to track the targets is changing and the sensors may not make it to the optimal position at next time steps. Instead, the sensors guided by Algorithm 2.2 move in the furthest feasible direction and achieve the current best performance score. This tendency is same for the most cases in the simulations except the cases with stationary targets. When the targets are stationary, Algorithm 2.1 shows the better performance since Algorithm 2.1 guides each sensors directly to the (fixed) optimal position and the sensor takes the shortest path to its destination. Furthermore, Algorithm 2.1 requires much more computation time than Algorithm 2.2. It is obvious since Algorithm 2.1 is supposed to iteratively solve its subproblem (31) which is same to Algorithm 2.2 itself. Thus, the required computation time is proportional to the number of iterations in Algorithm 2.1. In the simulation, the average computation time of executing Algorithm 2.1 was 74 times longer than that of executing Algorithm 2.2 that implies that the average number of iterations in Algorithm 2.1 was about 74. 16 of 18 Figure 8. The time history of the information score of each target when the targets are moving and the sensors are deployed at their optimal positions. Figure 9. The performance scores of the sensors resulted in being guided by Algorithm 2.2 (solid line), Algorithm 2.1 (dashed line) are plotted against time, with the results with no guidance command (dotted line). 6. Conclusion 17 of 18 This paper proposed a framework for airborne multisensor management for target tracking. The performance metric was newly defined and its convexity was proved. The convex optimization was used in determining the configuration of the new sensor deployment as well as in the guidance of the deployed sensors to improve their target tracking performance. In providing optimal position to each sensor, an intuitive way that directs the sensor to its optimal position by solving the nonlinear optimization problem did not perform well as the targets are moving. Instead, we proposed an algorithm that provides the negative gradient of the cost function by solving the subproblem of the nonlinear optimization problem. The simulation result showed that the proposed algorithm obtained better performance score requiring much less computation time. In conclusion, the proposed framework addressed in this paper is a powerful tool that allows the efficient management of the unmanned aircraft as sensors. References [1] N. Xiong and P. Svensson, "Multi-sensor management for information fusion: issues and approaches," Information Fusion, vol. 3, no. 2, pp. 163-186, 6// 2002. [2] G. W. Ng and K. H. Ng, "Sensor management -- what, why and how," Information Fusion, vol. 1, no. 2, pp. 67-75, 2000. [3] K. A. Tarabanis, P. K. Allen, and R. Y. Tsai, "A survey of sensor planning in computer vision," IEEE transactions on Robotics and Automation, vol. 11, no. 1, pp. 86-104, 1995. [4] M. Hernandez, T. Kirubarajan, and Y. Bar-Shalom, "Multisensor resource deployment using posterior Cramér-Rao bounds," IEEE Transactions on Aerospace and Electronic Systems, vol. 40, no. 2, pp. 399- 416, 2004. [5] D. E. Penny, "Sensor management in an ASW data fusion system," in Sensor Fusion: Architectures, Algorithms, and Applications III, 1999, vol. 3719, pp. 418-430: International Society for Optics and Photonics. [6] R. Tharmarasa, T. Kirubarajan, M. L. Hernandez, and A. Sinha, "PCRLB-based multisensor array management for multitarget tracking," IEEE Transactions on Aerospace and Electronic Systems, vol. 43, no. 2, pp. 539-555, 2007. [7] R. Tharmarasa, T. Kirubarajan, A. Sinha, and T. Lang, "Decentralized Sensor Selection for Large-Scale Multisensor-Multitarget Tracking," IEEE Transactions on Aerospace and Electronic Systems, vol. 47, no. 2, pp. 1307-1324, 2011. [8] P. Tichavsky, C. H. Muravchik, and A. Nehorai, "Posterior Cramér-Rao bounds for discrete-time nonlinear filtering," IEEE Transactions on signal processing, vol. 46, no. 5, pp. 1386-1396, 1998. [9] B. Ristic and M. S. Arulampalam, "Tracking a manoeuvring target using angle-only measurements: algorithms and performance," Signal processing, vol. 83, no. 6, pp. 1223-1238, 2003. [10] Y. Kim and H. Bang, "Airborne multisensor management for multitarget tracking," in Unmanned Aircraft Systems (ICUAS), 2015 International Conference on, 2015, pp. 751-756: IEEE. [11] Y. Kim, W. Jung, and H. Bang, "Real-time path planning to dispatch a mobile sensor into an operational area," Information Fusion, vol. 45, pp. 27-37, 2019. [12] J. Hong, Y. Kim, and H. Bang, "Cooperative circular pattern target tracking using navigation function," Aerospace Science and Technology, vol. 76, pp. 105-111, 2018. [13] X. R. Li and V. P. Jilkov, "Survey of maneuvering target tracking. Part I. Dynamic models," IEEE Transactions on aerospace and electronic systems, vol. 39, no. 4, pp. 1333-1364, 2003. 18 of 18 [14] D. Willner, C. Chang, and K. Dunn, "Kalman filter algorithms for a multi-sensor system," in Decision and Control including the 15th Symposium on Adaptive Processes, 1976 IEEE Conference on, 1976, vol. 15, pp. 570-574: IEEE. [15] M. Patan, Optimal observation strategies for parameter estimation of distributed systems. University Press Zielona Góra, 2004. [16] S. S. Ponda, R. M. Kolacinski, and E. Frazzoli, "Trajectory optimization for target localization using small unmanned aerial vehicles," Master's thesis, Massachusetts Institute of Technology, Cambridge, MA, 2009. [17] D. Ucinski, Optimal measurement methods for distributed parameter system identification. CRC Press, 2004. [18] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, 1999. [19] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge university press, 2004. [20] A. Pázman, Foundations of optimum experimental design. Springer, 1986. [21] J. R. Magnus and H. Neudecker, "Matrix differential calculus with applications in statistics and econometrics," 1995.
1705.06130
1
1705
2017-05-13T14:16:56
Stability and Performance of Coalitions of Prosumers Through Diversification in the Smart Grid
[ "cs.MA", "cs.SI", "eess.SY" ]
Achieving a successful energetic transition through a smarter and greener electricity grid is a major goal for the 21st century. It is assumed that such smart grids will be characterized by bidirectional electricity flows coupled with the use of small renewable generators and a proper efficient information system. All these bricks might enable end users to take part in the grid stability by injecting power, or by shaping their consumption against financial compensation. In this paper, we propose an algorithm that forms coalitions of agents, called prosumers, that both produce and consume. It is designed to be used by aggregators that aim at selling the aggregated surplus of production of the prosumers they control. We rely on real weather data sampled across stations of a given territory in order to simulate realistic production and consumption patterns for each prosumer. This approach enables us to capture geographical correlations among the agents while preserving the diversity due to different behaviors. As aggregators are bound to the grid operator by a contract, they seek to maximize their offer while minimizing their risk. The proposed graph based algorithm takes the underlying correlation structure of the agents into account and outputs coalitions with both high productivity and low variability. We show then that the resulting diversified coalitions are able to generate higher benefits on a constrained energy market, and are more resilient to random failures of the agents.
cs.MA
cs
Stability and Performance of Coalitions of Prosumers Through Diversification in the Smart Grid Nicolas Gensollen, Vincent Gauthier, Monique Becker and Michel Marot CNRS UMR 5157 SAMOVAR, Telecom SudParis/Institut Mines Telecom Email: {nicolas.gensollen, vincent.gauthier, michel.marot, monique.becker}@telecom-sudparis.eu 7 1 0 2 y a M 3 1 ] A M . s c [ 1 v 0 3 1 6 0 . 5 0 7 1 : v i X r a Abstract-Achieving a successful energetic transition through a smarter and greener electricity grid is a major goal for the 21st century. It is assumed that such smart grids will be characterized by bidirectional electricity flows coupled with the use of small renewable generators and a proper efficient information system. All these bricks might enable end users to take part in the grid stability by injecting power, or by shaping their consumption against financial compensation. In this paper, we propose an algorithm that forms coalitions of agents, called prosumers, that both produce and consume. It is designed to be used by aggregators that aim at selling the aggregated surplus of production of the prosumers they control. We rely on real weather data sampled across stations of a given territory in order to simulate realistic production and consumption patterns for each prosumer. This approach enables us to capture geographical correlations among the agents while preserving the diversity due to different behaviors. As aggregators are bound to the grid operator by a contract, they seek to maximize their offer while minimizing their risk. The proposed graph based algorithm takes the underlying correlation structure of the agents into account and outputs coalitions with both high productivity and low variability. We show then that the resulting diversified coalitions are able to generate higher benefits on a constrained energy market, and are more resilient to random failures of the agents. I. INTRODUCTION Designing stable power systems is a classical engineering challenge since blackouts can have catastrophic consequences. One obvious condition for stability revolves around sustaining at any time a power generation that meets the demand. If one is larger than the other, the system deviates from its synchronous state. If nothing is done to return to the synchro- nized equilibrium, this can lead to catastrophic cascades of failures [1] [2]. With traditional power plants based on fossil energies, the production can be scheduled in order to sustain the predicted consumption. Deviations from this schedule can then be supported almost on real time by using fast response power plants, interconnections with border countries, as well as regulator entities. Even if most individual consumers may not realize it, the electricity prices are not constant rates and evolve with the production/consumption conditions on the grid. It is often assumed that the granularity of these prices is meant to increase in the future as a way to pass on the production conditions on the end users [3]. The pricing of electricity and the necessity for the grid operator to have different emergency reserves lead to an economy setting for electricity, where operations and various kind of contracts are decided on a market [4]. Such a market environment clearly necessitates communication in order to monitor and obtain information from the grid as well as exchange between participants. These kind of settings are already being used at the transport level of current power grid with large renewable plants in the production portfolio. Using electricity markets appears thus as a way to manage the reliability of the whole system, especially when the use of renewables is important. The smart grid vision however goes further and revolu- tionizes this top-down centralized architecture by assuming that bidirectional power flows are allowed. This would change completely the nature of the traditional grid since production could be located down to the very end of the distribution networks. Nodes that were simply pure loads yesterday could behave tomorrow as generators or loads [5]. On the other hand, the user of renewables in the production is continuously growing, and is expected to become majority in a near future. These plants completely rely on the presence and the intensity of their respective resources (wind, sun, tiles...). Balancing production and demand in such a scenario appears much more challenging and it seems inevitable that the grid should modernize its infrastructures to sustain this transition [4]. The key to drive safely such a system is assumed to be information, and more precisely, the capacity to measure, communicate, and analyze data on real time. in cases when it In this paper, we focus on these "nodes" in the distribution network that can produce and consume electricity. More precisely, we consider a set of agents that own both renewable distributed energy resources (DER) and electrical loads. The production of an agent can be, of course, used to meet its own demand, but is over-producing, we consider that it has the possibility to inject, against financial compensation, its extra-production in the grid. Such an agent is known as a "prosumer" [6] (and will be called model accordingly in this paper). A key point of this work is to merge the interests of the grid operator with the prosumers in a single utility function. While the latter intend to maximize their benefits with higher production contracts, the operator primary concerns are related to the quality and stability of the injections. The coalitions that we wish to form should thus be both stable and productive. This compromise can be difficult to obtain in real situations, especially when renewable generation and complex spatiotemporal correlation happen. More precisely, in our model, any entity that wishes to sell its production on some energy market has to estimate and announce a production capacity for an upcoming period of time. If a contract is bought, the entity commits to injecting exactly, at any time of the contracted period, the announced amount of power, under financial penalties if it fails. Since pro- sumers use exclusively renewables, contracts come naturally with some amount of risk due to the intermittent nature of most renewables. Using storage as buffers in order to reduce risks is a popular approach. Actually, a whole branch of the smart grid literature is even studying the possibility to use electric vehicles as moving storage capacities for stabilizing the grid. Without storage and proper control, the over-producing state of the agents, and thus the power they inject in the grid, might be rather unstable. This is clearly unacceptable for the grid operator that cannot ensure system stability if it has to deal with numerous small unpredictable entities. Forming coalitions/aggregations is an envisaged solution to both the number of entities soliciting the operator, and their high variability. Indeed, it has been argued that using a multi- level aggregators architecture for the control could lead to better performance on the communication side [7], since an ag- gregator can be considered as a single node by the level above it. On the other hand, it is well-known that diversification of the assets is a way of minimizing risks when constructing a portfolio. One thus expect a more stable and predictable energy production for a coalition than for a single agent. Nevertheless, all coalitions are obviously not equally stable or productive, which means that special attention should be paid to the aggregation step. Recall that prosumers have both a consumption and a production component, each depending on location and time, meaning that there are complex underlying correlations between the agents. This is a central topic of the present paper : given N prosumers, what coalitions should be formed so that the compromise between expected production and variability is optimized ? We will see that the variability in the aggregated produc- tions can be quantified to a certain extent by the correlation among the agents forming the coalitions. Understanding the correlation relationships among the agents can thus give an indication about what coalitions to form and how much they should sell. More precisely, we use a graph representation of the correlation structure to gain insight about the expected production to risk ratios of different coalitions. We build a framework in which the system operator specifies both the minimum production acceptable to enter the market and restrain the amount of risk he is willing to take. We then propose a graph heuristic that uses decorrelated cliques in order to form diversified productive and stable coalitions, and we compare the results with other formation strategies (see section VII). Rather than maximizing the profit of each agent in the grid (prosumers and grid operator), our algorithm tries to form the most productive coalitions given a maximum amount of risk acceptable. In other words, it tries to maximize coalitions prof- its without considering individual retributions to single agents (a task often studied through game theory). Furthermore, the pricing strategies for both the prosumer and the grid is beyond the scope of this paper. Because agents are susceptible to fail for diverse reasons, the propensity of the system to undertake these failures is critical [8]. We therefore investigate in this paper the resilience of the coalitions when prosumers fail. Despite the fact that losing agents is usually detrimental to the coalitions, we will see that the coalitions formed with our algorithm tend to be less impacted by random failures. The paper is organized as follows, section II gives a brief overview of the related literature, section III clarifies how we generated realistic prosumer production traces based on weather data. In section IV, we define most of the notations and explain why correlation between prosumers is a quantity of interest for our objective. Based on the conclusions of sec- tion IV, we develop in section V a utility function quantifying how much power a coalition can announce on the market given an accepted risk level. We then develop, in section VI a greedy optimization algorithm that uses decorrelated cliques as inputs and improves their utility over a correlation-constrained environment. Finally, section VII provides some results both on performance of the method and resilience of the coalitions formed. II. RELATED WORK As explained in the section above, allowing entities using mainly renewables to inject power in the grid is a difficult challenge. Indeed, on the contrary to fossil plants whose production can be scheduled in advance to meet the expected consumption, renewables by definition only produce when the resource is present. Unfortunately, these moments do not necessarily coincide with the consumption peak hours [9]. One possible solution consists in shifting some of the loads towards high productivity periods. Demand side management techniques implemented in the end users' smart meters, can mitigate the consumption peaks and wast less production [9] [10]. Since end users tend to seek a maximum utility at a minimum cost, dynamic pricing is believed to be a good way to give incentives to them. By carefully scheduling the prices, it is assumed that the load curve can be shaped to some extend. Dynamic pricing is an interesting and useful tool, but it has also some limitations. It is likely that dynamic pricing will serve as a shaping mass tool while finer techniques will be needed locally. A popular approach in this direction consists in deploying storage devices in the network and using them as electricity buffers. Basically these storages would be charged when there is a surplus of production, and discharged when the consumption exceeds the production. Although quite simple, this idea causes numerous challenges when it comes to its real implementation. As long as the system considered remains small, a centralized control of these buffers could be envisioned. However, for real large systems it is likely that more sophisticated decentralized algorithms will be necessary. In [11], the authors introduce a distributed energy management system with a high use of renewables such that power is scheduled in a distributed fashion. In [12] the optimal storage 2 capacity problem is addressed. There is indeed an interesting trade-off between the costs of the equipments and the expected availability of power. The authors develop a framework that enables them to exhibit a Pareto front of efficient solutions. These are only a few possibilities for balancing production and demand in the smart grid. Most of the time, these techniques will be coupled with predictions of the upcoming load curves and weather conditions. Combining all these technologies enables aggregators to quantify their expected production and the inherent risk that comes with it. The optimization of expected returns to risk is a traditional goal in finance, and a wide literature exists on this topic. It is well-known for instance, that the more risk one is willing to take, the higher his potential gains. On the contrary, when investing exclusively on low risks assets, one should expect relatively small gains. This trade-off is formalized in the Markowitz' portfolio theory [13]. More precisely, given a set of assets for which we have some historic data of returns, the objective is to find a linear combination of these assets (the so-called portfolio) which maximizes the expected value while minimizing the variance of the portfolio's return. Markowitz's answer is a set of efficient portfolios that all optimize in some sense this trade-off. If one is able to put a number on his risk acceptance or on the target expected return, the corresponding efficient portfolio is a priori the best option. One of the most controversial assumptions in the portfolio theory is that returns are jointly normally distributed (or, at least, that the returns distribution is jointly elliptical). Some economist have pointed out the fact that this assumption might not capture well the reality of financial markets [14]. Nevertheless, one of the key point in the Markowitz theory is to consider explicitly the correlation between the assets since they impact directly the variances of the portfolios. Since the work of [15], an interesting approach consists in computing a distance metric based on the correlation coefficients in order to organize the series in a correlation graph. Nodes represent the series considered while the edges are weighted by the metric. Because the metric can be computed for all pairs, these graphs are complete and of little use as is. Historically, the approach used by [15] was to compute a minimum spanning tree as to obtain a hierarchical clustering of the series. Later on, it was pointed out that, by definition, a spanning tree could not capture the underlying clustering structure hidden in the correlation graph. In this paper, we use another classical filtering technique called -graph [16]. It consists in selecting a threshold , and filtering out edges with smaller weights. As we will see further in this paper, this approach has the advantage of preserving clusters of correlated series. III. GENERATING REALISTIC PROSUMER PATTERNS An essential component of the smart grid is the smart meter which makes the interface between the end user and the rest of the system. Smart meters coupled with sensors measure quantities of interest (like instantaneous consumption), receive informations from the grid (electricity prices for instance), and take actions accordingly (demand side management programs). Smart meters are currently and gradually deployed, and will 3 probably provide interesting datasets to work on. Unfortu- nately, at the time this paper was written, production and consumption data for prosumers over a large region were not yet available to our knowledge. Some interesting experiments are nonetheless being conducted and data are progressively made public [17]. In this paper, we use weather quantities like wind speed or solar radiance as alternative data for generating realistic production and consumption series. Fortunately, these kinds of data are easier to find, and since the development of small personal weather stations, their geographical granularity keeps increasing. Since these quantities depend both on time and location, we discretize time into slots and space into zones in the following. A zone is simply a portion of the considered region of study for which we sampled data. Therefore, if prosumers i and j are positioned on the same zone, they are exposed to the same weather. Adding some intra-zone noise can easily be done though not considered in this paper. More formally, we denote by Pi(t) the instantaneous extra- production of agent i at time t : Pi(t) = P P i (t) − P D i (t) (1) i (t) its consumption at Where P P time t and P D i (t) represents the total production of agent i at time t. In other words, Pi(t) represents the instantaneous surplus of power that agent i is willing to sell at time t. As explained above, since large datasets containing this quantity over time are not yet available, we simulated these traces by considering separately i and P D P P i For a prosumer i, it is possible to write both quantities as a sum over the distributed energy resources (DERi) and loads (loadi) of i : . (cid:88) (cid:88) k∈DERi k∈loadi P P i (t) = P D i (t) = Pk(t) Pk(t) (2) (3) For simplicity, in this paper we only consider wind-turbines (WT) and photovoltaic panels (PV) as possible DERs for the agents (DERi = W Ti ∪ P Vi): P D i (t) = Pk(t) + Pk(t) (4) (cid:88) k∈W Ti (cid:88) k∈P Vi (cid:88) k∈P Vi We denote by νi(t) and Ψi(t) the wind speed (in m.s−1) and the solar radiance ( in W.m−2) at the location of agent i and at time t, so that : P P i (t) = FW T (νi(t)) + FP V (Ψi(t)) (5) (cid:88) k∈W Ti Where FW T (resp. FP V ) is the power curve for the wind- turbines (resp. photovoltaic panels). We made here the implicit assumption that all wind-turbines (resp. photovoltaic panels) have the same power curve. The model can be easily extended to multiple power curves accounting for different types of generators. More details about power curves and their approx- imations can be found in the appendix B and in [18]. The predictable. Let PS(t) =(cid:80) of coalition S at time t. i∈S Pi(t) be the extra-production S S S Suppose now that coalition S has to suggest a production value P CRCT to enter the market. This means that, during the time S is on the market, it will have to inject in the grid exactly P CRCT at any time t and will be rewarded proportionally to this amount, with penalties if it deviates. Obviously, the actual extra-production will not be constant at this value and will oscillate due to intermittences in the production and consumption. If S always produces more than , it will never have to pay penalties, but it is losing P CRCT some gains since it could have announced a higher contract value. If the production oscillates around P CRCT , by using batteries or demand side management techniques (see section II), S could be able to maintain its production to the contract value at any time. Nevertheless, if the oscillations are too important compared to the available storage capacity, S will probably break the contract and pay penalties. We can see that there is a return over risk trade-off here, meaning that coalitions should find the right balance between announcing too low and losing some potential gains, and claiming too high and paying penalties. S Let us illustrate the rest of the notations and concepts with a simple example. We consider only two agents i and j such that the distribution of their extra-production can be approximated by normal distributions : Pi ∼ N (µi, σi) and Pj ∼ N (µj, σj). This is only for explanation purposes as it is of course rather unrealistic in real situations where the distributions are skewed. Using simple statistics, we can write the distribution of the coalition S = {i, j} as P{i,j} ∼ N (µij, σij), where : (cid:40) µij = µi + µj (cid:113) σij = σ2 i + σ2 j + ρijσiσj (6) S S ρij being the Pearson's correlation coefficient between Pi and Pj. If the coalition {i, j} proposes a contract value P CRCT , all instants when {i, j} will produce less than P CRCT is critical. Indeed, in this kind of situations, {i, j} will either have to discharge batteries to keep up with its contract, or pay penalties to the grid. The probability that {i, j} is under- producing compared to the contract : P r[Pi,j ≤ P CRCT ] is thus an important indicator of the coalition's quality. A well- known result for normal distributions is that the cumulative distribution function can be written as : P r[Pij ≤ P CRCT (cid:33)(cid:35) 1 + erf (cid:32) (cid:34) (7) ] = S 1 2 where erf is the error function : erf (x) = dt. The contract a given coalition is willing to take depends on its capacity to compensate for under-producing (using batteries, backup generators...), and its risk acceptance. Se- lecting the right contract value appears thus as an interesting problem on its own that we plan to investigate in future works. In order to keep the present paper in a reasonable length, we simplify the contract value selection problem by giving some responsibilities to a third party named the grid operator. The role of the grid operator is to constrain the S − µij P CRCT √ σij 2 2√ π (cid:82) x 0 e−t2 Figure 1: Process diagram process for generating the Pi series is pictured in the first block of the process diagram (see figure 1). Note that a prosumer i is defined by his zone Zi as well as the sets DERi and loadi. That is, a prosumer can be configured to represent anything from a single wind-turbine for instance (DERi = {W T0} and loadi = ∅) to a pure load (DERi = ∅ and loadi = {L0}) through more complex combinations. In practice, we use random configurations for the agents. In the rest of the paper, we use french weather data [19] starting in January 2006 and ending in December 2012, with a sampling frequency of three hours, and generate N timeseries of extra-production over this date range. IV. NOTATIONS This section provides most of the notations and introduces important concepts for the rest of the paper. As explained in section III, we consider a set A = {a1, a2, ..., aN} of N prosumers configured randomly, and for each agent, we simulate its extra-production Pi(t), ∀i ∈ A from 2006 to 2012. Based on these historical values, our objective is now to form groups of prosumers (the so-called coalitions) so that the global power production resulting from the superposition of individual's extra-productions be both sufficiently high and 4 Time Serie AnalysisSimulationCoalition Formation1. Weather data resa-mpling2. Removal of season-al effect1. Space Dicretization2. Parametrization3. Production/con-sumption simulation4. Production sam-1. Generate correla-tion graph2. Clique percolation3. forming non over-lapping coalition123 (cid:26) P r[Pij ≤ P CRCT S ≥ P M IN P CRCT S ] ≤ φ (9) On figure 2, P M IN is fixed to 2 units for illustration purpose. For φ = 0.1, only blue triangles and cyan circles coalitions are valid while red diamonds coalition is not. The Gaussian assumption of this small example is conve- nient as it allows us to write P CRCT (cid:63) analytically. Never- theless, such assumption is rather unrealistic in practice. In the following, we keep the same framework but release this Gaussian assumption unless the contrary is specified (see eq. 14). This assumption will indeed be convenient for computing some parameter estimates. S V. UTILITY FUNCTION In this section, we use the notions of contract values and valid coalitions developed in section IV in order to design a proper utility function. The contract basically indicates the rate at which a coalition has to inject power in the grid. It seems then natural that coalitions are remunerated proportionally to their contract values gain(S) ∝ P CRCT (cid:63) . More precisely, if λ is the unitary price rate for electricity, a coalition S injecting P CRCT (cid:63) in the grid during a period [t0, tk] earns : S S (cid:90) tk (cid:90) tk gain(S) = λP CRCT (cid:63) dt = P CRCT (cid:63) S S λdt (10) S t0 t0 is supposed to be a constant rate over the (since P CRCT (cid:63) contracted period). Using gain(S) directly as a utility function suffers a major drawback. It is indeed not a concave function of the coalitions' sizes, meaning that coalitions can grow as large as the number of agents allows it, without any counterbalance effects. Such a model, that virtually allows infinitely large coalitions and contract values, is in practice not realistic. There are indeed costs (communication costs for instance) that increase with the coalitions sizes. We take this observation into account by rescaling the utility of a coalition S by its size in term of number of agents (S): U(S) = S P CRCT (cid:63) P M AX , if S is valid, Sα 0, if S is not valid (11) where parameter α controls to what extent the size of a coalition impacts its utility, and P M AX is a normalizing factor. P M AX can be seen as the maximum production which can be injected in the grid. Based on U, the marginal contribution of an agent i can be expressed as δS(i) = U(S + {i}) − U(S). A coalition S has thus an interest in adding an additional agent i if this marginal contribution is positive :  1 (cid:18)S + 1 (cid:19)α S (12) δS(i) ≥ 0 ⇔ P CRCT (cid:63) S+{i} ≥ P CRCT (cid:63) S If α is set to zero, agents are added as long as they increase the contract value of the coalition. If α is greater 5 S S Figure 2: P CRCT (cid:63) depending on reliability parameter φ for Gaussian distributions (see equation 8). Blue curve with tri- angles stands for a coalition S with an expected production of 5 units and a standard deviation of 0.5. Under a grid policy of φ = 0.1, it is able to announce a contract value = 4.36. The same coalition in term of expected of P CRCT (cid:63) production (µ = 5), but with a higher variance (σ = 1.5, cyan curve with circles) can only afford a smaller contract = 3.07. The red curve with diamonds value of P CRCT (cid:63) stands for a coalition with a higher expected production (µ = 7), but with a very high unpredictability (σ = 5). For low values of φ, this coalition is thus heavily penalized and can only afford a contract of 0.59 units. Under grid policy (φ = 0.1, P M IN = 2), this last coalition is thus not allowed to enter the market (red dot below the horizontal dashed line). S market entry to coalitions able to propose both sufficiently high and sufficiently credible contract values. More formally, let φ ∈ [0, 1] be the reliability threshold fixed by the grid operator as a maximum value for the probability of under-producing. The highest contract value that a coalition can propose is thus ] = φ. In the Gaussian P CRCT (cid:63) example, it implies that coalition {i, j} is announcing : such that P r[Pij ≤ P CRCT (cid:63) S S P CRCT (cid:63) S = µij − √ 2σijerf−1(1 − 2φ) (8) S This is the best contract value that the coalition S can afford giving the stability policy φ of the grid operator. Figure 2 shows how P CRCT (cid:63) evolves according to the reliability parameter φ. For illustration, the range of φ values is shown from 0 to 1, but in practice, only small values of φ really make sense : φ = 1 for instance means that coalitions can announce absolutely anything since the probability of producing less than any contract value is necessarily less than one by trivial definition of a probability. As visible on figure 2, coalitions with high expected productions but presenting a high unpredictability are penalized and can only afford small contracts. In order not to overload the market with unrealistically small coalitions, the grid operator also specifies a lower bound P M IN on the contract values. We thus characterized a valid coalition as one satisfying the two conditions : 0.00.20.40.60.81.0φ505101520PCRCTSPCRCTS=4.36PCRCTS=3.07PCRCTS=0.59φGRID=0.1PMIN=2PCRCTS=f(φ) for gaussian assumptionµS=5,σS=0.5µS=5,σS=1.5µS=7,σS=5 VI. COALITION FORMATION Section IV explained how contract values for the coalitions are computed, and in section V we related this quantity to the utility and gains of a coalition. Since the computation time of this quantity is not negligible, we derive in this section the heuristic we used to form the coalitions structure. A. Representing the correlation structure As seen in section IV, the variance of the aggregated pro- duction impacts directly the contract values, and depends on the covariances between the agents productions. We argue here that, by having some representation of the correlation structure between the agents, the search landscape for high utility coalitions could be reduced, such that good coalitions are more likely to be found quickly. Usually, this correlation structure is formalized with a covariance matrix or a correlation matrix that contains all the correlation coefficients between the agents : M = (ρij)∀i,j∈A2. By using a metric to map this matrix in a weighted adjacency matrix (see section II), it is possible to obtain a graph representation of the correlation relationships between the agents. In the following, we use two opposite distance metrics for this mapping : (cid:26) d1 ij = 1 − ρ2 ij, d2 ij = ρ2 ij = 1 − d1 ij (15) ij in G2. Clearly, d1 (resp. d2) maps two correlated series as close points (resp. distant) while two uncorrelated series are distant (resp. close). These metrics enable us to compute a corre- lation graph G1 = (A, E1) and a "de-correlation" graph G2 = (A, E2). For any i and j, the weight of the edge eij is d1 ij in G1 and d2 In both cases, we want to keep only the edges which weights are located in the lower tail of the distance distributions. In other words, we want to compute the -graphs of G1 and G2 such that only meaningful edges remain. Selecting the right filter  is thus an important point since it affects the landscape search for the coalition formation. Unfortunately, there seems to be no clear consensus in the literature on how to select such a threshold. We will see later in this section that cliques in G2 are potential seeds for the coalitions. Since we want to generate NCOAL coalitions, we need at least NCOAL cliques of a given size to start. Besides, since we consider coalitions as disjoint, the starting cliques should be non overlapping. We thus select our optimal threshold for G2 as : (16) 2) ≥ NCOAL} (cid:63) = min∈[0,1] { s.t. Θk(G 2 is the de-correlation graph G2 filtered by , and where G Θk(G) is the set of non overlapping cliques of size k in a given graph G. In other words we select (cid:63) as the smallest threshold possible such that the filtered de-correlation graph contains at least NCOAL non overlapping cliques of size k. The existence of (cid:63) as defined in equation 16 is not guaranteed. The users has indeed to provide consistent values of NCOAL or k compared to the size of the agent population A. Figure 3: Gaussian mean approximation. Subplot a shows how the parameter α of the utility function should be chosen in function of the mean desired size of the coalitions (see equation 14). Subplot b displays the corresponding utility functions for different values of α. Blue curve with diamonds favors very small coalitions of 2 agents while the green one with triangles favors 5 agents coalitions. Finally, the red curve with squares has an optimal size of 15 agents. than zero, additional agents have to increase the contract value by some factor. The utility function with α is not necessarily convenient, here we relate α to the mean sizes of the coalitions ¯N. otherwise U(S) tends to form coalitions of size approximately in the order of ¯N, then : (cid:21) (cid:20) ∂U ∂S = 0 S= ¯N (13) In order to get an estimator for α, we solve equation 13 in a Gaussian case (as in section IV). Furthermore, since considering all the possible interactions between agents is analytically intractable, we use here a mean approximation. Any quantity x that varies over the agent set is thus simplified in its mean value ¯x. Solving equation 13 for α in these conditions leads to: ¯µ(cid:112) ¯N (¯ρ ¯N − ¯ρ + 1) + 1.4¯σerf−1(2φ − 1)(¯ρ ¯N − ¯ρ + 1) 0.7¯σ(¯ρ − 1)erf−1(2φ − 1) α(cid:63) ¯N = (14) Figure 3 shows how α(cid:63) and the utility function evolves according to the mean size of the coalitions ¯N. These curves are only valid in the simplified Gaussian example considered they will provide some guidance when here. Nonetheless, using real data. As can be pointed out, the purpose of U is not to study coalitions stability against player defection which could be done through game theory, nor to redistribute the coalition's utility in terms of individual payoffs. But we aim to design U as a measure of how good a given coalition is according to our criteria. In other terms does a given coalitions has a good production to risk ratio. 6 51015202530¯N0.000.010.020.030.040.050.06α¯Na.α¯N=f(¯N)051015202530¯N0.600.620.640.660.680.70Uαb.Uα=f(¯N)Uα2Uα5Uα15Uα15 appealing. Nevertheless, the quality of the results seems to decrease as the sizes of the cliques increase. Indeed, the larger the desired cliques, the more dense G(cid:63) 2 becomes (see equation 16). There is a point where cliques results more from noisy edges than true de-correlation, which decreases the quality of the results. Directly mapping cliques to coalitions by this de-correlation oriented approach is thus not sufficient. It is indeed possible that adding agents to these cliques has the combined effect of increasing the expected production while decreasing its stability. The question revolves around measuring the benefits of this production surplus compared to the disadvantage of having coalition with high volatility. This can be quantified by the marginal benefit in equation 12. C. Algorithm The algorithm takes inputs from : • The agents : historical series of available productions Pi, • The grid operator : market entrance policy (P M IN , φ), • The "user" : Number of desired coalitions NCOAL and size of starting cliques k. The first steps consists in computing the de-correlation threshold (cid:63). Cliques graph G2 as well as the optimal of size k in G(cid:63) are considered as coalition seeds. The 2 next step is a local greedy improvement over the landscape represented by G(cid:63) 2 . Cliques add alternatively the node i(cid:63) in their neighborhood that yields the best marginal benefit M AXi∈N (clique)δclique(i) where N (clique) is the neighbor- hood of a given clique. This addition occurs only if i(cid:63) is not already involved in another coalition, and if δclique(i(cid:63)) ≥ 0, meaning that utilities are increasing. The algorithm stops when all nodes are distributed in a coalition or when the global utility stops increasing. See the details in algorithm 1 in the appendix. VII. RESULTS The algorithm presented in the previous section is supposed to generate a given number of coalitions that have good utilities. As it comprises mainly of a greedy optimization based on local improvements, there is no guarantee that the algorithm finds the global optimum. Since there is, to our knowledge, no state of the art algorithm that aggregates uncorrelated agents in an optimum way (see section II for related problems), we compare the results with : • Random sampling of coalitions : Coalitions are formed randomly without any other constraint that the desired size. This enables us to have an idea about the distribu- tions of utility values for coalitions of a given size. • Random sampling of coalition structures : Coalition structures are sampled randomly by shuffling and random divisions of the agents. Algorithm 2 uses such a sampling and returns the highest utility coalition structure sampled. This algorithm will be refered to as "random" in the following. • Correlated : This is the complete opposite of our al- gorithm. It uses the correlation graph G1 and performs a community detection. The resulting coalitions have Figure 4: Histograms of utility values for coalitions of size 3. Red bars stands for cliques in the decorrelation graph, and blue bars represents all the other possible triplets. As visible, cliques tend to exhibit higher utilities than randomly selected coalitions. B. Cliques In [16] the structural roles of weak and strong links on finan- cial correlation graphs is investigated. The author shows that strong links, accounting for strong correlation relationships, are responsible for the clustering, while weak links provide the connectivity between clusters. Indeed, if we consider three items, say a, b, and c such that a and b are strongly correlated and b and c are also strongly correlated, then it is likely that a and c are also strongly correlated. It can be easily shown using the cosine addition formula1, that if ρab > x and ρbc > x with x > 0, then ρac > 2x2 − 1). Correlation graphs capture this weak transitivity notion through clusters of correlated series. Nevertheless de-correlation seems like a more complex concept than correlation in the sense that there is not even a partial notion of transitivity when it comes to it. Therefore, the clustering coefficients of G 1 is much higher than the one of G 2. This can be seen as another formulation of [16] on the structural roles of weak and strong links on financial corre- lation graphs. Strong links, accounting for strong correlation relationships, are responsible for the clustering, while weak links provide the connectivity between clusters. Searching for 2 and hoping that this strategy will provide a nice clusters in G coalition structure of internally uncorrelated coalitions seems thus pointless. Consider now a clique in G 2, which is a complete subgraph 2. This is indeed a structure of interest for our purpose. of G Since there is a link for every pairs of nodes, we know, by construction, that a clique has a mean correlation and a maximum correlation less than . Figure 4 shows the distributions of the utility values for cliques of size 3 (triangles) in G(cid:63) 2 and for all the other possible triplets of agents. It is clearly visible that cliques tend to exhibit higher utilities because of their de-correlation prop- erty. Choosing cliques in G(cid:63) 2 as coalitions seems therefore 1 cos(a + b) = cos(a)cos(b) − sin(a)sin(b) 7 0.100.150.200.250.300.35Utility0246810121416FrequencyUtilities of 3 agents coalitions3-cliquesother triplets Figure 5: Utility of random coalitions depending on their size. Blue dots show real mean utility values and the thick red curve its smoothed version by applying a Savitzky-Golay filter. On this plot the α parameter of the utility function was selected according to equation 14 in order to favor 40 agents coalitions. Figure 6: Evolution of the global utility U(CS) (blue diamond curve, left axis) and the number of agents involved in the coalitions (red circle curve, right axis) during the greedy optimization of algorithm 1 thus very high internal correlations. We thus expect this algorithm to perform very bad compared to the others. See algorithm 3. Before running the algorithms, we need to calibrate the utility function by choosing the value of the α parameter. Recall that the purpose of this parameter is to take into account some constraints on the coalition's sizes if needed. In this paper, neither the communication network nor the electrical grid are explicitly considered. Thus, we do not have any technical constraints on coalition sizes even if we designed the utility such that these could be taken into account. We select the desired size as being (cid:98)N/NCOAL(cid:99) (where (cid:98).(cid:99) means floor). Figure 5 shows how the mean utility of a coalition evolves with its size when the optimum size is set to 40 agents. Using equation 14 to estimate α based on the mean quantities and Gaussian approximations seems to give acceptable results for the utility function behavior. Figure 6 displays the evolution of the global utility and the number of involved agents during the course of the greedy algorithm 1. The transition from an invalid to a valid coalitions is clearly visible on the blue diamond curve and occurs between iteration 10 and 15. After this transition, coalition's utilities improve slowly up to a maximum point. Figure 7 shows the coalitions formed with the considered algorithms in the contract value / volatility space. The color map in the background indicates regions where we expect high utilities (red) and the ones where we expect very poor utility values (blue). The bottom right corner, with high contract values and low volatilities, is therefore the region where we wish to form our coalitions. A single coalition is represented by a marker and the color and shape of a marker indicates by which algorithm the coalition has been formed. Besides, the sizes of the coalitions are indicated on the markers, and the marker size is also proportional to the coalition size. We can see that the utility function results in approximatively balanced coalitions. Small yellow markers indicates the gravity 8 centers of their respective coalition structures. The coalitions of correlated agents (green squares) are clearly of poor quality according to our criteria since they can only afford small production contracts, and with a very high volatility. On figure 7, the decorrelated coalitions (blue dots) are closer to the bottom right corner indicating a much better quality in term of productivity over volatility ratio. The black dotted line indicates the mean values for the random coalitions sampling technique. Each small dot stands for the mean position of all sampled coalitions of this given size. Variances are not indicated for readability, but are usually quite large since this sampling only takes the size as a constraint. We can see that as coalitions get larger, they tend to increase on average their contract values, but at the price of a higher volatility. On figure 7, the results of the random coalition structure sampling are shown with the red ellipses that represent the distribution of the gravity centers of the sampled structures. Since the center of the ellipses stands for the mean and each ellipse adds one standard deviation, more than 99% of the sampled gravity centers are within the largest ellipse. The small yellow dot below the ellipses indicates the gravity center of our solution. It is thus visible that our greedy graph based algorithm is able to find a quite good coalition structure in terms of volatility and contract values. A key point for the coalitions, besides stability and pro- ductivity, is their resilience. The resilience of a system can be roughly described as its ability to perform its tasks when subject to failures of its components. Therefore, the notion of resilience we will use in the following can be seen as the ability of the coalition structures to inject stable power in the grid when node failures occur. According to our model, the grid operator specified two thresholds (P M IN and φ) such that the power injected by every coalition is constrained : ]. As long as a coalition can P CRCT propose a contract value higher than P M IN , it is valid and allowed to enter the energy market. We define the resilience of a coalition S as the probability that S produces more than ∈ [P M IN , P CRCT (cid:63) S S 20406080100Number of agents in the coalition0.2400.2420.2440.2460.2480.2500.252UtilityUtility of a coalition depending on its sizereal meansmoothed mean05101520253035Number of iterations0.00.10.20.30.40.5U(CS)020406080100120140160180Number of agents in CS Figure 7: Coalitions formed in the (contract value, volatility) space. The color map indicates qualities of portions of the plane. The closer to red the better (high contract values with small volatility). On the opposite, blue areas show poor quality (small contract values with high volatility). Blue dots stand for the decorrelated coalitions that we formed while green squares show correlated coalitions. The smaller yellow markers stand for the gravity centers of the coalition structures. The black dotted line shows how contract values and volatility evolve when the size of the coalitions increases (a subset of the points are labeled by the size of the coalition they represent). Each point is the average over 105 unconstrained draws of a random coalition. As we can also draw random coalition structures, we show the distribution of their gravity centers by the red ellipses (center is the mean, and each ellipse corresponds to one standard deviation). For instance in our algorithm the utility function favors balanced coalitions. We also loosely constrained the sizes of the coalitions in the utility function. the P M IN threshold : RS = P r[PS >= P M IN ] = 1 − P r[PS < P M IN ] And we extend this measure to the coalition structures : (17) (cid:0)1 − P r[PS < P M IN ](cid:1) (18) (cid:89) S∈CS RCS = We consider that prosumers fail randomly, and we denote by ψ ∈ [0, 1] the fraction of agents that failed. Figure 8 exhibits how the resilience of the coalition structures evolves according to ψ. On the top subplot, P M IN was voluntarily selected relatively low such that the resiliences of the three structures fit on the same figure. When the P M IN requirement increases, the differences between the algorithms also increase as visible on the bottom subplot of figure 8. The decorrelated coalitions seem to achieve a more resilient production on the market in the sense that they are able to sustain a higher fraction of node failures. VIII. CONCLUSION In this paper we studied how aggregations of prosumers could be authorized to sell their surplus of production to the 9 Figure 8: Resilience of the coalition structures when nodes fail randomly (see equation 18) for P M IN = 10M W (top subplot) and P M IN = 80M W (bottom subplot) grid operator. By relying on the past values of the agents, we constrained the market entry to both sufficiently productive and stable coalitions. The power that a coalition is able to propose on the market is therefore related to production and stability. As the correlations between the prosumers that form these coalitions impact directly their volatilities, we seek uncorrelated aggregations of agents. We used a graph representation of the correlation relationships between the agents as a reduced landscape for the coalition formation. A greedy algorithm that starts with cliques of the "de-correlation" graph of the agents and makes local improvements offers a good compromise between speed and quality of the results. We compare these results with random samplings, and an opposite strategy that clusters correlated agents together. We showed that the coalitions resulting from our algorithm are able to provide more power to the grid with a lower volatility. Because they tend to have globally a better production over volatility ratios, these coalitions will tend to use less storage and waste less energy than more unstable coalitions. We plan to study these benefits for the control of the aggregations in future works. Because in real situations, agents are prone to failure, resilience is also an important criterion for the quality of the aggregations. We therefore studied how the coalitions are able to remain on the market when their agents fail randomly one by one. We showed that, in this situation, the coalitions resulting from our algorithm better withstand losses of agents. REFERENCES [1] C. D. Brummitt, R. M. D'Souza, and E. a. Leicht, "Suppressing cas- cades of load in interdependent networks." Proceedings of the National Academy of Sciences of the United States of America, vol. 109, no. 12, pp. E680–9, Mar. 2012. [2] J.-W. Wang and L.-L. Rong, "Cascade-based attack vulnerability on the US power grid," Safety Science, vol. 47, no. 10, pp. 1332–1336, Dec. 2009. [3] T. Jiang, Y. Cao, L. Yu, and Z. Wang, "Load shaping strategy based on energy storage and dynamic pricing in smart grid," Smart Grid, IEEE Transactions on, vol. 5, no. 6, pp. 2868–2876, Nov 2014. [4] F. Van Hulle, "Integrating Wind," 2009. 0.60.81.01.21.4PCRCTS1e81234567Volatility1e73031282728261520253035342726342722Coalitions in the (PCRCTS,σPS) spacedecorrelatedcorrelated0.00.20.40.60.81.0ψ0.00.20.40.60.81.0RCSRCS=f(ψ)decorrelatedrandomcorrelated0.00.10.20.30.40.5ψ0.00.20.40.60.81.0RCSdecorrelatedrandomcorrelated [5] S. D. Ramchurn, P. Vytelingum, A. Rogers, and N. R. Jennings, "Putting the 'smarts' into the smart grid: A grand challenge for artificial intelligence," Commun. ACM, vol. 55, no. 4, pp. 86–97, Apr. 2012. [6] A. J. D. Rathnayaka et al., "Prosumer management in socio-technical smart grid," in Proceedings of the CUBE International Information Technology Conference, 2012, pp. 483–489. [7] E. Negeri and N. Baken, "Architecting the Smart Grid As a Holarchy," Proceedings of the 1st International Conference on Smart Grids and Green IT Systems, pp. 73–78, 2012. [8] S. Pahwa, C. Scoglio, S. Das, and N. Schulz, "Load-shedding strate- gies for preventing cascading failures in power grid," Electric Power Components and Systems, vol. 41, no. 9, pp. 879–895, 2013. [9] M. Milligan and B. Kirby, "Utilizing Load Response for Wind and Solar Integration and Power System Reliability," in Proc. of WindPower, 2010. [10] T. Logenthiran, D. Srinivasan, and T. Z. Shun, "Demand side manage- ment in smart grid using heuristic optimization," IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1244–1252, 2012. [11] Y. Zhang, N. Gatsis, and G. B. Giannakis, "Robust energy management for microgrids with high-penetration renewables," IEEE Transactions on Sustainable Energy, vol. 4, no. 4, pp. 944–953, 2013. [12] M. Shadmand and R. Balog, "Multi-objective optimization and design of photovoltaic-wind hybrid system for community smart dc microgrid," Smart Grid, IEEE Transactions on, vol. 5, no. 5, pp. 2635–2643, Sept 2014. [13] H. M. Markowitz, Portfolio Selection: Efficient Diversification of Invest- ments. Yale University Press, 1959. [14] R. Chicheportiche and J.-P. Bouchaud, "The joint distribution of stock returns is not elliptical," International Journal of Theoretical and Ap- plied Finance, vol. 15, no. 03, p. 1250019, 2012. [15] R. Mantegna, "Hierarchical structure in financial markets," The Euro- pean Physical Journal B, vol. 11, no. 1, pp. 193–197, 1999. [16] A. Garas et al., "The structural role of weak and strong links in a financial market network," The European Physical Journal B, vol. 63, no. 2, pp. 265–271, 2008. [17] "Irish Social Science Data Archive." [Online]. Available: http: //www.ucd.ie/issda/data/commissionforenergyregulationcer/ [18] M. Lydia, S. S. Kumar, a. I. Selvakumar, and G. E. Prem Kumar, "A comprehensive review on wind turbine power curve modeling techniques," Renewable and Sustainable Energy Reviews, vol. 30, pp. 452–460, 2014. http://www.ncdc.noaa.gov/ [19] "Infoclimat." [Online]. Available: http://www.infoclimat.fr [20] "National Centers for Environmental Information." [Online]. Available: [21] C. Piedallu and J.-C. Gà c(cid:13)gout, "Multiscale computation of solar radiation for predictive vegetation modelling," Annals of Forest Science, vol. 64, no. 8, pp. 899–909, 2007. [22] --, "Efficient assessment of topographic solar radiation to improve plant distribution models," Agricultural and Forest Meteorology, vol. 148, no. 11, pp. 1696 – 1706, 2008. APPENDIX A. Algorithms B. Net production series Data were collected from [19] (similar data can be found at [20] for the United States). The variables used in the simulation are : • Average wind speed (in m.s−1) • Nebulosity (integer in [0, 8]) • Temperature (in degree Celsius) 1) Wind power curve: Power curves are functions that, for a given type of generator, map some input quantity to the output power produced. For wind-turbines and solar arrays these functions are well studied and approximations have been proposed [18] [21], [22]. For the wind turbines, the power curve can be specified by 4 values : • Cut-in-speed : The wind speed at which the turbine first starts to rotate and generates power. • Rated-output-power : The maximum power that the tur- bine can generate. 10 Data: Pi series, Grid policy (P M IN , φ), Desired number of coalitions NCOAL, size of starting cliques k Result: CS = {S1, ..., SNCOAL} Compute G(cid:63) Find the NCOAL cliques in G(cid:63) 2 ; while U(CS) is improving do 2 ; for each clique do Find i(cid:63) ; if δclique(i(cid:63)) ≥ 0 then clique ← clique ∪ {i(cid:63)} ; end if ∃j ∈ clique, s.t δclique(j) < 0 then clique ← clique − {j} ; end end end Algorithm 1: Local greedy optimization algorithm Data: Agent set A, Desired number of coalitions NCOAL, Maximum number of iterations Loopmax Result: CS = {S1, ..., SNCOAL} N loop ← 0 ; CS(cid:63) ← ∅; while N loop < Loopmax do CS ← SelectRandomCS(); if U(CS) > U(CS(cid:63)) then CS(cid:63) ← CS; end N loop ← N loop + 1; end return CS(cid:63) Algorithm 2: Random algorithm Data: Pi series, Desired number of coalitions NCOAL, search step size β << 1 Result: CS = {S1, ..., SNCOAL}  ← 1 ; CS ← ∅; while CS < NCOAL do 1 ; Compute G CS ← computeClusters(G 1); if CS = NCOAL then return CS; end else end end  ←  − β; Algorithm 3: Correlated algorithm • Rated-output-speed : The wind speed at which the turbine attains its rated output power. • Cut-out-speed : The speed at which the turbine is turned off as not to damage the rotor. The most interesting part is the increase of output power when the wind speed is in the cut-in-speed rated-output-speed range. Even if sometimes a simple linear model is used, the increase has been shown to be non linear and some more complex exponential fit can be found in the literature [18]. 2) Solar power curve: The input quantity desired for our power curve model for solar arrays is a radiance in W.m−2, which can be difficult to find in weather station available data. As we mainly collected nebulosity series, we used the Helios model described in [21], [22]. This model enabled us to compute perfect (clear blue sky situation) solar radiances at some specific locations on earth and at given timestamps. As nebulosity is a measure of the sky cloudiness, we can use the nebulosity series as degradation factors on the clear blue sky model (see [21], [22] for more details) :  Ψreal(t) = Ψperf ect(t)η(t) (cid:19)3.4 (cid:18) N (t) η(t) = 1 − 0.75 8 i where F heat (τ (t), t) is the power curve that maps the tem- perature to a heating consumption, and F elec (t) computes the consumption of agent i (other than heating) at a given hour of the day. In the simulation, all agents have a desired inside temperature Ti, supposed to be a constant for simplification. By using thermodynamic laws F heat (τ (t), t) can be approxi- mated by : i i F heat i (τ (t), t) = [Ti − τ (t)] Bi Ri (22) where Bi is the surface of thermal exchanges for agent i and Ri is their thermal resistance. We denote by Ωi the maximum consumption possible for agent i, which is basically the sum of all its appliances powers. We also denote by ωi(t) = {ωi(t0), ..., ωi(t24)} the vector of the average fraction of Ωi used for each hour. We can therefore write : F elec i (t) = Ωi(ωi(t) + ) (23) (19) where  is a noise term. The vector ωi(t) enables us to easily differentiate agent consumption behaviors. Business or residential areas for instance can be easily distinguished with this kind of model. where Ψperf ect(t) and Ψreal(t) are respectively the clear blue sky and real radiances at time t, η(t) is the degradation factor at time t, and N (t) is the nebulosity index at time t. Once we have input data in the forms of radiances, we compute the production of a solar array with the following simplified power curve : FP V (Ψreal(t)) = SP V Ψreal(t)eP V (20) where SP V is the surface of the array, and eP V is its efficiency. The very simple form of this power curve is due to some simplifications in order not to overload the model. For instance, it does not take into account angles and orienta- tions degradations. These could be incorporated if needed by changing the power curve in the simulations. 3) Consumption: Modeling electric consumption has al- ready been widely tackled in the literature. Models can be basically divided into two main categories : Top-down and bottom-up approaches. Top-down techniques take aggregated consumption data as inputs and try to estimate individual consumption patterns while bottom-up methods use a fine modeling of users consumptions as to obtain realistic aggre- gated consumption curves. In this paper, we used a bottom- up model since the end user, or relatively small aggregations of end users, are in our interest. The main objective was to capture both daily patterns and seasonal variations of the consumptions. We assumed an additive model where the consumption of an agent is the sum of a seasonal heating term that depends on the outside temperature and an electronic consumption term that only depends on the hour of the day. By denoting τ (t) the outside temperature at timestamp t, we can express the consumption P D i (t) of agent i at time t : i (t) = F heat P D i (τ (t), t) + F elec i (t) (21) 11
1802.00435
2
1802
2019-08-20T03:19:24
Evolutionary model discovery of causal factors behind the socio-agricultural behavior of the ancestral Pueblo
[ "cs.MA" ]
Agent-based modeling of artificial societies offers a platform to test human-interpretable, causal explanations of human behavior that generate society-scale phenomena. However, parameter calibration is insufficient to conduct an adequate data-driven exploration of the importance of causal factors that constitute agent rules, resulting in models with limited causal accuracy and robustness. We introduce evolutionary model discovery, a framework that combines genetic programming and random forest regression to evaluate the importance of a set of causal factors hypothesized to affect the individual's decision-making process. We investigated the farm plot seeking behavior of the ancestral Pueblo of the Long House Valley simulated in the Artificial Anasazi model our proposed framework. We evaluated the importance of causal factors not considered in the original model that we hypothesized to have affected the decision-making process. Contrary to the original model, where closeness was the sole factor driving farm plot selection, selection of higher quality land and desire for social presence are shown to be more important. In fact, model performance is improved when agents select farm plots further away from their failed farm plot. Farm selection strategies designed using these insights into the socio-agricultural behavior of the ancestral Pueblo significantly improved the model's accuracy and robustness.
cs.MA
cs
Evolutionary model discovery of causal factors behind the socio-agricultural behavior of the ancestral Pueblo Chathika Gunaratne1, Ivan Garibay1, Nguyen Dang2 1 Complex Adaptive Systems Lab, Department of Industrial Engineering and Management Systems, University of Central Florida, Orlando, Florida, USA 2 AI group, School of Computer Science, University of St Andrews, St Andrews, UK * Corressponding authors Email: [email protected] (CG) Email: [email protected] (IG) Abstract Agent-based modeling of artificial societies offers a platform to test human-interpretable, causal explanations of human behavior that generate society-scale phenomena. However, parameter calibration is insufficient to conduct an adequate data-driven exploration of the importance of causal factors that constitute agent rules, resulting in models with limited causal accuracy and robustness. We introduce evolutionary model discovery, a framework that combines genetic programming and random forest regression to evaluate the importance of a set of causal factors hypothesized to affect the individual's decision-making process. We investigated the farm plot seeking behavior of the ancestral Pueblo of the Long House Valley simulated in the Artificial Anasazi model our proposed framework. We evaluated the importance of causal factors not considered in the original model that we hypothesized to have affected the decision-making process. Contrary to the original model, where closeness was the sole factor driving farm plot selection, selection of higher quality land and desire for social presence are shown to be more important. In fact, model performance is improved when agents select farm plots further away from their failed farm plot. Farm selection strategies designed using these insights into the socio-agricultural behavior of the ancestral Pueblo significantly improved the model's accuracy and robustness. Introduction Exposing the mechanics of the human decision-making processes that cause complex, society-scale phenomena is a difficult endeavor. These decision-making processes are often driven by multiple causal factors [1] with researchers having no direct means of measuring how these factors contribute to society-scale phenomena. Abductive reasoning via data-driven modeling and simulation techniques can overcome these issues by 'growing' artificial societies [2] and adjusting their configurations until adequate matches between simulation results and real world data are achieved. Agent-based modeling (ABM) in particular, offers the benefit of representing behaviors as human-interpretable rules. These rules are driven by the agent's autonomous evaluation of a variety of factors that are hypothesized by the modeler to be important in the decision-making process being modeled, indicated by the ability of August 21, 2019 1/16 ABM to simulate real world observations. However, a particular behavior rule only represents a single hypothetical decision-making process contained within a large space of possible, alternate decision-making processes. Exploring this vast space of rules requires the repeated re-implementation of multiple versions of the same ABM with different embedded decision-making processes [3]; this is a tedious task, involving the comparison of a massive number of combinations of causal factors. Thus, researchers often resort to modeling the most intuitive decision-making processes, if not process, which risks a subjective and inaccurate representation of the actual individual behavior [4]. The current standard of ABM exploration, parameter calibration, is a black-box technique and does not perform white-box rule exploration. Parameter calibration works on the assumption of the correctness of a predefined rule and fine tunes the coefficients of its constituent factors, but cannot it easily experiment between different structures and operators through which these factors combine. Unless the importance of factors and how they are structured in the behavior rule are established, the underlying behavior rule merely remains an untested hypothesis of the actual individual behavior [2 -- 4]. Parameter calibration tools are readily available for ABM frameworks, such as BehaviorSearch [5] for NetLogo [6], and OptQuest [7] for AnyLogic [8]. Inductive games have been used to infer the decision-making of societies via game theory [9], yet no established methodology exists for ABMs. As ABM rules are implemented as program instructions, genetic programming [10] is a highly suitable technique for model discovery. However, research into using genetic programming with ABMs for exploration of causality has been limited [11, 13, 14]. To meet this need, we introduce evolutionary model discovery, a technique for agent rule exploration and causal factor importance measurement, which combines the automated program generation capability of genetic programming [10] with the factor importance evaluation capability of random forest regression [15 -- 20]. Unlike current standard techniques like pattern-oriented modeling [3] and model selection [21], evolutionary model discovery has the advantage of avoiding manual and repetitive re-implementation of models through automated program generation, resulting in a greatly reduced risk of implementation errors. Agent rules generated through genetic programming consist of functions of primitives that are easily comparable, as they follow a common representation. Using this representation, differences between candidate models are isolated to the code implementing the decision under scrutiny, to facilitate factor analysis and to avoid the need to compare two completely different implementations. The comparability of candidate models is important in drawing insights into the causes of the society-level phenomena being simulated. The stochasticity of genetic programming allows for the exploration of a vast space of possible agent rules, while selection of fitter models for breeding the next generation of rules ensures the exploitation of stronger factor interactions. Assumptions on agent behavior can be relaxed and rules with deeper factor interactions evaluated. Genetic programming, random forest training, and factor importance evaluation are all easily parallelizable techniques, which is important considering the large search space that can result even from a simple factor set. In this study, we employ evolutionary model discovery to discover plausible interactions of causal factors by comparing their importance in the farm plot selection of the ancestral Pueblo community modeled in the Artificial Anasazi [22, 24]. The ABM simulates the population dynamics of the Long House Valley between the years 800 AD to 1400 AD during which there was a sudden population collapse around 1350 AD. The original model demonstrated that this collapse was not caused by environmental factors alone. The model is data driven and simulations attempt to match the annual population time-series measuring households in the valley, which August 21, 2019 2/16 was estimated through data gathered from archaeological digs [22]. The agents in the model represent households, and are dependent on the agricultural success of their farm plot for sustenance and reproduction. The farm plot selection strategy originally implemented dictates that upon depletion of a household's current farm plot, the agent moves to the next closest available plot of land. In other words, the sole factor influencing this decision is the minimization of distance over the complete set of available plots of land in the valley. We argue that this behavior is not entirely human-like, and could have been influenced by factors other than distance. Instead, we hypothesize that nine different factors and four different social structures governing information flow may have driven the farm plot seeking behavior of the modeled Pueblo society. Specifically, we hypothesize that the following factors could have had significant importance: distance (FDist), dryness of the farm-land (FDry), quality of farm-land (FQual), yield of the land in the previous year (FY ield), water availability (FW ater), social presence near the potential farm land (FSoc), homophily by age (FAge), homophily by agricultural success (FAgri), and inter-zone migration (FM ig ), under the following possible social connectivity configurations: full information of the valley (SAll), information provided by family immediate family members (SF am), information provided by the most productive households (SP erf ), or information from the nearest neighbors (SN hbr). We consider the coefficients of these factors in the evolved agent behavior rules as the factors' 'presence' in that particular behavior rule. Each factor's presence is then analyzed for its importance at predicting the ABM's fitness through feature importance analysis on a random forest trained on data generated by the genetic program. Utilizing a random forest for this purpose allowed us to measure both main effects of the factors' presence and the joint contributions of factors towards the ABM's fitness. After identifying the most important factors, we determined the optimal presence for them. With these insights we were able to construct causally accurate and robust farm selection procedures. Our results falsify the original assumption [22, 24] that closeness was the sole causal factor governing farm plot selection of the ancestral Pueblo society. Instead, evolutionary model discovery reports the most important factors as quality, social presence, migration from zone, distance, and dryness in order of decreasing importance. In particular, the selection of higher quality land that either had a higher social presence or was located in a different zone was shown to be more likely behavior and versions of the Artificial Anasazi with these farm selection strategies were significantly more robust against random initialization of parameters. Our results indicate that the farm selection strategy was likely more human-like than that implemented in original version of the model [22, 24]. Methodology Farm Plot Selection in the Artificial Anasazi The Artificial Anasazi is an agent-based model of the Kayenta Anasazi during the years of 800 AD to 1350 AD [22, 24]. This model was initially developed as part of a larger effort to study the ancestral Pueblo civilization that occupied the Long House Valley region. The ABM is implemented in NetLogo [6, 24]. Archaeological excavations provide annual population time series data as estimated counts of households that existed in the valley during the period of study. Annual data on water sources and estimated soil dryness (Adjusted Palmer Drought Severity Index) for each grid location on the map are provided. The model used a normal distribution to map relative quality of soil over the map. The agent-based model simulates the rise and fall August 21, 2019 3/16 of households over a geographic map of the valley over time and produces a time series of annual household count. The original purpose of the Artificial Anasazi was to test if environmental factors could have triggered the sudden disappearance of the Anasazi from the Long House Valley around 1350 AD. Critics of the Artificial Anasazi have argued that the agent-based model itself is but a single candidate explanation of the social phenomenon at hand, the rise and fall of the Anasazi population over time [4]. However, we view this as an advantage as the Artificial Anasazi can be used as a test-bed to discover multiple plausible explanations of the population dynamics of the Long Valley at the time. Testing combinations of hypothesized factors that may have influenced actual decision-making processes of the individuals results in a vast search space of plausible Artificial Anasazi behavior results. We concentrated on a particular sub-model of the Artificial Anasazi: the farm plot selection strategy. The households perform farm plot selection under two conditions: 1) when a new child household is hatched by a household that has enough resources to increase its family size, or 2) when the current farm plot is unable to produce enough yield to satisfy the nutrition needs of the household anymore. The original model, hypothesizes that the households simply selected the next closest available farm plot to the household's current farm plot during farm plot selection, i.e., minimizing over distance. A patch must be free of farms or households and not be located inside a water body to be available. Consequently, the original farm selection strategy ignores other sensory data available to the households regarding the land and the state of other households in the valley. Hypothesized Alternate Factors Influencing Farm Plot Selection Human social behavior is rarely entirely rational. Accordingly, our hypothesis proposed that the farm selection decisions of the ancestral Pueblo were complex, and took into account the state of the potential farm plots available to them and the social influences of other households around them. Agent Zero [2] models the human decision making process into three dimensions: social, emotional and rational. Similarly, we defined factors that we hypothesized to influence the farm plot selection process within these dimensions. The social component is expressed through four mutually exclusive social connectivity configurations through which the agent could receive information on a subset of potential farm plots, s, out of the entire set of potential farm plots in the valley, SAll. The received information is then processed through a utility function f (x) defined as a combination of factors and operators, F , which consider both the internal state of the household and the conditions of the farm plot and its surroundings in order to determine the next farm plot x′ ∈s⊂ SAll as in Eq (1). x′ = argmax x∈s⊂SAll f (x) (1) Households in the original Artificial Anasazi model consider a single factor, distance, which we will refer to as FDist, and choose the potential farm plot with minimal distance to their current farm location. No further factors are considered in the decision making process. Furthermore, the original model assumes that the households have complete information of the valley, and every potential farm plot is compared. Therefore, the farm selection process of the original Artificial Anasazi can be represented as in Eq (1). x′ = argmax x∈SAll (−FDist(x)) (2) Arguing that the farm selection decision may have been more complex, considering a variety of other factors, we proposed an extended factor set consisting of four social August 21, 2019 4/16 and five rational factors, namely: homophily by age (FHAge), homophily by agricultural productivity (FHAgri), social presence (FSoc), migration from current zone (FM ig ), comparison of quality (FQual), comparison of dryness (FDry), comparison of yield (FY eild), comparison of water availability (FW ater), and comparison of distance (FDist). Additionally, the numerical operators + and − are included in F , for the aggregation of sub-scores reported by the social/emotional and rational factors. Four hypothesized configurations of social connectivity were included F . These configurations determined the subset of all viable farm plots that were to be considered by the households for comparison. 1) Full information (SAll): Households had complete knowledge of all potential farm plots in the valley. Full information was used by agents in the original version of the model, assuming that each household knew and compared every potential farm plot in the Long House Valley. 2) Family inherited information (SF am): Households solely depended on information available through their 'family'. Families are defined as a household's parent household, sibling households, any surviving grandparents, and the household itself. 3) Nearest-neighbor information (SN eigh): agents only consider the farm plots known to their neighboring households within a fixed radius of their current location. 4) Best performers SP erf : Households only consider potential farm plots known to the best performing households, demonstrating a leadership dynamic. Four social/emotional factors were included in F : two types of homophily (the tendency for social entities to congregate among those with similar traits), need for social presence, and one of fleeing/migration. Each social/emotional factor returned a sub-score representing the desirability of each evaluated farm plot. Sub-scores were normalized within the factors, to lie in the range of 0 to 1, for fair comparison. 1) Homophily by age (FHAge): Households prefer to select farm plots near other households that are of similar age, where age is measured as the number of simulation steps the household has survived since splitting from its parent. 2) Homophily by agricultural productivity (FHAgri): Households tend to select farm plots near other households with a similar corn stock to itself. 3) Social presence (FSoc): Agents score potential farm plots with many nearby households higher than those in isolation. 4) Fleeing/migration (FM ig): Agents score potential farm plots that are in a completely different zone than the current one with a full sub-score, while patches in the same zone receive a sub-score of zero. Five Rational factors considered for the farm selection process were logical comparisons of sensory data on the potential farm plots already available to the households in the original model. Similar to the social/emotional factors, rational factors also returned a normalized sub-score of farm plot desirability between 0 and 1. 1) Comparison of quality (FQual): Higher sub-scores were reported for potential farm plots with higher quality of land. 2) Comparison of dryness (FDry): Higher sub-scores were reported for potential farm plots with higher dryness of land. 3) Comparison of yield (FY eild): Higher sub-scores were reported for potential farm plots that were known to have higher yield in the previous year. 4) Water availability (FW ater): Higher sub-scores were reported for potential farm plots with more nearby water sources. 5) Comparison of distance (FDist): Higher sub-scores were reported for potential farm plots that were closer to the current farm plot location. Evolutionary model discovery Evolutionary model discovery allows agent-based modelers to explore the importance of a hypothesized set of factors affecting individual-level decision making towards a macro, society-level outcome. Accordingly, evolutionary model discovery requires the modeler to identify the particular agent behavior rule being evaluated within the original agent-based model. The modeler must also provide a set of hypothesized August 21, 2019 5/16 factors and combining operators that the modeler hypothesizes to affect the decision-making process represented by the agent behavior rule. A factor Fi ∈ F , where F is the modeler's set of hypothetical factors and operators, is defined as in Eq (3). Where C is the set of commands defined within F that are applied on the n number of input parameters P to produce an output return value R, where the type of each parameter tPj and the type of the return value tR are each an element of the set T of all possible parameter and return types defined by the modeler. A factor is considered an operator if C resembles an operation on one or more factors, which it accepts as parameters, rather than resembling a decision-making step. In order for a factor or operator Fi to accept another Fj as an input, the condition Eq (4) must be met. Fi = (C, R, P tR, tPk ∈ T ∀k = 1...n) ∃k, tRfi = tPfj ,k (3) (4) An agent behavior rule b ∈ B is represented as a tree of factors combined under this condition. Depending on T and the factor definitions, the space of behavior rules B can be infinitely large. To prevent the construction of such undesirably large trees, is we specify a maximum depth for all b. There must be at least one Fi of which tRFi the return type expected by the entire agent behavior rule. Given the ABM and F , evolutionary model discovery performs two stages of analysis. First, models driven by alternate decision making processes consisting of combinations of elements of F are evolved through genetic programming [10, 25, 26]. Genetic programming performs automated program implementation and is a suitable approach towards automating the rule discovery process [11 -- 14]. Genetic programming evolves generations of programs through crossover and mutation operators performed on a representation consisting of primitives and terminals that combine to define program statements. Primitives are defined as a set of functions that encode program statements and may be strongly typed to only accept child and parent primitives that are compatible with the arguments and return statements accepted by its program statement. Primitives with no arguments are considered terminals. The syntax tree representation is perhaps the most common representation used in genetic programming, and arranges the primitives and terminals into a tree structure, a representation compatible with b. Programs in a generation that have a closer fit to data are more likely to be selected for reproduction through crossover and mutation to populate the next generation of programs. Second, factor and factor interaction importance was assessed by random forest feature importance measurement. A random forest regressor was trained on the factor presence to fitness data produced by the genetic program. Random forests are an ensemble learning algorithm consisting of a forest of randomized decision trees [15 -- 17]. The two most common factor importance measurement techniques for random forests are gini importance (or mean decrease in impurity), and permutation importance (or mean decrease in accuracy) [15 -- 17]. However, both gini importance and permutation importance are unable to quantify the importance of factor interactions, as they consider the global importance each factor has for the random forest. Functional analysis of variance [20, 27] is able to quantify the importance of factor interactions, yet lacked precision considering the inherent heteroskedasticity of the data produced by the genetic program, caused by its tendency to explore and test models of higher fitness. Instead, joint contribution [18, 19] was used for this purpose as it has been successfully used to assess the importance of variable interactions in a large number of recent studies [28 -- 34]. August 21, 2019 6/16 Twenty genetic programming runs were executed with the objective of minimizing the (RMSE) between the simulated household count to the actual household count over 550 simulation ticks of the Artificial Anasazi. Details on the RMSE calculation can be found in [14]. In order to ensure robustness of the evolved rules, the parameters of the ABM were randomly initialized with values ±5% about the optimal parameter values found through Stonedahl's calibration of the Artificial Anazasi through a genetic algorithm [5] (ie: water source distance = (10.925, 12.075), death age span = (9.5, 10.5), min fertility = (0.1615, 0.1785), base nutrition need = (175.75, 194.25), fertility span = (0.0285, 0.0315), min fertility ends age = (27.55, 30.45), harvest variance = (0.418, 0.462), harvest adjustment = (0.608, 0.672), maize gift to child = (0.4465, 0.4935), min death age = (38.0, 42.0), fertility ends age span = (4.75, 5.25)). The genetic program was implemented with the Distributed Evolutionary Algorithms in Python library (DEAP) [35] and parallelized by SCOOP [36]. Each genetic program run was executed for 100 generations over populations of 50 individuals. Syntax trees of minimum depth 4 and maximum depth 10 were used to avoid trees exhibiting bloat. The Half-and-Half tree builder was used for initialization [10]. To accommodate the high computational cost, the genetic program runs were distributed across a 48 vcpu Amazon Web Services EC2 instance. The random forest and gini importance algorithm of Scikit-learn [37] were used, while ELI5 [38] was used for permutation accuracy importance, and tree interpreter [19] for joint contribution measurement. Finally, new farm selection strategies were designed taking into account the insights gained through evolutionary model discovery. The robustness of the Artificial Anasazi with these new strategies were tested against the original model by comparing the RMSE of 100 runs of each model under randomized initialization of parameters within the ranges above. Results The resulting best farm selection strategies evolved by the genetic program by run are provided in Table 1 along with their respective RMSE values. 15 of the runs produced RMSE values lower than the current best RMSE in the literature obtained through parameter calibration of the Artificial Anasazi model with the original farm plot selection by closeness (733.6) [39]. All best scoring rules for each run utilized SAll, i.e., the model produced best results when the agents had full information regarding available farm plots as shown in Fig. 1, comparing SAll, SF am, SN eigh, and SP erf over the complete factor presence to fitness data. One-tailed Mann-Whitney U tests comparing the fitness of all rules by their social connectivity configurations confirmed that rules with SAll had significantly (α = 0.05) lower RMSE than the other three configurations: argmaxx∈SAll f (x) (p = 4.856 × 10−154), argmaxx∈SAll f (x) (p = 1.983 × 10−57). Also, rules with SN eigh argmaxx∈SAll were shown to have significantly (alpha=0.05) lower RMSE than those with SF am and SP erf : argmaxx∈SN eigh argmaxx∈SN eigh were shown to have significantly (alpha=0.05) lower RMSE than rules with SP erf : f (x) (p = 0.012). Accordingly, the rest of the argmaxx∈SF am analyses detailed in this paper were performed on rules where the social connectivity configuration was SAll. f (x) < argmaxx∈SN eigh f (x) < argmaxx∈SP erf f (x) (p = 2.339−24). Finally, rules with SF am f (x) < argmaxx∈SF am f (x) (p = 3.535 × 10−14), f (x) < argmaxx∈SF am f (x) (p = 2.045 × 10−113), f (x) < argmaxx∈SP erf f (x) < argmaxx∈SP erf Fig. 2 displays the distribution of RMSE against factor presence, for presence values that were recorded in at least 200 rules across the 20 genetic program runs. Negative correlations to RMSE (higher fitness) are seen between FDist, FQual, FW ater, FY ield, FM ig , FSoc, and FAge, and in general the genetic program favored the positive August 21, 2019 7/16 SNeigh SPerf SFam SAll 1000 1500 Root Mean Squared Error 2000 2500 3000 Fig 1. Best fit to data was obtained under SAll. Comparison of the RMSE produced by the Artificial Anasazi model when agents had full information (SAll), information through family households (SF am), information through the households with most agricultural success (SP erf ), or information through neighboring households (SN eigh). Models that used SAll produced the lowest RMSE overall argmaxx∈SAll argmaxx∈SAll argmaxx∈SAll f (x) (p = 2.045 × 10−113), f (x) (p = 4.856 × 10−154), f (x) (p = 1.983 × 10−57). f (x) < argmaxx∈SF am f (x) < argmaxx∈SN eigh f (x) < argmaxx∈SP erf presence of these factors, and evolved more rules with these factors having a positive effect on farm selection. FDry on the other hand had a negative correlation to RMSE for presence less than 2. FDist -1 0 1 2 3 FWater 4 5 6 -3 -2 FDry -1 0 FYield FQual 1 2 -1 0 1 2 3 4 5 6 8 FMig -1 0 1 FSoc 2 3 -2 -1 0 1 2 3 4 -2 -1 0 FHAge 3 4 6 1 2 FHAgri 3000 2000 1000 2000 1000 2000 1000 r o r r E d e r a u q S n a e M t o o R -1 0 1 2 3 4 5 1 2 0 -1 3 Factor Presence 4 7 -2 -1 0 1 2 3 Fig 2. RMSE vs Factor Presence under SAll. RMSE distributions by factor presence produced by evolutionary model discovery of the farm selection strategy of the Artificial Anasazi under SAll. Only presence values that appeared at least 200 times in the genetic program are displayed. Most factors display negative correlations to RMSE, while FDry shows a positive correlation. The random forest fit the factor presence to fitness data best for a forest of 520 August 21, 2019 8/16 Table 1. The candidate farm selection strategies of models produced by the evolutionary model discovery process along with their best fitness as reported by the genetic programming search. GP Run Best scoring rule (FM ig(x)) 0 (−FDist(x) − FDry(x) + 2 ∗ FM ig(x)) (FY ield(x) + FHAgri(x)) (FM ig(x) − FHAgri(x)) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll argmax x∈SAll (FM ig(x)) (FDist(x)) (FDist(x)) (FY ield(x)) (FM ig(x)) (FQual(x)) (FQual(x)) (FM ig(x)) Best Fitness 753.430820 755.270812 709.502643 738.949931 730.475188 752.519767 728.293210 714.205153 734.249957 701.208243 720.281195 723.633194 687.122260 732.189183 728.772255 706.282521 715.957401 715.468378 701.438522 701.300934 (FDist(x) − FDry(x)) (4 ∗ FDist(x) + FDry(x) + FQual(x) + FW ater(x) + FSoc(x) + FHAge(x)) (FDist(x) + FQual(x) + FW ater(x) − FY ield(x) + FM ig(x) + FSoc(x)) (FDist(x) + FQual(x) + 2 ∗ FY ield(x) + 2 ∗ FM ig(x) + FSoc(x) + FHAgri(x)) (FDist(x) + FSoc(x)) (FDist(x) + 2 ∗ FQual(x) + FY ield(x) + FSoc(x) + 3 ∗ FHAge(x)) (−FDist(x) + FSoc(x) − FHAgri(x)) (FQual(x) + FM ig(x) + FSoc(x)) regression trees, testing from 10 to 1000 trees with a train/test split 90%-10%. Accordingly, a forest of 520 trees was used for factor importance determination. Factor importance under SAll obtained through both the gini importance and permutation accuracy importance techniques can be seen in Fig. 3. Gini importance generally had less precise estimations than permutation accuracy importance. Yet both techniques indicated FQual as the factor of highest importance towards RMSE prediction. FSoc, FM ig, and FDist also scored higher importance values than the other factors hypothesized. Fig. 4 displays the p-values of one-tailed Mann Whitney U tests (alpha=0.05), comparing the permutation importance of each factor A against every other factor B, testing the alternate hypothesis: importance of A ¿ importance of B. According to the results, 7 of the 9 factors showed significant difference and could be ordered in terms of permutation accuracy importance as FQual, FSoc, FDist, FM ig, FW ater, FY ield, FHAgri, FHAge, and FDry. Fig. 5 compares the top ten joint contributions towards RMSE prediction of the random forest by individual factors, and joint contributions of factors considered in August 21, 2019 9/16 Gini Importance Permutation Accuracy Importance FQual FSoc FDist FMig FWater FYield FHAgri FHAge FDry 0.0 0.1 0.2 0.3 0.4 0.4 0.3 0.2 0.1 0.0 Fig 3. FQual, FSoc, FDist, and FM ig have highest Gini and Permutation Accuracy Importance. Gini importance and permutation accuracy importance of the hypothesized factors towards a random forest's ability to predict the models' RMSE. Gini importance results are less decisive than permutation accuracy importance. Both techniques agree that FQual, FSoc, FDist, and FM ig are the most important factors. FDry FHAge FHAgri FYield FWater FMig FDist FSoc FQual 5.2e-01 9.1e-05 9.1e-05 9.1e-05 9.1e-05 B 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 5.2e-01 1.0e+00 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 5.2e-01 1.0e+00 1.0e+00 9.1e-05 9.1e-05 9.1e-05 9.1e-05 9.1e-05 5.2e-01 1.0e+00 1.0e+00 1.0e+00 9.1e-05 9.1e-05 9.1e-05 9.1e-05 5.2e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 9.1e-05 1.6e-04 4.4e-02 5.2e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 9.1e-05 1.1e-03 5.2e-01 9.6e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 9.1e-05 5.2e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 5.2e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 A FQual FSoc FDist FMig FWater FYield FHAgri FHAge FDry Fig 4. Statistical confirmation of the existence of order by importance among causal factors. Results from systematic Mann-Whitney U tests on the permutation accuracy importance results. The cells contain p-values for the alternate hypothesis that A > B (null hypothesis A = B). Green cells indicate agreement of the alternate hypothesis. The results indicate a clear ordering of the factors by importance. pairs and triples. Again, FQual demonstrates far higher importance than any other factor or factor interaction. The factor pairs (FQual, FM ig) and (FQual, FSoc) also demonstrate high importance, followed by (FQual, FM ig, FSoc), (FDry, FQual, FM ig), and (FDist, FQual, FSoc). Overall, FQual is present in all highest scoring joint contributions. Despite FDry having very low individual importance, FDry showed higher importance when considered in combination with FQual and FM ig. August 21, 2019 10/16 n o i t c a r e t n I r o t c a F ['FQual'] ['FQual', 'FMig'] ['FQual', 'FSoc'] ['FQual', 'FMig', 'FSoc'] ['FDry', 'FQual', 'FMig'] ['FDist', 'FQual', 'FSoc'] 0.0 0.2 0.8 1.0 Normalized Contribution to Random Forest Prediction 0.4 0.6 Fig 5. FQual, [FQual,FMig], and [FQualFSoc] have highest joint contribution to farm plot selection. Ordered barchart of highest normalized joint contribution scores of factors and interactions of three or less under SAll. Again, FQual shows a far larger contribution to the random forest's ability to predict model RMSE than other factors and factor interactions, and is present in all of the highest contributing interactions. Interactions [FQual,FM ig ] and [FQual,FSoc] also demonstrate high joint contribution. Considering the evidence of FQual, FSoc, FM ig, FDist, and FDry as important factors, Fig. 6 demonstrates Mann Whitney U tests conducted for each factor Fi, for the alternate hypothesis that RMSE when presence of Fi was A, is less than the RMSE when presence of Fi was B in rules with SAll. Models with positive presence of FQual, FSoc, FDist, and FM ig showed significantly higher fitness (with the exception of when presence of FM ig = -2). Models with strong positive or negative presence of FDry showed lower RMSE overall, most likely a result of FDry's interaction with FQual, FSoc, or FM ig. The lowest median RMSE for (FQual, FSoc) was 985 at presence of FSoc at 5 and presence of FQual at; the lowest median RMSE for (FQual, FM ig) was 997 at presence of FM ig at 3 and presence of FQual at 5. Finally, rules following the three highest joint contributions were constructed using the best values for each factor concerned: argmaxx∈SAll(FQual(x)), argmaxx∈SAll(5FSoc(x) + 6FQual(x)), and argmaxx∈SAll(3FM ig(x) + 5FQual(x)), and RMSE was compared against the original farm selection strategy argmaxx∈SAll(−FDist(x)) for 100 runs each under random initialization of parameters within the ranges specified in section . Fig. 7 shows that all three of these rules derived through evolutionary model discovery have significantly lower RMSE than that of the original farm selection strategy under randomized parameter initialization. Discussion and Conclusion Despite being an excellent tool for the construction and analysis of human-interpretable explanations of social phenomena, ABMs risk premature assumptions when modeling individuals' decision-making processes. Parameter calibration alone cannot adequately explore the causal factors and their possible interactions in order to infer more accurate decision-making processes. This is primarily due to the absence of a systematic method for behavior inference and discovery. We address this issue with the introduction of evolutionary model discovery, which is able to distinguish, out of a hypothesized set, the causal factors that are important to simulate the behavior of interest. By combining automated program generation of genetic programming with feature importance evaluation of random forests, evolutionary model discovery is able to quantify the importance of these factors August 21, 2019 11/16 FQual FSoc FMig A -1 0 1 2 3 4 5 6 8 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.1e-26 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 5.0e-48 1.5e-66 5.0e-01 9.6e-01 1.0e+00 1.0e+00 9.7e-01 8.0e-01 9.9e-01 3.1e-46 2.1e-33 3.7e-02 5.0e-01 1.0e+00 1.0e+00 8.7e-01 6.4e-01 9.8e-01 1.2e-52 1.3e-43 6.9e-08 8.2e-04 5.0e-01 6.1e-01 3.4e-01 2.3e-01 8.2e-01 A 3.1e-44 2.8e-26 8.4e-06 2.3e-03 3.9e-01 5.0e-01 2.8e-01 2.1e-01 7.7e-01 2.7e-24 3.7e-08 3.4e-02 1.3e-01 6.6e-01 7.2e-01 5.0e-01 3.7e-01 8.5e-01 2.6e-14 5.4e-04 2.0e-01 3.6e-01 7.7e-01 7.9e-01 6.3e-01 5.0e-01 8.8e-01 6.7e-19 2.7e-07 5.1e-03 2.1e-02 1.8e-01 2.3e-01 1.5e-01 1.2e-01 5.0e-01 -1 0 4 1 2 -1 0 1 2 3 4 5 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 5.4e-05 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 5.7e-13 4.2e-22 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.9e-18 1.3e-24 4.7e-04 5.0e-01 8.2e-01 8.5e-01 9.3e-01 A 9.4e-14 3.9e-11 1.8e-03 1.8e-01 5.0e-01 5.5e-01 7.4e-01 2.3e-12 1.9e-09 2.8e-03 1.5e-01 4.5e-01 5.0e-01 6.9e-01 7.6e-12 7.3e-09 1.4e-03 7.0e-02 2.6e-01 3.1e-01 5.0e-01 -2 -1 0 1 2 3 4 6 5.0e-01 1.1e-03 3.7e-01 9.3e-01 9.8e-01 1.0e+00 9.8e-01 9.9e-01 1.0e+00 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 6.3e-01 5.7e-12 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 7.2e-02 3.8e-26 1.5e-27 5.0e-01 9.9e-01 1.0e+00 9.2e-01 9.8e-01 1.7e-02 2.8e-25 8.2e-16 1.1e-02 5.0e-01 9.5e-01 7.3e-01 9.1e-01 2.0e-03 1.3e-19 3.6e-10 7.8e-04 4.5e-02 5.0e-01 3.4e-01 5.7e-01 2.1e-02 8.0e-09 6.5e-04 7.6e-02 2.7e-01 6.6e-01 5.0e-01 6.7e-01 6.4e-03 4.7e-11 2.5e-05 1.5e-02 9.3e-02 4.3e-01 3.3e-01 5.0e-01 3 B 5 6 8 -1 0 1 FDry A -3 -2 -1 0 1 2 5.0e-01 7.0e-01 1.8e-01 7.6e-02 8.3e-03 9.4e-01 3.0e-01 5.0e-01 7.9e-04 1.3e-06 5.0e-10 9.5e-01 8.2e-01 1.0e+00 5.0e-01 2.1e-02 6.4e-06 1.0e+00 9.2e-01 1.0e+00 9.8e-01 5.0e-01 8.5e-05 1.0e+00 9.9e-01 1.0e+00 1.0e+00 1.0e+00 5.0e-01 1.0e+00 5.8e-02 4.8e-02 5.4e-05 1.2e-06 4.5e-09 5.0e-01 2 B A -1 0 1 2 3 4 5 6 3 4 5 -2 -1 0 1 2 3 4 6 B FDist 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.5e-13 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 5.2e-22 7.2e-13 5.0e-01 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.0e+00 1.9e-32 6.3e-25 2.6e-08 5.0e-01 5.9e-01 7.2e-01 8.9e-01 9.8e-01 1.6e-23 1.6e-12 2.9e-05 4.1e-01 5.0e-01 6.5e-01 8.5e-01 9.7e-01 1.5e-18 4.5e-09 2.0e-04 2.8e-01 3.5e-01 5.0e-01 7.7e-01 9.5e-01 4.2e-13 8.4e-07 4.8e-04 1.1e-01 1.5e-01 2.3e-01 5.0e-01 8.2e-01 7.9e-11 1.8e-06 2.0e-04 2.0e-02 3.3e-02 5.3e-02 1.8e-01 5.0e-01 -3 -2 -1 B 0 1 2 -1 0 1 2 3 4 5 6 B Fig 6. Optimal presence scores for causal factors with highest importance. Results from systematic one-tailed Mann-Whitney U tests between presence values of the 5 most important factors for the alternate hypothesis: RMSE for presence A < RMSE for presence B (null hypothesis: RMSE for presence A = RMSE for presence B) for α = 0.05. Green cells indicate agreement of the alternate hypothesis. Results indicate that for FQual, FSoc, FM ig, and FDist RMSE is generally lower for higher, positive presence. For FDry, both negative and higher positive presence may provide low RMSE scores. Fig 7. Models designed through evolutionary model discovery insights are significantly more robust. Comparison between the RMSE of 100 runs of three models with farm selection strategies designed taking into consideration the insights from evolutionary model discovery, 1) argmaxx∈SAll(FQual(x)), 2) argmaxx∈SAll(5FSoc(x) + 6FQual(x)), and 3) argmaxx∈SAll(3FM ig(x) + 5FQual(x)), against 100 runs of the original farm selection strategy argmaxx∈SAll(−FDist(x)) in [22 -- 24, 39], under random initialization of parameters. The three farm selection strategies derived from evolutionary model discovery are far more robust under random parameter initialization and show significantly better RMSE scores compared to the original model. to the decision-making process that result in society-level phenomena simulated by the ABM. This allows for the construction of agent rules that more accurately represent the actual decision-making process of individuals and result in more robust models. August 21, 2019 12/16 Applying evolutionary model discovery on the Artificial Anasazi we show that the socio-agricultural behavior of the ancestral Pueblo of the Long House Valley was more deliberative and informed than originally assumed. Our results indicate that, contrary to the original farm selection behavior, where households would select the next closest possible plot of land once their present farm was depleted, the households most likely selected potential farming land with higher soil quality (FQual). Further, it was highly likely that the households had good knowledge of the potential arable land throughout the valley, since SAll was the best social connectivity configuration for information spread. Also, the desire to congregate into communities was indicated, as positive desire for social presence (FSoc) was the second most important factor, and acting on information on arable land known to neighboring households (SN eigh) was the second most successful social connectivity configuration. Further, instead of choosing closer potential farm plots (−FDist), choosing farm plots that were further away from the households current farm plot (FDist) or moving to a completely different zone in the region (FM ig ) was found to be a more likely behavior. Finally, versions of the Artificial Anasazi where farm plot selection was driven by seeking higher quality land, higher quality land with more social presence, and higher quality land in different zones, all proved to be significantly more robust than the decision to move to the next closest available plot of land (Fig. 7). Supporting information S1 File. EvolutionaryModelDiscoveryArtificialAnasazi.zip This archive contains the Evolutionary Model Discovery Python source code. This Python package is also being actively maintained at: https://github.com/chathika/evolutionarymodeldiscovery and documentation is available at https://evolutionarymodeldiscovery.readthedocs.io/en/latest/. NetLogo models of the Artificial Anasazi with the best . S1 Table. FactorScores.csv Factor presence to model fitness data produced by the 20 genetic programming runs on the Artificial Anasazi. Acknowledgments This research was supported by DARPA SocialSim program HR001117S0018 and Amazon AWS Research Grant. References 1. Epstein JM. Agent Zero: Toward Neurocognitive Foundations for Generative Social Science. Princeton, NJ: Princeton University Press; 2013. 2. Epstein JM. Agent-based computational models and generative social science. Complexity. 1999;4(5): 41 -- 60. 3. Grimm V, Revilla E, Berger U, Jeltsch F, Mooij WM, Railsback SF, et al. Pattern-oriented modeling of agent-based complex systems: lessons from ecology. Science. 2005;310(5750): 987 -- 991. 4. Grune-Yanoff T. The explanatory potential of artificial societies. Synthese. 2009;169(3): 539 -- 555. August 21, 2019 13/16 5. Stonedahl F, Wilensky U. BehaviorSearch [computer software]. Center for Connected Learning and Computer Based Modeling, Northwestern University, Evanston, IL Available online: http://www.behaviorsearch.org. 2010. 6. Wilensky U. NetLogo [computer software]. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL. Available online: http://ccl.northwestern.edu/netlogo/. 1999. 7. Laguna M, Marti R. The OptQuest callable library. Optimization software class libraries. Springer; 2003. pp. 193 -- 218. 8. Borshchev A. The big book of simulation modeling: multimethod modeling with AnyLogic 6. AnyLogic North America Chicago; 2013. 9. DeDeo S, Krakauer DC, Flack JC. Inductive game theory and the dynamics of animal conflict. PLoS computational biology. 2010;6(5): e1000782. 10. Koza JR. Genetic programming: on the programming of computers by means of natural selection. vol. 1. MIT press; 1992. 11. Manson SM. Agent-based modeling and genetic programming for modeling land change in the Southern Yucatan Peninsular Region of Mexico. Agriculture, ecosystems & environment. 2005;111(1): 47 -- 62. 12. Manson SM. Bounded rationality in agent-based models: experiments with evolutionary programs. International Journal of Geographical Information Science. 2006;20(9): 991 -- 1012. 13. Zhong J, Luo L, Cai W, Lees M. Automatic rule identification for agent-based crowd models through gene expression programming. In: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multi-agent Systems; 2014. pp. 1125 -- 1132. 14. Gunaratne C, Garibay I. Alternate social theory discovery using genetic programming: towards better understanding the artificial anasazi. In: Proceedings of the Genetic and Evolutionary Computation Conference. ACM; 2017. pp. 115 -- 122. 15. Breiman L. Manual on setting up, using, and understanding random forests v3. 1. Statistics Department University of California Berkeley, CA, USA. 2002;1. 16. Genuer R, Poggi JM, Tuleau-Malot C. Variable selection using random forests. Pattern Recognition Letters. 2010;31(14): 2225 -- 2236. 17. Louppe G. Understanding Random Forests: From Theory to Practice. Ph.D. Thesis, The Universit´e de Li`ege, Li`ege, Belgique; 2014. 18. Saabas A. Interpreting random forests. In: Diving into data, 24 [Internet] Available online: https://blog.datadive.net/interpreting-random-forests/. 2014. 19. Saabas A. Treeinterpreter [computer software]. Available online: https://github.com/andosa/treeinterpreter. 2019. 20. Hutter F, Hoos H, Leyton-Brown K. An efficient approach for assessing hyperparameter importance. In: International Conference on Machine Learning; 2014. p. 754 -- 762. August 21, 2019 14/16 21. Stratton RJ. Automated theory selection using agent based models. Ph.D. Thesis, King's College London, UK; 2015. 22. Dean JS, Gumerman GJ, Epstein JM, Axtell RL, Swedlund AC, Parker MT, et al. Understanding Anasazi culture change through agent-based modeling. Dynamics in human and primate societies: Agent-based modeling of social and spatial processes. 2000;pp. 179 -- 205. 23. Janssen M A. Understanding artificial anasazi. Journal of Artificial Societies and Social Simulation. 2009;12(4): 13 24. Stonedahl F, Wilensky U. Artificial Anasazi model [computer software] Available from: http://ccl.northwestern.edu/netlogo/models/ArtificialAnasazi. 2010. 25. Langdon WB, Harman M. Optimizing existing software with genetic programming. IEEE Transactions on Evolutionary Computation. 2014;19(1): 118 -- 135. 26. Petke J, Haraldsson SO, Harman M, Langdon WB, White DR, Woodward JR. Genetic improvement of software: a comprehensive survey. IEEE Transactions on Evolutionary Computation. 2017;22(3): 415 -- 432. f 27. Dang N, De Causmaecker P. Analysis of algorithm components and parameters: some case studies. In: International Conference on Learning and Intelligent Optimization. Springer. 2018; pp. 288 -- 303 2018;. 28. Lundberg SM, Erion GG, Lee SI. Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:180203888. 2018;. 29. Smith EM, Nantes A, Hogue A, Papas I. Forecasting customer behaviour in constrained E-commerce platforms. In: 8th International Conference of Pattern Recognition Systems (ICPRS 2017). IET; 2017. pp. 1 -- 8. 30. Beillevaire M. Inside the Black Box: How to Explain Individual Predictions of a Machine Learning Model : How to automatically generate insights on predictive model outputs, and gain a better understanding on how the model predicts each individual data point. KTH, School of Electrical Engineering and Computer Science (EECS); 2018. 31. Rea C, Erickson K, Granetz R, Johnson R, Eidietis N, Montes K, et al. Initial Results of a Machine Learning-based Real Time Disruption Predictor on DIII-D. In: Proc. 45th EPS Conf. on Plasma Physics, Europhysics Conf. Abstracts. vol. 42; 2018. 32. Granetz R, Rea C, Montes K, Tinguely R, Eidietis N, Meneghini O, et al. Machine learning for disruption warning on ALCATOR C-MOD, DIII-D, and EAST tokamaks. In: Proc. 27th IAEA Fusion Energy Conference, IAEA, Vienna; 2018. 33. Morice-Atkinson X, Hoyle B, Bacon D. Learning from the machine: interpreting machine learning algorithms for point-and extended-source classification. Monthly Notices of the Royal Astronomical Society. 2018;481(3): 4194 -- 4205. 34. Bastrakova E. Improving interpretability of complex predictive models. Universitat Polit`ecnica de Catalunya; 2017. August 21, 2019 15/16 35. Fortin FA, De Rainville FM, Gardner MA, Parizeau M, Gagn´e C. DEAP: Evolutionary Algorithms Made Easy. Journal of Machine Learning Research. 2012;13: 2171 -- 2175. 36. Hold-Geoffroy Y, Gagnon O, Parizeau M. Once you SCOOP, no need to fork. In: Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment. ACM; 2014. p. 60. 37. Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, et al. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research. 2011;12: 2825 -- 2830. 38. Korobov M, Lopuhin K. Permutation Importance; Available from: https://eli5.readthedocs.io/en/latest/blackbox/permutation_importance.html. 2019. 39. Stonedahl F, Wilensky U. Evolutionary Robustness Checking in the Artificial Anasazi Model. In: AAAI Fall Symposium: Complex Adaptive Systems; 2010. pp. 120 -- 129. August 21, 2019 16/16
1301.2678
2
1301
2013-01-22T09:22:30
Verification of Agent-Based Artifact Systems
[ "cs.MA", "cs.AI", "cs.LO" ]
Artifact systems are a novel paradigm for specifying and implementing business processes described in terms of interacting modules called artifacts. Artifacts consist of data and lifecycles, accounting respectively for the relational structure of the artifacts' states and their possible evolutions over time. In this paper we put forward artifact-centric multi-agent systems, a novel formalisation of artifact systems in the context of multi-agent systems operating on them. Differently from the usual process-based models of services, the semantics we give explicitly accounts for the data structures on which artifact systems are defined. We study the model checking problem for artifact-centric multi-agent systems against specifications written in a quantified version of temporal-epistemic logic expressing the knowledge of the agents in the exchange. We begin by noting that the problem is undecidable in general. We then identify two noteworthy restrictions, one syntactical and one semantical, that enable us to find bisimilar finite abstractions and therefore reduce the model checking problem to the instance on finite models. Under these assumptions we show that the model checking problem for these systems is EXPSPACE-complete. We then introduce artifact-centric programs, compact and declarative representations of the programs governing both the artifact system and the agents. We show that, while these in principle generate infinite-state systems, under natural conditions their verification problem can be solved on finite abstractions that can be effectively computed from the programs. Finally we exemplify the theoretical results of the paper through a mainstream procurement scenario from the artifact systems literature.
cs.MA
cs
Verification of Agent-Based Artifact Systems Francesco Belardinelli Laboratoire Ibisc, Universit´e d'Evry, France Alessio Lomuscio Department of Computing, Imperial College London, UK Fabio Patrizi Dipartimento di Ingegneria Informatica, Automatica e Gestionale "A. Ruberti" Universit`a di Roma "La Sapienza", Italy [email protected] [email protected] [email protected] Abstract Artifact systems are a novel paradigm for specifying and implementing business processes described in terms of interacting modules called artifacts. Artifacts consist of data and lifecy- cles, accounting respectively for the relational structure of the artifacts' states and their possible evolutions over time. In this paper we put forward artifact-centric multi-agent systems, a novel for- malisation of artifact systems in the context of multi-agent systems operating on them. Differently from the usual process-based models of services, the semantics we give explicitly accounts for the data structures on which artifact systems are defined. We study the model checking problem for artifact-centric multi-agent systems against speci- fications written in a quantified version of temporal-epistemic logic expressing the knowledge of the agents in the exchange. We begin by noting that the problem is undecidable in general. We then identify two noteworthy restrictions, one syntactical and one semantical, that enable us to find bisimilar finite abstractions and therefore reduce the model checking problem to the instance on fi- nite models. Under these assumptions we show that the model checking problem for these systems is EXPSPACE-complete. We then introduce artifact-centric programs, compact and declarative representations of the programs governing both the artifact system and the agents. We show that, while these in principle generate infinite-state systems, under natural conditions their verification problem can be solved on finite abstractions that can be effectively computed from the programs. Finally we exemplify the theoretical results of the paper through a mainstream procurement sce- nario from the artifact systems literature. 1. Introduction Much of the work in the area of reasoning about knowledge involves the development of formal techniques for the representation of epistemic properties of rational actors, or agents, in a multi- agent system (MAS). The approaches based on modal logic are often rooted on interpreted sys- tems (Parikh & Ramanujam, 1985), a computationally grounded semantics (Wooldridge, 2000) used for the interpretation of several temporal-epistemic logics. This line of research was thoroughly ex- plored in the 1990s leading to a significant body of work (Fagin, Halpern, Moses, & Vardi, 1995). Further significant explorations have been conducted since then; a recent topic of interest has fo- cused on the development of automatic techniques, including model checking (Clarke, Grumberg, & Peled, 1999), for the verification of temporal-epistemic specifications for the autonomous agents in a MAS (Gammie & van der Meyden, 2004; Kacprzak, Nabialek, Niewiadomski, Penczek, P´olrola, Szreter, Wozna, & Zbrzezny, 2008; Lomuscio, Qu, & Raimondi, 2009). This has led to develop- ments in a number of areas traditionally outside artificial intelligence, knowledge representation 1 and MAS, including security (Dechesne & Wang, 2010; Ciobaca, Delaune, & Kremer, 2012), web- services (Lomuscio, Solanki, Penczek, & Szreter, 2010) and cache-coherence protocols in hardware design (Baukus & van der Meyden, 2004). The ambition of the present paper is to offer a simi- lar change of perspective in the area of artifact systems (Cohn & Hull, 2009), a growing topic in Service-Oriented Computing (SOC). Artifacts are structures that "combine data and process in an holistic manner as the basic building block[s]" (Cohn & Hull, 2009) of systems' descriptions. Artifact systems are services constituted by complex workflow schemes based on artifacts which the agents interact with. The data component is given by the relational databases underpinning the artifacts in a system, whereas the workflows are described by "lifecycles" associated with each artifact schema. While in the standard services paradigm services are made public by exposing their processes interface, in artifact systems both the data structures and the lifecycles are advertised. Services are composed in a "hub" where op- erations on the artifacts are executed. Implementations of artifact systems, such as the IBM engine BARCELONA (Heath, Hull, & Vacul´ın, 2011), provide a hub where the service choreography and service orchestratation (Alonso, Casati, Kuno, & Machiraju, 2004) are carried out. While artifact systems are beginning to drive new application areas, such as case management systems (Marin, Hull, & Vacul´ın, 2012), we identify two shortcomings in the present state-of-the- art. Firstly, the artifact systems literature (Bhattacharya, Gerede, Hull, Liu, & Su, 2007; Deutsch, Hull, Patrizi, & Vianu, 2009; Hull, 2008; Nooijen, Fahland, & Dongen, 2012) focuses exclusively on the artifacts themselves. While there is obviously a need to model and implement the artifact infrastructure, importantly we also need to account for the agents implementing the services acting on the artifact system. This is of particular relevance given that artifact systems are envisaged to play a leading role in information systems. We need to be able to reason not just about the artifact states but also about what actions specific participants are allowed and not allowed to do, what knowledge they can or cannot derive in a system run, what system state they can achieve in coordination with their peers, etc. In other words, we need to move from the description of the artifact infrastructure to one that encompasses both the agents and the infrastructure. Secondly, there is a pressing demand to provide the hub with automatic choreography and or- chestration capabilities. It is well-known that choreography techniques can be leveraged on auto- matic model checking techniques; orchestration can be recast as a synthesis problem, which, in turn, can also benefit from model checking technology. However, while model checking and its applications are relatively well-understood in the plain process-based modelling, the presence of data makes these problems much harder and virtually unexplored. Additionally, infinite domains in the underlying databases lead to infinite state-spaces and undecidability of the model checking problem. The aim of this paper is to make a concerted contribution to both problems above. Firstly, we provide a computationally grounded semantics to systems comprising the artifact infrastructure and the agents operating on it. We use this semantics to interpret a temporal-epistemic language with first-order quantifiers to reason about the evolution of the hub as well as the knowledge of the agents in the presence of evolving, structured data. We observe that the model checking problem for these structures is undecidable in general and analyse two notable decidable fragments. In this context, a contribution we make is to provide finite abstractions to infinite-state artifact systems, thereby presenting a technique for their effective verification for a class of declarative agent-based, artifact-centric programs that we here define. We evaluate this methodology by studying its compu- 2 tational complexity and by demonstrating its use on a well-known scenario from the artifact systems literature. 1.1 Artifact-Centric Systems Service-oriented computing is concerned with the study and development of distributed applica- tions that can be automatically discovered and composed by means of remote interfaces. A point of distinction over more traditional distributed systems is the interoperability and connectedness of ser- vices and the shared format for both data and remote procedure calls. Two technology-independent concepts permeate the service-oriented literature: orchestration and choreography (Alonso et al., 2004; Singh & Huhns, 2005). Orchestration involves the ordering of actions of possibly different services, facilitated by a controller or orchestrator, to achieve a certain overall goal. Choreogra- phy concerns the distributed coordination of different actions through publicly observable events to achieve a certain goal. A MAS perspective (Wooldridge, 2001) is known to be particularly helpful in service-oriented computing in that it allows us to ascribe information states and private or com- mon goals to the various services. Under this view the agents of the system implement the services and interact with one another in a shared infrastructure or environment. A key theoretical problem in SOC is to devise effective mechanisms to verify that service com- position is correct according to some specification. Techniques based on model checking (Clarke et al., 1999) and synthesis (Berardi, Cheikh, Giacomo, & Patrizi, 2008) have been put forward to solve the composition and orchestration problem for services described and advertised at inter- face level through finite state machines (Calvanese, Giacomo, Lenzerini, Mecella, & Patrizi, 2008). More recently, attention has turned to services described by languages such as WS-BPEL (Alves et al., 2007), which provide potentially unbounded variables in the description of the service pro- cess. Again, model checking approaches have successfully been used to verify complex service compositions (Bertoli, Pistore, & Traverso, 2010; Lomuscio, Qu, & Solanki, 2012). While WS-BPEL provides a model for services with variables, the data referenced by them is non-permanent. The area of data-centric workflows (Hull, Narendra, & Nigam, 2009; Nigam & Caswell, 2003) evolved as an attempt to provide support for permanent data, typically present in the form of underlying databases. Although usually abstracted away, permanent data is of central importance to services, which typically query data sources and are driven by the answers they obtain; see, e.g., (Berardi, Calvanese, Giacomo, Hull, & Mecella, 2005). Therefore, a faithful model of a service behavior cannot, in general, disregard this component. In response to this, proposals have been made in the workflows and service communities in terms of declarative specifications of data-centric services that are advertised for automatic discovery and composition. The artifact- centric approach (Cohn & Hull, 2009) is now one of the leading emerging paradigms in the area. As described in (Hull, 2008; Hull, Damaggio, De Masellis, Fournier, Gupta, Heath, Hobson, Linehan, Maradugu, Nigam, Sukaviriya, & Vaculin, 2011) artifact-centric systems can be presented along four dimensions. Artifacts are the holders of all structured information available in the system. In a business- oriented scenario this may include purchase orders, invoices, payment records, etc. Artifacts may be created, amended, and destroyed at run time; however, abstract artifact schemas are provided at design time to define the structure of all artifacts to be manipulated in the system. Intuitively, external events cause changes in the system, including in the value of artifact attributes. 3 The evolution of artifacts is governed by lifecycles. These capture the changes that an artifact may go through from creation to deletion. Intuitively, a purchase order may be created, amended and operated on by several events before it is fullfilled and its existence in the system terminated: a lifecycle associated with a purchase order artifact formalises these transitions. Services are seen as the actors operating on the artifact system. They represent both human and software actors, possibly distributed, that generate events on the artifact system. Some services may "own" artifacts, and some artifacts may be shared by several services. However, not all artifacts, or parts of artifacts, are visible to all services. Views and windows respectively determine which parts of artifacts and which artifact instances are visible to which service. An artifact hub is a system that maintains the artifact system and processes the events generated by the services. Services generate events on the artifact system according to associations. Typically these are declarative descriptions providing the precondition and postconditions for the generation of events. These generate changes in the artifact system according to the artifact lifecycles. Since events may trigger changes in several artifacts in the system, events are processed by a well-defined seman- tics (Damaggio, Hull, & Vacul´ın, 2011; Hull et al., 2011) that governs the sequence of changes an artifact-system may undertake upon consumption of an event. Such a semantics, based on the use of Prerequisite-Antecedent-Consequent (PAC) rules, ensures acyclicity and full determinism in the updates on the artifact system. GSM is a declarative language that can be used to describe artifact systems. BARCELONA is an engine that can be used to run a GSM-based artifact-centric system (Heath et al., 2011). The above is a partial and incomplete description of the artifact paradigm. We refer to (Cohn & Hull, 2009; Hull, 2008; Hull et al., 2011) for more details. As it will be clear in the next section, in line with the agent-based approach to services, we will use agent-based concepts to model services. The artifact-system will be represented as an environ- ment, constituted by evolving databases, upon which the agents operate; lifecycles and associations will be modelled by local and global transition functions. The model is intended to incorporate all artifact-related concepts including views and windows. In view of the above in this paper we address the following questions. How can we give a transition-based semantics for artifacts and agents operating on them? What syntax should we use to specify properties of the agents and the artifacts themselves? Can we verify that an artifact system satisfies certain properties? As this will be shown to be undecidable, can we find suitable fragments on which this can actually be carried out? If so, what is the resulting complexity? Lastly, can we provide declarative specifications for the agent programs so that these can be verified by model checking? Can this technique be used on mainstream scenarios from the SOC literature? This paper intends to contribute answering these questions. 1.2 Related Work As stated above, virtually all current literature on artifact-centric systems focuses on properties and implementations of the artifact-system as such. Little or no attention is given to the actors on the system, whether they are human or artificial agents. A few formal techniques have, however, been put forward to verify the core, non-agent aspects of the system; in the following we briefly compare these to this contribution. To our knowledge the verification of artifact-centric business processes was first discussed in (Bhattacharya et al., 2007), where reachability and deadlocks are phrased in the context of 4 artifact-centric systems and complexity results for the verification problem are given. The present contribution differs markedly from (Bhattacharya et al., 2007) by employing a more expressive specification language, even if the agent-related aspects are not considered, and by putting forward effective abstraction procedures for verification. In (Gerede & Su, 2007) a verification technique for artifact-centric systems against a variant of computation-tree logic is put forward. The decidability of the verification problem is proven for the language considered under the assumption that the interpretation domain is bounded. Decidability is also shown for the unbounded case by making restrictions on the values that quantified variables can range over. In the work here presented we also work on unbounded domains, but do not require the restrictions present in (Gerede & Su, 2007): we only insist on the fact that the number of distinct values in the system does not exceed a given threshold at any point in any run. Most importantly, the interplay between quantification and modalities here considered allows us to bind and use variables in different states. This is a major difference as this feature is very expressive and known to lead to undecidability. A related line of research is followed in (Deutsch et al., 2009; Damaggio, Deutsch, & Vianu, 2012), where the verification problem for artifact systems against two variants of first-order linear- time temporal logic is considered. Decidability of the verification problem is retained by imposing syntactic restrictions on both the system descriptions and the specifications to check. This effec- tively limits the way in which new values introduced at every computational step can be used by the system. Properties based on arithmetic operators are considered in (Damaggio et al., 2012). While there are elements of similarity between these approaches and the one we put forward here, includ- ing the fact that the concrete interpretation domain is replaced by an abstract one, the contribution here presented has significant differences from these. Firstly, our setting is branching-time and not linear-time thereby resulting in different expressive power. Secondly, differently from (Deutsch et al., 2009; Damaggio et al., 2012), we impose no constraints on nested quantifiers. In contrast, (Damaggio et al., 2012) admits only universal quantification over combinations of quantifier-free first-order formulas. Thirdly, the abstraction results we present here are given in general terms on the semantics of declarative programs and do not depend on a particular presentation of the system. More closely related to the present contribution is (Hariri, Calvanese, Giacomo, Deutsch, & Montali, 2012), where conditions for the decidability of the model checking problem for data- centric dynamic systems, e.g., dynamic systems with relational states, are given. In this case the specification language used is a first-order version of the µ-calculus. While our temporal fragment is subsumed by the µ-calculus, since we use indexed epistemic modalities as well as a common knowledge operator, the two specification languages have different expressive power. To retain decidability, like we do here, the authors assume a constraint on the size of the states. However, differently from the contribution here presented, (Hariri et al., 2012) assume limited forms of quan- tification whereby only individuals persisting in the system evolution can be quantified over. In this contribution we do not make this restriction. Irrespective of what above, the most important feature that characterises our work is that the set-up is entirely based on epistemic logic and multi-agent systems. We use agents to represent the autonomous services operating in the system and agent-based concepts play a key role in the modelling, the specifications, and the verification techniques put forward. Differently from all ap- proaches presented above we are not only concerned with whether the artifact-system meets a par- ticular specification. Instead, we also wish to consider what knowledge the agents in the system acquire by interacting among themselves and with the artifact-system during a system run. Ad- 5 ditionally, the abstraction methodology put forward is modular with respect to the agents in the system. These features enable us to give constructive procedures for the generation of finite abstrac- tions for artifact-centric programs associated with infinite models. We are not aware of any work in the literature tackling any of these aspects. Relation to previous work by the authors. This paper combines and expands preliminary results originally discussed in (Belardinelli, Lomuscio, & Patrizi, 2011a), (Belardinelli, Lomuscio, & Patrizi, 2011b), (Belardinelli, Lomuscio, & Patrizi, 2012a), and (Belardinelli, Lomuscio, & Pa- trizi, 2012b). In particular, the technical set up of artifacts and agents is different from that of our preliminary studies and makes it more natural to express artifact-centric concepts such as views. Differently from our previous attempts we here incorporate an operator for common knowledge and provide constructive methods to define abstractions for all notions of bisimulation. We also con- sider the complexity of the verification problem, previously unexplored, and evaluate the technique in detail on a case study. 1.3 Scheme of the Paper The rest of the paper is organised as follows. In Section 2 we introduce Artifact-centric Multi- Agent Systems (ACMAS), the semantics we will be using throughout the paper to describe agents operating on an artifact system. In the same section we put forward FO-CTLK, a first-order logic with knowledge and time to reason about the evolution of the knowledge of the agents and the artifact system. This enables us to propose a satisfaction relation based on the notion of bounded quantification, define the model checking problem, and highlight some properties of isomorphic states. An immediate result we will explore concerns the undecidability of the model checking problem for ACMAS in their general setting. Section 3 is concerned with synctactical restrictions on FO- CTLK that enable us to guarantee the existence of finite abstractions of infinite-state ACMAS, thereby making the model checking problem feasible by means of standard techniques. Section 4 tackles restrictions orthogonal to those of Section 3 by focusing on a subclass of ACMAS that admits a decidable model checking problem when considering full FO-CTLK specifi- cations. The key finding here is that bounded and uniform ACMAS, a class identified by studying a strong bisimulation relation, admit finite abstractions for any FO-CTLK specification. The section concludes by showing that under these restrictions the model checking problem is EXPSPACE- complete. We turn our attention to artifact programs in Section 6 by defining the concept of artifact-centric programs. We define them through natural, first-order preconditions and postconditions in line with the artifact-centric approach. We give a semantics to them in terms of ACMAS and show that their generated models are precisely those uniform ACMAS studied earlier in the paper. It follows that, under some boundedness conditions, which can be naturally expressed, the model checking problem for artifact-centric programs is decidable and can be executed on finite models. Section 7 reports a scenario from the artifact systems literature. This is used to exemplify the technique by providing finite abstractions that can be effectively verified. We conclude in Section 8 where we consider the limitations of the approach and point to further work. 6 2. Artifact-Centric Multi-Agent Systems In this section we formalise artifact-centric systems and state their verification problem. As data and databases are important constituents of artifact systems, our formalisation of artifacts relies on them as underpinning concepts. However, as discussed in the previous section, we here give prominence to agent-based concepts. As such, we define our systems as comprising both the artifacts in the system as well as the agents that interact with the system. A standard paradigm for logic-based reasoning about agent systems is interpreted systems (Parikh & Ramanujam, 1985; Fagin et al., 1995). In this setting agents are endowed with private local states and evolve by performing actions according to an individual protocol. As data play a key part, as well as to allow us to specify properties of the artifact system, we will define the agents' local states as evolving database instances. We call this formalisation artifact-centric multi-agent systems (AC- MAS). AC-MAS enable us to represent naturally and concisely concepts much used in the artifact paradigm such as the one of view discussed earlier. Our specification language will include temporal-epistemic logic but also quantification over a domain so as to represent the data. This is an usual verification setting, so we will formally define the model checking problem for this set up. 2.1 Databases and First-Order Logic As discussed above, we use databases as the basic building blocks for defining the states of the agents and the artifact system. We here fix the notation and terminology used. We refer to (Abite- boul, Hull, & Vianu, 1995) for more details on databases. Definition 2.1 (Database Schemas) A (relational) database schema is a set D = {P1/q1, . . . , Pn/qn} of relation symbols Pi, each associated with its arity qi ∈ N. Instances of database schemas are defined over interpretation domains. Definition 2.2 (Database Instances) Given an interpretation domain U and a database schema D, a D-instance over U is a mapping D associating each relation symbol Pi ∈ D with a finite qi-ary relation over U, i.e., D(Pi) ⊆ U qi. The set of all D-instances over an interpretation domain U is denoted by D(U ). We simply refer to "instances" whenever the database schema D is clear by the context. The active domain of an instance D, denoted as adom(D), is the set of all individuals in U occurring in some tuple of some predicate interpretation D(Pi). Observe that, since D contains a finite number of relation symbols and each D(Pi) is finite, so is adom(D). To fix the notation, we recall the syntax of first-order formulas with equality and no function symbols. Let V ar be a countable set of individual variables and C be a finite set of individual constants. A term is any element t ∈ V ar ∪ C. Definition 2.3 (FO-formulas over D) Given a database schema D, the formulas ϕ of the first- order language LD are defined by the following BNF grammar: ϕ ::= t = t′ Pi(t1, . . . , tqi) ¬ϕ ϕ → ϕ ∀xϕ where Pi ∈ D, t1, . . . , tqi is a qi-tuple of terms and t, t′ are terms. 7 We assume "=" to be a special binary predicate with fixed obvious interpretation. To summarise, LD is a first-order language with equality over the relational vocabulary D with no function symbols and with finitely many constant symbols from C. Observe that considering a finite set of constants is not a limitation. Indeed, since we will be working with finite sets of formulas, C can always be defined so as to be able to express any formula of interest. In the following we use the standard abbreviations ∃, ∧, ∨, and 6=. Also, free and bound variables are defined as standard. For a formula ϕ we denote the set of its variables as vars(ϕ), the set of its free variables as free(ϕ), and the set of its constants as const(ϕ). We write ϕ(~x) to list explicitly in arbitrary order all the free variables x1, . . . , xℓ of ϕ. By slight abuse of notation, we treat ~x as a set, thus we write ~x = free(ϕ). A sentence is a formula with no free variables. Given an interpretation domain U such that C ⊆ U, an assignment is a function σ : V ar 7→ U. For an assignment σ, we denote by σ(cid:0)x u(cid:1)(x) = u; and (ii) σ(cid:0)x u(cid:1)(x′) = σ(x′), for every x′ ∈ V ar different from x. For convenience, we extend assignments to constants so that σ(t) = t, if t ∈ C; that is, we assume a Herbrand interpretation of constants. We can now define the semantics of LD. u(cid:1) the assignment such that: (i) σ(cid:0)x Definition 2.4 (Satisfaction of FO-formulas) Given a D-instance D, an assignment σ, and an FO-formula ϕ ∈ LD, we inductively define whether D satisfies ϕ under σ, written (D, σ) = ϕ, as follows: (D, σ) = Pi(t1, . . . , tqi) (D, σ) = t = t′ (D, σ) = ¬ϕ (D, σ) = ϕ → ψ (D, σ) = ∀xϕ iff iff iff iff iff hσ(t1), . . . , σ(tqi)i ∈ D(Pi) σ(t) = σ(t′) it is not the case that (D, σ) = ϕ (D, σ) = ¬ϕ or (D, σ) = ψ A formula ϕ is true in D, written D = ϕ, iff (D, σ) = ϕ, for all assignments σ. for all u ∈ adom(D), we have that (D, σ(cid:0)x u(cid:1)) = ϕ Observe that we adopt an active-domain semantics, that is, quantified variables range only over the active domain of D. Also notice that constants are interpreted rigidly; so, two constants are equal if and only if they are syntactically the same. In the rest of the paper, we assume that every interpretation domain includes C. Also, as a usual shortcut, we write (D, σ) 6= ϕ to express that it is not the case that (D, σ) = ϕ. Finally, we introduce the ⊕ operator on D-instances that will be used later in the paper. Let the n/qn} obtained from D primed version of a database schema D be the schema D′ = {P ′ by syntactically replacing each predicate symbol Pi with its primed version P ′ 1/q1, . . . , P ′ i of the same arity. Definition 2.5 (⊕ Operator) Given two D-instances D and D′, we define D ⊕ D′ as the (D ∪ D′)- instance such that D ⊕ D′(Pi) = D(Pi) and D ⊕ D′(P ′ i ) = D′(Pi). Intuitively, the ⊕ operator defines a disjunctive join of the two instances, where relation symbols in D are interpreted according to D, while their primed versions are interpreted according to D′. 2.2 Artifact-Centric Multi-Agent Systems In the following we introduce the semantic structures that we will use throughout the paper. We define an artifact-centric multi-agent system as a system comprising an environment representing all interacting artifacts in the system and a finite set of agents interacting with such environment. 8 As agents have views of the artifact state, i.e., projections of the status of particular artifacts, we assume the building blocks of their private local states also to be modelled as database instances. In line with the interpreted systems semantics (Fagin et al., 1995) not everything in the agents' states needs to be present in the environment; a portion of it may be entirely private and not replicated in other agents' states. So, we start by introducing the notion of agent. Definition 2.6 (Agent) Given an interpretation domain U, an agent is a tuple A = hD, L, Act, P ri, where: • D is the local database schema; • L ⊆ D(U ) is the set of local states; • Act is the finite set of action types of the form α(~p), where ~p is the tuple of abstract parame- ters; • P r : L 7→ 2Act(U ) is the local protocol function, where Act(U ) is the set of ground actions of the form α(~u) where α(~p) ∈ Act and ~u ∈ U ~p is a tuple of ground parameters. Intuitively, at a given time each agent A is in some local state l ∈ D(U ) that represents all the information agent A has at its disposal. In this sense we follow (Fagin et al., 1995) but require that this information is structured as a database. Again, following standard literature we assume that the agents are autonomous and proactive and perform the actions in Act according to the protocol function P r. In the definition above we distinguish between "abstract parameters" to denote the language in which particular action parameters are given, and their concrete values or "ground parameters". We assume that the agents interact among themselves and with an environment comprising all artifacts in the system. As artifacts are entities involving both data and process, we can see them as collections of database instances paired with actions and governed by special protocols. Without loss of generality we can assume the environment state to be a single database instance including all artifacts in the system. From a purely formal point of view this allows us to represent the environment as a special agent. Of course, in any specific instantiation the environment and the agents will be rather different, exactly in line with the standard propositional version of interpreted systems. We can therefore define the synchronous composition of agents with the environment. Definition 2.7 (Artifact-Centric Multi-Agent Systems) Given an interpretation domain U and a set Ag = {A0, . . . , An} of agents Ai = hDi, Li, Acti, P rii defined on U, an artifact-centric multi- agent system (or AC-MAS) is a tuple P = hS, U, s0, τ i where: • S ⊆ L0 × · · · × Ln is the set of reachable global states; • U is the interpretation domain; • s0 ∈ S is the initial global state; • τ : S × Act(U ) 7→ 2S is the global transition function, where Act(U ) = Act0(U ) × · · · × Actn(U ) is the set of global (ground) actions, and τ (hl0, . . . , lni, hα0(~u0), . . . , αn(~un)i) is defined iff αi(~ui) ∈ P ri(li) for every i ≤ n. 9 As we will see in later sections, AC-MAS are the natural extension of interpreted systems to the first order to account for environments constituted of artifact-centric systems. They can be seen as a specialisation of quantified interpreted systems (Belardinelli & Lomuscio, 2012), a general extension of interpreted systems to the first-order case. In the formalisation above the agent A0 is referred to as the environment E. The environment includes all artifacts in the system as well as additional information to facilitate communication between the agents and the hub, e.g., messages in transit etc. At any given time an AC-MAS is described by a tuple of database instances, representing all the agents in the system as well as the artifact system. A single interpretation domain for all database schemas is given. Note that this does not break the generality of the representation as we can always extend the domain of all agents and the environment before composing them into a single AC-MAS. The global transition function defines the evolution of the system through synchronous composition of actions for the environment and all agents in the system. Much of the interaction we are interested in modelling involves message exchanges with pay- load, hence the action parameters, between agents and the environment, i.e., agents operating on the artifacts. However, note that the formalisation above does not preclude us from modelling agent-to- agent interactions, as the global transition function does not rule out successors in which only some agents change their local state following some actions. Also observe that essential concepts such as views are naturally expressed in AC-MAS by insisting that the local state of an agent includes part of the environment's, i.e., the artifacts the agent has access to. Not all AC-MAS need to have views defined, so it is also possible for the views to be empty. Other artifact-based concepts such as lifecycles are naturally expressed in AC-MAS. As artifacts are modelled as part of the environment, a lifecycle is naturally encoded in AC-MAS simply as the sequence of changes induced by the transition function τ on the fragment of the environment representing the lifecycle in question. We will show an example of this in Section 7. Some technical remarks now follow. To simplify the notation, we denote a global ground action as ~α(~u), where ~α = hα0(p0), . . . , αn(pn)i and ~u = h~u0, . . . , ~uni, with each ~ui of appropriate size. We define the transition relation → on S × S such that s → s′ if and only if there exists a ~α(~u) ∈ Act(U ) such that s′ ∈ τ (s, ~α(~u)). If s → s′, we say that s′ is a successor of s. A run r . from s ∈ S is an infinite sequence s0 → s1 → · · · , with s0 = s. For n ∈ N, we take r(n) = sn. A state s′ is reachable from s if there exists a run r from the global state r(0) = s such that r(i) = s′, for some i ≥ 0. We assume that the relation → is serial. This can be easily obtained by assuming that each agent has a skip action enabled at each local state and that performing skip induces no changes in any of the local states. We consider S to be the set of states reachable from the initial state s0. For convenience we will use also the concept of temporal-epistemic (t.e., for short) run. Formally a t.e. run r from a state s ∈ S is an infinite sequence s0 ❀ s1 ❀ . . . such that s0 = s and si → si+1 or si ∼k si+1, for some k ∈ Ag. A state s′ is said to be temporally-epistemically reachable (t.e. reachable, for short) from s if there exists a t.e. run r from the global state r(0) = s such that for some i ≥ 0 we have that r(i) = s′. Obviously, temporal-epistemic runs include purely temporal runs as a special case. As in plain interpreted systems (Fagin et al., 1995), we say that two global states s = hl0, . . . , lni ni are epistemically indistinguishable for agent Ai, written s ∼i s′, if li = l′ and s′ = hl′ i. Differently from interpreted systems the local equality is evaluated on database instances. Also, notice that we admit U to be infinite, thereby allowing the possibility of the set of states S to be 0, . . . , l′ 10 infinite. AC-MAS. Indeed, unless we specify otherwise, we will assume to be working with infinite-state Finally, for technical reasons it is useful to refer to a global database schema D = D0 ∪ · · · ∪ Dn of an AC-MAS. Every global state s = hl0, . . . , lni is associated with the (global) D-instance Ds ∈ D(U ) such that Ds(Pi) = Sj∈Ag lj(Pi), for Pi ∈ D. We omit the subscript s when s is clear from the context and we write adom(s) for adom(Ds). Notice that for every s ∈ S, the Ds associated with s is unique, while the converse is not true in general. 2.3 Model Checking We now define the problem of verifying an artifact-centric multi-agent system against a specification of interest. By following the artifact-centric model, we wish to give data the same prominence as processes. To deal with data and the underlying database instances, our specification language needs to include first-order logic. Further, we require temporal logic to describe the system execution. Lastly, we use epistemic logic to express the information the agents have at their disposal. Hence, we define a first-order temporal epistemic specification language to be interpreted on AC-MAS. The specification language will be used in Section 6 to formalise properties of artifact-centric programs. Definition 2.8 (The Logic FO-CTLK) The first-order CTLK (or FO-CTLK) formulas ϕ over a database schema D are inductively defined by the following BNF: ϕ ::= φ ¬ϕ ϕ → ϕ ∀xϕ AXϕ AϕU ϕ EϕU ϕ Kiϕ Cϕ where φ ∈ LD and 0 < i ≤ n. The notions of free and bound variables for FO-CTLK extend straightforwardly from LD, as well as functions vars, free, and const. As usual, the temporal formulas AXϕ and AϕU ϕ′ (resp. EϕU ϕ′) are read as "for all runs, at the next step ϕ" and "for all runs (resp. some run), ϕ until ϕ′". The epistemic formulas Kiϕ and Cϕ intuitively mean that "agent Ai knows ϕ" and "it is common knowledge among all agents that ϕ" respectively. We use the abbreviations EXϕ, AF ϕ, AGϕ, EF ϕ, and EGϕ as standard. Observe that free variables can occur within the scope of modal op- erators, thus allowing for the unconstrained alternation of quantifiers and modal operators, thereby allowing us to refer to elements in different modal contexts. We consider also a number of frag- ments of FO-CTLK. The sentence atomic version of FO-CTLK without epistemic modalities, or SA-FO-CTL, is the language obtained from Definition 2.8 by removing the clauses for epistemic operators and restricting atomic formulas to first-order sentences, so that no variable appears free in the scope of a modal operator: ϕ ::= φ ¬ϕ ϕ → ϕ AXϕ AϕU ϕ EϕU ϕ where φ ∈ LD is a sentence. We will consider also the language FO-ECTLK, i.e., the existential fragments of FO-CTLK, defined as follows: ϕ ::= φ ϕ ∧ ϕ ϕ ∨ ϕ ∀xϕ ∃xϕ EXϕ EϕU ϕ ¯Kiϕ ¯Cϕ, where φ ∈ LD, with ∧ and ∨ the standard abbreviations, ¯Kiϕ ≡ ¬Ki¬ϕ, and ¯Cϕ ≡ ¬C¬ϕ. The semantics of FO-CTLK formulas is defined as follows. 11 Definition 2.9 (Satisfaction for FO-CTLK) Consider an AC-MAS P, an FO-CTLK formula ϕ, a state s ∈ P, and an assignment σ. We inductively define whether P satisfies ϕ in s under σ, written (P, s, σ) = ϕ, as follows: (P, s, σ) = ϕ (P, s, σ) = ¬ϕ (P, s, σ) = ϕ → ϕ′ (P, s, σ) = ∀xϕ (P, s, σ) = AXϕ (P, s, σ) = AϕU ϕ′ (P, s, σ) = EϕU ϕ′ (P, s, σ) = Kiϕ (P, s, σ) = Cϕ iff iff iff iff iff iff iff iff iff for all u ∈ adom(s), (P, s, σ(cid:0)x u(cid:1)) = ϕ (Ds, σ) = ϕ, if ϕ is an FO-formula it is not the case that (P, s, σ) = ϕ (P, s, σ) = ¬ϕ or (P, s, σ) = ϕ′ for all runs r, if r(0) = s, then (P, r(1), σ) = ϕ for all runs r, if r(0) = s, then there is k ≥ 0 s.t. (P, r(k), σ) = ϕ′, and for all j, 0 ≤ j < k implies (P, r(j), σ) = ϕ for some run r, r(0) = s and there is k ≥ 0 s.t. (P, r(k), σ) = ϕ′, and for all j, 0 ≤ j < k implies (P, r(j), σ) = ϕ for all s′, s ∼i s′ implies (P, s′, σ) = ϕ for all s′, s ∼ s′ implies (P, s′, σ) = ϕ where ∼ is the transitive closure of S1...n ∼i. A formula ϕ is said to be true at a state s, written (P, s) = ϕ, if (P, s, σ) = ϕ for all assignments σ. Moreover, ϕ is said to be true in P, written P = ϕ, if (P, s0) = ϕ. A key concern in this paper is to explore the model checking of AC-MAS against first-order temporal-epistemic specifications. Definition 2.10 (Model Checking) Model checking an AC-MAS P against an FO-CTLK formula ϕ amounts to finding an assignment σ such that (P, s0, σ) = ϕ. It is easy to see that whenever U is finite the model checking problem is decidable as P is a finite- state system. In general this is not the case. Theorem 2.11 The model checking problem for AC-MAS w.r.t. FO-CTLK is undecidable. Proof (sketch). This can be proved by showing that every Turing machine T whose tape contains an initial input I can be simulated by an artifact system PT,I. The problem of checking whether T terminates on that particular input can be reduced to checking whether PT,I = ϕ, where ϕ encodes the termination condition. The detailed construction is similar to that of Theorem 4.10 of (Deutsch, Sui, & Vianu, 2007). Given the general setting in which the model checking problem is defined above, the negative result is not surprising. In the following we identify syntactic and semantic restrictions for which the problem is decidable. 2.4 Isomorphisms We now investigate the concept of isomorphism on AC-MAS. This will be needed in later sections to produce finite abstractions of infinite-state AC-MAS. In what follows let P = hS, U, s0, τ i and P ′ = hS ′, U ′, s′ 0, τ i be two AC-MAS. Definition 2.12 (Isomorphism) Two local states l, l′ ∈ D(U ) are isomorphic, written l ≃ l′, iff there exists a bijection ι : adom(l) ∪ C 7→ adom(l′) ∪ C such that: 12 l(P1) b a b d l(P2) a l′(P1) b c b e l′(P2) c l′′(P1) d f d e l′′(P2) f Figure 1: Examples of isomorphic and non-isomorphic local states. (i) ι is the identity on C; (ii) for every Pi ∈ D, ~u ∈ U qi, we have that ~u ∈ l(Pi) iff ι(~u) ∈ l′(Pi). When this is the case, we say that ι is a witness for l ≃ l′. Two global states s ∈ S and s′ ∈ S ′ are isomorphic, written s ≃ s′, iff there exists a bijection ι : adom(s) ∪ C 7→ adom(s′) ∪ C such that for every j ∈ Ag, ι is a witness for lj ≃ l′ j. Notice that isomorphisms preserve the constants in C as well as predicates in the local states up to renaming of the corresponding terms. Any function ι as above is called a witness for s ≃ s′. Obviously, the relation ≃ is an equivalence relation. Given a function f : U 7→ U ′ defined on adom(s), f (s) denotes the interpretation in D(U ′) obtained from s by renaming each u ∈ adom(s) as f (u). If f is also injective (thus invertible) and the identity on C, then f (s) ≃ s. Example. For an example of isomorphic states, consider an agent with local database schema D = {P1/2, P2/1}, let U = {a, b, c, . . .} be an interpretation domain, and fix the set C = {b} of constants. Let l be the local state such that l(P1) = {ha, bi, hb, di} and l(P2) = {a} (see Figure 1). Then, the local state l′ such that l′(P1) = {hc, bi, hb, ei} and l′(P2) = {c} is isomorphic to l. This can be easily seen by considering the isomorphism ι, where: ι(a) = c, ι(b) = b, and ι(d) = e. On the other hand, the state l′′ where l′′(P1) = {hf, di, hd, ei} and l′′(P2) = {f } is not isomorphic to l. Indeed, although a bijection exists that "transforms" l into l′′, it is easy to see that none can be such that ι′(b) = b. Note that, while isomorphic states have the same relational structure, two isomorphic states do not necessarily satisfy the same FO-formulas as satisfaction depends also on the values assigned to free variables. To account for this, we introduce the following notion. Definition 2.13 (Equivalent assignments) Given two states s ∈ S and s′ ∈ S ′, and a set of vari- ables V ⊆ V ar, two assignments σ : V ar 7→ U and σ′ : V ar 7→ U ′ are equivalent for V w.r.t. s and s′ iff there exists a bijection γ : adom(s) ∪ C ∪ σ(V ) 7→ adom(s′) ∪ C ∪ σ′(V ) such that: (i) γadom(s)∪C is a witness for s ≃ s′; (ii) σ′V = γ ◦ σV . Intuitively, equivalent assignments preserve both the (in)equalities of the variables in V and the constants in s, s′ up to renaming. Note that, by definition, the above implies that s, s′ are isomorphic. We say that two assignments are equivalent for an FO-CTLK formula ϕ, omitting the states s and s′ when it is clear from the context, if these are equivalent for free(ϕ). We can now show that isomorphic states satisfy exactly the same FO-formulas. Proposition 2.14 Given two isomorphic states s ∈ S and s′ ∈ S ′, an FO-formula ϕ, and two assignments σ and σ′ equivalent for ϕ, we have that (Ds, σ) = ϕ iff (Ds′, σ′) = ϕ 13 Proof. The proof is by induction on the structure of ϕ. Consider the base case for the atomic formula ϕ ≡ P (t1, . . . , tk). Then (Ds, σ) = ϕ iff hσ(t1), . . . , σ(tk)i ∈ Ds(P ). Since σ and σ′ are equivalent for ϕ, and s ≃ s′, this is the case iff hσ′(t1), . . . , σ′(tk)i ∈ Ds′(P ), that is, (Ds′, σ′) = ϕ. The base case for ϕ ≡ t = t′ is proved similarly, by observing that the satisfaction of ϕ depends only on the assignments, and that the function γ of Def. 2.13 is a bijection, thus all the (in)equalities between the values assigned by σ and σ′ are preserved. This is sufficient to guarantee that σ(t) = σ(t′) iff σ′(t) = σ′(t′). The inductive step for the propositional connectives is straightforward. Finally, if ϕ ≡ ∀yψ, then (Ds, σ) = ϕ iff for all u ∈ adom(s), (Ds, σ(cid:0)y u(cid:1)) = ψ. Now consider the witness ι = γadom(s)∪C for s ≃ s′, where γ is as in Def. 2.13. We have that σ(cid:0)y u(cid:1) and σ′(cid:0) y u(cid:1)) = ψ iff (Ds′, σ′(cid:0) y ι(u)(cid:1)) = ψ. Since ι is a bijection, this is the case iff for all u′ ∈ adom(s′), (Ds′, σ′(cid:0) y u′(cid:1)) = ψ, i.e., (Ds′, σ′) = ϕ. ι(u)(cid:1) are equivalent for ψ. By induction hypothesis (Ds, σ(cid:0)y This leads us to the following result. Corollary 2.15 Given two isomorphic states s ∈ S and s′ ∈ S ′ and an FO-sentence ϕ, we have that Ds = ϕ iff Ds′ = ϕ Proof. From right to left. Suppose, by contradiction, that Ds 6= ϕ. Then there exists an assignment σ s.t. (Ds, σ) 6= ϕ. Since free(ϕ) = ∅, if ι is a witness for s ≃ s′, then the assignment σ′ = ι ◦ σ is equivalent to σ for s and s′. By Proposition 2.14 we have that (Ds′, σ′) 6= ϕ, that is, Ds′ 6= ϕ. The case from left to right can be shown similarly. Thus, isomorphic states cannot be distinguished by FO-sentences. This enables us to use this notion when defining simulations as we will see in the next section. 3. Abstractions for Sentence Atomic FO-CTL In the previous section we have observed that model checking AC-MAS against FO-CTLK is un- decidable in general. So, it is clearly of interest to identify decidable settings. In what follows we introduce two main results. The first, presented in this section, identifies restrictions on the language; the second, presented in the next section, focuses on semantic constraints. While these cases are in some sense orthogonal to each other, we show that they both lead to decidable model checking problems. They are also both carried out on a rather natural subclass of AC-MAS that we call bounded, which we identify below. Our goal for proceeding in this manner is to identify finite abstractions of infinite-state AC-MAS so that verification of programs, that admit AC-MAS as models, can be conducted on them, rather than on infinite-state AC-MAS. We will see this in detail in Section 6. Given our aims we begin by defining a first notion of bisimulation in the context of AC-MAS. Bisimulations will be used to show that all bounded AC-MAS admit a finite, bisimilar, abstraction that satisifies the same SA-FO-CTL specifications as the original AC-MAS. Also in what follows we assume that P = hS, U, s0, τ i and P ′ = hS ′, U ′, s′ 0, τ ′i. Definition 3.1 (Simulation) A relation R ⊆ S × S ′ is a simulation iff hs, s′i ∈ R implies: 1. s ≃ s′; 14 2. for every t ∈ S, if s → t then there exists t′ ∈ S ′ s.t. s′ → t′ and ht, t′i ∈ R. Definition 3.1 presents the standard notion of simulation applied to the case of AC-MAS. The dif- ference from the propositional case is that we here insist on the states being isomorphic, a generali- sation from the usual requirement for propositional valuations to be equal (Blackburn, de Rijke, & Venema, 2001). As in the standard case, two states s ∈ S and s′ ∈ S ′ are said to be similar, written s (cid:22) s′, if there exists a simulation relation R s.t. hs, s′i ∈ R. It can be proven that the similarity relation (cid:22) is a simulation itself, and in particular the largest one w.r.t. set inclusion, and that it is transitive and reflexive. Finally, we say that P ′ simulates P, written P (cid:22) P ′, if s0 (cid:22) s′ 0. We extend the above to bisimulations. Definition 3.2 (Bisimulation) A relation B ⊆ S × S ′ is a bisimulation iff both B and B−1 = {hs′, si hs, s′i ∈ B} are simulations. We say that two states s ∈ S and s′ ∈ S ′ are bisimilar, written s ≈ s′, if there exists a bisimulation B s.t. hs, s′i ∈ B. Similarly to simulations, it can be proven that the bisimilarity relation ≈ is the largest bismulation. Further, it is an equivalence relation. Finally, P and P ′ are said to be bisimilar, written P ≈ P ′, if s0 ≈ s′ 0. Since, as shown in Proposition 2.15, the satisfaction of FO-sentences is invariant under iso- morphisms, we can now extend the usual bisimulation result from the propositional case to that of SA-FO-CTL. We begin by showing a result on bisimilar runs. Proposition 3.3 Consider two AC-MAS P and P ′ such that P ≈ P ′, s ≈ s′, for some s ∈ S, s′ ∈ S ′, and a run r of P such that r(0) = s. Then there exists a run r′ of P ′ such that: (i) r′(0) = s′; (ii) for all i ≥ 0, r(i) ≈ r′(i). Proof. We show by induction that such run r′ in P ′ exists. For i = 0, let r′(0) = s′. Obviously, r(0) ≈ r′(0). Now, assume, by induction hypothesis, that r(i) ≈ r′(i). Let r(i) → r(i + 1). Since r(i) ≈ r′(i), by Def. 3.1, there exists t′ ∈ S ′ such that r′(i) → t′ and r(i + 1) ≈ t′. Let r′(i + 1) = t′; hence we obtain r(i + 1) ≈ r′(i + 1). By definition r′ is a run of P ′. This enables us to show that bisimilar AC-MAS preserve SA-FO-CTL formulas. This is an extension of analogous results on propositional CTL. Lemma 3.4 Consider the AC-MAS P and P ′ such that P ≈ P ′, s ≈ s′, for some s ∈ S, s′ ∈ S ′ and an SA-FO-CTL formula ϕ. Then, (P, s) = ϕ iff (P ′, s′) = ϕ Proof. The proof is by induction on the structure of ϕ. Observe first that since ϕ is sentence- atomic, its satisfaction does not depend on assignments. We report the proof for the left-to-right part of the implication; the converse can be shown similarly. The base case for an FO-sentence ϕ follows from Prop. 2.15. The inductive cases for proposi- tional connectives are straightforward. 15 For ϕ ≡ AXψ, assume for contradiction that (P, s) = ϕ and (P ′, s′) 6= ϕ. Then, there exists a run r′ s.t. r′(0) = s′ and (P ′, r′(1)) 6= ψ. By Def. 3.2 and 3.1 there exists a t ∈ S s.t. s → t and t ≈ r′(1). Further, by seriality of →, s → t can be extended to a run r s.t. r(0) = s and r(1) = t. By the induction hypothesis we obtain that (P, r(1)) 6= ψ. Hence, (P, r(0)) 6= AXψ, which is a contradiction. For ϕ ≡ EψU φ, let r be a run with r(0) = s such that there exists k ≥ 0 such that (P, r(k)) = φ, and for every j, 0 ≤ j < k implies (P, r(j)) = ψ. By Prop. 3.3 there exists a run r′ s.t. r′(0) = s′ and for all i ≥ 0, r′(i) ≈ r(i). By the induction hypothesis we have that for each i ∈ N, (P, r(i)) = ψ iff (P ′, r′(i)) = ψ, and (P, r(i)) = φ iff (P ′, r′(i)) = φ. Therefore, r′ is a run s.t. r′(0) = s′, (P ′, r′(k)) = φ, and for every j, 0 ≤ j < k implies (P ′, r′(j)) = ψ, i.e., (P ′, s′) = EψU φ. For ϕ ≡ AψU φ, assume for contradiction that (P, s) = ϕ and (P ′, s′) 6= ϕ. Then, there exists a run r′ s.t. r′(0) = s′ and for every k ≥ 0, if (P ′, r′(k)) = φ, then there exists j s.t. 0 ≤ j < k and (P ′, r′(j)) 6= ψ. By Prop. 3.3 there exists a run r s.t. r(0) = s and for all i ≥ 0, r(i) ≈ r′(i). Further, by the induction hypothesis we have that (P, r(i)) = ψ iff (P ′, r′(i)) = ψ and (P, r(i)) = φ iff (P ′, r′(i)) = φ. But then r is s.t. r(0) = s and for every k ≥ 0, if (P, r(k)) = φ, then there exists j s.t. 0 ≤ j < k and (P, r(j)) 6= ψ. That is, (P, s) 6= AψU φ, which is a contradiction. By applying the result above to the case of s = s0 and s′ = s′ 0, we obtain the following. Theorem 3.5 Consider the AC-MAS P and P ′ such that P ≈ P ′, and an SA-FO-CTL formula ϕ. We have P = ϕ iff P ′ = ϕ In summary we have proved that bisimilar AC-MAS validate the same SA-FO-CTL formulas. In the next section we use this result to reduce, under additional assumptions, the verification of an infinite-state AC-MAS to that of a finite-state one. 3.1 Finite Abstractions of Bisimilar AC-MAS We now define a notion of finite abstraction for AC-MAS. We prove that abstractions are bisimilar to the corresponding concrete model. We are particularly interested in finite abstraction; so we operate on a special class of infinite models that we call bounded. Definition 3.6 (Bounded AC-MAS) An AC-MAS P is b-bounded, for b ∈ N, if for all s ∈ S, adom(s) ≤ b. An AC-MAS is b-bounded if none of its reachable states contains more than b distinct elements. Observe that bounded AC-MAS may be defined on infinite domains U. Furthermore, note that a b- bounded AC-MAS may contain infinitely many states, all bounded by b. So b-bounded systems are infinite-state in general. Notice also that the value b bounds only the number of distinct individuals in a state, not the size of the state itself, i.e., the amount of memory required to accommodate the individuals. Indeed, the infinitely many elements of U need an unbounded number of bits to be represented (e.g., as finite strings), so, even though each state is guaranteed to contain at most b distinct elements, nothing can be said about how large the actual space required by such elements is. On the other hand, it should be clear that memory-bounded AC-MAS are finite-state (hence b-bounded, for some b). 16 Thus, seen as programs, b-bounded AC-MAS are in general memory-unbounded. Therefore, for the purpose of verification, they cannot be trivially checked by generating all their executions -- as it would be the case if they were memory-bounded -- like standard model checking techniques typically do. However, we will show later that any b-bounded infinite-state ACMAS admits a finite abstraction which can be used to verify it. We now introduce abstractions in a modular manner by first introducing a set of abstract agents from a concrete AC-MAS. Definition 3.7 (Abstract agent) Let A = hD, L, Act, P ri be an agent defined on the interpretation domain U. Given a set U ′ of individuals, we define the abstract agent A′ = hD′, L′, Act′, P r′i on U ′ such that: 1. D′ i = Di; i ⊆ D′ 2. L′ 3. Act′ i(U ′); i = Acti; 4. α(~u′) ∈ P r′ i(l′ i) iff there exist li ∈ Li and α(~u) ∈ P ri(li) s.t. l′ i ≃ li, for some witness ι, and ~u′ = ι′(~u), for some bijection ι′ extending ι to ~u. Given a set Ag of agents defined on U, let Ag′ be the set of the corresponding abstract agents on U ′. We remark that A′, as defined in Definition 3.7, is indeed an agent and complies with Defini- tion 2.6. Notice that the protocol of A′ is defined on the basis of its corresponding concrete agent A and requires the existence of a bijection between the elements in the local states and the action parameters. Thus, in order for a ground action of A to have a counterpart in A′, the last requirement of Definition 3.7 constrains U ′ to contain a sufficient number of distinct values. As it will become apparent later, the size of U ′ determines how closely an abstract system can simulate its concrete counterpart. We can now formalize the notion of abstraction that we will use in this section. Definition 3.8 (Abstraction) Let P be an AC-MAS over Ag and Ag′ the set of agents obtained as in Definition 3.7, for some U ′. The AC-MAS P ′ defined over Ag′ is said to be an abstraction of P iff: • s′ 0 ≃ s0; • t′ ∈ τ ′(s′, ~α(~u′)) for some ~α(~u′) ∈ Act(U ′) iff there exist s, t ∈ S and ~α(~u) ∈ Act(U ), such that t ∈ τ (s, ~α(~u)), s ≃ s′ and t ≃ t′ for some witness ι, and ~u′ = ι′(~u) for some ι′ extending ι. Notice that abstractions have initial states isomorphic to their concrete counterparts. The con- dition in Definition 3.8 means that whenever s ≃ s′ for some witness ι, ~u′ = ι(~u), t ∈ τ (s, α(~u)) and t′ ∈ τ (s′, α(~u′)), then t ≃ t′. This constraint means that action are data-independent. So, for example, a copy action in the concrete model has a corresponding copy action in the abstract model regardless of the data that are copied. Crucially, this condition requires that the domain U ′ contains enough elements to simulate the concrete states and action effects as the following result makes precise. In what follows we take NAg = NAg′ = PAi∈Ag maxα(~p)∈Acti{~p}, i.e., NAg is the sum of the maximum numbers of parameters contained in the action types of each agent in Ag. 17 Theorem 3.9 Consider a b-bounded AC-MAS P over an infinite interpretation domain U, an SA- FO-CTLK formula ϕ, and a finite interpretation domain U ′ such that C ⊆ U ′ and U ′ ≥ b + C + NAg. Any abstraction P ′ of P is bisimilar to P. 0i ∈ R. Observe first that s′ 0 ≃ s0, so hs0, s′ Proof. Define a relation R as R = {hs, s′i ∈ S × S ′ s ≃ s′}. We show that R is a bisimulation such that hs0, s′ 0i ∈ R. Next, consider s ∈ S and s′ ∈ S ′ such that s ≃ s′ (i.e., hs, s′i ∈ R), and assume that s → t, for some t ∈ S. Then, there exists α(~u) ∈ Act(U ) s.t. t ∈ τ (s, α(~u)). We show next that there exists t′ ∈ S ′ s.t. s′ → t′ and t ≃ t′. To this end, observe that, since U ′ ≥ b + C and adom(t) ≤ b, we can define an injective function f : adom(t) ∪ C 7→ U ′ such that f (t) ≃ t. We take t′ = f (t); it remains to prove that s′ → t′. By the condition on the cardinality of U ′ we can extend f to ~u as well, and set ~u′ = f (~u). Then, by the definition of P ′ we have that t′ ∈ τ ′(s′, α(~u′)). Hence, s′ → t′. So, R is a simulation relation between P and P ′. Since R−1 can similarly be shown to be a simulation, it follows that P and P ′ are bisimilar. By combining this result with Lemma 3.4, we can easily derive the main result of this section. Theorem 3.10 If P is a b-bounded AC-MAS over an infinite interpretation domain U, and P ′ an abstraction of P over a finite interpretation domain U ′ such that C ⊆ U ′ and U ′ ≥ b + C + NAg, then for every SA-FO-CTLK formula ϕ, we have that P = ϕ iff P ′ = ϕ. This result states that we can reduce the verification of an infinite AC-MAS to the verification of a finite one. Given the fact that checking a finite AC-MAS is decidable, this is a noteworthy result. Note, however, that we do not have a constructive definition for the construction of an abstract AC-MAS P ′ from a concrete AC-MAS P. This is of no consequence though, as in practice any concrete artifact-system will be defined by a program, e.g., in the language GSM, as discussed in the introduction. Of importance, instead, is to be able to derive finite abstractions not just for arbitrary AC-MAS but for those that are models of concrete programs. We will do this in Section 6 where we will use the result above. Observe that an abstract AC-MAS as in Definition 3.8 depends on the set Ag′ of abstract agents defined in Definition 3.7. However, other abstract AC-MAS defined on different sets of agents, exist. This is a standard outcome when defining modular abstractions, as the same system can be obtained by considering different agent components. 4. Abstractions for FO-CTLK In the previous section we showed that syntactical restrictions on the specification language lead to finite abstractions for bounded AC-MAS. A natural question that arises is whether the limitation to sentence-atomic specifications can be removed. Doing so would enable us to check any agent-based FO-CTLK specification not on an infinite-state AC-MAS, but on its finite abstraction. The key concept we identify in this section that enables us to achieve the above is that of unifor- mity. As we will see later uniform AC-MAS are systems for which the behaviour does not depend on the actual data present in the states. This means that the system contains all possible transitions that are enabled according to parametric action rules, thereby resulting in a rather "full" transition 18 relation. This notion corresponds to that of genericity in databases (Abiteboul et al., 1995). We use the term "uniformity" as we refer to transition systems and not databases. To achieve finite abstractions we proceed as follows. We first introduce a notion of bisimulation stronger than the one discussed in the previous section. In Subsection 4.1 we show that this new bisimulation relation guarantees that uniform AC-MAS satisfy the same formulas in FO-CTLK. We use this result to show that bounded, uniform systems admit finite abstractions (Subsection 4.2). In the rest of the section we let P = hS, U, s0, τ i and P ′ = hS ′, U ′, s′ and assume, unless stated differently, that s = hl0, . . . , lni ∈ S, and s′ = hl′ 0, τ ′i be two AC-MAS 0, . . . , l′ ni ∈ S ′. 4.1 ⊕-Bisimulation Plain bisimulations are known to be satisfaction preserving in a modal propositional setting (Black- burn et al., 2001). In the following we explore the conditions under which this applies to AC-MAS as well. We begin by using a notion of bisimulation which is also based on isomorphism, but it is stronger than the one discussed in Section 3 and later explore its properties in the context of uniform AC-MAS. Definition 4.1 (⊕-Simulation) A relation R on S × S ′ is a ⊕-simulation if hs, s′i ∈ R implies: 1. s ≃ s′; 2. for every t ∈ S, if s → t then there exists t′ ∈ S ′ s.t. s′ → t′, s ⊕ t ≃ s′ ⊕ t′, and ht, t′i ∈ R; 3. for every t ∈ S, for every 0 < i ≤ n, if s ∼i t then there exists t′ ∈ S ′ s.t. t ∼i t′, s ⊕ t ≃ s′ ⊕ t′, and ht, t′i ∈ R. Observe that Definition 4.1 differs from Definition 3.1 not only by adding a condition for the epis- temic relation, but also by insisting that s ⊕ t ≃ s′ ⊕ t′. This condition ensures that the ⊕-similar transitions in AC-MAS have isomorphic disjoint unions. Two states s ∈ S and s′ ∈ S ′ are said to be ⊕-similar, iff there exists an ⊕-simulation R s.t. hs, s′i ∈ R. Note that all ⊕-similar states are isomorphic as condition 2. above ensures that t ≃ t′. We use the symbol (cid:22) both for similarity and ⊕-similarity, as the context will disambiguate. Also ⊕-similarity can be shown to be the largest ⊕-simulation, reflexive, and transitive. Further, we say that P ′ ⊕-simulates P if s0 (cid:22) s′ 0. ⊕-simulations can naturally be extended to ⊕-bisimulations. Definition 4.2 (⊕-Bisimulation) A relation B on S × S ′ is a ⊕-bisimulation iff both B and B−1 = {hs′, si hs, s′i ∈ B} are ⊕-simulations. Two states s ∈ S and s′ ∈ S ′ are said to be ⊕-bisimilar iff there exists an ⊕-bisimulation B such that hs, s′i ∈ B. Also for bisimilarity and ⊕-bisimilarity, we use the same symbol, ≈, and can prove that ≈ is the largest ⊕-bisimulation, and an equivalence relation. We say that P and P ′ are ⊕-bisimilar, written P ≈ P ′ iff so are s0 and s′ 0. While we observed in the previous section that bisimilar, hence isomorphic, states in bisimilar systems preserve sentence atomic formulas, it is instructive to note that this is not the case when full FO-CTLK formulas are considered. Example. Consider Figure 2, where C = ∅ and P and P ′ are given as follows. For the number 0(P ) = {1}; n of agents equal to 1, we define D = D′ = {P/1} and U = N; s0(P ) = s′ 19 3 4 5 P 1 P ′ 1 2 2 Figure 2: ⊕-Bisimilar AC-MAS not satisfying the same FO-CTLK formulas. τ = {hs, s′i s(P ) = {i}, s′(P ) = {i + 1}}; τ ′ = {hs, s′i s(P ) = {i}, s′(P ) = {(i + 1) mod 2}}. Notice that S ⊆ D(N) and S ′ ⊆ D(N). Clearly we have that P ≈ P ′. Now, consider the constant-free FO-CTLK formula ϕ = AG(∀x(P (x) → AXAG¬P (x))). It can be easily seen that P = ϕ while P ′ 6= ϕ. The above shows that ⊕-bisimilarity is not a sufficient condition to guarantee preservation of the satisfaction of FO-CTLK formulas. Intuitively, this is a consequence of the fact that ⊕-bisimilar AC-MAS do not preserve value associations along runs. For instance, the value 1 in P ′ is infinitely many times associated with the odd values occurring in P. By quantifying across states we are able to express this fact and are therefore able to distinguish the two structures. This is a difficulty as, intuitively, we would like to use ⊕-bisimulations to demonstrate the existence of finite abstractions. Indeed, as we will show later, this happens for the class of uniform AC-MAS, defined below. Definition 4.3 (Uniformity) An AC-MAS P is said to be uniform iff for every s, t, s′ ∈ S, t′ ∈ D(U ), 1. if t ∈ τ (s, ~α(~u)) and s ⊕ t ≃ s′ ⊕ t′ for some witness ι, then for every constant-preserving bijection ι′ that extends ι to ~u, we have that t′ ∈ τ (s′, ~α(ι′(~u))); 2. if s ∼i t and s ⊕ t ≃ s′ ⊕ t′, then s′ ∼i t′. This definition captures the idea that actions take into account and operate only on the relational structure of states and action parameters, irrespectively of the actual data they contain (apart from a finite set of constants). Intuitively, it says that if t can be obtained by executing α(~u) in s, and we replace in s, ~u and t, the same element v with v′, obtaining, say, s′, ~u′ and t′, then t′ can be obtained by executing α(~u′) in s′. In terms of the underlying Kripke structures this means that the systems are "full" up to ⊕, i.e., in all uniform AC-MAS the points t′ identified above are indeed part of the system and reachable from s′. A similar condition is required on the epistemic relation. A useful property of uniform systems is the fact that the latter requirement is implied by the former, as shown by the following result. Proposition 4.4 If an AC-MAS P satisfies req. 1 in Def. 4.3 and adom(s0) ⊆ C, then req. 2 is also satisfied. Proof. If s ⊕ t ≃ s′ ⊕ t′, then there is a witness ι : adom(s) ∪ adom(t) ∪ C 7→ adom(s′) ∪ adom(t′) ∪ C that is the identity on C (hence on adom(s0)). Assume s ∼i t, thus li(s) = li(t), and li(s′) = ι(li(s)) = ι(li(t)) = li(t′). Notice that this does not guarantee that s′ ∼i t′, 20 as we need to prove that t′ ∈ S. This can be done by showing that t′ is reachable from s0. Since t is reachable from s0, there exists a run s0 → s1 → . . . → sk s.t. sk = t. Extend now ι to a total and injective function ι′ : adom(s0) ∪ · · · ∪ adom(sk) ∪ C 7→ U. This can always be done because U ≥ adom(s0) ∪ · · · ∪ adom(sk) ∪ C. Now consider the sequence ι′(s0), ι′(s1), . . . , ι′(sk). Since adom(s0) ⊆ C then ι(s0) = s0 and, because ι′ extends ι, we have that ι′(s0) = ι(s0) = s0. Further, ι′(sk) = ι(t) = t′. By repeated applications of req. 1 we can show that ι′(sm+1) ∈ τ (ι′(sm), ~α(ι′(~u))) whenever sm+1 ∈ τ (sm, ~α(~u)), for m < k. Hence, the sequence is actually a run from s0 to t′. Thus, t′ ∈ S, and s′ ∼i t′. Thus, as long as adom(s0) ⊆ C, to check whether an AC-MAS is uniform, it is sufficient to take into account only the transition function. A further distinctive feature of uniform systems is that all isomorphic states are ⊕-bisimilar. Proposition 4.5 If an AC-MAS P is uniform, then for every s, s′ ∈ S, s ≃ s′ implies s ≈ s′. Proof. We prove that B = {hs, s′i ∈ S × S s ≃ s′} is a ⊕-bisimulation. Observe that since ≃ is an equivalence relation, so is B. Thus B is symmetric and B = B−1. Therefore, proving that B is a ⊕-simulation proves also that B−1 is a ⊕-simulation; hence, that B is a ⊕-bisimulation. To this end, let hs, s′i ∈ B, and assume s → t for some t ∈ S. Then, t ∈ τ (s, α(~u)) for some α(~u) ∈ Act(U ). Consider a witness ι for s ≃ s′. By cardinality considerations ι can be extended to a total and injective function ι′ : adom(s) ∪ adom(t) ∪ {~u} ∪ C 7→ U. Consider ι′(t) = t′; it follows that ι′ is a witness for s ⊕ t ≃ s′ ⊕ t′. Since P is uniform, t′ ∈ τ (s′, α(ι′(~u))), that is, s′ → t′. Moreover, ι′ is a witness for t ≃ t′, thus ht, t′i ∈ B. Next assume that hs, s′i ∈ B and s ∼i t, for some t ∈ S. By reasoning as above we can find a witness ι for s ≃ s′, and an extension ι′ of ι s.t. t′ = ι′(t) and ι′ is a witness for s ⊕ t ≃ s′ ⊕ t′. Since P is uniform, s′ ∼i t′ and ht, t′i ∈ B. This result intuitively means that submodels generated by isomorphic states are ⊕-bisimilar. Next we prove some partial results, which will be useful in proving our main preservation theo- rem. The first two results guarantee that under appropriate cardinality constraints the ⊕-bisimulation preserves the equivalence of assignments w.r.t. a given FO-CTLK formula. Lemma 4.6 Consider two ⊕-bisimilar and uniform AC-MAS P and P ′, two ⊕-bisimilar states s ∈ S and s′ ∈ S ′, and an FO-CTLK formula ϕ. For every assignments σ and σ′ equivalent for ϕ w.r.t. s and s′, we have that: 1. for every t ∈ S s.t. s → t, if U ′ ≥ adom(s) ∪ adom(t) ∪ C ∪ σ(free(ϕ)), then there exists t′ ∈ S ′ s.t. s′ → t′, t ≈ t′, and σ and σ′ are equivalent for ϕ w.r.t. t and t′. 2. for every t ∈ S s.t. s ∼i t, if U ′ ≥ adom(s) ∪ adom(t) ∪ C ∪ σ(free(ϕ)), then there exists t′ ∈ S ′ s.t. s′ ∼i t′, t ≈ t′, and σ and σ′ are equivalent for ϕ w.r.t. t and t′. Proof. To prove (1), let γ be a bijection witnessing that σ and σ′ are equivalent for ϕ w.r.t. s and s′. Suppose that s → t. Since s ≈ s′, by definition of ⊕-bisimulation there exists t′′ ∈ S ′ s.t. s′ → t′′, s ⊕ t ≃ s′ ⊕ t′′, and t ≈ t′′. Now, define Domj . = adom(s) ∪ adom(t) ∪ C, and partition it into: • Domγ . = adom(s) ∪ C ∪ (adom(t) ∩ σ(free(ϕ)); • Domι′ . = adom(t) \ Domγ. 21 Let ι′ : Domι′ 7→ U ′ \ Im(γ) be an invertible (total) function. Observe that Im(γ) = adom(s′) ∪ C ∪ σ′(free(ϕ)) = adom(s) ∪ C ∪ σ(free(ϕ)), thus from the fact that U ′ ≥ adom(s) ∪ adom(t) ∪ C ∪ σ(free(ϕ)) we have U ′ \ Im(γ) ≥ Dom(ι′), which guarantees the existence of ι′. Next, define j : Domj 7→ U ′ as follows: j(u) = (cid:26) γ(u), if u ∈ Domγ ι′(u), if u ∈ Domι′ Obviously, j is invertible. Thus, j is a witness for s ⊕ t ≃ s′ ⊕ t′, where t′ = j(t). Since s ⊕ t ≃ s′ ⊕ t′′ and ≃ is an equivalence relation, s′ ⊕ t′ ≃ s′ ⊕ t′′. Thus, s′ → t′, as P ′ is uniform. Moreover, σ and σ′ are equivalent for ϕ w.r.t. t and t′, by construction of t′. To check that t ≈ t′, observe that, since t′ ≃ t′′ and P ′ is uniform, by Prop. 4.5 it follows that t′ ≈ t′′. Thus, since t ≈ t′′ and ≈ is transitive, we obtain that t ≈ t′. The proof for (2) has an analogous structure and is omitted. It can be proven that this result is tight, i.e., that if the cardinality requirement is violated, there exist cases where assignment equivalence is not preserved along temporal or epistemic transitions. Lemma 4.6 easily generalizes to t.e. runs. Lemma 4.7 Consider two ⊕-bisimilar and uniform AC-MAS P and P ′, two ⊕-bisimilar states s ∈ S and s′ ∈ S ′, an FO-CTLK formula ϕ, and two assignments σ and σ′ equivalent for ϕ w.r.t. s and s′. For every t.e. run r of P, if r(0) = s and for all i ≥ 0, U ′ ≥ adom(r(i)) ∪ adom(r(i + 1)) ∪ C ∪ σ(free(ϕ)), then there exists a t.e. run r′ of P ′ s.t. for all i ≥ 0: (i) r′(0) = s′; (ii) r(i) ≈ r′(i); (iii) σ and σ′ are equivalent for ϕ w.r.t. r(i) and r′(i). (iv) for every i ≥ 0, if r(i) → r(i + 1) then r′(i) → r′(i + 1), and if r(i) ∼j r(i + 1), for some j, then r′(i) ∼j r′(i + 1). Proof. Let r be a t.e. run s.t. U ′ ≥ adom(r(i)) ∪ adom(r(i + 1)) ∪ C ∪ σ(free(ϕ)) for all i ≥ 0. We inductively build r′ and show that the conditions above are satisfied. For i = 0, let r′(0) = s′. By hypothesis, r is s.t. U ′ ≥ adom(r(0)) ∪ adom(r(1)) ∪ C ∪ σ(free(ϕ)). Thus, since r(0) ❀ r(1), by Lemma 4.6 there exists t′ ∈ S ′ s.t. r′(0) ❀ t′, r(1) ≈ t′, and σ and σ′ are equivalent for ϕ w.r.t. r(1) and t′. Let r′(1) = t′. Lemma 4.6 guarantees that the transitions r′(0) ❀ t′ and r(0) ❀ r(1) can be chosen so that they are either both temporal or both epistemic with the same index. The case for i > 0 is similar. Assume that r(i) ≈ r′(i) and σ and σ′ are equivalent for ϕ w.r.t. r(i) and r′(i). Since r(i) ❀ r(i+1) and U ′ ≥ adom(r(i))∪adom(r(i+1))∪C∪σ(free(ϕ)), by Lemma 4.6 there exists t′ ∈ S ′ s.t. r′(i) ❀ t′, σ and σ′ are equivalent for ϕ w.r.t. r(i + 1) and t′, and r(i + 1) ≈ t′. Let r′(i + 1) = t′. It is clear that r′ is a t.e. run in P ′, and that, by Lemma 4.6, the transitions of r′ can be chosen so as to fulfill requirement (iv). We can now prove the following result, which states that FO-CTLK formulas cannot distin- guish ⊕-bisimilar and uniform AC-MAS. This is in marked contrast with the earlier example in this section which operated on ⊕-bisimilar but non-uniform AC-MAS. 22 Theorem 4.8 Consider two ⊕-bisimilar and uniform AC-MAS P and P ′, two ⊕-bisimilar states s ∈ S and s′ ∈ S ′, an FO-CTLK formula ϕ, and two assignments σ and σ′ equivalent for ϕ w.r.t. s and s′. If 1. for every t.e. run r s.t. r(0) = s, for all k ≥ 0 we have U ′ ≥ adom(r(k)) ∪ adom(r(k + 1)) ∪ C ∪ σ(free(ϕ)) + vars(ϕ) \ free(ϕ); and 2. for every t.e. run r′ s.t. r′(0) = s′, for all k ≥ 0 we have U ≥ adom(r′(k)) ∪ adom(r′(k + 1)) ∪ C ∪ σ′(free(ϕ)) + vars(ϕ) \ free(ϕ); then (P, s, σ) = ϕ iff (P ′, s′, σ′) = ϕ. Proof. The proof is by induction on the structure of ϕ. We prove that if (P, s, σ) = ϕ then (P ′, s′, σ′) = ϕ. The other direction can be proved analogously. The base case for atomic formulas follows from Prop. 2.14. The inductive cases for propositional connectives are straightforward. For ϕ ≡ ∀xψ, assume that x ∈ free(ψ) (otherwise consider ψ, and the corresponding case), and no variable is quantified more than once (otherwise rename the other variables). Let γ be a bijection witnessing that σ and σ′ are equivalent for ϕ w.r.t. s and s′. For u ∈ adom(s), consider the assignment σ(cid:0)x free(ϕ)∪{x}; so σ(cid:0)x u(cid:1). By definition, γ(u) ∈ adom(s′), and σ′(cid:0) x γ(u)(cid:1) are equivalent for ψ w.r.t. s and s′. Moreover, σ(cid:0)x γ(u)(cid:1) is well-defined. Note that free(ψ) = u(cid:1)(free(ψ)) ≤ σ(free(ϕ)) + 1, as u may not occur in σ(free(ϕ)). The same considerations apply to σ′. Further, vars(ψ) \ free(ψ) = vars(ϕ) \ free(ϕ) − 1, as vars(ψ) = vars(ϕ), free(ψ) = free(ϕ) ∪ {x}, and x /∈ free(ϕ). Thus, both hypotheses 1. and 2. remain satisfied if we replace ϕ with ψ, σ u(cid:1) and σ′(cid:0) x u(cid:1)) = ψ then with σ(cid:0)x (P ′, s′, σ′(cid:0) x u(cid:1), and σ′ with σ′(cid:0) x γ(u)(cid:1)) = ψ. Since u ∈ adom(s) is generic and γ is a bijection, the result follows. γ(u)(cid:1). Therefore, by the induction hypothesis, if (P, s, σ(cid:0)x For ϕ ≡ AXψ, assume by contradiction that (P, s, σ) = ϕ but (P ′, s′, σ′) 6= ϕ. Then, there exists a run r′ s.t. r′(0) = s′ and (P ′, r′(1), σ′) 6= ψ. By Lemma 4.7, which applies as vars(ϕ) \ free(ϕ) ≥ 0, there exists a run r s.t. r(0) = s, for all i ≥ 0, r(i) ≈ r′(i) and σ and σ′ are equivalent for ψ w.r.t. r(i) and r′(i). Since r is a run s.t. r(0) = s, it satisfies hypothesis 1. Moreover, the same hypothesis is necessarily satisfied by all the t.e. runs r′′ s.t., , for some i ≥ 0, r′′(0) = r(i) (otherwise, the t.e. run r(0) · · · r(i)r′′(1)r′′(2) · · · would not satisfy the hypothesis); the same considerations apply w.r.t hypothesis 2 and for all the t.e. runs r′′′ s.t. r′′′(0) = r′(i), for some i ≥ 0. In particular, these hold for i = 1. Thus, we can inductively apply the Lemma, by replacing s with r(1), s′ with r′(1), and ϕ with ψ (observe that vars(ϕ) = vars(ψ) and free(ϕ) = free(ψ)). But then we obtain (P, r(1), σ) 6= ψ, thus (P, r(0), σ) 6= AXψ. This is a contradiction. For ϕ ≡ EψU φ, assume that the only variables common to ψ and φ occur free in both formulas (otherwise rename the quantified variables). Let r be a run s.t. r(0) = s, and there exists k ≥ 0 s.t. (P, r(k), σ) = φ, and (P, r(j), σ) = ψ for 0 ≤ j < k. By Lemma 4.7 there exists a run r′ s.t. r′(0) = s′, and for all i ≥ 0, r′(i) ≈ r(i), and σ and σ′ are equivalent for ϕ w.r.t. r′(i) and r(i). From each bijection γi witnessing that σ and σ′ are equivalent for ϕ w.r.t. r′(i) and r(i), define the bijections γi,ψ = γiadom(r(i))∪C∪σ(free(ψ)) and γi,φ = γiadom(r(i))∪C∪σ(free(φ)). Since free(ψ) ⊆ free(ϕ), free(φ) ⊆ free(ϕ), it can be seen that γi,ψ and γi,φ witness that σ and σ′ are equivalent for respectively ψ and φ w.r.t. r′(i) and r(i). By the same argument used for the AX case above, 23 hypothesis 1 holds for all the t.e. runs r′′ s.t. r′′(0) = r(i), for some i ≥ 0, and hypothesis 2 holds for all the t.e. runs r′′′ s.t. r′′′(0) = r′(i). Now observe that σ(free(φ)), σ(free(ψ)) ≤ σ(free(ϕ)). Moreover, by the assumption on the common variables of ψ and φ, (vars(ϕ)\free(ϕ)) = (vars(ψ)\ free(ψ))⊎(vars(φ)\free(φ)), thus vars(ϕ) \ free(ϕ) = (vars(ψ) \ free(ψ)+(vars(φ) \ free(φ), hence (vars(ψ) \ free(ψ), (vars(φ) \ free(φ) ≤ vars(ϕ) \ free(ϕ). Therefore hypotheses 1 and 2 hold also with ϕ uniformly replaced by ψ or φ. Then, the induction hypothesis applies for each i, by replacing s with r(i), s′ with r′(i), and ϕ with either ψ or φ. Thus, for each i, (P, r(i), σ) = ψ iff (P ′, r′(i), σ′) = ψ, and (P, r(i), σ) = φ iff (P ′, r′(i), σ′) = φ. Therefore, r′ is a run s.t. r′(0) = s′, (P ′, r′(k), σ′) = φ, and for every j, 0 ≤ j < k implies (P ′, r′(j), σ′) = ψ, i.e., (P ′, s′, σ′) = EψU φ. For ϕ ≡ AψU φ, assume by contradiction that (P, s, σ) = ϕ but (P ′, s′, σ′) 6= ϕ. Then, there exists a run r′ s.t. r′(0) = s′ and for every k ≥ 0, either (P ′, r′(k), σ′) 6= φ or there exists j s.t. 0 ≤ j < k and (P ′, r′(j), σ′) 6= ψ. By Lemma 4.7 there exists a run r s.t. r(0) = s, and for all i ≥ 0, r(i) ≈ r′(i) and σ and σ′ are equivalent for ϕ w.r.t. r(i) and r′(i). Similarly to the case of EψU φ, it can be shown that σ and σ′ are equivalent for ψ and φ w.r.t. r(i) and r′(i), for all i ≥ 0. Further, assuming w.l.o.g. that all variables common to ψ and φ occur free in both formulas, it can be shown, as in the case of EψU φ, that the induction hypothesis holds on every pair of runs obtained as suffixes of r and r′, starting from their i-th state, for every i ≥ 0. Thus, (P, r(i), σ) = ψ iff (P ′, r′(i), σ′) = ψ, and (P, r(i), σ) = φ iff (P ′, r′(i), σ′) = φ. But then r is s.t. r(0) = s and for every k ≥ 0, either (P, r(k), σ) 6= φ or there exists j s.t. 0 ≤ j < k and (P, r(j), σ) 6= ψ, that is, (P, s, σ) 6= AψU φ. This is a contradiction. For ϕ ≡ Kiψ, assume by contradiction that (P, s, σ) = ϕ but (P ′, s′, σ′) 6= ϕ. Then, there exists s′′ s.t. s′ ∼i s′′ and (P ′, s′′, σ′) 6= ψ. By Lemma 4.7 there exists s′′′ s.t. s′′′ ≈ s′′, s ∼i s′′′, and σ and σ′ are equivalent for ψ w.r.t. s′′ and s′′′. Thus, by an argument analogous to that used for the case of AX, we can apply the induction hypothesis, obtaining (P, s′′′, σ) 6= ψ. But then (P, s, σ) 6= Kiψ, which is a contradiction. Finally, for ϕ ≡ Cψ, assume by contradiction that (P, s, σ) = ϕ but (P ′, s′, σ′) 6= ϕ. Then, there exists an s′′ s.t. s′ ∼ s′′ and (P ′, s′′, σ′) 6= ψ. Again by Lemma 4.7 there exists s′′′ s.t. s′′′ ≈ s′′, s ∼ s′′′, and σ and σ′ are equivalent for ψ w.r.t. s′′ and s′′′. Thus, by an argument analogous to that used for the case of Ki, we can apply the induction hypothesis, obtaining (P, s′′′, σ) 6= ψ. But then (P, s, σ) 6= Cψ, which is a contradiction. We can now easily extend the above result to the model checking problem for AC-MAS. Theorem 4.9 Consider two ⊕-bisimilar and uniform AC-MAS P and P ′, and an FO-CTLK formula ϕ. If 1. for all t.e. runs r s.t. r(0) = s0, and for all k ≥ 0, U ′ ≥ adom(r(k)) ∪ adom(r(k + 1)) ∪ C + vars(ϕ), and 2. for all t.e. runs r′ s.t. r′(0) = s′ 0, and for all k ≥ 0, U ≥ adom(r′(k)) ∪ adom(r′(k + 1)) ∪ C + vars(ϕ) then P = ϕ iff P ′ = ϕ. 24 Proof. Equivalently, we prove that if (P, s0, σ) 6= ϕ for some σ, then there exists a σ′ such that (P ′, s′ 0, σ′) 6= ϕ, and viceversa. To this end, observe that hypotheses 1. and 2. imply, respectively, hypotheses 1. and 2. of Theorem 4.8. Further, notice that, by cardinality considerations, given the assignment σ : V ar 7→ U, there exists an assignment σ′ : V ar 7→ U ′ s.t. σ and σ′ are equivalent for ϕ w.r.t. s0 and s′ 0. Thus, by applying Theorem 4.8 we have that if there exists an assignment σ 0, σ′) 6= ϕ. The converse can be s.t. (P, s0, σ) 6= ϕ, then there exists an assignment σ′ s.t. (P ′, s′ proved analogously, as the hypotheses are symmetric. This result shows that uniform AC-MAS can in principle be verified by model checking a ⊕- bisimilar one. Note that this applies to infinite AC-MAS P as well. In this case the results above enable us to show that the verification question can be posed on the corresponding, possibly finite, P ′ as long as U ′, as defined above, is sufficiently large for P ′ to ⊕-bisimulate P. A noteworthy class of infinite systems for which these results prove particularly powerful is that of bounded AC-MAS, which, as discussed in the next subsection, always admit a finite abstraction. 4.2 Finite Abstractions We now combine the notion of uniformity explored so far in this section with the assumption on boundedness made in Section 3.1. Our aim remains to identify conditions under which the verifi- cation of an infinite AC-MAS can be reduced to the verification of a finite one. Differently from Section 3.1 we here operate on the full FO-CTLK specification language. The main result here is given by Corollary 4.14 which guarantees that, in the context of bounded AC-MAS, uniformity is a sufficient condition for ⊕-bisimilar finite abstractions to be satisfaction preserving. In the following we assume that any AC-MAS P is such that adom(s0) ⊆ C. If this is not the case, C can be extended so as to include all the (finitely many) elements in adom(s0). Further, we recall that NAg is the sum of the maximum numbers of parameters contained in the action types of We start by formalizing the notion of ⊕-abstraction. each agent in Ag, i.e., NAg = PAi∈Ag maxα(~x)∈Acti{~x}. Definition 4.10 (⊕-Abstraction) Let P = hS, U, s0, τ i be an AC-MAS over Ag, and Ag′ the set of abstract agents obtained as in Definition 3.7, for some domain U ′. The AC-MAS P ′ = hS ′, U ′, s′ 0, τ ′i over Ag′ is said to be an ⊕-abstraction of P iff: • s′ 0 = s0; • t′ ∈ τ ′(s′, ~α(~u′)) iff there exist s, t ∈ S and ~α(~u) ∈ Act(U ), such that s ⊕ t ≃ s′ ⊕ t′, for some witness ι, t ∈ τ (s, ~α(~u)), and ~u′ = ι′(~u) for some bijection ι′ extending ι to ~u. Notice that P ′ is indeed an AC-MAS as it satisfies the relevant conditions on protocols and transitions in Definition 2.7. Indeed, if t′ ∈ τ ′(s′, ~α(~u′)), then there exist s, t ∈ S, and ~α(~u) such that t ∈ τ (s, ~α(~u)), s ⊕ t ≃ s′ ⊕ t′ for some witness ι, and ~u = ι′(~u′) for some bijection ι′ extending ι. This means that αi(~ui) ∈ P ri(li) for i ≤ n. By definition of P r′ i(l′ i) for i ≤ n. Further, if U ′ has finitely many elements, then S ′ has finitely many states. Observe that by varying U ′ we obtain different ⊕-abstractions. i we have that αi(~u′ i) ∈ P r′ Next, we investigate the relationship between an AC-MAS and its ⊕-abstractions. A first useful result states that every finite ⊕-abstraction is uniform, independently of the properties of the AC- MAS they abstract. 25 Lemma 4.11 Every ⊕-abstraction P ′ of an AC-MAS P is uniform. Proof. Consider s, t, s′ ∈ S ′, t′ ∈ D(U ′), and ~α(~u) ∈ Act′(U ′) s.t. t ∈ τ ′(s, ~α(~u)) and s ⊕ t ≃ s′ ⊕ t′, for some witness ζ. We need to show that P ′ admits a transition from s′ to t′. Since P ′ is an ⊕-abstraction of P, given the definition of τ ′, there exist s′′, t′′ ∈ S and ~α(~u′′) ∈ Act(U ) s.t. t′′ ∈ τ (s′′, ~α(~u′′)), s′′ ⊕ t′′ ≃ s ⊕ t, for some witness ι, and ~u = ι′(~u′′), for some constant- preserving bijection ι′ extending ι to ~u′′. Consider ~u′ ∈ U ′~u such that ~u′ = ζ ′(~u), for some constant-preserving bijection ζ ′ extending ζ to ~u. Obviously, the composition ζ ′ ◦ ι′ is a constant- preserving bijection such that ~u′ = ζ ′(ι′(~u′′)). Moreover, it can be easily restricted to a witness for s′′ ⊕ t′′ ≃ s′ ⊕ t′. But then, since P ′ is an ⊕-abstraction of P, this implies that t′ ∈ τ ′(s′, ~α(~u′)). Thus, P ′ is uniform. The second result below guarantees that every b-bounded AC-MAS is bisimilar to any of its ⊕-abstractions, provided these are built over a sufficiently large interpretation domain. Lemma 4.12 Consider a uniform, b-bounded AC-MAS P over an infinite interpretation domain U, and an interpretation domain U ′ such that C ⊆ U ′. If U ′ ≥ 2b + C + NAg, then any ⊕-abstraction P ′ of P over U ′ is bisimilar to P. 0, then s0 ≃ s′ 0, and hs0, s′ Proof. Let B = {hs, s′i ∈ S × S ′ s ≃ s′}. We prove that B is a ⊕-bisimulation such that hs0, s′ 0i ∈ B. We start by proving that B is a ⊕-simulation relation. To this end, observe that since 0i ∈ B. Next, consider hs, s′i ∈ B, thus s ≃ s′. Assume that s0 = s′ s → t, for some t ∈ S. Then, there must exist ~α(~u) ∈ Act(U ) such that t ∈ τ (s, ~α(~u)). Moreover, since U ′ ≥ 2b + C + NAg, PAi∈Ag ~ui ≤ NAg, and adom(s) ∪ adom(t) ≤ 2b, the witness ι for s ≃ s′ can be extended to SAi∈Ag ~ui as a bijection ι′. Now let t′ = ι′(t). By the way ι′ has been defined, it can be seen that s ⊕ t ≃ s′ ⊕ t′. Further, since P ′ is an ⊕-abstraction of P, we have that t′ ∈ τ ′(s′, ~α(~u′)) for ~u′ = ι′(~u), that is, s′ → t′ in P ′. Therefore, there exists t′ ∈ S ′ such that s′ → t′, s ⊕ t ≃ s′ ⊕ t′, and ht, t′i ∈ B. As regards the epistemic relation, assume s ∼i t for some i ∈ {1, . . . , n} and t ∈ S. By definition of ∼i, li(s) = li(t). Since U ′ ≥ 2b + C, any witness ι for s ≃ s′ can be extended to a witness ι′ for s ⊕ t ≃ s′ ⊕ t′, where t′ = ι′(t). Obviously, li(s′) = li(t′). Thus, to prove that s′ ∼i t′, we need to show that t′ ∈ S ′, i.e., that t′ is reachable in P ′ from s′ 0 = s0. To this end, observe that since t ∈ S, there exists a purely temporal run r such that r(0) = s0 and r(k) = t, for some k ≥ 0. Thus, there exist also ~α1(~u1) . . . , ~αk(~uk) such that r(j + 1) ∈ τ (r(j), ~αj+1(~uj+1)), for 0 ≤ j < k. Since U ′ ≥ 2b + C, we can define, for 0 ≤ j < k, a function ιj that is a witness for r(j)⊕ r(j + 1) ≃ ιj(r(j))⊕ ιj (r(j + 1)). In particular, this can be done starting from j = k − 1, defining ιk−1 so that ιk−1(r(k)) = ιk−1(t) = t′, and proceeding backward to j = 0, guaranteeing that, for 0 ≤ j < k, ιj(r(j + 1)) = ιj+1(r(j + 1)). Observe that since adom(s0) ⊆ C, necessarily i0(r(0)) = i0(s0) = s0 = s′ 0. Moreover, as U ′ ≥ 2b + C + NAg, each ιj can be extended to a bijection ι′ j, to the elements occurring in ~uj+1. Thus, given that P ′ is an ⊕-abstraction of P, for 0 ≤ j < k, we have that ι′ j(r(j + 1)) ∈ k−1(r(k)) is a run of P ′, and, τ (ι′ k−1(r(k)), t′ is reachable in P ′. Therefore s′ ∼i t′. Further, since t ≃ t′, by definition since t′ = ι′ of B, it is the case that ht, t′i ∈ B, hence B is a ⊕-simulation. 0(r(0)) → · · · → ι′ j(r(j)), ~α(ι′ j(~uj+1))). Hence, the sequence ι′ To prove that B−1 is a ⊕-simulation, given hs, s′i ∈ B (thus s ≃ s′), assume that s′ → t′, for some t′ ∈ S ′. Obviously, there exists ~α(~u′) ∈ Act(U ′) such that t′ ∈ τ ′(s′, ~α(~u′)). Because P ′ is an ⊕-abstraction of P, there exist s′′, t′′ ∈ S and ~α(~u′′) ∈ Act(U ) such that s′′ ⊕ t′′ ≃ s′ ⊕ t′, for some witness ι, and t′′ ∈ τ (s′′, α(~u′′)), with ~u′′ = ι′(~u′), for some bijection ι′ extending ι to ~u′. 26 Observe that s′ ≃ s′′, thus, by transitivity of ≃, we have s ≃ s′′. The fact that there exists t ∈ S such that s → t easily follows from the uniformity of P. Thus, since t′ ≃ t, we have ht, t′i ∈ B. For the epistemic relation, assume s′ ∼i t′, for some t′ ∈ S ′ and 0 < i ≤ n. Let ι be a witness for s′ ≃ s, and let ι′ be an extension of ι that is a witness for s′ ⊕ t′ ≃ s ⊕ t. For t = ι′(t′), it can be seen that li(s) = li(t). Observe that t′ ∈ S ′. Using an argument essentially analogous to the one above, but exploiting the fact that P is uniform, that P ′ is certainly b-bounded, and that U > 2b + C + NAg as U is infinite, we show that t ∈ S by constructing a run r of P such that r(k) = t, for some k ≥ 0. Then s ∼i t. Further, since t′ ≃ t, we have ht, t′i ∈ B. Therefore, B−1 is a ⊕-simulation. So, P and P ′ are bisimilar. This result allows us to prove our main abstraction theorem. Theorem 4.13 Consider a b-bounded and uniform AC-MAS P over an infinite interpretation do- main U, an FO-CTLK formula ϕ, and an interpretation domain U ′ such that C ⊆ U ′. If U ′ ≥ 2b + C + max{vars(ϕ), NAg}, then for any ⊕-abstraction P ′ of P over U ′, we have that: P = ϕ iff P ′ = ϕ. Proof. By Lemma 4.11, P ′ is uniform. Thus, by the hypothesis on the cardinalities of U and U ′, Lemma 4.12 applies, so P and P ′ are bisimilar. Obviously, also P ′ is b-bounded. Thus, since P and P ′ are b-bounded, and by the cardinality hypothesis on U and U ′, Theorem 4.9 applies. In particular, notice that for every temporal-epistemic run r s.t. r(0) = s0, and for all k ≥ 0, we have that U ′ ≥ adom(r(k))∪adom(r(k+1))∪C+vars(ϕ), as adom(r(k)) ≤ b, by b-boundedness. Therefore, P = ϕ iff P ′ = ϕ. Note that the theorem above does not require U ′ to be infinite. So, by using a sufficient number of abstract values in U ′, we can in principle reduce the verification of an infinite, bounded, and uniform AC-MAS to the verification of a finite one. The following corollary to Theorem 4.13 states this clearly. Corollary 4.14 Given a b-bounded and uniform AC-MAS P over an infinite interpretation domain U, and an FO-CTLK formula ϕ, there exists an AC-MAS P ′ over a finite interpretation domain U ′ such that P = ϕ iff P ′ = ϕ. It should also be noted that U ′ can simply be taken to be any finite subset of U satisfying the cardinality requirement above. By doing so, the finite ⊕-abstraction P ′ can be defined simply as the restriction of P to U ′. Thus, every infinite, b-bounded and uniform AC-MAS is bisimilar to a finite subsystem which satisfies the same formulas. Note that, similarly to what noted at page 18 we are not concerned in the actual construction of the finite abstraction. This is because we intend to construct it directly from an artifact-centric program, as we will do in Section 6. Before that we explore the complexity of the model checking problem. 5. The Complexity of Model Checking Finite AC-MAS against FO-CTLK Specifications We now analyse the complexity of the model checking problem for finite AC-MAS with respect to FO-CTLK specifications. The input of the problem consists of an AC-MAS P on a finite domain U 27 and an FO-CTLK formula ϕ; the solution is an assignment σ such that (P, s0, σ) = ϕ. Hereafter we follow (Grohe, 2001) for basic notions and definitions. To encode an AC-MAS P we use a tuple EP = hU, D, s0, Φτ i, where U is the (finite) interpretation domain, D is the global database schema, s0 is the initial state, and Φτ = {φα1, . . . , φαm } is a set of FO-formulas, each capturing the transitions associated with a ground action αi. Since U is finite, so is the set of ground actions, thus Φτ . Each ϕαi is a FO-formula over local predicate symbols, in both normal and "primed" form, that is, φα can mention both P and P ′. For the semantics of Φτ , we have that s′ ∈ τ (s, α) iff s ⊕ s′ = φα, for s, s′ ∈ D(U ). It can be proved that every transition relation τ can be represented . in this way, and that, given EP, the size P = S + τ of the corresponding AC-MAS P is at most doubly exponential in EP of Pk. In particular, P = S + τ ≤ 23·2EP = U + D + Φτ , where D = PPk∈D qk, for qk the arity . 4 . We consider the combined complexity of the input, that is, EP + ϕ. In particular, we say that the combined complexity of model checking finite AC-MAS against FO-CTLK specifications is EXPSPACE-complete if the problem is in EXPSPACE, i.e., there is a polynomial p(x) and an algorithm solving the problem in space bound by 2p(EP +ϕ). We say it is EXPSPACE-hard if every EXPSPACE problem can be reduced to model checking finite AC-MAS against FO-CTLK specifications. We now state the following complexity result. Theorem 5.1 The complexity of the model checking problem for finite AC-MAS against FO-CTLK specifications is EXPSPACE-complete. Proof. To show that the problem is in EXPSPACE, recall that P is at most doubly exponential w.r.t. the size of the input, thus so is S. We describe an algorithm that works in NEXPSPACE, which combines the algorithm for model checking the first-order fragment of FO-CTLK and the temporal epistemic fragment. Since NEXPSPACE = EXPSPACE, the result follows. Given an AC- MAS P and an FO-CTLK formula ϕ, we guess an assignment σ. Given such σ, we check whether (P, s0, σ) = ϕ. This can be done by induction according to the structure of ϕ. If ϕ is atomic, this check can be done in polynomial time w.r.t. the size of the state it is evaluated on, that is exponential time w.r.t. EP . If ϕ is of the form ∀xψ, then we can apply the algorithm for model checking first- order (non-modal) logic, which works in PSPACE. Finally, if the outmost operator in ϕ is either a temporal or epistemic modality, then we can extend the automata-based algorithm to model check propositional CTL in (Kupferman, Vardi, & Wolper, 2000), which works in logarithmic space in S. However, we remarked above that S is generally doubly exponential in EP . Thus, if the main operator in ϕ is either a temporal or epistemic modality, then this step can be performed in space singly exponential in EP . All these steps can be performed in time polynomial in the size of ϕ. As a result, the total combined complexity of model checking finite AC-MAS is in NEXPSPACE = EXPSPACE. To prove that the problem is EXPSPACE-hard we show a reduction from any problem in EXPSPACE. We assume standard definitions of Turing machines and reductions (Papadimitriou, 1994). If A is a problem in EXPSPACE, then there exists a deterministic Turing machine TA = hQ, Σ, q0, F, δi, where Q is the finite set of states, Σ the machine alphabet, q0 ∈ Q the initial state, F the set of accepting states, and δ the transition function, that solves A using at most space 2p(in) on a given input in, for some polynomial function p. As standard, we assume δ to be a relation on (Q × Σ × Q × Σ × D), with D = {L, R}, and hq, c, q′, c′, di ∈ δ representing a transition from state q to state q′, with characters c and c′ read and written respectively , and head direction d ((L)eft and (R)ight). Without loss of generality, we assume that TA uses only the righthand half of the tape. 28 From TA and in, we build an encoding EP = hD, U, s0, Φτ i of an AC-MAS P induced by a single (environment) agent AE = hDE, LE, ActE, P rEi defined on U = Σ ∪ Q ∪ {0, 1}, where: (i) DE = {P/p(in) + 1, Q/1, H/p(in), F/1}; (ii) LE = DE(U ); (iii) ActE is the singleton {αE}, with αE parameter-free; (iv) αE ∈ P rE(lE) for every lE ∈ D(U ). Intuitively, the states of P correspond to configurations of TA, while τ mimics δ. To define EP , we let D = DE. The intended meaning of the predicates in D is as follows: the first p(in) elements of a P -tuple encode (in binaries) the position of a non-blank cell, and the (p(in) + 1)-th element contains the symbol appearing in that cell; Q contains the current state q of TA; H contains the position of the cell the head is currently on; F contains the final states of TA, i.e., F = F. The initial state s0 represents the initial configuration of TA, that is, for in = in0 · · · inℓ: s(Q) = {q0}; s(H) = {h0, . . . , 0i}; and s(P ) = {hBIN(i), inii i ∈ {0, . . . , ℓ}}, where BIN(i) stands for the binary encoding in p(in) bits of the integer i. Observe that p(in) bits are enough to index the (at most) 2p(in) cells used by TA. As to the transition relation, we define Φτ = {φαE }, where: φαE = _hq,c,q′,c′,di∈δ (∀xF (x) ↔ F ′(x)) ∧ Q(q) ∧ (∀xQ(x) → x = q) ∧ Q′(q′) ∧ (∀xQ′(x) → x = q′) ∧ ∃~p(H(~p) ∧ (∀xH(x) → x = ~p) ∧ (P (~p, c) ∨ (c = ✷ ∧ ¬∃xP (~p, x)))) ∧ ∃~p′(d = R → SUCC(~p, ~p′)) ∧ (d = L → SUCC(~p′, ~p)) ∧ H ′(~p′) ∧ (∀xH ′(x) → x = ~p′) ∧ (P ′(~p, c′) ↔ (c′ 6= ✷)) ∧ (∀xP ′(~p, x) → x = c′) ∧ (∀~x, y(P (~x, y) ∧ (~x 6= ~p) → P ′(~x, y)) ∧ (∀~x, yP ′(~x, y) → (P (~x, y) ∨ (~x = ~p ∧ y = c′)))) The symbol ✷ represents the content of blank cells, while SUCC(~x, ~x′) = Vp(in) i = 1 ↔ ((x′ i = 1) ∧ (x′ j=1 xj = 1))) is a formula capturing that ~x′ is the successor of ~x, for ~x and ~x′ interpreted as p(in)-bit binary encodings of integers (observe that {0, 1} ∈ U). Such a formula can obviously be written in polynomial time w.r.t. p(in), as well as EP , and in particular s0 and φαE . i = 1 ∧ ¬Vi−1 i = 0 ∧Vi−1 j=1 xj = 1) ∨ (x′ i=1 (x′ i = 0∨x′ As it can be seen by analyzing Φτ , the obtained transition function is such that τ (s, αE) = s′ iff, for δ(q, c) = (q′, c′, d) in TA, we have that: s′(P ) is obtained from s(P ) by overwriting with c′ (if not blank) the symbol in position (p(in) + 1) of the tuple in s(P ) beginning with the p(in)-tuple s(H) (that is, c by definition of φαE ); by updating s(H) according to d, that is by increasing or decreasing the value it contains; and by setting s′(Q) = {q′}. The predicate F does not change. Observe that cells not occurring in P are interpreted as if containing ✷ and that when ✷ is to be written on a cell, the cell is simply removed from P . It can be checked that, starting with s = s0, by iteratively generating the successor state s′ according to Φτ , i.e., s′ s.t. s ⊕ s′ = φαE , one obtains a (single) P-run that is a representation of the computation of TA on in, where each pair of consecutive P-states corresponds to a computation step. In particular, at each state, Q contains the current state of TA. It should be clear that ϕ = EF (∃xQ(x) ∧ F (x)) holds in P iff TA accepts in. Thus, by checking ϕ, we can check whether TA accepts in. This completes the proof of EXPSPACE-hardness. 29 Note that the result above is given in terms of the "data structures" in the model, i.e., U and D, and not the state space S itself. This accounts for the high complexity of model checking AC-MAS, as the state space is doubly exponential in the size of data. While EXPSPACE-hardness indicates intractability, we note that this is to be expected given that we are dealing with quantified structures which are in principle prone to undecidability. Recall also from Section 4.2 that the size of the interpretation domain U ′ of the abstraction P ′ is linear in the bound b, the number of constants in C, the size of φ, and NAg. Hence, model checking bounded and uniform AC-MAS is EXPSPACE-complete with respect to these elements, whose size will generally be small. Thus, we believe than in several cases of practical interest model checking AC-MAS may be entirely feasible. We now conclude the section with some observations on the verification of bounded and un- bounded systems. Observe that the results presented in Sections 3.1 and 4.2 apply to infinite but bounded AC-MAS, i.e., whose global states never exceed a certain size in any run. It is however worth noting that existential fragments of the specification languages considered so far need not be examined with respect to the whole AC-MAS. Indeed in bounded model checking for CTLK submodels are iteratively explored until a witness for an existential specification is found (Penczek & Lomuscio, 2003). If that happens, we can deduce that the existential specification holds on the full model as well. As we show below, we can extend these result to the case of infinite AC-MAS. To begin, define the b-restriction Pb of an AC-MAS P as follows. Definition 5.2 (b-Restriction) Given an AC-MAS P = hS, U, s0, τ i and b ∈ N such that b ≥ adom(s0) ∪ C, the b-restriction Pb = hSb, U, s0, τbi of P is such that • Sb = {s ∈ S adom(s) ≤ b}; • s′ ∈ τb(s, α(~u)) iff s′ ∈ τ (s, α(~u)) and s, s′ ∈ Sb. Notice that s0 ∈ Sb by construction and τb is the restriction of τ to Sb; the interpretation domain U is the same in P and Pb. The result below demonstrates that if a FO-ECTLK formula holds on the b-restriction, then the formula holds on the whole AC-MAS. Theorem 5.3 Consider an AC-MAS P and its b-restriction Pb, for b ∈ N. For any formula φ in FO-ECTLK, we have that: Pb = φ ⇒ P = φ Proof. By induction on the construction of φ. The base case for atomic formulas and the inductive cases for propositional connectives are trivial, as the interpretation of relation symbols for states in Sb is the same as in S. As to the existential operators EX and EU, it suffices to remark that if r is a run in Pb satisfying either EXψ or EψU ψ′, then r belongs to P as well by definition of Pb. The cases for the epistemic modalities ¯Ki and ¯C are similar: if (Pb, s, σ) = ¯Kiφ, then there exists s′ ∈ Sb such that s ∼i s′ and (Pb, s′, σ) = φ. In particular, s′ ∈ S and therefore (P, s, σ) = ¯Kiφ. For ¯Cφ the proof is similar by considering the transitive closure of the epistemic relations. Finally, the case of quantifiers follows from the fact that the active domain for each state is the same in P and Pb. Observe that there are specifications in FO-CTLK that are not preserved from Pb to P. For instance, consider the specification ϕb = AG∀x1, . . . , xb+1Wi6=j(xi = xj) in SA-FO-CTL, which 30 expresses the fact that every state in every run contains at most b distinct elements. The formula ϕb is clearly satisfied by Pb but not in P, whenever P is unbounded. Theorem 5.3 can in principle form the basis for an incremental iterative procedure for checking an existential specification φ on an infinite AC-MAS P. We can begin by taking a reasonable bound b and check Pb = φ. If that holds we can deduce P = φ; if not we can increase the bound and repeat. The procedure is sound but clearly not complete. As mentioned earlier, this is in spirit of bounded model checking (Biere, Cimatti, Clarke, Strichman, & Zhu, 2003). Here, however, the bound is on the size of the states, rather than the length of the runs. 6. Model Checking Artifact-Centric Programs We have so far developed a formalism that can be used to specify and reason about temporal- epistemic properties of models representing artifact-centric systems. We have identified two notable classes that admit finite abstractions. As we remarked in the introduction, however, artifact-centric systems are typically implemented through declarative languages such as GSM (Hull et al., 2011). It is therefore of paramount interest to investigate the verification problem, not just on a Kripke semantics such as AC-MAS, but on concrete programs. As discussed, while GSM is a mainstream declarative language for artifact-centric environments, alternative declarative approaches exist. In what follows for the sake of generality we ground our discussion on a very wide class of declarative languages and define the notion of artifact-centric program. Intuitively, an artifact-centric program (or AC program) is a declarative description of a whole multi-agent system, i.e., a set of services, that interact with the artifact system (see discussion in the Introduction). Since artifact systems are also typically implemented declaratively (see (Heath et al., 2011)) in what follows AC programs will be used to encode both the artifact system itself and the agents in the system. This also enables us to import into the formalism the previously discussed features of views and windows typical in GSM and other languages. This section is organised as follows. Firstly, we define AC programs and give their semantics in terms of AC-MAS. Secondly, we show that any AC-MAS that results from an AC program is uniform. This enables us to state that, as long as the generated AC-MAS is bounded, any AC program admits an AC-MAS as its finite model. In this context it is actually important to give constructive procedures for the generation of the finite abstraction; we provide such a procedure here. This enables us to state that, under the assumptions we identify, AC programs admit decidable verification by means of model checking their finite model. We start by defining the abstract syntax of AC programs. Definition 6.1 (AC Program) An artifact-centric program (or AC program) is a tuple ACP = hD, U, Σi, where: • D is the program's database schema; • U is the program's interpretation domain; • Σ = {Σ0, . . . , Σn} is the set of agent programs Σi = hDi, li0, Ωii, where: -- Di ⊆ D is agent i's database schema, s.t. Di ∩ Dj = ∅, for i 6= j; -- li0 ∈ Di(U ) is agent i's initial state (as a database instance); 31 -- Ωi is the set of local action descriptions in terms of preconditions and postconditions of the form α(~x) . = hπ(~y), ψ(~z)i, where: ∗ α(~x) is the action signature and ~x = ~y ∪ ~z is the set of its parameters; ∗ π(~y) is the action precondition, i.e., an FO-formula over Di; ∗ ψ(~z) is the action postcondition, i.e., an FO-formula over D ∪ D′. Recall that local database schemas and instances were introduced in Definition 2.6. Observe that AC programs are defined modularly by giving the agents' programs including preconditions and postconditions as well as those of the environment. Notice that preconditions use relation symbols from the local database only, while postcondi- tions can use any symbol from the whole D. This accounts for the intuition formalised in AC-MAS as well as present in temporal-epistemic logic literature that agents' actions may change the envi- ronment and the state of other agents. For an action α(~x), we let const(α) = const(π) ∪ const(ψ), vars(α) = vars(π) ∪ vars(ψ), and free(α) = ~x. An execution of α(~x) with ground parameters ~u ∈ U ~x is the ground action α(~u) = hπ(~v), ψ( ~w)i, where ~v (resp. ~w) is obtained by replacing each yi (resp. zi) with the value occurring in ~u at the same position as yi (resp. zi) in ~x. Such replacements make both π(~v) and ψ( ~w) ground. Finally, we define the set CACP of all constants mentioned in ACP , i.e., CACP = Sn i=1(cid:0)adom(Di0) ∪Sα∈Ωi const(α)(cid:1). The semantics of a program is given in terms of the AC-MAS induced by the agents that the program implicitly defines. Formally, this is captured by the following definition. Definition 6.2 (Induced Agents) Given an AC program ACP = hD, U, Σi, an agent induced by ACP is a tuple Ai = hDi, Li, Acti, P rii on the interpretation domain U such that, for Σi = hDi, li0, Ωii: • Li ⊆ Di(U ) is the set of the agent's local states; • Acti = {α(~x) α(~x) ∈ Ωi} is the set of local actions; • The protocol P ri(li) is defined by α(~u) ∈ P ri(li) iff li = π(~v) for α(~u) = hπ(~v), ψ( ~w)i. Note that the definition of induced agent is in line with the definition of Agents (Definition 2.6). Agents induced as above are composed to give an AC-MAS associated with an AC program. Definition 6.3 (Induced AC-MAS) Given an AC program ACP and the set Ag = {A0, . . . , An} of agents induced by ACP , the AC-MAS induced by ACP is the tuple PACP = hS, U, s0, τ i, where: • S ⊆ L0 × · · · × Ln is the set of reachable states; • s0 = hl00, . . . , ln0i is the initial global state; • U is the interpretation domain; • τ is the global transition function defined by the following condition: s′ ∈ τ (s, hα1(~u1), . . . , αn(~un)i), with s = hl0, . . . , lni and αi(~ui) = hπi(~vi), ψi( ~wi)i (i ∈ {0, . . . , n}), iff the following conditions are satisfied: -- for every i ∈ {0, . . . , n}, li = πi(~vi); 32 -- adom(s′) ⊆ adom(s) ∪Si=0,...,n ~wi ∪ const(ψi); -- Ds ⊕ Ds′ = ψi( ~wi), where Ds and Ds′ are obtained from s and s′ as discussed on p. 11. Given an AC program, the induced AC-MAS is the Kripke model representing the whole execution tree for the AC program and representing all the data in the system. Observe that all actions per- formed are enabled by the respective protocols and that transitions can introduce only a bounded number of new elements in the active domain, those bound to the action parameters. It follows from the above that AC programs are parametric with respect to the interpretation domain, i.e., by replacing the interpretation domain we obtain a different AC-MAS. For simplicity, we assume that for every postcondition ψ in a program, if a predicate does not occur in the postcondition, it is left unchanged by the relevant transitions. Formally, this means that we implicitly add a conjunct of the form ∀~xP (~x) ↔ P ′(~x) (∗) to the postcondition whenever P is not mentioned in ψ. Further, we assume that every program induces an AC-MAS whose transition relation is serial, i.e., AC-MAS states always have successors. These are basic requirements that can be easily fulfilled, for instance, by assuming that each agent has a skip action with an empty precondition and a postcondition of the form (∗) for every P ∈ D. In the next section we present an example of one such program. A significant feature of AC programs is that they induce uniform AC-MAS. Lemma 6.4 Every AC-MAS P induced by an AC program ACP is uniform. Proof. By Prop. 4.4, it is sufficient to consider only the temporal transition relation →, as adom(s0) ⊆ CACP . Consider s, s′, s′′ ∈ S and s′′′ ∈ L0 × · · · × Ln, such that s ⊕ s′ ≃ s′′ ⊕ s′′′ for some witness ι. Also, assume that there exists ~α(~u) = hα1(~u1), . . . , αn(~un)i ∈ Act(U ) such that s′ ∈ τ (s, ~α(~u)). We need to prove that for every constant-preserving bijection ι′ that extends ι to ~u, we have that s′′′ ∈ τ (s′′, ~α(ι′(~u))). To this end, we remark that any witness ι for s ⊕ s′ ≃ s′′ ⊕ s′′′ can be extended to an injective function ι′ on Si∈Ag ~ui. Obviously, U contains enough distinct elements for ι′ to exist, as every ~ui takes values from U. Now, by an argument analogous to that of Proposition 2.14, it can be seen that for any F O-formula ϕ and equivalent assignments σ and σ′, we have that (s ⊕ s′, σ) = ϕ iff (s′′ ⊕ s′′′, σ′) = ϕ. But then, this holds, in particular, for σ′ obtained from σ by applying ι′ to the values assigned to each parameter, i.e., ι′(~u), and α(~u) −−−→ s′. Thus, we have for the pre- and postconditions of all actions involved in the transition s s′′′ ∈ τ (s′′, ~α(ι′(~u))), i.e., P is uniform. We can now define what it means for an AC program to satisfy a specification, by referring to its induced AC-MAS. Definition 6.5 Given an AC program ACP , a FO-CTLK formula ϕ, and an assignment σ, we say that ACP satisfies ϕ under σ, written (ACP, σ) = ϕ, iff (PACP , s0, σ) = ϕ. It follows that the model checking problem for an AC program against a specification φ is defined in terms of the model checking problem for the AC-MAS PACP against φ. The following result allows us to reduce the verification of any AC program with an infinite interpretation domain U1, that induces a b-bounded AC-MAS, to the verification of an AC program over a finite U2. To show how it can be done, we let NACP = Pi∈{1,...,n} maxα(~x)∈Ωi{~x} be the maximum number of different parameters that can occur in a joint action of ACP . 33 Lemma 6.6 Consider an AC program ACP1 = hD, U1, Σi operating on an infinite interpretation domain U1 and assume its induced AC-MAS PACP1 = hS1, U1, s10, τ1i is b-bounded. Consider a finite interpretation domain U2 such that CACP1 ⊆ U2 and U2 ≥ 2b + CACP1 + NACP1 and the AC program ACP2 = hD, U2, Σi. Then, the AC-MAS PACP2 = hS2, U2, s20, τ2i induced by ACP2 is a finite abstraction of PACP1. i ⊆ D′ Proof. Let Ag1 and Ag2 be the set of agents induced respectively by ACP1 and ACP2, according to Def. 6.2. First, we prove that the set of agents Ag1 and Ag2 satisfy Def. 3.7, for Ag = Ag1 and Ag′ = Ag2. To this end, observe that because ACP1 and ACP2 differ only in U, by Def. 6.2, D = D′, L′ i(U ′), and Act′ = Act. Thus, only requirement 4 of Def. 3.7 still needs to be proved. To see it, fix i ∈ {1, . . . , n} and assume that α(~u) ∈ P ri(li). By Def. 6.2, we have that li = π(~v), for α(~u) = hπ(~v), ψ( ~w)i. By the assumption on U2, since const(α) ⊆ CACP1 ⊆ U2, ~u ≤ NACP1, and adom(li) ≤ b, we can define an injective function ι : adom(li) ∪ ~u ∪ CACP1 7→ U2 that is the identity on CACP1. Thus, for l′ i = ι(li), we can easily extract from ι a witness for i. Moreover, it can be seen that ~v and ~v′ are equivalent for π. Then, by applying Prop. 2.14 to li ≃ l′ li and l′ i, we conclude that l′ i). So, we have shown the right-to-left part of requirement 4. The left-to-right part can be shown similarly and in a simplified way as U1 is infinite. i = π(~v′), for ~v′ = ι(~v). Hence, by Def. 6.2, α(~u′) ∈ P r′ i(l′ 1 = hl′ 1 ∈ τ1(s1, ~α(~u)). Consider s1⊕s′ Thus, we have proven that Ag = Ag1 and Ag′ = Ag2 are obtained as in Def. 3.7. Hence, the assumption on Ag and Ag′ in Def. 4.10 is fulfilled. We prove next that also the remaining requirements of Def. 4.10 are satisfied. Obviously, since Σ is the same for ACP1 and ACP2, by Def. 6.3, s10 = s20, so the initial states of PACP1 and PACP2 are the same. It remains to show that the requirements on τ1 and τ2 are satisfied. We prove the right-to-left part. To this end, take two states s1 = hl10, . . . , l1ni, s′ 1ni in S1 and a joint action ~α(~u) = hα0(~u0), . . . , αn(~un)i ∈ Act(U ) such that s′ 1. By the assumptions on U2, there exists an injective function ι : adom(s1) ∪ adom(s′ 1) ∪ ~u ∪ CACP1 7→ U2 that is the identity on CACP1 (recall that adom(s1), adom(s′ 1) ≤ b). Then, for s2 = hι(l10), . . . , ι(l1n)i, s′ 2 = hι(l′ 2. Moreover, it can be seen that for every πi and ψi in ~αi(~xi) = hπi(~yi), ψi(~zi)i, ~u and ~u′ = ι(~u) are equivalent with respect to s1 ⊕ s′ 2. Now, consider Def. 6.3 and recall that both PACP1 and PACP2 are AC-MAS induced by ACP1, ACP2, respectively. By applying Prop. 2.14, we have that, for i ∈ {0, . . . , n}: ι(l1i) = πi(ι(~vi)) iff l1i = πi(~vi); Ds2 ⊕Ds′ = ψi( ~wi). In addition, by the definition of ι, adom(s′ 2) ⊆ adom(s2)∪Si=0,...,n ι( ~wi)∪const(ψi). But then, it is the case that s′ 2, ~α(ι(~u0), . . . , ι(~un))). So we have proved the right-to-left part of the second requirement of Def. 4.10. The other direction follows similarly. Therefore, PACP2 is an abstraction of PACP1. 1) ⊆ adom(s1) ∪Si=0,...,n ~wi ∪ const(ψi) iff adom(s′ 1n)i in S2, we can extract, from ι, a witness for s1 ⊕ s′ 1 and s2 ⊕ s′ 10), . . . , ι(l′ 1 ≃ s2 ⊕ s′ 10, . . . , l′ = ψi(ι( ~wi)) iff Ds1 ⊕Ds′ 1 2 2 ∈ τ2(s′ Intuitively, Lemma 6.6 shows that the following diagram commutes, where [U1/U2] stands for the replacement of U1 by U2 in the definition of ACP1. Observe that since U2 is finite, one can actually apply Def. 6.3 to obtain PACP2, while this cannot be done for ACP1, as U1 is infinite. ACP1 Def. 6.3 PACP1 [U1/U2] Def. 4.10 ACP2 Def. 6.3 / PACP2 34 / /     / The following result, a direct consequence of Lemma 4.12 and Lemma 6.6, is the key conclusion of this section. Theorem 6.7 Consider an FO-CTLK formula ϕ, an AC program ACP1 operating on an infinite interpretation domain U1 and assume its induced AC-MAS PACP1 is b-bounded. Consider a finite interpretation domain U2 such that CACP1 ⊆ U2 and U2 ≥ 2b+CACP +max{NACP , vars(ϕ)}, and the AC program ACP2 = hD, U2, Σi. Then we have that: ACP1 = ϕ iff ACP2 = ϕ. Proof. By Lemma 6.6 PACP2 is a finite abstraction of PACP1. Moreover, U2 ≥ 2b + CACP + max{NACP , vars(ϕ)} implies U2 ≥ 2b+CACP +vars(ϕ). Hence, we can apply Lemma 4.12 and the result follows. The above is the key result in this section. It shows that if the generated AC-MAS model is bounded, then any AC program can be verified by model checking its finite ⊕-abstraction, i.e., a ⊕-bisimilar AC-MAS defined on a finite interpretation domain. Note that in this case the procedure is entirely constructive: given an AC program ACP1 = hD, U1, Σi on an infinite domain U1 and an FO-CTLK formula ϕ, to check whether ACP1 satisfies the specification ϕ, we first consider the finite "abstraction" ACP2 = hD, U2, Σi defined on a finite domain U2 satisfying the requirement on cardinality in Theorem 6.7. Since U2 is finite, also the induced AC-MAS PACP2 is finite, hence we can apply standard model checking techniques to verify whether PACP2 satisfies ϕ. Finally, by definition of satisfaction for AC programs and Theorem 6.7, we can transfer the result obtained to decide the model checking problem for the original infinite AC program ACP1 and ϕ. Also observe that in the finite abstraction considered above the abstract interpretation domain U2, depends on the number of distinct variables that the specification ϕ contains. Thus, in principle, to check the same AS program against a different specification ϕ′, one should construct a new 2, and then check ϕ′ against it. However, abstraction PACP ′ it can be seen that if the number of distinct variables of ϕ′ does not exceed that of ϕ, the abstraction PACP2, used to check ϕ, can be re-used for ϕ′. Formally, let FO-CTLKk be the set of all FO-CTLK formulas containing at most k distinct variables. We have the following corollary to Theorem 6.7. using a different interpretation domain U ′ 2 Corollary 6.8 If U2 ≥ 2b + CACP + max{NACP , k}, then, for every FO-CTLKk formula ϕ, ACP1 = ϕ iff ACP2 = ϕ. This result holds in particular for k = NACP ; thus for FO-CTLKNACP formulas, we have an abstraction procedure that is specification-independent. Theorem 6.7 requires the induced AC-MAS to be bounded, which may seem a difficult condition to check a priori. Note however that AC programs are declarative. As such it is straightforward to give postconditions that enforce that no transition will generate states violating the boundedness requirement. The scenario in the next section will exemplify this. 7. The Order-to-Cash Scenario In this section we exemplify the methodology presented so far in the context of a business process inspired by an IBM customer use-case (Hull et al., 2011). The order-to-cash scenario describes the actions performed by a number of agents in an e-commerce situation relating to the purchase 35 createP O prepared submitP O pending pay paid shipP O shipped deleteP O (a) Purchase Order lifecyle createM O preparation doneM O acceptM O submitted accepted shipM O shipped rejectM O rejected deleteM O deleteM O (b) Material Order lifecyle Figure 3: Lifecycles of the artifacts involved in the order-to-cash scenario. and delivery of a product. The agents in the system consist of a manufacturer, some customers, and some suppliers. The process begins when a customer prepares and submits a purchase order (PO), i.e., a list of products the customer requires, to the manufacturer. Upon receiving a PO, the manufacturer prepares a material order (MO), i.e., a list of components needed to assemble the requested products. The manufacturer then selects a supplier and forwards him the relevant material order. Upon receipt a supplier can either accept or reject a MO. In the former case he then proceeds to deliver the requested components to the manufacturer. In the latter case he notifies the manufacturer of his rejection. If an MO is rejected, the manufacturer can delete it and then prepare and submit new MOs. When the components required have been delivered to the manufacturer, he assembles the product and, provided the order has been paid for, he delivers it to the customer. Any order which is directly on indirectly related to a PO can be deleted only after the PO is deleted. We can encode the order-to-cash business process as an artifact-centric program ACPotc, where the artifact data models are represented as database schemas and its evolution is characterised by an appropriate set of operations. It is natural to identify 2 classes of artifacts, representing the PO and the MO, each corresponding to the respective orders by the agents. An intuitive representation of the artifact lifecycles, i.e., the evolution of some key records in the artifacts' states, capturing only the dependence of actions from the artifact statuses, is shown in Fig. 3. Note that this is an incomplete representation of the business process, as the interaction between actions and the artifact data content is not represented. Next, we encode the whole system as an AC program, where the artifact data models are repre- sented as a relational database schema, and the corresponding lifecycles are formally characterised by an appropriate set of actions. We reserve a distinguished relation for each artifact class. In addition, we introduce static relations to store product and material information. For the sake of presentation we assume to be dealing with three agents only: one customer c, one manufacturer m and one supplier s. The database schema Di for each agent i ∈ {c, m, s} can therefore be given as: • Customer c: Dc = {Products(prod code, budget), PO (id, prod code, offer , status)}; • Manufacturer m: Dm = {PO (id, prod code, offer , status), MO (id, prod code, price, status)}; • Supplier s: Ds = {Materials(mat code, cost), MO (id, prod code, price, status)}. The relations Products and Materials, as well as PO and MO are self-explanatory. Note the presence of the attribute status in the relations corresponding to artifacts. 36 As interpretation domain, we consider the infinite set Uotc of alphanumeric strings. Also, we assume that in the initial state the only non-empty relations are Products and Materials, which contain background information, such as the catalogue of available products. Hence, the artifact-centric program ACPotc corresponding to the order-to-cash scenario can be given formally as follows: Definition 7.1 The artifact-centric program ACPotc is a tuple hDotc, Uotc, Σotci, where: • the program's database schema Dotc and interpretation domain Uotc are introduced as above, i.e., Dotc = Dc ∪ Dm ∪ Ds = {Products/2, PO /4, MO /4, Materials /2} and Uotc is the set of all alphanumeric strings. • Σ = {Σc, Σm, Σs} is the set of agent specifications for the customer c, the manufacturer m and the supplier s. Specifically, for each i ∈ {c, m, s}, Σi = hDi, li0, Ωii is such that: -- Di ⊆ D is agent i's database schema as detailed above, i.e., Dc = {Products /2, PO /4}, Dm = {PO /4, MO /4}, and Ds = {MO/4, Materials /2}. -- lc0, lm0, and ls0 are database instances in Dc(Uotc), Dm(Uotc), and Ds(Uotc) respec- tively s.t. lc0(Products) and ls0(Materials) are not empty, i.e., they contain some back- ground information, while lc0(PO), lm0(PO ), lm0(MO) and ls0(MO) are empty. -- We assume that Ωc contains the actions createPO(prod code,offer), submitPO(po id), pay(po id), deletePO(po id). Similarly, Ωm = {createMO (po id, price), doneMO (mo id), shipPO (po id), deleteMO (mo id)} and Ωs = {acceptMO (mo id), rejectMO (mo id), shipMO (mo id)}. System actions capture legal operations on the underlying database and, thus, on artifacts. In Table 1 we report some of their specifications. Variables (from V ) and constants (from U) are distinguished by fonts v and c, respectively. From Section 6 we adopt the convention that an action affects only those relations whose name occurs in ψ. Consider, for instance, the action createPO performed by the customer c, whose purpose is the creation of a PO artifact instance related to a given prod code. Its precondition requires that the action parameter prod code refers to an actual product in the P roducts database; while the postcondition guarantees that the offer value in PO is set equal to budget as well as the id of the new PO is unique. As regards the action createMO, performed by the manufacturer m and meant to create instances of MO artifacts, its precondition requires that po id is the identifier of some existing PO. Its postcondition states that, upon execution, the MO relation contains exactly one additional tuple, with identifier attribute set to id, with attribute status set to preparation and asking price set to price. As an example of action triggering an artifact's status transition, consider the action doneMO performed also by the manufacturer m. doneMO is executable only if the MO artifact is in status preparation; its effect is to set the status attribute to submitted. Finally, as an example of an action triggered by a choice, consider the action acceptMO performed by the supplier s. It is triggered only if the entries for the product code pc and the price p have matching values in the Materials database. The action outcome is to set the status attribute to accepted. Notice that although actions are typically conceived to manipulate artifacts of a specific class their preconditions and postconditions may depend on artifact instances of different classes. For example note that the action createMO manipulates MO artifacts, but its preconditions and post- conditions may depend on artifact instances originating from different classes (e.g. createMO's 37 Table 1: Specification of the actions affecting the artifacts PO and MO in the order-to-cash scenario. • createP O(prod code) = hπ(prod code), ψ(prod code)i, where: -- π(prod code) ≡ ∃b P roducts(prod code, b) -- ψ(prod code) ≡ ∃id, b (P O′(id, prod code, b, prepared)∧ P roducts(prod code, b)∧ ∀id′, pc, o, s (P O(id′, pc, o, s) → id 6= id′)) • createM O(po id, price) = hπ(po id, price), ψ(po id, price)i, where: -- π(po id, price) ≡ ∃pc, o (P O(po id, pc, o, prepared) -- ψ(po id, price) ≡ (M O′(po id, pc, price, preparation)∧ ∃oP O(po id, pc, o, prepared)∧ ∀id′, pc, pr, s (M O(id′, pc, pr, s) → id 6= id′)) • doneM O(mo id) = hπ(mo id), ψ(mo id)i, where: -- π(mo id) ≡ ∃pc, p M O(mo id, pc, pr, preparation) (M O(mo id, pc, p, s) → (M O′(mo id, pc, p, submitted)∧ -- ψ(mo id) ≡ ∀w, pc, p, s (cid:0)(w 6= mo id → (M O(w, pc, p, s) ↔ M O′(w, pc, p, s)))∧ (s 6= submitted → ¬M O′(mo id, pc, p, s))))(cid:1) • acceptM O(mo id) = hπ(mo id), ψ(mo id)i, where: -- π(mo id) ≡ ∃mo id, pc, p M O(mo id, pc, pr, submitted) ∧ M aterial(pc, p) (M O(mo id, pc, p, s) → (M O′(mo id, pc, p, accepted)∧ -- ψ(mo id) ≡ ∀w, pc, p, s (cid:0)(w 6= mo id → (M O(w, pc, p, s) ↔ M O′(w, pc, p, s)))∧ (s 6= accepted → ¬M O′(mo id, pc, p, s))))(cid:1) 38 precondition depends on PO artifacts). We stress that action executability depends not only on the status attribute of an artifact, but on the data content of the whole database, i.e., of all other artifacts. Similarly, action executions affect not only status attributes. Most importantly, by using first-order formulas such as φb = ∀x1, . . . , xb+1Wi6=j(xi = xj) in the postcondition ψ, we can guarantee that the AC program in question is bounded and is therefore amenable to the abstraction methodology of Section 6. We now define the agents induced by the AC program ACPotc given above according to Defi- nition 6.2. Definition 7.2 Given the AC program ACPotc = hDotc, Uotc, Σotci, the agents Ac, Am and As induced by ACPotc are defined as follows: • Ac = hDc, Lc, Actc, P rci, where (i) Dc is as above; (ii) Lc = Dc(Uotc); (iii) Actc = Ωc = {createPO (prod code, offer ), submitPO (po id), pay(po id), deletePO (po id)}; and (iv) α(~u) ∈ P rc(lc) iff lc = π(~v) for α(~u) = hπ(~v), ψ( ~w)i. • Am = hDm, Lm, Actm, P rmi, where (i) Dm is as above; (ii) Lm = Dm(Uotc); (iii) Actm = Ωm = {createMO (po id, price), doneMO (mo id), shipPO (po id), deleteMO (mo id)}; and (iv) α(~u) ∈ P rm(lm) iff lm = π(~v) for α(~u) = hπ(~v), ψ( ~w)i. • As = hDs, Ls, Acts, P rsi, where (i) Ds is as above; (ii) Ls = Ds(Uotc); (iii) Acts = Ωs = {acceptMO (mo id), rejectMO (mo id), shipMO (mo id)}; and (iv) α(~u) ∈ P rs(ls) iff lm = π(~v) for α(~u) = hπ(~v), ψ( ~w)i. By the definition of Am we can see that createM O(po id, price) ∈ P rm(lm) if and only if the interpretation lm(P O) of the relation P O in the local state lm contains a tuple hpo id, pc, o, preparedi for some product pc and offer o; while doneM O(mo id) ∈ P rm(lm) iff lm(M O) contains a tuple in the interpretation lm(M O) with id mo id and status preparation. It can also be checked that, in line with our discussion in Section 2, a full version of the function τotc given above can easily encode the artifacts' lifecycles as given in Figure 3. We can now define the AC-MAS generated by the set of agents {Ac, Am, As} according to Definition 6.3. Definition 7.3 Given the AC program ACPotc and the set Ag = {Ac, Am, As} of agents induced by ACPotc, the AC-MAS induced by ACPotc is the tuple Potc = hSotc, Uotc, s0 otc, τotci, where: • Sotc ⊆ Lc × Lm × Ls is the set of reachable states; • Uotc is the interpretation domain; • s0 otc = hlc0, lm0, ls0i is the initial global state, where the only non-empty relation are Products and Materials; • τotc is the global transition function defined according to Def. 6.3. As an example we give a snippet of the transition function τotc by considering the global action α(~u) = hcreateP O(pc), doneM O(m), acceptM O(m′)i enabled by the respective protocols in a global state s. By the definition of the actions createP O(pc), doneM O(m), and acceptM O(m′) 39 we have that li(s) ∈ P ri for i ∈ {c, m, s} implies that the Products relation contains infor- mation about the product pc. Also, the interpretation of the relation M O contains the tuples hm, p, pr, preparationi and hm′, p′, pr′, submittedi for some products p and p′. By the definition of τotc it follows that for every s′ ∈ Sotc, s ψcreateP O(pc) ∧ ψdoneM O(m) ∧ ψacceptM O(m′), that is, α(~u) −−−→ s′ implies that Ds ⊕ Ds′ = Ds ⊕ Ds′ = ∃id, b (P O′(id, pc, b, prepared) ∧ P roducts(pc, b) ∧ ∀id′, p, o, s (P O(id′, p, o, s) → id 6= id′)) ∧ (M O(m, p, pr, s) → (M O′(m, p, pr, submitted) ∧ ∀w, p, pr, s (cid:0)(w 6= m → (M O(w, p, pr, s) ↔ M O′(w, p, pr, s))) ∧ (s 6= submitted → ¬M O′(m, p, pr, s))))(cid:1) ∧ ∀w, p, pr, s (cid:0)(w 6= m′ → (M O(w, p, pr, s) ↔ M O′(w, p, pr, s))) ∧ (s 6= accepted → ¬M O′(m′, p, pr, s))))(cid:1) (M O(m′, p, pr, s) → (M O′(m′, p, pr, accepted) ∧ Hence, the interpretation of the relation PO in Ds′ extends Ds(P O) with the tuple hid, pc, b, preparedi, where id is a fresh id. The tuples for the material orders m and m′ are updated in Ds′(M O) by becoming hm, p, pr, submittedi and hm′, p′, pr′, acceptedi, respectively. In view of the second condition on τotc in Definition 6.3, no other elements are changed in the transition. Finally, notice that these extensions are indeed the interpretations of PO and MO in Ds′. Thus, the operational semantics satisfies the intended meaning of actions. We can now investigate properties of the AC program ACPotc by using specifications in FO- CTLK. For instance, the following formula specifies that the manufacturer m knows that each ma- terial order MO has to match a corresponding purchase order PO: ϕmatch = AG ∀id, pc (∃pr, s M O(id, pc, pr, s) → Km∃o, s′P O(id, pc, o, s′)) The next specification states that given a material order MO, the customer will eventually know that the corresponding PO will be shipped. ϕfulfil = AG ∀id, pc (∃pr, s M O(id, pc, pr, s) → EF Kc∃o P O(id, pc, o, shipped)) Further, we may be interested in checking whether budget and costs are always kept secret from the supplier s and the customer c respectively, and whether the customer (resp., the supplier) knows this fact: ϕbudget = Kc ∀pc AG ¬∃b Ks P roducts(pc, b) ϕcost = Ks ∀mc AG ¬∃c Kc M aterials(mc, c) Other interesting specifications describing properties of the artifact system and the agents oper- ating in it can be similarly formalised in FO-CTLK, thereby providing the engineer with a valuable tool to assess the implementation. We now proceed to exploit the methodology of Section 6 to verify the AC program ACPotp. We use ϕmatch as an example specification; analogous results can be obtained for other formulas. Observe that according to Definition 6.3 the AC-MAS induced by ACPotp has infinitely many states. 40 We assume two interpretations for the relations Products and Materials, which determine an initial state D0. Consider the maximum number max of parameters and the constants CΩ in the operations in Ωc, Ωm and Ωs. In the case under analysis we have that max = 2. We earlier remarked that formulas such as φb in the postcondition of actions force the AC-MAS Potc corresponding to ACPotc is bounded. Here we have that Potc is b-bounded. According to Corollary 4.14, we can therefore consider a finite domain U ′ such that and such that U ′ ⊇ D0 ∪ CΩ ∪ const(ϕmatch) D0(P roducts) ∪ D0(M aterials) ∪ CΩ U ′ ≥ 2b + D0 + CΩ + const(ϕmatch) + max = 2b + D0 + CΩ + 2 For instance, we can consider any subset U ′ of Uotc satisfying the conditions above. Given that U ′ satisfies the hypothesis of Theorem 6.7, it follows that the AC program ACPotc over Uotc satisfies ϕmatch if and only if ACPotc over U ′ does. But the AC-MAS induced by the latter is a finite-state system, which can be constructively built by running the AC program ACPotc on the elements in U ′. Thus, ACPotc = ϕmatch is a decidable instance of model checking that can be therefore solved by means of standard techniques. A manual check on the finite model indeed reveals that ϕmatch, ϕbudget and ϕcost are satisfied in the finite model, whereas ϕfulfil is not. By Corollary 4.14 the AC-MAS Potc induced by ACPotp satisfies the same specifications. Hence, in view of Definition 6.5, we conclude that the artifact- centric program ACPotp satisfies ϕmatch, ϕbudget and ϕcost but does not satisfy ϕfulfil . This is entirely in line with our intuitions of the scenario. 8. Conclusions and Future Work In this paper we put forward a methodology for verifying agent-based artifact-centric systems. We proposed AC-MAS, a novel semantics incorporating first-order features, that can be used to rea- son about multi-agent systems in an artifact-centric setting. We observed that the model checking problem for these structures against specifications given in a first-order temporal-epistemic logic is undecidable and proceeded to identify suitable fragments for which decidability can be retained. We identified two orthogonal solutions to this issue. In the former we operated a restriction to the specification language and showed that, by limiting ourselves to sentence-atomic temporal- epistemic specifications, infinite-state, bounded AC-MAS admit finite abstractions. In the latter we kept the full first-order temporal-epistemic logic but identified the noteworthy subset of uniform AC-MAS. In this setting we showed that bounded uniform AC-MAS admit finite abstractions. The abstractions we identified in each setting depend on novel notions of bisimulation at first-order that we proposed. We explored the complexity of the model checking problem in this context and showed this to be EXPSPACE-complete. While this is obviously a hard problem, we need to consider that these are first-order structures which normally lead to undecidable problems. We were also reassured by the fact that the abstract interpretation domain is actually linear in the size of the bound considered. 41 Mindful of the practical needs for verification in artifact-centric systems, we then explored how finite abstractions can actually be built. To this end, rather than investigating one specific data- centric language, we defined a general class of declarative artifact-centric programs. We showed that these systems admit uniform AC-MAS as their semantics. Under the assumption of bounded systems we showed that model checking these multi-agent system programs is decidable and gave a constructive procedure operating on bisimilar, finite models. While the results are general, they can be instantiated for various artifact-centric languages. For instance (Belardinelli et al., 2012b) explores finite abstractions of GSM programs by using these results. We exemplified the methodology put forward on a use-case consisting of several agents pur- chasing and delivering products. While the system has infinitely many states we showed it admits a finite abstraction that can be used to verify a variety of specifications on the system. A question left open in the present paper is whether the uniform condition we provided is tight. While we showed this to be a sufficient condition, we did not explore whether this is necessary for finite abstractions or whether more general properties can be given. In this context it is of interest that artifact-centric programs generate uniform structures. Also, it will be worthwhile to explore whether a notion related to uniformity can be applied to other domains in AI, for example to retain decidability of specific calculi. This would appear to be the case as preliminary studies in the Situation Calculus demonstrate (De Giacomo, Lesp´erance, & Patrizi, 2012). On the application side, we are also interested in exploring ways to use the results of this paper to build a model checker for artifact-centric MAS. Previous efforts in this area, including (Gonzalez, Griesmayer, & Lomuscio, 2012), are limited to finite state systems. It would therefore be of great interest to construct finite abstractions on the fly to check practical e-commerce scenarios such as the one here discussed. References Abiteboul, S., Hull, R., & Vianu, V. (1995). Foundations of Databases. Addison-Wesley. Alonso, G., Casati, F., Kuno, H. A., & Machiraju, V. (2004). Web Services - Concepts, Architectures and Applications. Data-Centric Systems and Applications. Springer. Alves et al. (2007). Web Services Business Process Execution Language Version 2.0. http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.pdf. Baukus, K., & van der Meyden, R. (2004). A Knowledge Based Analysis of Cache Coherence. In Proc. of the 6th International Conference on Formal Engineering Methods (ICFEM'04), pp. 99 -- 114. Belardinelli, F., & Lomuscio, A. (2012). Interactions between Knowledge and Time in a First-Order Logic for Multi-Agent Systems: Completeness Results. Journal of Artificial Intelligence Re- search, 45, 1 -- 45. Belardinelli, F., Lomuscio, A., & Patrizi, F. (2011a). A Computationally-Grounded Semantics for Artifact-Centric Systems and Abstraction Results. In Proc. of the 22nd International Joint Conference on Artificial Intelligence (IJCAI'12), pp. 738 -- 743. Belardinelli, F., Lomuscio, A., & Patrizi, F. (2011b). Verification of Deployed Artifact Systems via Data Abstraction. In Proc. of the 9th International Conference on Service-Oriented Comput- ing (ICSOC'11), pp. 142 -- 156. 42 Belardinelli, F., Lomuscio, A., & Patrizi, F. (2012a). An Abstraction Technique for the Verification of Artifact-Centric Systems. In Proc. of the 13th International Conference on Principles of Knowledge Representation and Reasoning (KR'12), pp. 319 -- 328. Belardinelli, F., Lomuscio, A., & Patrizi, F. (2012b). Verification of GSM-Based Artifact-Centric Systems through Finite Abstraction. In Proc. of the 10th International Conference on Service- Oriented Computing (ICSOC'12), pp. 17 -- 31. Berardi, D., Calvanese, D., Giacomo, G. D., Hull, R., & Mecella, M. (2005). Automatic Com- In Proc. of the 31st position of Transition-based Semantic Web Services with Messaging. International Conference on Very Large Data Bases (VLDB'05), pp. 613 -- 624. Berardi, D., Cheikh, F., Giacomo, G. D., & Patrizi, F. (2008). Automatic Service Composition via Simulation. International Journal of Foundations of Computer Science, 19(2), 429 -- 451. Bertoli, P., Pistore, M., & Traverso, P. (2010). Automated Composition of Web Services via Plan- ning in Asynchronous Domains. Artificial Intelligence, 174(3-4), 316 -- 361. Bhattacharya, K., Gerede, C. E., Hull, R., Liu, R., & Su, J. (2007). Towards Formal Analysis of Artifact-Centric Business Process Models. In Proc. of the 5th International Conference on Business Process Management (BPM'07), pp. 288 -- 304. Biere, A., Cimatti, A., Clarke, E. M., Strichman, O., & Zhu, Y. (2003). Bounded Model Checking. Advances in Computers, 58, 118 -- 149. Blackburn, P., de Rijke, M., & Venema, Y. (2001). Modal Logic, Vol. 53 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press. Calvanese, D., Giacomo, G. D., Lenzerini, M., Mecella, M., & Patrizi, F. (2008). Automatic Service Composition and Synthesis: the Roman Model. IEEE Data Engineering Bulletin, 31(3), 18 -- 22. Ciobaca, S., Delaune, S., & Kremer, S. (2012). Computing Knowledge in Security Protocols Under Convergent Equational Theories. Journal of Automated Reasoning, 48(2), 219 -- 262. Clarke, E. M., Grumberg, O., & Peled, D. A. (1999). Model Checking. The MIT Press, Cambridge, Massachusetts. Cohn, D., & Hull, R. (2009). Business Artifacts: A Data-Centric Approach to Modeling Business Operations and Processes. IEEE Data Engineering Bulletin, 32(3), 3 -- 9. Damaggio, E., Deutsch, A., & Vianu, V. (2012). Artifact Systems with Data Dependencies and Arithmetic. ACM Transactions on Database Systems, 37(3), 22:1 -- 22:36. Damaggio, E., Hull, R., & Vacul´ın, R. (2011). On the Equivalence of Incremental and Fixpoint Semantics for Business Artifacts with Guard-Stage-Milestone Lifecycles. In Proc. of the 9th International Conference on Business Process Management (BPM'11). De Giacomo, G., Lesp´erance, Y., & Patrizi, F. (2012). Bounded Situation Calculus Action Theories and Decidable Verification. In Proc. of the 13th International Conference on Principles of Knowledge Representation and Reasoning (KR'12), pp. 467 -- 477. Dechesne, F., & Wang, Y. (2010). To Know or not to Know: Epistemic Approaches to Security Protocol Verification. Synthese, 177(Supplement-1), 51 -- 76. 43 Deutsch, A., Hull, R., Patrizi, F., & Vianu, V. (2009). Automatic Verification of Data-centric Busi- ness Processes. In Proc. of the 12th International Conference on Database Theory (ICDT'09), pp. 252 -- 267. Deutsch, A., Sui, L., & Vianu, V. (2007). Specification and Verification of Data-Driven Web Appli- cations. Journal of Computer and System Sciences, 73(3), 442 -- 474. Fagin, R., Halpern, J. Y., Moses, Y., & Vardi, M. Y. (1995). Reasoning About Knowledge. The MIT Press. Gammie, P., & van der Meyden, R. (2004). MCK: Model Checking the Logic of Knowledge. In Proc. of 16th International Conference on Computer Aided Verification (CAV'04), pp. 479 -- 483. Gerede, C. E., & Su, J. (2007). Specification and Verification of Artifact Behaviors in Business Process Models. In Proc. of the 5th International Conference on Service-Oriented Computing (ICSOC'07), pp. 181 -- 192. Gonzalez, P., Griesmayer, A., & Lomuscio, A. (2012). Verifying GSM-Based Business Artifacts. In Proc. of the 19th IEEE International Conference on Web Services (ICWS'12), pp. 25 -- 32. Grohe, M. (2001). Generalized Model-Checking Problems for First-Order Logic. In Proc. of the 18th Annual Symposium on Theoretical Aspects of Computer Science (STACS'01), pp. 12 -- 26. Hariri, B. B., Calvanese, D., Giacomo, G. D., Deutsch, A., & Montali, M. (2012). Verification of Relational Data-Centric Dynamic Systems with External Services. CoRR, abs/1203.0024. Heath, F. T., Hull, R., & Vacul´ın, R. (2011). Barcelona: A Design and Runtime Environment for Modeling and Execution of Artifact-centric Business Processes (demo). In Proc. of the 9th International Conference on Business Process Management Demo Track (BPM'11). Hull, R. (2008). Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges. In Proc. (part II) of Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008 (On the Move to Meaningful Internet Systems: OTM'08), pp. 1152 -- 1163. Hull, R., Damaggio, E., De Masellis, R., Fournier, F., Gupta, M., Heath, III, F. T., Hobson, S., Line- han, M., Maradugu, S., Nigam, A., Sukaviriya, P. N., & Vaculin, R. (2011). Business Artifacts with Guard-Stage-Milestone Lifecycles: Managing Artifact Interactions with Conditions and Events. In Proc. of the 5th ACM International Conference on Distributed Event-Based Sys- tems (DEBS'11), pp. 51 -- 62. Hull, R., Narendra, N. C., & Nigam, A. (2009). Facilitating Workflow Interoperation Using Artifact- Centric Hubs. In Proc. of the 7th International Conference on Service-Oriented Computing (ICSOC-ServiceWave '09), pp. 1 -- 18. Kacprzak, M., Nabialek, W., Niewiadomski, A., Penczek, W., P´olrola, A., Szreter, M., Wozna, B., & Zbrzezny, A. (2008). VerICS 2007 - a Model Checker for Knowledge and Real-Time. Fundamenta Informaticae, 85(1-4), 313 -- 328. Kupferman, O., Vardi, M. Y., & Wolper, P. (2000). An Automata-Theoretic Approach to Branching- Time Model Checking. Journal of the ACM, 47(2), 312 -- 360. 44 Lomuscio, A., Qu, H., & Raimondi, F. (2009). MCMAS: A Model Checker for the Verification of Multi-Agent Systems. In Proc. of the 21st International Conference on Computer Aided Verification (CAV'09), pp. 682 -- 688. Lomuscio, A., Qu, H., & Solanki, M. (2012). Towards Verifying Contract Regulated Service Com- position. Autonomous Agents and Multi-Agent Systems, 24(3), 345 -- 373. Lomuscio, A., Solanki, M., Penczek, W., & Szreter, M. (2010). Runtime Monitoring of Contract Regulated Web Services. In Proc. of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'10), pp. 1449 -- 1450. Marin, M., Hull, R., & Vacul´ın, R. (2012). Data Centric BPM and the Emerging Case Management Standard: A Short Survey. In Proc. of the 1st (BPM) International Workshop on Adaptive Case Management. Nigam, A., & Caswell, N. S. (2003). Business Artifacts: An Approach to Operational Specification. IBM Systems Journal, 42(3), 428 -- 445. Nooijen, E., Fahland, D., & Dongen, B. V. (2012). Automatic Discovery of Data-Centric and Artifact-Centric Processes. In Proc. of the 1st (BPM) Workshop on Data- & Artifact-centric BPM (DAB'12). Papadimitriou, C. H. (1994). Computational complexity. Addison-Wesley. Parikh, R., & Ramanujam, R. (1985). Distributed Processes and the Logic of Knowledge. In Proc. of Logics of Programs, Conference, pp. 256 -- 268. Penczek, W., & Lomuscio, A. (2003). Verifying Epistemic Properties of Multi-agent Systems via Bounded Model Checking. Fundamenta Informaticae, 55(2), 167 -- 185. Singh, M. P., & Huhns, M. N. (2005). Service-Oriented Computing: Semantics, Processes, Agents. Wiley. Wooldridge, M. (2000). Computationally Grounded Theories of Agency. In Proc. of the 4th Inter- national Conference on Multi-Agent Systems (ICMAS'00), pp. 13 -- 22. Wooldridge, M. (2001). Introduction to Multiagent Systems. John Wiley & Sons, Inc. 45
1905.08750
2
1905
2019-06-01T10:05:01
Adaptation and learning over networks under subspace constraints -- Part I: Stability Analysis
[ "cs.MA", "eess.SP" ]
This paper considers optimization problems over networks where agents have individual objectives to meet, or individual parameter vectors to estimate, subject to subspace constraints that require the objectives across the network to lie in low-dimensional subspaces. This constrained formulation includes consensus optimization as a special case, and allows for more general task relatedness models such as smoothness. While such formulations can be solved via projected gradient descent, the resulting algorithm is not distributed. Starting from the centralized solution, we propose an iterative and distributed implementation of the projection step, which runs in parallel with the stochastic gradient descent update. We establish in this Part I of the work that, for small step-sizes $\mu$, the proposed distributed adaptive strategy leads to small estimation errors on the order of $\mu$. We examine in the accompanying Part II [2] the steady-state performance. The results will reveal explicitly the influence of the gradient noise, data characteristics, and subspace constraints, on the network performance. The results will also show that in the small step-size regime, the iterates generated by the distributed algorithm achieve the centralized steady-state performance.
cs.MA
cs
Adaptation and learning over networks under subspace constraints -- Part I: Stability Analysis Roula Nassif†, Member, IEEE, Stefan Vlaski†,‡, Student Member, IEEE, 1 Ali H. Sayed†, Fellow Member, IEEE † Institute of Electrical Engineering, EPFL, Switzerland ‡ Electrical Engineering Department, UCLA, USA [email protected] [email protected] [email protected] Abstract This paper considers optimization problems over networks where agents have individual objectives to meet, or individual parameter vectors to estimate, subject to subspace constraints that require the objectives across the network to lie in low-dimensional subspaces. This constrained formulation includes consensus optimization as a special case, and allows for more general task relatedness models such as smoothness. While such formulations can be solved via projected gradient descent, the resulting algorithm is not distributed. Starting from the centralized solution, we propose an iterative and distributed implementation of the projection step, which runs in parallel with the stochastic gradient descent update. We establish in this Part I of the work that, for small step-sizes µ, the proposed distributed adaptive strategy leads to small estimation errors on the order of µ. We examine in the accompanying Part II [2] the steady-state performance. The results will reveal explicitly the influence of the gradient noise, data characteristics, and subspace constraints, on the network performance. The results will also show that in the small step-size regime, the iterates generated by the distributed algorithm achieve the centralized steady-state performance. Distributed optimization, subspace projection, gradient noise, stability analysis. Index Terms 9 1 0 2 n u J 1 ] A M . s c [ 2 v 0 5 7 8 0 . 5 0 9 1 : v i X r a This work was supported in part by NSF grant CCF-1524250. A short conference version of this work appears in [1]. 2 I. INTRODUCTION Distributed inference allows a collection of interconnected agents to perform parameter estimation tasks from streaming data by relying solely on local computations and interactions with immediate neighbors. Most prior literature focuses on consensus problems, where agents with separate objective functions need to agree on a common parameter vector corresponding to the minimizer of the aggregate sum of the individual costs, namely, wo = arg min w Jk(w), N(cid:88)k=1 (1) where Jk(·) is the cost function at agent k, N is the number of agents in the network, and w ∈ CL is the global parameter vector, which all agents need to agree upon -- see Fig. 1 (middle). Each agent seeks to estimate wo through local computations and communications among neighboring agents without the need to know any of the costs besides their own. Among many useful strategies that have been proposed in the literature [3] -- [10], diffusion strategies [3] -- [5] are particularly attractive since they are scalable, robust, and enable continuous learning and adaptation in response to drifts in the location of the minimizer. However, there exist many network applications that require more complex models and flexible algorithms than consensus implementations since their agents may involve the need to estimate and track multiple distinct, though related, objectives. For instance, in distributed power system state estimation, the local state vectors to be estimated at neighboring control centers may overlap partially since the areas in a power system are interconnected [11], [12]. Likewise, in monitoring applications, agents need to track the movement of multiple correlated targets and to exploit the correlation profile in the data for enhanced accuracy [13], [14]. Problems of this kind, where nodes need to infer multiple, though related, parameter vectors, are referred to as multitask problems. Existing strategies to address multitask problems generally exploit prior knowledge on how the tasks across the network relate to each other [11] -- [29]. For example, one way to model relationships among tasks is to formulate convex optimization problems with appropriate co-regularizers between neighboring agents [13], [16] -- [19]. Graph spectral regularization can also be used in order to leverage more thoroughly the graph spectral information and improve the multitask network performance [20]. In other applications, it may happen that the parameter vectors to be estimated at neighboring agents are related according to a set of linear equality constraints [12], [21] -- [26]. However, in this paper, and the accompanying Part II [2], we consider multitask inference problems where each agent seeks to minimize an individual cost (expressed as the expectation of some loss function), and where the collection of parameter vectors to be estimated across the network is required to lie in a low-dimensional subspace -- see Fig. 1 (left). That is, we let wk ∈ CMk denote some parameter vector at node k and let W = col{w1, . . . , wN} denote the collection of parameter vectors from across the network. We associate with each agent k a differentiable convex cost Jk(wk) : CMk → R, which is expressed as the expectation of some loss function Qk(·) and written as Jk(wk) = EQk(wk; xk), where xk denotes the random data. The expectation is computed over the distribution of the data. Let M =(cid:80)N k=1 Mk. We consider constrained problems of the form: o = arg min W W J glob(W) (cid:44) N(cid:88)k=1 Jk(wk), 3 (2) subject to W ∈ R(U), where R(·) denotes the range space operator, and U is an M × P full-column rank matrix with P (cid:28) M. Each agent k is interested in estimating the k-th Mk × 1 subvector wo N}. In order to solve (2) iteratively, the gradient projection method can be applied [30]: k of Wo = col{wo 1, . . . , wo Wi = PU(cid:16)Wi−1 − µ col(cid:8)∇w∗ k Jk(wk,i−1)(cid:9)N k=1(cid:17) , i ≥ 0, (3) where Wi = col{w1,i, . . . , wN,i} with wk,i the estimate of wo parameter, ∇w∗ of wk), and PU is the projector onto the P -dimensional subspace of CM spanned by the columns of U: k at iteration i and agent k, µ > 0 is a small step-size Jk(·) is the (Wirtinger) complex gradient [4, Appendix A] of Jk(·) relative to w∗k (complex conjugate k PU = U(U∗U)−1U∗, (4) where we used the fact that U is a full-column rank matrix. We are particularly interested in solving the problem in the stochastic setting when the distribution of the data xk is generally unknown. This means that the risks Jk(·) and their gradients ∇w∗ Jk(·) are unknown. As such, approximate gradient vectors need to be employed. A common construction in stochastic approximation theory is k to employ the following approximation at iteration i: (cid:92) ∇w∗ k Jk(wk) = ∇w∗ k Qk(wk; xk,i), (5) where xk,i represents the data observed at iteration i. The difference between the true gradient and its approximation is called gradient noise. This noise will seep into the operation of the algorithm and one main challenge is to show that despite its presence, agent k is still able to approach wo k asymptotically. Although the gradient update in (3) and (5) can be performed locally at agent k, the projection operation requires a fusion center. To see this, let us introduce an intermediate variable ψk,i at node k: ψk,i = wk,i−1 − µ∇w∗ k Jk(wk,i−1). (6) After evaluating ψk,i locally, each agent at each iteration needs to send its estimate ψk,i to a fusion center, which performs the projection operation in (3) by computing Wi = PUcol{ψ1,i, . . . , ψN,i}, and then sends the resulting estimates wk,i back to the agents. While centralized solutions can be powerful, decentralized solutions are more attractive since they are more robust and respect the privacy policy at each agent [4]. Thus, a second challenge we face in this paper is how to carry out the projection through a distributed network where each node performs local computations and exchanges information only with its neighbors. We propose in Section II an adaptive and distributed iterative algorithm allowing each agent k to converge, in k of (2), for sufficiently small µ. Conditions on the the mean-square-error sense, within O(µ) from the solution wo 4 network topology and signal subspace ensuring the feasibility of a distributed implementation are provided. We also show how some well-known network optimization problems, such as consensus optimization [3] -- [5] and multitask smooth optimization [16], can be recast in the form (2) and addressed with the strategy proposed in this paper. The analysis in Section III of this Part I shows that, for sufficiently small µ, the proposed adaptive strategy leads to small estimation errors on the order of the small step-size. Building on the results of this Part I, we shall derive in Part II [2] a closed-form expression for the steady-state network mean-square-error performance. This closed form expression will reveal explicitly the influence of the data characteristics (captured by the second-order properties of the costs and second-order moments of the gradient noises) and subspace constraints (captured by U), on the network performance. The results will also show that, in the small step-size regime, the iterates generated by the distributed implementation achieve the centralized steady-state performance. For illustration purposes, distributed sub-optimal beamforming is considered in Section IV of this Part I. Notation: All vectors are column vectors. Random quantities are denoted in boldface. Matrices are denoted in capital letters while vectors and scalars are denoted in lower-case letters. We use the symbol (·)(cid:62) to denote matrix transpose, the symbol (·)∗ to denote matrix complex-conjugate transpose, and the symbol Tr(·) to denote trace operator. The symbol diag{·} forms a matrix from block arguments by placing each block immediately below and to the right of its predecessor. The operator col{·} stacks the column vector entries on top of each other. The symbol ⊗ denotes the Kronecker product. The M × M identity matrix is denoted by IM . II. DISTRIBUTED INFERENCE UNDER SUBSPACE CONSTRAINTS We move on to propose and study a distributed solution for solving (2) with a continuous adaptation mechanism. The solution must rely on local computations and communications with immediate neighborhood, and operate in real-time on streaming data. To proceed with the analysis, one of the challenges we face is that the projection in (3) requires non-local exchange of information. Our strategy is to replace the M × M projection matrix PU in (3) by an M × M matrix A that satisfies the following conditions: (cid:40) lim i→∞Ai = PU, Ak(cid:96) = [A]k(cid:96) = 0, if (cid:96) /∈ Nk and k (cid:54)= (cid:96), (7) (8) where [A]k(cid:96) denotes the (k, (cid:96))-th block of A of dimension Mk × M(cid:96) and Nk denotes the neighborhood of agent k, i.e., the set of nodes connected to agent k by an edge. The sparsity condition (8) characterizes the network topology and ensures local exchange of information at each time instant i. By replacing the projector PU in (3) by A and the true gradients ∇w∗ Jk(·) by their stochastic approximations, we obtain the following distributed adaptive solution at each agent k: k ψk,i = wk,i−1 − µ (cid:92) ∇w∗ wk,i = (cid:80)(cid:96)∈Nk Ak(cid:96)ψ(cid:96),i, k Jk(wk,i−1), (9)  where we used condition (8), and where ψk,i is an intermediate estimate and wk,i is the estimate of wo k at agent k and iteration i. As we shall see in Section III, condition (7) helps ensure convergence toward the optimum. Necessary and sufficient conditions for the matrix equation (7) to hold are given in the following lemma. 5 Lemma 1. (Necessary and sufficient conditions for (7)) The matrix equation (7) holds, if and only if, the following conditions on the projector PU and the matrix A are satisfied: APU = PU, PUA = PU, ρ(A − PU) < 1, (10) (11) (12) where ρ(·) denotes the spectral radius of its matrix argument. It follows that any A satisfying condition (7) has one as an eigenvalue with multiplicity P , and all other eigenvalues are strictly less than one in magnitude. Proof. See Appendix A. The arguments are along the lines developed in [31] for distributed averaging with proper adjustments to handle general subspace constraints. Note that conditions (10) -- (12) appeared previously (with proof omitted) in the context of distributed denoising in wireless sensor networks [29]. In such problems, the N sensors are observing N-dimensional signal, with each entry of the signal corresponding to one sensor. Using the prior knowledge that the observed signal belongs to a low-dimensional subspace, the sensor task is to denoise the corresponding entry of the signal by projecting in a distributed iterative manner onto the signal subspace in order to improve the error variance. However, in this work, we consider the more general problem of distributed inference over networks. If we replace PU by (4), multiply both sides of (10) by U, and multiply both sides of (11) by U∗, conditions (10) and (11) reduce to: AU = U, U∗A = U∗. (13) (14) Conditions (13) and (14) state that the P columns of U are right and left eigenvectors of A associated with the eigenvalue 1. Together with these two conditions, condition (12) means that A has P eigenvalues at one, and that all other eigenvalues are strictly less than one in magnitude. In the following, we discuss how some well-known network optimization problems can be recast in the form (2) and addressed with strategies in the form of (9). Remark 1. (Distributed consensus optimization). Let Mk = L for all agents. If we set in (2) P = L and U = (1N ⊗ IL) where 1N is the N × 1 vector of all ones, then solving problem (2) will be equivalent to solving 1√N the well-known consensus problem (1). Different algorithms for solving (1) over strongly-connected networks have been proposed [3] -- [9]. By picking any N × N doubly-stochastic matrix A = [ak(cid:96)] satisfying: ak(cid:96) ≥ 0, A1N = 1N , 1(cid:62)N A = 1(cid:62)N , ak(cid:96) = 0 if (cid:96) /∈ Nk and k (cid:54)= (cid:96) (15) 6 Fig. 1. Inference under subspace constraints. (Left) Illustrative scheme of problem (2): Each agent k in the network has an individual wk to estimate, subject to subspace constraints that enforce the objectives across the network to lie in R(U). (Middle) Consensus optimization (1): Agents in the network seek to estimate an L× 1 common vector w corresponding to the minimizer of the aggregate sum of individual costs. (Right) Coupled optimization [23]: Different agents generally seek to estimate different, but overlapping, parameter vectors. the diffusion strategy for instance takes the form [3] -- [5]: ψk,i = wk,i−1 − µ (cid:92) ∇w∗ wk,i = (cid:80)(cid:96)∈Nk ak(cid:96)ψ(cid:96),i. Jk(wk,i−1), k  (16) Observe that this strategy can be written in the form of (9) with Ak(cid:96) = ak(cid:96)IL and A = A ⊗ IL. It can be verified that, when A satisfies (15) over a strongly connected network, the matrix A will satisfy (8), (13), (14), and (12). Remark 2. (Distributed coupled optimization). Similarly, with a proper selection of U, multitask inference problems with overlapping parameter vectors [22] -- [24] can also be recast in the form (2). This scenario is illustrated in Fig. 1 (right). In this example, agent k is influenced by only a subset of the entries of a global w = [w1, w2, w3] and seeks to estimate wk = [w2, w3]. For a given variable w(cid:96) and any two arbitrary agents containing w(cid:96) in their costs, it is assumed that the network topology is such that there exists at least one path linking one agent to the other [23]. By properly selecting the matrix U, the network vector W = col{w1, . . . , wN} can be written as W = Uw and, therefore, distributed coupled optimization can be recast in the form (2). It can be verified that the coupled diffusion strategy proposed in [23] for solving this problem can be written in the form of (9) and that the (doubly-stochastic) matrix A in [23] satisfies conditions (7) and (8). Remark 3. (Distributed optimization under affine constraints). Several existing works consider (distributed or offline) variations of the following problem [26] -- [28]: o = arg min W W Jk(wk), (17) N(cid:88)k=1 subject to D∗W = d, where D is an M × (M − P ) full-column rank matrix and d is an (M − P ) × 1 column vector. It turns out that the online distributed strategy proposed in this work can be used to solve (17) for general constraints that are not 123456kJ1(w1)J2(w2)J3(w3)J4(w4)J5(w5)J6(w6)Jk(wk)NkW=col{w1,...,wN}∈R(U)W=col{w1,...,wN}∈R(U)123456kJ1(w)J2(w)J3(w)J4(w)J5(w)J6(w)Jk(w)W=(1N⊗IL)w∈R(U),U=1√N(1N⊗IL)W=(1N⊗IL)w∈R(U),U=1√N(1N⊗IL)123456kJ1(w1,w2)J2(w1,w3)J3(w1,w2,w3)Jk(w2,w3)J6(w3)J5(w2,w3)J4(w1)U=⎡⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢⎣100010100001100010001.........⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦W=Uw∈R(U),w=[w1,w2,w3]W=Uw∈R(U),w=[w1,w2,w3] necessarily local. To see this, we first note that the gradient projection method can be applied to solve (17) [30]: 7 Wi = PD(cid:16)Wi−1 − µ col(cid:8)∇w∗ k Jk(wk,i−1)(cid:9)N k=1(cid:17) + dD, i ≥ 0, (18) (cid:44) IM − D(D∗D)−1D∗ and dD (cid:44) D(D∗D)−1d. Since PD is a projection matrix, it can be decomposed where PD as PD =(cid:80)P p=1 upu∗p with {up} the orthonormal eigenvectors of PD associated with the P eigenvalues at one, and thus Pd can be replaced by PU = UU∗ with U = [u1, . . . , uP ]. Therefore, solution (18) has a form similar to the earlier solution (3) with the rightmost term dD in (18) absent from (3). Following the same line of reasoning that led to (9), we can similarly obtain the following distributed adaptive solution for solving (17): ψk,i = wk,i−1 − µ (cid:92) ∇w∗ wk,i = (cid:80)(cid:96)∈Nk Ak(cid:96)ψ(cid:96),i + dD,k, k Jk(wk,i−1),  (19) where dD,k is the k-th sub-vector of (IM − A)dD corresponding to node k (see Appendix B), and A = [Ak(cid:96)] is a properly selected matrix satisfying conditions (7) and (8). Although algorithm (19) is different than (9) due to the presence of the constant term dD,k, the mean-square-error analyzes of both algorithms are the same, as we shall see in Section III. In Section IV, we shall apply (19) to solve linearly constrained beamforming [32], [33]. Remark 4. (Distributed inference under smoothness). Let Mk = L for all agents. In such problems, each agent k in the network has an individual cost Jk(wk) to minimize subject to a smoothness condition over the graph. The smoothness requirement softens the transition in the tasks {wk} among neighboring nodes and can be measured in terms of a quadratic form of the graph Laplacian [16]: S(W) = W(cid:62)LcW = 1 2 N(cid:88)k=1 (cid:88)(cid:96)∈Nk ck(cid:96)(cid:107)wk − w(cid:96)(cid:107)2, (20) where Lc = Lc ⊗ IL with Lc = diag{C1N} − C denoting the graph Laplacian. The matrix C = [ck(cid:96)] is an N × N symmetric weighted adjacency matrix with ck(cid:96) ≥ 0 if (cid:96) ∈ Nk and ck(cid:96) = 0 otherwise. The smaller S(W) is, the smoother the signal W on the graph is. Since Lc is symmetric positive semi-definite, it can be decomposed as Lc = V ΛV (cid:62) where Λ = diag{λ1, . . . , λN} with λm the non-negative eigenvalues ordered as 0 = λ1 ≤ λ2 ≤ . . . ≤ λN and V = [v1, . . . , vN ] is the matrix of orthonormal eigenvectors. When the graph is 1N [34]. Using the eigenvalue connected, there is only one zero eigenvalue with corresponding eigenvector v1 = 1√N decomposition L = (V ΛV (cid:62)) ⊗ IL, S(W) can be written as: S(W) = W(cid:62)(Λ ⊗ IL)W = λm(cid:107)wm(cid:107)2, (21) N(cid:88)m=1 where W = (V (cid:62) ⊗ IL)W and wm = (v(cid:62)m ⊗ IL)W. Given that λm ≥ 0, the above expression shows that W is considered to be smooth if (cid:107)wm(cid:107)2 corresponding to large λm is negligible. Thus, for a smooth W, S(W) will be equal to (cid:80)p m=1 λm(cid:107)wm(cid:107)2 with p (cid:28) N. By choosing U = U ⊗ IL where U = [v1, . . . , vp], the smooth signal W will be in the range space of U since it can be written as W = Us with s = col{w1, . . . , wp}. Therefore, distributed inference problems under smoothness can be recast in the form (2). 8 Before proceeding, note that, in some cases, one may find a family of matrices A satisfying conditions (12), (13), and (14) under the sparsity constraints (8). For example, in consensus optimization described in Remark 1 where (1N ⊗ IL), by ensuring that the underlying graph is strongly connected and by choosing any doubly- U = 1√N stochastic A satisfying the sparsity constraints, the resulting matrix A = A⊗ IL will satisfy the required conditions. The same observation holds for coupled optimization problems described in Remark 2. Several policies for designing locally doubly-stochastic matrices have been proposed in the literature [3] -- [5]. For more general U, designing an A satisfying conditions (7) and (8) can be written as the following feasibility problem: find A such that AU = U, U∗A = U∗, (22) ρ(A − PU) < 1, [A]k(cid:96) = 0, if (cid:96) /∈ Nk and (cid:96) (cid:54)= k, which is challenging in general. Not all network topologies satisfying (8) guarantee the existence of an A satisfying condition (7). The higher the dimension of the signal subspace is, the greater the graph connectivity has to be. In the works [1], [29], it is assumed that the sparsity constraints (8) and the signal subspace lead to a feasible problem. That is, it is assumed that problem (22) admits at least one solution. As a remedy for the violation of such assumption, one may increase the network connectivity by increasing the transmit power of each node, i.e., adding more links [29]. In the accompanying Part II [2], we shall relax the feasibility assumption by considering the problem of finding an A that minimizes the number of edges to be added to the original topology while satisfying the constraints (12), (13), and (14). In this case, if the original topology leads to a feasible solution, then no links will be added. Otherwise, we assume that the designer is able to add some links to make the problem feasible. In the following section, we consider that a feasible A (topology) is computed by the designer and that its blocks {Ak(cid:96)}(cid:96)∈Nk are provided to agent k in order to run algorithm (9). We shall study the performance of (9) in the mean-square-error sense. We shall consider the general complex case, in addition to the real case, since complex-valued combination matrix A and data xk,i are important in several applications, as will be the case in the distributed beamforming application considered later in Section IV. III. STABILITY ANALYSIS relative to wo In this Part I, we shall establish mean-square-error stability by showing that, for each agent k, the error variance k− wk,i(cid:107)2 = O(µ). Then, building on this result, we will assess in the accompanying Part II [2] the size of this mean-square error by k enters a bounded region whose size is in the order of µ, namely, lim supi→∞ E(cid:107)wo deriving closed-form expression for the network mean-square-deviation (MSD) defined by [4]: MSD (cid:44) µ lim µ→0(cid:18)lim sup i→∞ 1 µ E(cid:18) 1 N (cid:107)W o − Wi(cid:107)2(cid:19)(cid:19) , (23) where Wi (cid:44) col{wk,i}N k=1. In this way, we will be able to conclude that distributed strategies of the form (9) with small step-size are able to lead to reliable performance even in the presence of gradient noise. We will be able also to conclude that the iterates generated by the distributed implementation achieve the centralized steady-state performance. As explained in [4, Chap. 8], in the general case where Jk(wk) are not necessarily quadratic in the (complex) variable wk, we need to track the evolution of both quantities wk,i and (w∗k,i)(cid:62) in order to examine how the network is performing. Since Jk(wk) is real valued, the evolution of the complex conjugate iterates (w∗k,i)(cid:62) is given by: 9 Representations (9) and (24) can be grouped together into a single set of equations by introducing extended vectors of dimensions 2Mk × 1 as follows: k ∇w(cid:62)  (cid:0)ψ∗k,i)(cid:62) = (cid:0)w∗k,i−1(cid:1)(cid:62) − µ (cid:92) (cid:0)w∗k,i(cid:1)(cid:62) = (cid:80)(cid:96)∈Nk (A∗k(cid:96))(cid:62)(cid:0)ψ∗(cid:96),i(cid:1)(cid:62). (cid:0)w∗k,i−1)(cid:62)  − µ (cid:0)ψ∗k,i)(cid:62)  = (A∗k(cid:96))(cid:62)   (cid:0)w∗k,i)(cid:62)  = (cid:88)(cid:96)∈Nk wk,i−1 ψk,i wk,i Ak(cid:96) 0 0    Jk(wk,i−1), (cid:92) ∇w∗ (cid:92) ∇w(cid:62) k k Jk(wk,i−1) Jk(wk,i−1)  (cid:0)ψ∗(cid:96),i)(cid:62)  . ψ(cid:96),i (24) (25) (26) Therefore, when the data is complex, extended vectors and matrices need to be introduced in order to analyze the network evolution. The arguments and results presented in the analysis are applicable to both cases of real and complex data through the use of data-type variable h defined in Table I. When the data is real-valued, the complex conjugate transposition should be replaced by the real transposition. Table I lists a couple of variables and symbols that will be used in the sequel for both real and complex data cases. The superscript "e" is used to refer to extended quantities. Although in the real data case no extended quantities should be introduced, we use the superscript "e" for both data cases for compactness of notation. A. Modeling conditions We analyze (9) under conditions (8), (12), (13), and (14) on A, and the following assumptions on the risks {Jk(·)} and on the gradient noise processes {sk,i(·)} defined as: Jk(w) − sk,i(w) (cid:44) ∇w∗ k (cid:92) ∇w∗ k Jk(w). Before proceeding, we introduce the Hermitian Hessian matrix functions [4, Appendix B]: Hk(wk) (cid:44) ∇2 wk Jk(wk), = k ∇w(cid:62) [∇wkJk(wk)], [∇wkJk(wk)] [∇wkJk(wk)] (∇w(cid:62) (∇w∗ H(W) (cid:44) diag{H1(w1), . . . , HN (wN )} ,  ∇w∗ ∇w(cid:62) k k k k [∇wkJk(wk)])∗ [∇wkJk(wk)])(cid:62)  (hM × hM ). (27) (hMk × hMk) when the data is real (Mk × Mk) when the data is complex (2Mk × 2Mk) (28) 10 DEFINITION OF SOME VARIABLES USED THROUGHOUT THE ANALYSIS. I IS A PERMUTATION MATRIX DEFINED BY (31). TABLE I Variable Real data case Complex data case Data-type variable h Gradient vector Error vector (cid:101)we k,i 1 k Jk(wk) ∇w(cid:62) (cid:101)wk,i from (45) Gradient noise se k,i(w) sk,i(w) from (26) Bias vector be k bk from (48) (k, (cid:96))-th block of Ae Matrix U e Matrix J e  Ak(cid:96) U J from (41) Matrix V e R, VR, from (41) Matrix (V e L,)∗ V∗L, from (41) Jk(wk) k (s∗k,i(w))(cid:62) 2 (b∗k)(cid:62) ∇w∗  (cid:101)wk,i ((cid:101)w∗k,i)(cid:62)  sk,i(w)  bk  Ak(cid:96)  U  J  VR,  V∗L, 0 0 0 0 I(cid:62) 0 0       I (A∗k(cid:96))(cid:62) 0 (U∗)(cid:62) 0 (J ∗ )(cid:62) 0 (V∗R,)(cid:62) 0 V(cid:62)L, I(cid:62) Note that, when J glob(W) =(cid:80)N ∇2 where I is a permutation matrix given by: k=1 Jk(wk), we have: WJ glob(W) = when the data is real H(W), IH(W)I(cid:62), when the data is complex I (cid:44)  IM1 0 0 0 0 0 0 0 0 IM1 0 0 0 IM2 0 0 0 0 0 0 0 0 IM2 0 0 . . . 0 . . . 0 ... . . . 0 IMN . . . 0 . . . 0 ... 0 . . . 0 0 0 0 0 0 0 0 0 IMN .   (29) (30) This matrix consists of 2N × 2N blocks with (m, n)-th block given by: [I]mn (cid:44) IMk, IMk, 0, if m = k, n = 2(k − 1) + 1 if m = k + N, n = 2k otherwise for m, n = 1, . . . , 2N and k = 1, . . . , N. Assumption 1. (Conditions on aggregate and individual costs). The individual costs Jk(wk) ∈ R are assumed to be twice differentiable and convex such that: νk h IhMk ≤ Hk(wk) ≤ δk h IhMk, where νk ≥ 0 for k = 1, . . . , N. It is further assumed that, for any W, H(W) satisfies: 0 < ν h IhP ≤ (U e)∗H(W)U e ≤ δ h IhP , for some positive parameters ν ≤ δ. The data-type variable h and the matrix U e are defined in Table I. Condition (33) ensures that problem (2), which can be rewritten as: W o = Uso, with so = arg min s f (s) (cid:44) J glob(Us), has a unique minimizer Wo. This is due to the fact that the Hessian of f (s), which is given by: ∇2 sf (s) = WJ glob(W)(cid:3)W=U s U, U(cid:62)(cid:2)∇2 diag(cid:8)U∗,U(cid:62)(cid:9)(cid:2)∇2 (33) WJ glob(W)(cid:3)W=U s diag(cid:8)U, (U∗)(cid:62)(cid:9) , IhP > 0, (29) ν h is positive definite under condition (33). = (U e)∗ H(Us)U e ≥ (real data case) (complex data case) Assumption 2. (Conditions on gradient noise). The gradient noise process defined in (26) satisfies for any w ∈ F i−1 and for all k, (cid:96) = 1, . . . , N: 11 (31) (32) (33) (34) (35) (36) (37) (38) (39) E[sk,i(w)F i−1] = 0, E[sk,i(w)s∗(cid:96),i(w)F i−1] = 0, E[sk,i(w)s(cid:62)(cid:96),i(w)F i−1] = 0, k (cid:54)= (cid:96), k (cid:54)= (cid:96), E[(cid:107)sk,i(w)(cid:107)2F i−1] ≤ (βk/h)2(cid:107)w(cid:107)2 + σ2 s,k, k ≥ 0, σ2 s,k ≥ 0, and where F i−1 denotes the filtration generated by the random processes {w(cid:96),j} for for some β2 all (cid:96) = 1, . . . , N and j ≤ i − 1. As explained in [3] -- [5], these conditions are satisfied by many objective functions of interest in learning and adap- tation such as quadratic and logistic risks. Condition (36) essentially states that the gradient vector approximation 12 should be unbiased conditioned on the past data, which is a reasonable condition to require. Condition (39) states that the second-order moment of the gradient noise process should get smaller for better estimates, since it is bounded by the squared-norm of the iterate. Conditions (37) and (38) state that the gradient noises across the agents are uncorrelated and second-order circular. Without loss of generality, we shall introduce the following assumption on the matrix U 1. Assumption 3. (Condition on U). The full-column rank matrix U is assumed to be semi-unitary, i.e., its column vectors are orthonormal and U∗U = IP . Before proceeding, we introduce an N × N block matrix Ae whose (k, (cid:96))-th block is defined in Table I. This matrix will appear in our subsequent study. Observe that in the real data case, Ae = A, and that in the complex data case, Ae can be seen as an extended version of the combination matrix A. The next statement exploits the eigen-structure of Ae that will be useful for establishing the mean-square stability. Lemma 2. (Jordan canonical decomposition). Under Assumption 3, the M × M combination matrix A satisfying conditions (13), (14), and (12) admits a Jordan canonical decomposition of the form: A (cid:44) VΛV, Λ = IP 0 0 J  , V =(cid:104) U VR, (cid:105) , V−1  = U∗ V∗L,  , where J is a Jordan matrix with the eigenvalues (which may be complex but have magnitude less than one) on the diagonal and  > 0 on the super-diagonal. It follows that the hM × hM matrix Ae defined in Table I admits a Jordan decomposition of the form: with: with Ae (cid:44) V e  Λe (V e  )−1, Λe  = IhP 0 0 J e   , V e  = [U e V e R,], (V e  )−1 = (U e)∗ (V e L,)∗  where U e,J e  ,V e R,, and (V e L,)∗ are defined in Table I. Since (V e  )−1V e  = IhM , the following relations hold: (U e)∗U e = IhP , Proof. See Appendix C. (V e L,)∗V e R, = Ih(M−P ), (U e)∗V e R, = 0, (V e L,)∗U e = 0. 1This assumption is not restrictive since for any full-column rank matrix U(cid:48) = [u(cid:48)1, . . . , u(cid:48)P ] with P ≤ M, we can generate by using, for example, the Gram-Schmidt process [35, pp. 15], a semi-unitary matrix U = [u1, . . . , uP ] that spans the same P -dimensional subspace of CM as U(cid:48), i.e., R(U) = R(U(cid:48)). (40) (41) (42) (43) (44) B. Network error vector recursion Let (cid:101)wk,i denote the error vector at node k:  where: k (cid:92) ∇w∗ (cid:92) ∇w(cid:62) k k − wk,i. (cid:101)wk,i (cid:44) wo Jk(wk,i−1)  = −H k,i−1(cid:101)we H k,i−1 (cid:44)(cid:90) 1 0 ∇2 Jk(wk,i−1) Jk(wo wk k,i−1 + be k − se k,i(wk,i−1) k − t(cid:101)wk,i−1)dt, k,i, se k,i(wk,i−1), and be and (cid:101)we k are defined in Table I with: bk (cid:44) ∇w∗ k Jk(wo k). 13 (45) (46) (47) (48) (49) (50) (51) (52) (53) (54) (55) (56) Consider first the complex data case. Using (26) and the mean-value theorem [36, pp. 24], [4, Appendix D], we can express the stochastic gradient vectors appearing in (25) as follows: Subtracting (wo k)e = col{wo k, ((wo k)∗)(cid:62)} from both sides of (25) and by introducing the following extended vectors and matrices, which collect quantities from across the network: i N,i(cid:9) , (cid:101)We 1,i, . . . ,(cid:101)we Hi−1 (cid:44) diag{H 1,i−1, . . . , H N,i−1} , Bi−1 (cid:44) Ae(IhM − µHi−1), 1,i(w1,i−1), . . . , se 1, . . . , be N} , N,i(wN,i−1)(cid:9) , se i (cid:44) col(cid:8)(cid:101)we (cid:44) col(cid:8)se be (cid:44) col{be we can show that the network weight error vector (cid:101)We i = Bi−1(cid:101)We (cid:101)We (cid:88)(cid:96)∈Nk since Wo is the solution of problem (2), and thus: i + µAebe where Ae is defined in Table I and where we used (46) and the fact that i−1 − µAese Ak(cid:96)wo (cid:96) = wo k, AW o = APUW o (10) = PUW o = W o. i in (49) evolves according to the following dynamics: For real data, the model can be simplified since we do not need to track the evolution of the complex conjugate (w∗k,i)(cid:62). Although we use the notation "e" for the quantities in the above recursion, it is to be understood that the extended quantities {(cid:101)we k,i, be k, se k,i,Ae} should be replaced by the quantities {(cid:101)wk,i, bk, sk,i,A} as in Table I. 14 The stability analysis of recursion (54) is facilitated by transforming it to a convenient basis using the Jordan  )−1 and introducing the decomposition of Ae in Lemma 2. Multiplying both sides of (54) from the left by (V e transformed iterates and variables: (V e  )−1Aese i =  )−1(cid:101)We i =  )−1Aebe = µ(V e µ(V e i i We i W(cid:86)e i  (cid:44) (U e)∗(cid:101)We L,)∗(cid:101)We  (cid:44) L,)∗Aebe  (cid:44) (V e µ (U e)∗Aese L,)∗Aese µ (V e µ (U e)∗Aebe µ (V e i i se i s(cid:86)e i  ,  , (cid:86)e  , 0 b i = (IhP − D11,i−1)We We  − D22,i−1)W(cid:86)e W(cid:86)e i = (J e i−1 − D12,i−1W(cid:86)e i−1 − D21,i−1We i−1 − se i , i−1 − s(cid:86)e (cid:86)e i + b , we obtain from Lemma 2: where (57) (58) (59) (60) (61) (62) (63) (64) (65) (66) (67) (68) (69) D11,i−1 = µ (U e)∗Hi−1U e, D12,i−1 = µ (U e)∗Hi−1V e D21,i−1 = µJ e D22,i−1 = µJ e L,)∗Hi−1U e, L,)∗Hi−1V e R,, R,.  (V e  (V e Recursions (60) and (61) can be written more compactly as: IhP − D11,i−1 −D21,i−1 −D12,i−1  − D22,i−1 J e  We W(cid:86)e i−1 i−1  We i W(cid:86)e i   = − se i s(cid:86)e i  + 0 (cid:86)e  . b The zero entry in (59) is due to the fact that since the constrained optimization problem (2) can be written alternatively as: (U e)∗Ae be (42),(44) = (U e)∗be = 0, minimize W J glob(W) = Jk(wk) N(cid:88)k=1 subject to (IM − PU)W = 0. The Lagrangian associated with problem (68) is given by: L(W; γ) = J glob(W) + hRe{γ∗(IM − PU)W} 15 o) be 0 γ  +(IM − PU)γ = 0, where γ is the M × 1 vector of Lagrange multipliers. From the optimality conditions, we obtain the following condition on Wo: ∇W(cid:62)J glob(W (cid:125) (cid:123)(cid:122) (cid:124) ∇W(cid:62)J glob(Wo)   ∇W∗J glob(Wo) + (cid:125) (cid:123)(cid:122) (cid:124) where we used the fact that(cid:80)N k=1 Jk(wk) is real valued and where be and I are given by (53) and (31), respectively. In the real data case, by multiplying both sides of the previous relation by (U e)∗ = U(cid:62), we obtain (U e)∗be = 0. For complex data, by multiplying both sides of the previous equation by (U e)∗I(cid:62) with U e defined in Table I, we obtain (U e)∗be = 0. Now, considering both real and complex data cases, we arrive at (67). (IM − PU)(cid:62)  (γ∗)(cid:62)  = 0, (when the data is complex) (when the data is real) IM − PU 0 Remark 5. Regarding algorithm (19), it can be verified that the weight error vector (cid:101)We according to recursion (54). The constant driving terms {dD,k} will disappear when subtracting wo of (19) since wo k satisfies the following relation: i will end up evolving k from both sides (70) Ibe (cid:96) + dD,k, where we used the fact that the optimal solution Wo in (17) verifies: Ak(cid:96)wo wo k = (cid:88)(cid:96)∈Nk W o = PUW o + dD o + dD) + (IM − A)dD (10) = A(PUW = AW o + (IM − A)dD. (71) (72) By rewriting the constraint in (17) as (IM − PU)W = dD and repeating similar arguments as (68) -- (70), we can show that (U e)∗be = 0. Therefore, the transformed iterates We i in (57) will continue to evolve according to recursions (60) and (61). i and W(cid:86)e In the following, we shall establish the mean-square-error stability of algorithm (9). In the accompanying Part II, we will derive a closed-form expression for the network MSD defined by (23). The derivation is demanding. However, the arguments are along the lines developed in [4, Chaps. 9 -- 11] for standard diffusion (16) with proper adjustments to handle possibly complex valued block matrices {Ak(cid:96)} satisfying conditions (7) and (8) and the subspace constraints. C. Mean-square-error stability Theorem 1. (Network mean-square-error stability). Consider a network of N agents running the distributed strategy (9) with a matrix A satisfying conditions (13), (14), and (12) and U satisfying Assumption 3. Assume the individual costs, Jk(wk), satisfy the conditions in Assumption 1. Assume further that the first and second-order moments of the gradient noise process satisfy the conditions in Assumption 2. Then, the network is mean-square- error stable for sufficiently small step-sizes, namely, it holds that: E(cid:107)wo k − wk,i(cid:107)2 = O(µ), lim sup i→∞ k = 1, . . . , N, (73) 16 for small enough µ. Proof. See Appendix D. IV. DISTRIBUTED LINEARLY CONSTRAINED MINIMUM VARIANCE (LCMV) BEAMFORMER Consider a uniform linear array (ULA) of N = 14 antennas, as shown in Fig. 2. A desired narrow-band signal s0(i) ∈ C from far field impinges on the array from known direction of arrival (DOA) θ0 = 30◦ along with two uncorrelated interfering signals {s1(i), s2(i)} ∈ C from DOAs {θ1 = −60◦, θ2 = 60◦}, respectively. We assume that the DOA of s3(i) is roughly known. The received signal at the array is therefore modeled as: xi = a(θ0)s0(i) + a(θn)sn(i) + vi (74) 2(cid:88)n=1 (cid:124) zi (cid:123)(cid:122) (cid:125) where xi = col{x1(i), . . . , xN (i)} is an N × 1 vector that collects the received signals at the antenna elements, n=0 are N × 1 array manifold vectors (steering vectors) for the desired and interference signals, and {a(θn)}2 vi = col{v1(i), . . . , vN (i)} is the additive noise vector at time i. With the first element as the reference point, the N × 1 array manifold vector a(θn) is given by a(θn) = col(cid:8)1, e−jτn, e−j2τn, . . . , e−j(N−1)τn(cid:9) [32], with λ sin(θn) where d denotes the spacing between two adjacent antenna elements, and λ denotes the wavelength τn = 2πd of the carrier signal. The antennas are assumed spaced half a wavelength apart, i.e., d = λ/2. Beamforming problems generally deal with the design of a weight vector h = col{h1, . . . , hN} ∈ CN×1 in order to recover the desired signal s0(i) from the received data xi [32], [33]. The narrowband beamformer output can be expressed as y(i) = h∗xi. Among many possible criteria, we use the linearly-constrained-minimum-variance (LCMV) design, namely, ho = arg min h Eh∗xi2 = h∗Rxh subject to D∗h = b, (75) where D is an N × P matrix and b is a P × 1 vector, in order to suppress the influence of the perturbation zi on the output y(i) while preserving the signal component. Since the DOAs of s0(i) is known and the DOA of s2(i) is roughly known, matrix D can be chosen as D = [a(30◦) a(58.5◦) a(61.5◦)], and the vector b as b = col{1, 0.01, 0.01}. In this way, we set unit response to the direction of the desired signal so that s0(i) passes through the array without distortion. In a distributed setting, the objective of agent (antenna element) k is to estimate ho k, the k-th component of ho in (75). Neighboring agents are allowed to exchange their observations x(cid:96)(i). To each agent k, we associate a neighborhood set Nk, an Mk × 1 parameter vector wk, and an Mk × 1 regression vector uk,i, defined in Table II depending on the node location on the array. Observe that the parameter ν controls the network topology. For DISTRIBUTED BEAMFORMING SETTINGS FOR UNIFORM LINEAR ARRAYS OF N ANTENNAS (1 ≤ ν ≤ N − 1). TABLE II 17 Neighboring set Nk {max{1, k − ν}, . . . , min{k + ν, N}} Parameter vector wk col{hm}min{k+ν,N} m=max{1,k−ν} col{Nm− 1 Regressor uk,i 2 xm(i)}min{k+ν,N} m=max{1,k−ν} example, ν = N − 1 corresponds to a fully connected network setting. We associate with each agent k a cost Jk(wk) (cid:44) w∗k E[uk,iu∗k,i]wk. Instead of solving (75), we propose to solve: W o = arg min W J glob(W) = N(cid:88)k=1 subject to D∗W = d, Jk(wk) (76) where the equality constraint D∗W = d merges the equality constraint in (75) and the equality constraints that need to be imposed on the parameter vectors at neighboring nodes in order to achieve equality between common entries (see Table II). Let E denote the binary connection matrix with [Ek(cid:96)] = 1 if (cid:96) ∈ Nk, and 0 otherwise. Under the consensus constraints, it can be shown that: J glob(W) = Jk(wk) = h∗(F ◦ Rx)h N(cid:88)k=1 where F is an N ×N matrix with [F ]k(cid:96) = [E2]k(cid:96) and ◦ is the element-wise product. Therefore, collecting obser- √NkN(cid:96) vations from neighboring nodes allows partial covariance matrix computation, which will be used in optimization. For the partial covariance F ◦Rx to converge to the true covariance Rx in (75), we need to set ν = N −1 in order to have F = 1N 1(cid:62)N . Note that, two main classes of distributed beamforming appear in the literature [37]. In the first class, which is considered here, the covariance matrix is approximated to form distributed implementations [37] -- [40] (77) leading to sub-optimal beamformers. In the second class, the proposed beamformers obtain statistical optimality but do so at the expense of restricting the topology of the underlying network [41]. Different from [38], the current distributed solution preserves convexity and is scalable since nodes exchange and compute M(cid:96)×1 sub-vectors {w(cid:96)} with M(cid:96) = N(cid:96) < N instead of N × 1 vectors. Algorithm (9) can be applied to solve (76). The signals {sn(i)}2 n=0 are i.i.d. zero-mean complex Gaussian s,n = 1,∀n. The additive noise vi is zero-mean complex Gaussian with covariance random variables with variance σ2 Eviv∗i = σ2 vIN (σv = 0.7). We set ν = 4. The complex combination matrix A is set as the solution of the feasibility problem (22) with the constraint ρ(A − PU) < 1 replaced by ρ(A − PU) ≤ 1 −  ( = 0.01) and the constraint A = A∗ added2. The resulting problem is solved via CVX package [42]. Note that the distributed implementation is feasible in this example. We set µ = 0.005. The output signal-to-interference-plus-noise ratio (SINR) given by E(cid:104) σ2 vIN is illustrated in Fig. 2 (right). The dashed black curve is the beampattern obtained by the centralized, also known as the constrained LMS [33], algorithm (µ = 0.001). The (cid:105) with Rz =(cid:80)2 s,na(θn)a∗(θn) + σ2 s,0h∗ h∗ i Rzhi i a(θ0) n=1 σ2 2These changes make the problem convex -- see [2, Sec. 3] for further details. 18 Fig. 2. (Left) Uniform linear array of N antennas. (Right) Comparison of output SINR. results are averaged over 1000 Monte-Carlo runs. We observe that the distributed solution performs well compared to the centralized implementation. V. CONCLUSION In this work, we considered inference problems over networks where agents have individual parameter vectors to estimate subject to subspace constraints that require the parameters across the network to lie in low-dimensional subspaces. Based on the gradient projection algorithm, we proposed an iterative and distributed implementation of the projection step, which runs in parallel with the stochastic gradient descent update. We showed that, for small step-size parameter, the network is able to approach the minimizer of the constrained problem to arbitrarily good accuracy levels. APPENDIX A PROOF OF LEMMA 1 First we prove sufficiency by proving that if PU is a projection matrix and A satisfies conditions (10), (11), and (12), then the matrix equation (7) holds. If A satisfies (10) and (11), then: Ai − PU (10) = = = (10),(11) = (10) = Ai − AiPU Ai(I − PU) Ai(I − PU)i (A(I − PU))i (A − PU)i (78) where we used the fact that (I −PU) = (I −PU)i since (I −PU) is a projector. Applying condition (12) and using the fact that for any matrix B, limi→∞ Bi = 0 if and only if ρ(B) < 1, we obtain the desired convergence (7). !hNh3h2h1Arrayoutputy(i)x3(i)x2(i)x1(i)xN(i)ddFarfieldsignalsources0(i)θ0dsin(θ0)(wavelengthλ)θnInterferencesignalsn(i)PatternformingnetworkIteration,i#10400.20.40.60.811.21.41.61.82OutputSINRindB-6-4-202468101214DistributedsolutionCentralizedsolution To prove necessity, we shall prove that every time we have (7), we will have PU a projection matrix and conditions (10), (11), and (12) on A satisfied. We use the fact that limi→∞ Ai exists if, and only if, there is a non singular matrix V such that [43]: A = V IK 0 0 J V−1, where the spectral radius of J is less than one. Let v1, . . . , vM be the columns of V and y∗1, . . . , y∗M be the rows of V−1. Then, we have: lim i→∞Ai = lim 0 0 IK 0 i→∞V = V K(cid:88)m=1 IK 0 J i V−1 0 V−1 = K(cid:88)m=1 vmy∗m= V 0 vmy∗m. IK 0 0 V−1. From the left hand-side of (7) and (80), we obtain: PU = lim i→∞Ai = Observe from (79) that one is an eigenvalue of A with multiplicity K and {vm, ym}K and left eigenvectors. Thus, from (81), we obtain: m=1 are the associated right 19 (79) (80) (81) (82) (83) (84) (85) and equations (10) and (11) hold. Moreover, from (79) and (81), we obtain: which is condition (12). Finally, from (81), we have: vmy∗m = PUA = APU = A vmy∗m = PU vmy∗m = PU K(cid:88)m=1 K(cid:88)m=1 vmy∗mA = ρ (A − PU) = ρV U = V K(cid:88)m=1 K(cid:88)m=1 V−1 = ρ(J ) < 1, 0 V−1 = PU. 0 0 0 J IK 0 P 2 0 Thus, PU is a projector, which completes the necessity proof. Since each vmy∗m is a rank-one matrix and their sum (cid:80)M m=1 vmy∗m = VV−1 = I has rank M, the matrix (cid:80)K m=1 vmy∗m must have rank K. Since the rank of PU is equal to P , we obtain from (81) K = P . Thus, the matrix A has P = K eigenvalues at one and all other eigenvalues are strictly less than one. 20 APPENDIX B DRIVING TERM IN ALGORITHM (19) Let W0 denote an M × 1 vector distributed across the network. In order to justify the choice of (I − A)dD in (19), we consider the problem of finding the projection Wo = PUW0 + dD in a distributed and iterative manner through a linear iteration of the form: Wi = AWi−1 + BdD, (86) where A satisfies (7), (8) and B is a properly chosen matrix ensuring convergence toward Wo. Starting from W0 and iterating the above recursion, we obtain: If we let i → ∞ on both sides of (87), we find: For W∞ to be equal to Wo, B in (86) must be chosen such that (cid:80)∞j=0 AjB = I. In the following, we show that B = I − A + PU ensures convergence. From the Jordan canonical form of A introduced in (41), we have: Wi = Ai W0 + i−1(cid:88)j=0 AjBdD. W0 + ∞(cid:88)j=0 AjBdD. Wi = lim W∞ = lim i→∞ i→∞Ai (cid:124) (cid:123)(cid:122) (cid:125)PU Aj = V I − A + PU = V Aj(I − A + PU) = V IP 0 ∞(cid:88)j=0 IP 0 0 J i IP  0 I − J   , . V−1 V−1  (I − J) V−1 0  = I, (87) (88) (89) (90) (91) If we multiply both terms and compute the infinite sum in (88), we obtain: where we used the fact that(cid:80)∞j=0 J i Now, since PU = PD and PDdD = 0, we obtain BdD = (I − A)dD, which justifies the choice in (19). 0 (cid:80)∞j=0 J i  = I − J since ρ(J) < 1. APPENDIX C PROOF OF LEMMA 2 We start by noting that the M × M matrix A satisfying conditions (13), (14), and (12) admits a Jordan canonical decomposition of the form: A = VΛV−1, Λ = IP 0 0 J  , V =(cid:104) U VR (cid:105) , V−1 = U∗ V∗L  (92) where the matrix J consists of Jordan blocks, with each one of them having the form (say for a Jordan block of size 3 × 3): , (93)  λ 1 0 0 λ 1 0 0 λ  21 (94) (95) (97) (98) (99) (100) (101) (102) where the eigenvalue λ may be complex but has magnitude less than one. Let E = diag{IP , , 2, . . . , M−P} with  > 0 any small positive number independent of µ. The matrix A in (92) can be written alternatively as: where = VΛV−1  A = VE(cid:124)(cid:123)(cid:122)(cid:125)V  , IP 0 0 J V −1  E−1ΛE E−1V−1 (cid:124) (cid:123)(cid:122) (cid:125)Λ (cid:124) (cid:123)(cid:122) (cid:125) V =(cid:104) U VR, (cid:105) , Λ = V−1  = U∗ V∗L,  , and where the matrix J consists of Jordan blocks, with each one of them having a form similar as (93) with  > 0 appearing on the upper diagonal instead of 1, and where the eigenvalue λ may be complex but has magnitude less than one. Obviously, since V−1  V = IM , it holds that: U∗VR, = 0, V∗L,U = 0, V∗L,VR, = IM−P , (96) and where U∗U = IP from Assumption 3. Now, let us consider the extended version of the matrix A, namely, Ae, which is an N × N block matrix whose (k, (cid:96))-th block is defined in Table I. In the real data case, we have Ae = A. In the complex data case, it can be verified that Ae is similar to the 2 × 2 block diagonal matrix: 0 Ad = A 0 (A∗)(cid:62)  according to: Ad = IAeI(cid:62) where I is the permutation matrix defined by (31). Using (94), we can rewrite the second block in (97) as: (A∗)(cid:62) = (V∗ )(cid:62)(Λ∗ )(cid:62)((V−1  )∗)(cid:62) = (V∗ )(cid:62)(Λ∗ )(cid:62)((V∗ )(cid:62))−1 where (Λ∗ )(cid:62) = diag{IP , (J ∗ )(cid:62)} and (V∗ )(cid:62) =(cid:104) (U∗)(cid:62) (V∗R,)(cid:62) (cid:105) , ((V−1  )∗)(cid:62) = U(cid:62) V(cid:62)L,  . Now, by replacing (94) and (99) into (97), and by introducing the extended 2 × 2 block diagonal matrices:  = diag(cid:110)V, (V∗ )(cid:62)(cid:111) , V d  = diag(cid:110)Λ, (Λ∗ )(cid:62)(cid:111) , Λd 22 we find that the 2M × 2M matrix Ad has a Jordan decomposition of the form: Ad = V d  Λd  (V d  )−1. Let us again introduce a permutation matrix I(cid:48) given by: 0 IP  I(cid:48) (cid:44) 0 0 0 0 IM−P 0 0 IP 0 0 0 0 0 IM−P .  (103) (104) (105) The matrix Ad in (103) can be written alternatively as: I(cid:48)Λd I(cid:48)(cid:62) (cid:124) (cid:123)(cid:122) (cid:125) (cid:44)Λe where the matrix Λe that the matrix Ae has a Jordan decomposition of the form:  I(cid:48)(cid:62) Ad = V d (cid:124) (cid:123)(cid:122) (cid:125)(cid:44) V d(cid:48)   I(cid:48)(V d  )−1 (cid:124) (cid:123)(cid:122) (V d(cid:48)  )−1 (cid:125)  is block diagonal defined in (43). Returning now to Ae, and using (98) and (105), we find Ae = V e  Λe  )−1, (V e where V e  and (V e  )−1 are defined by: (cid:44) I(cid:62)V d  I(cid:48)(cid:62), V e   )−1 (cid:44) I(cid:48)(V d (V e  )−1I (106) (107) in terms of the permutation matrices I and I(cid:48) in (30), (104) and the block diagonal matrix V d evaluating these matrices, we arrive at (43).  in (101). By properly APPENDIX D PROOF OF THEOREM 1 We consider the transformed variables We in (57). Conditioning both sides on F i−1, computing the conditional second-order moments, using the conditions from Assumption 2 on the gradient noise process, and i and W(cid:86)e i computing the expectations again, we get: and E(cid:107)We i(cid:107)2 = E(cid:13)(cid:13)(IhP − D11,i−1)We i(cid:107)2 = E(cid:13)(cid:13)(cid:13)(J e  − D22,i−1)W(cid:86)e E(cid:107)W(cid:86)e i−1 − D12,i−1W(cid:86)e i(cid:107)2 i−1(cid:13)(cid:13)2 + E(cid:107)se (cid:86)e(cid:13)(cid:13)(cid:13) 2 i−1 − D21,i−1We i−1 + b + E(cid:107)s(cid:86)e i(cid:107)2 . (108) (109) 23 By applying Jensen's inequality to the convex function (cid:107)x(cid:107)2, we can bound the first term on the RHS of (108) as follows: E(cid:13)(cid:13)(IhP − D11,i−1)We i−1 − D12,i−1W(cid:86)e i−1(cid:13)(cid:13)2 = E(cid:13)(cid:13)(cid:13)(cid:13)(1 − t) ≤ ≤ 1 1 − t 1 1 − t 2 1 t 1 1 − t (IhP − D11,i−1)We E(cid:13)(cid:13)(IhP − D11,i−1)We i−1(cid:13)(cid:13)2 + E(cid:104)(cid:107)IhP − D11,i−1(cid:107)2(cid:13)(cid:13)We i−1(cid:13)(cid:13)2(cid:105) + i−1− t 1 t i−1(cid:13)(cid:13)(cid:13)(cid:13) D12,i−1W(cid:86)e i−1(cid:13)(cid:13)2 E(cid:13)(cid:13)D12,i−1W(cid:86)e E(cid:104)(cid:107)D12,i−1(cid:107)2(cid:13)(cid:13)W(cid:86)e 1 t i−1(cid:13)(cid:13)2(cid:105) (110) for any arbitrary positive number t ∈ (0, 1). By Assumption 1, the Hermitian matrix H k,i−1 defined in (47) can be bounded as follows: νk h 0 ≤ IhMk ≤ H k,i−1 ≤ δk h IhMk. (111) Using the fact that the integral of a matrix is the matrix of the integrals, and the linear property of integration, the Hermitian block D11,i−1 in (62) can be rewritten as: 0 (cid:104)(U e)∗diag(cid:8)∇2 D11,i−1= µ(cid:90) 1 and, therefore, from Assumption 1, D11,i−1 can be bounded as follows: k − t(cid:101)wk,i−1)(cid:9)N k=1 U e(cid:105)dt Jk(wo (112) wk 0 < µ ν h IhP ≤ D11,i−1 ≤ µ δ h IhP , (113) for some positive constants ν and δ that are independent of µ and i. In terms of the 2−induced matrix norm (i.e., maximum singular value), we obtain: and, therefore, (cid:107)IhP − D11,i−1(cid:107) = ρ(IhP − D11,i−1) ≤ max(cid:26)(cid:12)(cid:12)(cid:12)(cid:12)1 − µ δ h(cid:12)(cid:12)(cid:12)(cid:12) ,(cid:12)(cid:12)(cid:12)1 − µ (cid:107)IhP − D11,i−1(cid:107)2 ≤ (1 − µσ11)2, ν h(cid:12)(cid:12)(cid:12)(cid:27) , (114) (115) for some positive constant σ11 that is independent of µ and i. Similarly, using the 2−induced matrix norm (i.e., maximum singular value), we can bound (cid:107)D12,i−1(cid:107)2 as follows: (cid:107)D12,i−1(cid:107)2 (63) R,(cid:107)2 = (cid:107)µ (U e)∗Hi−1V e ≤ µ2(cid:107)(U e)∗(cid:107)2(cid:107)Hi−1(cid:107)2(cid:107)V e R,(cid:107)2 ≤ µ2(cid:18) max 1≤k≤N (cid:107)H k,i−1(cid:107)2(cid:19)(cid:107)V e R,(cid:107)2 1≤k≤N(cid:26) δ2 h2(cid:27) R,(cid:107)2 max ≤ µ2(cid:107)V e = µ2σ2 12, k (111) for some positive constant σ12 and where we used the fact that (cid:107)(U e)∗(cid:107) = σmax((U e)∗) =(cid:112)λmax(U e(U e)∗) = 1. Substituting (110) into (108), and using (115), (116), we get: E(cid:107)We i(cid:107)2 ≤ (1 − σ11µ)2 1 − t E(cid:107)We i−1(cid:107)2 + µ2σ2 12 t E(cid:107)W(cid:86)e i−1(cid:107)2 + E(cid:107)se i(cid:107)2 (117) (116) 24 We select t = σ11µ (for sufficiently small µ). Then, the previous inequality can be written as: E(cid:107)We i(cid:107)2 ≤ (1 − σ11µ)E(cid:107)We i−1(cid:107)2 + µσ2 12 σ11 E(cid:107)W(cid:86)e i−1(cid:107)2 + E(cid:107)se i(cid:107)2. (118) We repeat similar arguments for the second variance relation (109). Using Jensen's inequality again, we obtain:  − D22,i−1)W(cid:86)e E(cid:107)(J e 1 E(cid:107)J e  W(cid:86)e i−1(cid:107)2 + ≤ t (ρ(J) + )2 E(cid:107)W(cid:86)e ≤ = (ρ(J) + )E(cid:107)W(cid:86)e i−1 − D21,i−1We E(cid:107)D22,i−1W(cid:86)e 1 1 − t i−1(cid:107)2 + i−1(cid:107)2 + 1 1 − t 1 1 − ρ(J) −  (b) (a) t (cid:86)e (cid:107)2 i−1 + b i−1 + D21,i−1We E(cid:107)D22,i−1W(cid:86)e (cid:86)e (cid:107)2 i−1 − b i−1 + D21,i−1We i−1 − b i−1 + D21,i−1We (cid:86)e E(cid:107)D22,i−1W(cid:86)e (119) (cid:107)2, (cid:107)2 i−1 − b (cid:86)e for any arbitrary positive number t ∈ (0, 1). In (a) we used the fact that the block diagonal matrix J e Table I satisfies:  defined in (cid:107)J e  (cid:107)2 ≤ (ρ(J) + )2. (120) Expression (120) can be established by using similar arguments as in [4, pp. 516] and the fact that λmax(cid:0)J (cid:62) (J ∗ )(cid:62)(cid:1) = λmax(cid:0)(J ∗ J)(cid:62)(cid:1) = λmax(J ∗ J). In (b), we used the fact that ρ(J) ∈ (0, 1), and thus,  can be selected small enough to ensure ρ(J) +  ∈ (0, 1). We then selected t = ρ(J) + . Using Jensen's inequality, the second term on the RHS of (119) can be bounded as follows: E(cid:107)D22,i−1W(cid:86)e i−1 + D21,i−1We i−1 − b (cid:86)e (cid:107)2 ≤ 3E[(cid:107)D22,i−1(cid:107)2(cid:107)W(cid:86)e i−1(cid:107)2] + 3E[(cid:107)D21,i−1(cid:107)2(cid:107)We (cid:86)e i−1(cid:107)2] + 3(cid:107)b Following similar arguments as in (116), we can show that: (cid:107)D21,i−1(cid:107)2 ≤ µ2σ2 21, (cid:107)D22,i−1(cid:107)2 ≤ µ2σ2 22, (121) (cid:107)2 (122) for some positive constants σ21 and σ22. Substituting (121) into (119) and (119) into (109), and using (122), we obtain: E(cid:107)W(cid:86)e i(cid:107)2 ≤(cid:18)ρ(J) +  + 1 − ρ(J) − (cid:19) E(cid:107)W(cid:86)e 1 − ρ(J) − (cid:19) E(cid:107)We 1 − ρ(J) − (cid:19)(cid:107)b i−1(cid:107)2 +(cid:18) i−1(cid:107)2 +(cid:18) (cid:107)2 + E(cid:107)s(cid:86)e 3µ2σ2 22 3µ2σ2 21 (cid:86)e 3 i(cid:107)2. (123) From (59), we have: (cid:86)e (cid:107)b where we used the fact that (V e gradient ∇w∗ For the noise terms E(cid:107)se Jk(wo k (cid:107)2 = (cid:107)µJ e  (V e L,)∗Ae = J e L,)∗be(cid:107)2 ≤ µ2(ρ(J) + )2(cid:107)(V e  (V e L,)∗(cid:107)2(cid:107)be(cid:107)2 k) and since Jk(wk) is twice differentiable, then (cid:107)be(cid:107)2 is bounded and we obtain (cid:107)b L,)∗ from Lemma 2. Since be in (53) is defined in terms of the (cid:107)2 = O(µ2). (cid:86)e (124) i(cid:107)2 in (118) and E(cid:107)s(cid:86)e i(cid:107)2 + E(cid:107)s(cid:86)e E(cid:107)se i(cid:107)2 in (123), we have: = E(cid:107)µ(V e i(cid:107)2 (58)  )−1Aese i(cid:107)2 ≤ µ2v2 1 E(cid:107)se i(cid:107)2, (125) where v1 is a positive constant independent of µ and given by v1 (cid:44) (cid:107)(V e i(cid:107)2 =(cid:80)N variances of the individual noise processes, E(cid:107)sk,i(cid:107)2, we have E(cid:107)se each sk,i(wk,i−1), we have from Assumption 2 and Jensen's inequality: k(cid:107)2 + σ2 k − wk,i−1 + wo k/h2)(cid:107)wo E(cid:107)sk,i(wk,i−1)(cid:107)2 ≤ (β2 ≤ 2(β2 = ¯β2 k k=1 s,k k(cid:107)2 + σ2 s,k  )−1Ae(cid:107) = (cid:107)Λe (V e  )−1(cid:107). In terms of the E(cid:107)sk,i(cid:107)2. For k=1 k,i(cid:107)2 = 2(cid:80)N E(cid:107)se where ¯β2 k (cid:44) 2(β2 k/h2) and ¯σ2 s,k i(cid:107)2 can thus be bounded as follows: (cid:44) 2(β2 s,k ¯β2 k k(cid:107)2 + σ2 k/h2)(cid:107)wo k/h2)E(cid:107)wo k/h2)E(cid:107)(cid:101)wk,i−1(cid:107)2 + 2(β2 E(cid:107)(cid:101)wk,i−1(cid:107)2 + ¯σ2 s,k. The term E(cid:107)se N(cid:88)k=1 N(cid:88)k=1 E(cid:107)(cid:101)wk,i−1(cid:107)2 + 2 E(cid:107)si(cid:107)2 ≤ 2 E(cid:107)V e  )−1(cid:101)We i−1(cid:107)2 + σ2 ≤ β2  (V e  (cid:107)2E(cid:107)(V e  )−1(cid:101)We max(cid:107)V e ≤ β2 2(cid:2)E(cid:107)We i−1(cid:107)2 + E(cid:107)W(cid:86)e = β2 maxv2 s,k, and v2 (cid:44) (cid:107)V e 2[E(cid:107)We 1β2 maxv2 max s ¯σ2 s,k s i−1(cid:107)2 + σ2 i−1(cid:107)2(cid:3) + σ2 s  (cid:107). Substituting into (125), we get: i−1(cid:107)2 + E(cid:107)W(cid:86)e i−1(cid:107)2] + µ2v2 1σ2 s . max ¯β2 k, σ2 where β2 (cid:44) max1≤k≤N E(cid:107)se (cid:44) 2(cid:80)N i(cid:107)2 + E(cid:107)s(cid:86)e i(cid:107)2 ≤ µ2v2 Using this bound in (118) and (123), we obtain: k=1 ¯σ2 s E(cid:107)W(cid:86)e E(cid:107)We i(cid:107)2 ≤(cid:18) +(cid:18) i(cid:107)2 ≤(1 − σ11µ + µ2v2 1β2 maxv2 3µ2σ2 21 + µ2v2 1β2 maxv2 1 − ρ(J) −  3 1 − ρ(J) − (cid:19)(cid:107)b (cid:86)e (cid:107)2 + µ2v2 1σ2 s . 12 σ11 + µ2v2 2)E(cid:107)We 2(cid:19) E(cid:107)We i−1(cid:107)2 +(cid:18) µσ2 i−1(cid:107)2 +(cid:18)ρ(J) +  + 1β2 maxv2 2(cid:19) E(cid:107)W(cid:86)e 3µ2σ2 22 1 − ρ(J) −  25 (126) (127) (128) (129) i−1(cid:107)2 + µ2v2 1σ2 s , + µ2v2 1β2 maxv2 2(cid:19) E(cid:107)W(cid:86)e i−1(cid:107)2 (130) (131) (132) We can combine (129) and (130) into a single inequality recursion: where Γ is given by:  Γ (cid:44) E(cid:107)We i(cid:107)2 E(cid:107)W(cid:86)e i(cid:107)2  (cid:22) Γ c d  = a b E(cid:107)We E(cid:107)W(cid:86)e e i−1(cid:107)2 i−1(cid:107)2  + e + f  ρ(J) +  + O(µ2)  . O(µ) 1 − O(µ) O(µ2) and where a = 1 − O(µ), b = O(µ), c = O(µ2), d = ρ(J) +  + O(µ2), e = O(µ2), and f = O(µ2). Now, using the property that the spectral radius of a matrix is upper bounded by its 1−norm norm, we obtain: ρ(Γ) ≤ max(cid:8)1 − O(µ) + O(µ2), ρ(J) +  + O(µ) + O(µ2)(cid:9) (133) 26 Since ρ(J) < 1 is independent of µ, and since  and µ are small positive numbers that can be chosen arbitrarily small and independently of each other, it is clear that the RHS of the above expression can be made strictly smaller than one for sufficiently small  and µ. In that case ρ(Γ) < 1 so that Γ is stable. Moreover, it holds that: Now, by iterating (131) we arrive at: E(cid:107)We i(cid:107)2 E(cid:107)W(cid:86)e from which we conclude that lim supi→∞ lim sup E(cid:107)We i→∞  E(cid:107)(cid:101)We lim sup i→∞ O(1/µ) O(1) (I − Γ)−1 = i(cid:107)2  (cid:22) (I − Γ)−1 E(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)  V e 2(cid:2)E(cid:107)We O(µ) O(1)  . e + f  = (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) i(cid:107)2 = lim sup i→∞ ≤ lim sup i→∞ We i W(cid:86)e i i(cid:107)2 + E(cid:107)W(cid:86)e i(cid:107)2 = O(µ) and lim supi→∞ v2 e 2 i(cid:107)2(cid:3) = O(µ). O(µ) O(µ2)  E(cid:107)W(cid:86)e i(cid:107)2 = O(µ2). Therefore, (134) (135) (136) REFERENCES [1] R. Nassif, S. Vlaski, and A. H. Sayed, "Distributed inference over networks under subspace constraints," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 1 -- 5. [2] R. Nassif, S. Vlaski, and A. H. Sayed, "Adaptation and learning over networks under subspace constraints -- Part II: Performance analysis," Submitted for publication., May 2019. [3] A. H. Sayed, S. Y. Tu, J. Chen, X. Zhao, and Z. J. Towfic, "Diffusion strategies for adaptation and learning over networks," IEEE Signal Process. Mag., vol. 30, no. 3, pp. 155 -- 171, 2013. [4] A. H. Sayed, "Adaptation, learning, and optimization over networks," Foundations and Trends in Machine Learning, vol. 7, no. 4-5, pp. 311 -- 801, 2014. [5] A. H. Sayed, "Adaptive networks," Proc. IEEE, vol. 102, no. 4, pp. 460 -- 497, Apr. 2014. [6] D. Bertsekas, "A new class of incremental gradient methods for least squares problems," SIAM J. Optim., vol. 7, no. 4, pp. 913 -- 926, 1997. [7] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp. 48 -- 61, Jan. 2009. [8] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal processing," Proc. IEEE, vol. 98, no. 11, pp. 1847 -- 1864, Nov. 2010. [9] S. Chouvardas, K. Slavakis, and S. Theodoridis, "Adaptive robust distributed learning in diffusion sensor networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct. 2011. [10] P. Braca, S. Marano, and V. Matta, "Enforcing consensus while monitoring the environment in wireless sensor networks," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3375 -- 3380, Jul. 2008. [11] G. N. Korres, "A distributed multiarea state estimation," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 73 -- 84, Feb. 2011. [12] V. Kekatos and G. B. Giannakis, "Distributed robust power system state estimation," IEEE Trans. Signal Process., vol. 28, no. 2, pp. 1617 -- 1626, 2013. [13] J. Chen, C. Richard, and A. H. Sayed, "Multitask diffusion adaptation over networks," IEEE Trans. Signal Process., vol. 62, no. 16, pp. 4129 -- 4144, 2014. 27 [14] S. Khawatmi and A. M. Zoubir, "Decentralized partitioning over adaptive networks," in Proc. IEEE Int. Workshop Mach. Learn. Signal Process., Vietri sul Mare, Italy, Sep. 2016, pp. 1 -- 6. [15] J. Plata-Chaves, A. Bertrand, M. Moonen, S. Theodoridis, and A. M. Zoubir, "Heterogeneous and multitask wireless sensor networks -- Algorithms, applications, and challenges," IEEE Journal of Selected Topics in Signal Processing, vol. 11, no. 3, pp. 450 -- 465, 2017. [16] R. Nassif, S. Vlaski, and A. H. Sayed, "Distributed inference over multitask graphs under smoothness," in Proc. IEEE Int. Workshop Signal Process. Adv. Wireless Commun., Kalamata, Greece, Jun. 2018, pp. 1 -- 5. [17] A. Koppel, B. M. Sadler, and A. Ribeiro, "Proximity without consensus in online multi-agent optimization," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Shanghai, China, May 2016, pp. 3726 -- 3730. [18] D. Hallac, J. Leskovec, and S. Boyd, "Network LASSO: Clustering and optimization in large graphs," in Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia, Aug. 2015, pp. 387 -- 396. [19] X. Cao and K. J. R. Liu, "Distributed efficient optimization for general network cost minimization problems," in Proc. IEEE International Conference on Communications, Kansas City, MO, USA, May 2018, pp. 1 -- 6. [20] R. Nassif, S. Vlaski, C. Richard, and A. H. Sayed, "A regularization framework for learning over multitask graphs," IEEE Signal Process. Lett., vol. 26, no. 2, pp. 297 -- 301, Feb. 2019. [21] J. Chen, C. Richard, A. O. Hero, and A. H. Sayed, "Diffusion LMS for multitask problems with overlapping hypothesis subspaces," in Proc. IEEE Int. Workshop Mach. Learn. Signal Process. (MLSP), Reims, France, Sept. 2014, pp. 1 -- 6. [22] J. F. C. Mota, J. M. F. Xavier, P. M. Q. Aguiar, and M. Puschel, "Distributed optimization with local domains: Applications in MPC and network flows," IEEE Trans. Autom. Control, vol. 60, no. 7, pp. 2004 -- 2009, Jul. 2015. [23] S. A. Alghunaim and A. H. Sayed, "Distributed coupled multi-agent stochastic optimization," to appear in IEEE Trans. Automatic Control. Also available as arXiv:1712.08817, 2019. [24] J. Plata-Chaves, N. Bogdanovi´c, and K. Berberidis, "Distributed diffusion-based LMS for node-specific adaptive parameter estimation," IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3448 -- 3460, Jul. 2015. [25] A. K. Sahu, D. Jakoveti´c, and S. Kar, "CIRFE: A distributed random fields estimator," IEEE Trans. Signal Process., vol. 66, no. 18, pp. 4980 -- 4995, Sep. 2018. [26] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Diffusion LMS for multitask problems with local linear equality constraints," IEEE Trans. Signal Process., vol. 65, no. 19, pp. 4979 -- 4993, 2017. [27] S. A. Alghunaim, K. Yuan, and A. H. Sayed, "Dual coupled diffusion for distributed optimization with affine constraints," in Proc. IEEE Conf. Decis. Control, Miami Beach, FL., USA, Dec. 2018, pp. 829 -- 834. [28] F. Hua, R. Nassif, C. Richard, and H. Wang, "Penalty-based multitask estimation with non-local linear equality constraints," in Proc. IEEE Int. Work. on Comp. Adv. in Multi-sensor Adapt. Process., Curacao, Dutch Antilles, Dec. 2017, pp. 433 -- 437. [29] S. Barbarossa, G. Scutari, and T. Battisti, "Distributed signal subspace projection algorithms with maximum convergence rate for sensor networks with topological constraints," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Taipei, Taiwan, Apr. 2009, pp. 2893 -- 2896. [30] D. P. Bertsekas, Nonlinear Programming, Athena Scientific, 1999. [31] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Systems & Control Letters, vol. 53, no. 1, pp. 65 -- 78, 2004. [32] H. L. Van Trees, Optimum Array Processing, Wiley, NJ, 2002. [33] O. L. Frost III, "An algorithm for linearly constrained adaptive array processing," Proc. IEEE, vol. 60, no. 8, pp. 926 -- 935, Aug. 1972. [34] F. R. K Chung, Spectral Graph Theory, American Mathematical Society, 1997. [35] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, second edition, 2013. [36] B. T. Polyak, Introduction to Optimization, Optimization Software, New York, 1987. [37] A. I. Koutrouvelis, T. W. Sherson, R. Heusdens, and R. C. Hendriks, "A low-cost robust distributed linearly constrained beamformer for wireless acoustic sensor networks with arbitrary topology," IEEE Audio, Speech, Language Process., vol. 26, no. 8, pp. 1434 -- 1448, Aug. 2018. 28 [38] M. O'Connor and W. B. Kleijn, "Diffusion-based distributed MVDR beamformer," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Florence, Italy, May 2014, pp. 810 -- 814. [39] Y. Zeng and R. C. Hendriks, "Distributed delay and sum beamformer for speech enhancement via randomized gossip," IEEE Audio, Speech, Language Process., vol. 22, no. 1, pp. 260 -- 273, Jan. 2014. [40] M. O'Connor, W. B. Kleijn, and T. Abhayapala, "Distributed sparse MVDR beamforming using the bi-alternating direction method of multipliers," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Shanghai, China, Mar. 2016, pp. 106 -- 110. [41] A. Bertrand and M. Moonen, "Distributed LCMV beamforming in a wireless sensor network with single-channel per-node signal transmission," IEEE Trans. Signal Process., vol. 61, no. 13, pp. 3447 -- 3459, Jul. 2013. [42] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming, version 2.1," http://cvxr.com/cvx, Mar. 2014. [43] R. Oldenburger, "Infinite powers of matrices and characteristic roots," Duke Mathematical Journal, vol. 6, no. 2, pp. 357 -- 361, 1940.
1903.00784
1
1903
2019-03-02T22:42:33
Neural MMO: A Massively Multiagent Game Environment for Training and Evaluating Intelligent Agents
[ "cs.MA", "cs.LG", "stat.ML" ]
The emergence of complex life on Earth is often attributed to the arms race that ensued from a huge number of organisms all competing for finite resources. We present an artificial intelligence research environment, inspired by the human game genre of MMORPGs (Massively Multiplayer Online Role-Playing Games, a.k.a. MMOs), that aims to simulate this setting in microcosm. As with MMORPGs and the real world alike, our environment is persistent and supports a large and variable number of agents. Our environment is well suited to the study of large-scale multiagent interaction: it requires that agents learn robust combat and navigation policies in the presence of large populations attempting to do the same. Baseline experiments reveal that population size magnifies and incentivizes the development of skillful behaviors and results in agents that outcompete agents trained in smaller populations. We further show that the policies of agents with unshared weights naturally diverge to fill different niches in order to avoid competition.
cs.MA
cs
Neural MMO: A Massively Multiagent Game Environment for Training and Evaluating Intelligent Agents Joseph Suarez Yilun Du Phillip Isola Igor Mordatch 9 1 0 2 r a M 2 ] A M . s c [ 1 v 4 8 7 0 0 . 3 0 9 1 : v i X r a Abstract The emergence of complex life on Earth is of- ten attributed to the arms race that ensued from a huge number of organisms all competing for finite resources. We present an artificial intelligence re- search environment, inspired by the human game genre of MMORPGs (Massively Multiplayer On- line Role-Playing Games, a.k.a. MMOs), that aims to simulate this setting in microcosm. As with MMORPGs and the real world alike, our en- vironment is persistent and supports a large and variable number of agents. Our environment is well suited to the study of large-scale multiagent interaction: it requires that agents learn robust combat and navigation policies in the presence of large populations attempting to do the same. Baseline experiments reveal that population size magnifies and incentivizes the development of skillful behaviors and results in agents that out- compete agents trained in smaller populations. We further show that the policies of agents with unshared weights naturally diverge to fill different niches in order to avoid competition. 1. Introduction Life on Earth can be viewed as a massive multiagent compe- tition. The cheetah evolves an aerodynamic profile in order to catch the gazelle, the gazelle develops springy legs to run even faster: species have evolved ever new capabilities in order to outcompete their adversaries. The success of biological evolution has inspired many attempts at creating "artificial life" in silico. In recent years, the field of deep reinforcement learning (RL) has embraced a related approach: train agents by hav- ing them compete in simulated games (Silver et al., 2016; OpenAI, 2018; Jaderberg et al., 2018). Such games are immediately interpretable and provide easy metrics derived from the game's "score" and win conditions. However, pop- ular game benchmarks typically define a narrow, episodic task with a small fixed number of players. In contrast, life on Earth involves a persistent environment, an unbounded number of players, and a seeming "open-endedness", where ever new and more complex species emerge over time, with no end in sight (Stanley et al., 2017). Our aim is to develop a simulation platform (see Figure 1) that captures important properties of life on Earth, while also borrowing from the interpretability and abstractions of human-designed games. To this end, we turn to the game genre of Massively Multiplayer Online Role-Playing Games (MMORPGs, or MMOs for short). These games involve a large, variable number of players competing to survive and prosper in persistent and far-flung environments. Our platform simulates a "Neural MMO" -- an MMO in which each agent is a neural net that learns to survive using RL. We demonstrate the capabilities of this platform through a series of experiments that investigate emergent complexity as a function of the number of agents and species that com- pete in the simulation. We find that large populations act as competitive pressure that encourages exploration of the environment and the development of skillful behavior. In addition, we find that when agents are organized into species (share policy parameters), each species naturally diverges from the others to occupy its own behavioral niche. Upon publication, we will opensource the platform in full. 2. Background and Related Work Artificial Life and Multiagent Reinforcement Learning Research in "Artificial life" aims to model evolution and natural selection in biological life; (Langton, 1997; Ficici & Pollack, 1998). Such projects often consider open-ended skill learning (Yaeger, 1994) and general morphology evo- lution (Sims, 1994) as primary objectives. Similar problems have recently resurfaced within multiagent reinforcement learning where the continual co-adaptation of agents can introduce additional nonstationarity that is not present in single agent environments. While there have been multiple attempts to formalize the surrounding theory (Hern´andez- Orallo et al., 2011; Strannegrd et al., 2018), we primarily consider environment-driven works. These typically con- sider either complex tasks with 2-10 agents (Bansal et al., 2017; OpenAI, 2018; Jaderberg et al., 2018) or much sim- pler environments with tens to upwards of a million agents Neural MMO Figure 1. Our Neural MMO platform provides a procedural environment generator and visualization tools for value functions, map tile visitation distribution, and agent-agent dependencies of learned policies. Baselines are trained with policy gradients over 100 worlds. (Lowe et al., 2017; Mordatch & Abbeel, 2017; Bansal et al., 2017; Lanctot et al., 2017; Yang et al., 2018a; Zheng et al., 2017; Jaderberg et al., 2018). Most such works further focus on learning a specific dynamic, such as predator-prey Yang et al. (2018b) or are more concerned with the study than the learning of behavior, and use hard-coded rewards Zheng et al. (2017). In contrast, our work focuses on large agent populations in complex environments. Game Platforms for Intelligent Agents The Arcade Learning Environment (ALE) (Bellemare et al., 2013) and Gym Retro (Nichol et al., 2018) provide 1000+ limited scope arcade games most often used to test individual re- search ideas or generality across many games. Better per- formance at a large random subset of games is a reasonable metric of quality. However, recent results have brought into question the overall complexity each individual environment (Cuccu et al., 2018), and strong performance in such tasks is not particularly difficult for humans. More recent work has demonstrated success on multiplayer games including Go (Silver et al., 2016), the Multiplayer On- line Battle Arena (MOBA) game DOTA2 (OpenAI, 2018), and Quake 3 Capture the Flag (Jaderberg et al., 2018). Each of these projects has advanced our understanding of a class of algorithms. However, these games are limited to 2-12 players, are episodic, with game rounds on the order of an hour, lack persistence, and lack the game mechanics sup- porting large persistent populations -- there is still a large gap in environment complexity compared to the real world. Role-playing games (RPGs) such as Pokemon and Final Fantasy, are in-depth experiences designed to engage human players for hundreds of hours of persistent gameplay. Like the real world, problems in RPGs have many valid solutions and choices have long term consequences. MMORPGs are the (massively) multiplayer analogs to RPGs. They are typically run across several persistent servers, each of which contains a copy of the environment and supports hundreds to millions of concurrent players. Good MMOs require increasingly clever, team-driven usage of the game systems: players attain the complex skills and knowledge required for the hardest challenges only through a curriculum of content spanning hundreds of hours of game- play. Such a curriculum is present in many game genres, but only MMOs contextualize it within persistent social and economic structures approaching the scale of the real world. 3. Neural MMO We present a persistent and massively multiagent environ- ment that defines foraging and combat systems over pro- cedurally generated maps. The Supplement provides full Neural MMO Figure 2. Our platform includes an animated 3D client and a toolbox used to produce the visuals in this work. Agents compete for food and water while engaging in strategic combat. See the Neural MMO section for a brief overview and the Supplement for full details. environment details and Figure 2 shows a snapshot. The core features are support for a large and variable number of agents, procedural generation of tile-based terrain, a food and water foraging system, a strategic combat system, and inbuilt visualization tools for analyzing learned policies Agents (players) may join any of several servers (environ- ment instances). Each server contains an automatically gen- erated tile-based environment of configurable size. Some tiles, such as food-bearing forest tiles and grass tiles, are traversable. Others, such as water and solid stone, are not. Upon joining a server, agents spawn at a random location along the edges of the environment. In order remain healthy (maintain their health statistic), agents must obtain food and water -- they die upon reaching reaching 0 health. At each server tick (time step), agents may move one tile and make an attack. Stepping on a forest tile or next to a water tile refills a portion of the agent's food or water supply, respec- tively. However, forest tiles have a limited supply of food; once exhausted, food has a 2.5 percent chance to regenerate each tick. This means that agents must compete for food tiles while periodically refilling their water supply from in- finite water tiles. They may attack each other using any of three attack options, each with different damage values and tradeoffs. Precise foraging and combat mechanics are detailed in the Supplement. Agents observe local game state and decide on an action each game tick. The environment does not make any further assumptions on the source of that decision, be it a neural network or a hardcoded algorithm. We have tested the envi- ronment with up to 100 million agent trajectories (lifetimes) on 100 cores in 1 week. Real and virtual worlds alike are open-ended tasks where complexity arises with little direction. Our environment is designed as such. Instead of rewarding agents for achieving particular objectives op- timize only for survival time: they receive reward rt = 1 for each time step alive. Competition for finite resources mandates that agents must learn intelligent strategies for gathering food and water in order to survive. One purpose of the platform is to discover game mechanics that support complex behavior and agent populations that can learn to make use of them. In human MMOs, developers aim to create balanced mechanics while players aim to max- imize their skill in utilizing them. The initial configurations of our systems are the results of several iterations of balanc- ing, but are by no means fixed: every numeric parameter presented is editable within a simple configuration file. of survival rewards: R(τ ) =(cid:80)T 4. Architecture and Training Agents are controlled by policies parameterized by neural networks. Agents make observations ot of the game state st and follow a policy π(ot) → at in order to make ac- tions at. We maximize a return function R over trajectory τ = (ot, at, rt, ..., oT , aT , rT ). This is a discounted sum t γtrt where γ = 0.99, T is the time at death and the survival reward rt equals 1, as motivated previously. The policy π may be different for each agent or shared. Algorithm 1 shows high level training logic. The Supplement details the tile-based game state st and hyperparameters (Table 1). Neural MMO Figure 3. Maximum population size at train time varies in (16, 32, 64, 128). At test time, we merge the populations learned in pairs of experiments and evaluate lifetimes at a fixed population size. Agents trained in larger populations always perform better. Figure 4. Population size magnifies exploration: agents spread out to avoid competition. Figure 5. Populations count (number of species) magnifies niche formation. Visitation maps are overlaid over the game map; different colors correspond to different species. Training a single population tends to produce a single deep exploration path. Training eight populations results in many shallower paths: populations spread out to avoid competition among species. Neural MMO Algorithm 1 Neural MMO logic for one game tick. See Experiments (Technical details) for spawning logic. The al- gorithm below makes two omissions for simplicity. First, we use multiple policies and sample a policy π ∼ π1, . . . , πN from the set of all policies when spawning a new agent. Second, instead of performing a policy gradient update ev- ery game tick, we maintain experience buffers from each environment and perform an update once all buffers are full. for each environment server do if number of agents alive < spawn cap then spawn an agent end if for each agent do i ← population index of the agent Make observation ot, decide action πi(ot) → at Environment processes at, computes rt, and updates agent health, food, etc. if agent is dead then remove agent end if end for Update environment state st+1 → f (st, at) end for Perform a policy gradient update on policies π ∼ π1, . . . , πN using ot, at, rt from all agents across all environment servers Input We set the observation state ot equal to the crop of tiles within a fixed L1 distance of the current agent. This includes tile terrain types and the select properties (such as health, food, water, and position) of occupying agents. Our choice of ot is an equivalent representation of what a human sees on the screen, but our environment supports other choices as well. Note that computing observations does not require rendering. Output Agents output action choices at for the next time step (game tick). Actions consist of one movement and one attack. Movement options are: North, South, East, West, and Pass (no movement). Attack options are labeled: Melee, Range, and Mage, with each attack option applying a specific preset amount of damage at a preset effective dis- tance. The environment will attempt to execute both actions. Invalid actions, (e.g. moving into stone), are ignored. Our policy architecture preprocesses the local environment by embedding it and flattening it into a single fixed length vector. We then apply a linear layer followed by linear output heads for movement and attack decisions. New types of action choices can be included by adding additional heads. We also train a value function to estimate the discounted return. As agents receive only a stream of reward 1, this is equal to a discounted estimate of the agent's time until death. We use a value function baselines policy gradient loss and optimize with Adam. It was possible to obtain good performance without discounting, but training was less stable. We provide full details in the supplements. 5. Experiments We present an initial series of experiments using our plat- form to explore multiagent interactions in large popula- tions. We find that agent competence scales with population size. In particular, increasing the maximum number of con- current players (Nent) magnifies exploration and increas- ing the maximum number of populations with unshared weights (Npop) magnifies niche formation. Agents poli- cies are sampled uniformly from a number of "populations" π ∼ π1, . . . , πN . Agents in different populations have the same architecture but do not share weights. Technical details We run each experiment using 100 worlds. We define a constant C over the set of worlds W . For each world w ∈ W , we uniformly sample a c ∈ (1, 2, ...C). We define "spawn cap" such that if world w has a spawn cap c, the number of agents in w cannot exceed c. In each world w, one agent is spawned per game tick provided that doing so would exceed the spawn cap c of w. To match standard MMOs, we would fix Nent = Npop (humans are independent networks with unshared weights). However, this incurs sample complexity proportional to number of populations. We therefore share parameters across groups of up to 16 agents for efficiency. 5.1. Server Merge Tournaments We perform four experiments to evaluate the effects on foraging performance of training with larger populations and with a greater number of populations. For each experiment, we fix Npop ∈ (1, 2, 4, 8) and a spawn cap (the maximum number of concurrent agents) c = 16 × Npop, such that c ∈ (16, 32, 64, 128). We train for a fixed number of trajectories per population. Evaluating the influence of these variables is nontrivial. The task difficulty is highly dependent on the size and com- petence of populations in the environment: mean agent lifetime is not comparable across experiments. Furthermore, there is no standard procedure among MMOs for evaluating relative player competence across multiple servers. How- ever, MMO servers sometimes undergo merges whereby the player bases from multiple servers are placed within a single server. As such, we propose tournament style evaluation in order to directly compare policies learned in different experiment settings. Tournaments are formed by simply concatenating the player bases of each experiment. Figure 3 shows results: we vary the maximum number of agents at test time and find that agents trained in larger settings consistently outperform agents trained in smaller settings. Neural MMO We observe more interesting policies once we introduce the combat module as an additional learnable mode of vari- ation on top of foraging. With combat, agent actions be- come strongly coupled with the states of other agents. As a sanity check, we also confirm that all of the populations trained with combat handily outperform all of the popula- tions trained with only foraging, when these populations compete in a tournament with combat enabled. To better understand theses results, we decouple our anal- ysis into two modes of variability: maximum number of concurrent players (Nent) and maximum number of pop- ulations with unshared weights (Npop). This allows us to examine the effects of each factor independently. In order to isolate the effects of environment randomization, which also encourages exploration, we perform these experiments on a fixed map. Isolating the effects of these variables pro- duces more immediately obvious results, discussed in the following two subsections: 5.2. Nent: Multiagent Magnifies Exploration In the natural world, competition between animals can in- centivize them to spread out in order to avoid conflict. We observe that overall exploration (map coverage) increases as the number of concurrent agents increases (see Figure 4; the map used is shown in Figure 5). Agents learn to explore only because the presence of other agents provides a natural incentive for doing so. 5.3. Npop: Multiagent Magnifies Niche Formation We find that, given a sufficiently large and resource-rich en- vironment, different populations of agents tend to separate to avoid competing with other populations. Both MMOs and the real world often reward masters of a single craft more than jacks of all trades. From Figure 5, specialization to particular regions of the map increases as number of pop- ulations increases. This suggests that the presence of other populations force agents to discover a single advantageous skill or trick. That is, increasing the number of populations results in diversification to separable regions of the map. As entities cannot out-compete other agents of their own population (i.e. agent's with whom they share weights), they tend to seek areas of the map that contain enough resources to sustain their population. 5.4. Environment Randomized Exploration The trend of increasing exploration with increasing entity number is clear when training on a single map as seen in Figure 4, 5, but it is more subtle with environment ran- domization. From Figure 6, all population sizes explore adequately. It is likely that "exploration" as defined by map coverage is not as difficult a problem, in our environment, as developing robust policies. As demonstrated by the Tourna- ment experiments, smaller populations learn brittle policies that do not generalize to scenarios with more competitive pressure -- even against a similar number of agents. 5.5. Agent-Agent Dependencies We visualize agent-agent dependencies in Figure 7. We fix an agent at the center of a hypothetical map crop. For each position visible to that agent, we show what the value func- tion would be if there were a second agent at that position. We find that agents learn policies dependent on those of other agents, in both the foraging and combat environments. 6. Discussion 6.1. Multiagent competition is a curriculum magnifier Not all games are created equal. Some produce more com- plex and engaging play than others. It is unreasonable to expect pure multiagent competition to produce diverse and interesting behavior if the environment does not support it. This is because multiagent competition is a curriculum magnifier, not a curriculum in and of itself. The initial conditions for formation of intelligent life are of paramount importance. Jungle climates produce more biodiversity than deserts. Deserts produce more biodiversity than the tallest mountain peaks. To current knowledge, Earth is the only planet to produce life at all. The same holds true in sim- ulation: human MMOs mirror this phenomenon. Those most successful garner large and dedicated player bases and develop into complex ecosystems. The multiagent setting is interesting because learning is responsive to the competitive and collaborative pressures of other learning agents -- but the environment must support and facilitate such pressures in order for multiagent interaction to drive complexity. There is room for debate as to the theoretical simplest pos- sible seed environment required to produce complexity on par with that of the real world. However, this is not our objective. We have chosen to model our environment after MMOs, even though they may be more complicated than the minimum required environment class, because they are known to support the types of interactions we are interested in while maintaining engineering and implementation feasi- bility. This is not true of any other class environments we are aware of: exact physical simulations are computationally in- feasible, and previously studied genres of human games lack crucial elements of complexity (see Background). While some may see our efforts as cherrypicking environment design, we believe this is precisely the objective: the pri- mary goal of game development is to create complex and engaging play at the level of human intelligence. The player base then uses these design decisions to create strategies far beyond the imagination of the developers. Neural MMO Figure 6. Exploration maps in the environment randomized settings. From left to right: population size 8, 32, 128. All populations explore well, but larger populations with more species develop robust and efficient policies that do better in tournaments. Figure 7. Agents learn to depend on other agents. Each square map shows the response of an agent of a particular species, located at the square's center, to the presence of agents at any tile around it. Random: dependence map of random policies. Early: "bulls eye" avoidance maps learned after only a few minutes of training. Additional maps correspond to foraging and combat policies learned with automatic targeting (as in tournament results) and learned targeting (experimental, discussed in Additional Insights). In the learned targeting setting, agents begin to fixate on the presence of other agents within combat range, as denoted by the central square patterns. Figure 8. Attack maps and niche formation quirks. Left: combat maps from automatic and learned targeting. The left two columns in each figure are random. Agents with automatic targeting learn to make effective use of melee combat (denoted by higher red density). Right: noisy niche formation maps learned in different combat settings with mixed incentives to engage in combat. Neural MMO 6.2. Additional Insights We briefly detail several miscellaneous points of interest in Figure 8. First, we visualize learned attack patterns of agents. Each time an agent attacks, we splat the attack type to the screen. There are a few valid strategies as per the environment. Melee is intentionally overpowered, as a sanity check. This cautions agents to keep their distance, as the first to strike wins. We find that this behavior is learned from observation of the policies learned in Figure 8. Second, a note on tournaments. We equate number of tra- jectories trained upon as a fairest possible metric of training progress. We experimented with normalizing batch size but found that larger batch size always leads to more stable performance. Batch size is held constant, but experience is split among species. This means that experiments with more species have smaller effective batch size: larger populations outperform smaller populations even though the latter are easier to train. Finally, a quick note on niche formation. Obtaining clean visuals is dependent on having an environment where inter- action with other agents is unfavorable. While we ensure this is the case for our exploration metrics, niche formation may also occur elsewhere, such as in the space of effective combat policies. For this reason, we expect our environment to be well suited to methods that encourage sample diversity such as population-based training (Jaderberg et al., 2017). 7. Future Work Our final set of experiments prescribes targeting to the agent with lowest health. Learned targeting was not required to produce compelling policies: agents instead learn effective attack style selection, strafing and engaging opportunisti- cally at the edge of their attack radius. Another possible experiment is to jointly learn attack style selection and tar- geting. This would require an attentional mechanism to handle the variable number of visible targets. We performed only preliminary experiments with such an architecture, but we still mention them here because even noisy learned tar- geting policies significantly alter agent-agent dependence maps. As shown in Figure 7, the small square shaped re- gions of high value at the center of the dependency maps correspond to the ranges of different attack styles. These appear responsive to the current combat policies of other learning agents. We believe that the learned targeting setting is likely to useful for investigating the effects of concurrent learning in large populations. 8. Conclusion We have presented a neural MMO as a research platform for multiagent learning. Our environment supports a large number of concurrent agents, inbuilt map randomization, and detailed foraging and combat systems. The included baseline experiments demonstrate our platform's capacity for research purposes. We find that population size magni- fies exploration in our setting, and the number of distinct species magnifies niche formation. It is our hope that our environment provides an effective venue for multiagent ex- periments, including studies of niche formation, emergent cooperation, and coevolution. The entire platform will be open sourced, including a performant 3D client and research visualization toolbox. Full technical details of the platform are available in the Supplement. Acknowledgements This research was undertaken in fulfillment of an intern- ship at OpenAI. Thank you to Clare Zhu for substantial contributions to the 3D client code. References Bahdanau, D., Cho, K., and Bengio, Y. Neural machine translation by jointly learning to align and translate. CoRR, abs/1409.0473, 2014. URL http://arxiv. org/abs/1409.0473. Bansal, T., Pachocki, J., Sidor, S., Sutskever, I., and Mor- datch, I. Emergent complexity via multi-agent competi- tion. arXiv preprint arXiv:1710.03748, 2017. Bellemare, M. G., Naddaf, Y., Veness, J., and Bowling, M. The arcade learning environment: An evaluation plat- form for general agents. Journal of Artificial Intelligence Research, 47:253 -- 279, 2013. Brockman, G., Cheung, V., Pettersson, L., Schneider, J., Schulman, J., Tang, J., and Zaremba, W. Openai gym. CoRR, abs/1606.01540, 2016. URL http://arxiv. org/abs/1606.01540. Cuccu, G., Togelius, J., and Cudre-Mauroux, P. Playing atari with six neurons. arXiv preprint arXiv:1806.01363, 2018. Ficici, S. G. and Pollack, J. B. Challenges in coevolution- ary learning: Arms-race dynamics, open-endedness, and mediocre stable states. In Proceedings of the sixth inter- national conference on Artificial life, pp. 238 -- 247. MIT Press, 1998. Hern´andez-Orallo, J., Dowe, D. L., Espana-Cubillo, S., Hern´andez-Lloreda, M. V., and Insa-Cabrera, J. On more realistic environment distributions for defining, evaluat- ing and developing intelligence. In International Con- ference on Artificial General Intelligence, pp. 82 -- 91. Springer, 2011. Neural MMO Williams, R. J. Simple statistical gradient-following algo- rithms for connectionist reinforcement learning. Machine learning, 8(3-4):229 -- 256, 1992. Yaeger, L. Computational genetics, physiology, metabolism, neural systems, learning, vision, and behavior or poly In SANTA FE INSTI- world: Life in a new context. TUTE STUDIES IN THE SCIENCES OF COMPLEXITY- PROCEEDINGS VOLUME-, volume 17, pp. 263 -- 263. ADDISON-WESLEY PUBLISHING CO, 1994. Yang, Y., Luo, R., Li, M., Zhou, M., Zhang, W., and Wang, J. Mean field multi-agent reinforcement learning. arXiv preprint arXiv:1802.05438, 2018a. Yang, Y., Yu, L., Bai, Y., Wen, Y., Zhang, W., and Wang, J. A study of ai population dynamics with million-agent reinforcement learning. In Proceedings of the 17th Inter- national Conference on Autonomous Agents and MultiA- gent Systems, pp. 2133 -- 2135. International Foundation for Autonomous Agents and Multiagent Systems, 2018b. Zheng, L., Yang, J., Cai, H., Zhang, W., Wang, J., and Yu, Y. Magent: A many-agent reinforcement learning plat- form for artificial collective intelligence. arXiv preprint arXiv:1712.00600, 2017. Jaderberg, M., Dalibard, V., Osindero, S., Czarnecki, W. M., Donahue, J., Razavi, A., Vinyals, O., Green, T., Dunning, I., Simonyan, K., et al. Population based training of neural networks. arXiv preprint arXiv:1711.09846, 2017. Jaderberg, M., Czarnecki, W. M., Dunning, I., Marris, L., Lever, G., Castaneda, A. G., Beattie, C., Rabinowitz, N. C., Morcos, A. S., Ruderman, A., et al. Human- level performance in first-person multiplayer games with population-based deep reinforcement learning. arXiv preprint arXiv:1807.01281, 2018. Lanctot, M., Zambaldi, V., Gruslys, A., Lazaridou, A., Per- olat, J., Silver, D., Graepel, T., et al. A unified game- theoretic approach to multiagent reinforcement learning. In Advances in Neural Information Processing Systems, pp. 4190 -- 4203, 2017. Langton, C. G. Artificial life: An overview. Mit Press, 1997. Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, P., and Mor- datch, I. Multi-agent actor-critic for mixed cooperative- competitive environments. Neural Information Process- ing Systems (NIPS), 2017. Mordatch, I. and Abbeel, P. Emergence of grounded com- positional language in multi-agent populations. arXiv preprint arXiv:1703.04908, 2017. Nichol, A., Pfau, V., Hesse, C., Klimov, O., and Schulman, J. Gotta learn fast: A new benchmark for generalization in rl. arXiv preprint arXiv:1804.03720, 2018. OpenAI. Openai five. https://blog.openai.com/ openai-five/, 2018. Perlin, K. An image synthesizer. SIGGRAPH Com- ISSN 0097- doi: 10.1145/325165.325247. URL http: put. Graph., 19(3):287 -- 296, July 1985. 8930. //doi.acm.org/10.1145/325165.325247. Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L., Van Den Driessche, G., Schrittwieser, J., Antonoglou, I., Panneershelvam, V., Lanctot, M., et al. Mastering the game of go with deep neural networks and tree search. nature, 529(7587):484, 2016. Sims, K. Evolving 3d morphology and behavior by compe- tition. Artificial life, 1(4):353 -- 372, 1994. Stanley, K. O., Lehman, J., and Soros, L. Open- endedness: The last grand challenge youve never heard of. https://www.oreilly.com/ideas/ open-endedness-the-last-grand-challenge-youve-never-heard-of, 2017. Accessed: 2017-09-26. Strannegrd, C., Svangrd, N., Lindstrm, D., Bach, J., and Steunebrink, B. Learning and decision-making in artifi- cial animals. Journal of Artificial General Intelligence, 9: 55 -- 82, 07 2018. doi: 10.2478/jagi-2018-0002. Neural MMO Supplement Figure 9. Procedural 80X80 game maps Figure 10. Example Agent Environment The environment state is represented by a grid of tiles. We generate the game map by thresholding a Perlin (Perlin, 1985) ridge fractal, as shown in Figure 9. Each tile has a particular assigned material with various properties, but it also maintains a set of references to all occupying enti- ties. When agents observe their local environment, they are handed a crop of all visible game tiles, including all visible properties of the tile material and all visible properties of oc- cupying agents. All parameters in the following subsystems are configurable; we provide only sane defaults obtained via multiple iterations of balancing. Tiles We adopt a tile based game state, which is common among MMOs. This design choice is computationally efficient for neural agents and can be made natural for human players via animation smoothing. When there is no need to render the game client, as in during training or test time statistical tests, the environment can be run with no limit on server tick rate. Game tiles are as follows: • Grass: Passable tile with no special properties • Forest: Passable tile containing food. Upon moving into a food tile, the agent gains 5 food and the tile decays into a scrub. • Scrub: Passable tile that has a 2.5 percent probability to regenerate into a forest tile on each subsequent tick • Stone: Impassible tile with no special properties • Water: Passable tile containing water. Upon moving adjacent to a water tile, the agent gains 5 water. • Lava: Passable tile that kills the agent upon contact Agents Input: On each game tick, agents (Figure 10) observe a 15x15 square crop of surrounding game tiles and all occupy- ing agents. We extract the following observable properties: Per-tile properties: • Material: an index corresponding to the tile type • nEnts: The number of occupying entities. This is technically learnable from the list of agents, but this may not be true for all architectures. We include it for convenience here, but may deprecate it in the future. Per-agent properties: • Lifetime: Number of game ticks alive thus far • Health: Agents die at 0 health (hp) • Food: Agents begin taking damage at 0 food or water • Water: Agents begin taking damage at 0 food or water • Position: Row and column of the agent • Position Deltas: Offsets from the agent to the observer • Damage: Most recent amount of damage taken • Same Color: Whether the agent is the same color (and thereby is in the same population) as the observer • Freeze: Whether the agent is frozen in place as a result of having been hit by a mage attack Output: Agents submit one movement and one attack ac- tion request per server tick. The server ignores any actions that are not possible or permissible to fulfil, such as attack- ing an agent that is already dead or attempting to move into stone. Pass corresponds to no movement. Movement: North Attack: Melee Range Mage East West Pass South Neural MMO Figure 11. Example foraging behavior Foraging Foraging (Figure 11) implements gathering based survival: • Food: Agents begin with 32 food, decremented by 1 per tick. Agents may regain food by occupying forest tiles or by making use of the combat system. • Water: Agents begin with 32 water, decremented by 1 per tick. Agents may regain water by occupying tiles adjacent to water or making use of the combat system. • Health: Agents begin with 10 health. If the agent hits 0 food, they lose 1 health per tick. If the agent hits 0 water, they lose 1 health per tick. These effects stack. Figure 12. Example combat behavior aggressive agents can use mage combat to immobilize their target before closing in for the kill. In all cases, the best strategy is not obvious, again imposing an arms race. Technical details: • Attack range is defined by l1 distance: "1 range" is a 3X3 grid centered on the attacker. • Spawn Killing Agents are immune during their first 15 game ticks alive. This prevents an exploit known as "spawn killing" whereby players are repeatedly at- tacked immediately upon entering the game. Human games often contain similar mechanism to prevent this strategy, as it results in uninteresting play. The limited availability of forest (food) tiles produces a carrying capacity. This incurs an arms race of exploration strategies: survival is trivial with a single agent, but it re- quires intelligent exploration in the presence of competing agents attempting to do the same. Combat Combat (Figure 12) enables direct agent-agent confrontation by implementing three different attack "styles": • Melee: Inflicts 10 damage at 1 range • Ranged: Inflicts 2 damage at 1-2 range • Mage: Inflicts 1 damage at 1-3 range and freezes the target in place, preventing movement for two ticks Each point of damage inflicted steals one point of food and water from the target and returns it to the attacker. This serves as an incentive to engage in combat. It is still fully possible for agents to develop primarily foraging based strategies, but they must at least be able to defend them- selves. The combat styles defined impose clear but difficult to optimize trade offs. Melee combat fells the target in one attack, but only if they are able to make their attack before the opponent retaliates in kind. Ranged combat produces less risky but more prolonged conflicts. Mage combat does little damage but immobilizes the target, which allows the attacker to retreat in favor of a foraging based strategy. More API The initial release is bundled with two APIs for running experiments on our platform. All of our experiments are RL based, but the API implementation is intentionally generic. Evolutionary methods and algorithmic baselines should work without modification. Gym Wrapper We provide a minimal extension of the Gym VecEnv API (Brockman et al., 2016) that adds support for variable numbers of agents per world and at any given time. This API distributes environment computation of ob- servations and centralizes training and inference. While this standardization is convenient, MMOs differ significantly from arcade games, which are easier to standardize under a single wrapper. The Neural MMO setting requires support for a large, variable number of agents that run concurrently, with aggregation across many randomly generated environ- ments. The Gym API incurs additional communications overhead that the native API bypasses. Native This is the simplest and most efficient interface. It pins the environment and agents on it to the same CPU core. Full trajectories run locally on the same core as the environment. Interprocess communication is only required infrequently to synchronize gradients across all environ- ments on a master core. We currently do the backwards pass on the same CPU cores because our networks are small, but GPU is fully supported. Neural MMO Client The environment visualizer comes bundled with research tools for analyzing agent policies. In the initial release, we provide both a 2D python client (Figure 13) and a 3D web client (Figure 14, 16). The 3D client has the best support for visualizing agent policies. The 2D client is already deprecated; we include it only because it will likely take a few weeks to fully finish porting all of the research tools. We include visualization tools for producing the following visualization maps; additional documentation is available on the project Github: • Value ghosting • Exploration • Interagent dependence • Combat Policy training and architecture Parameters relevant to policy training are listed in Table 1. The neural net architecture, shown in Figure 15, is a simplest possible fully connected network. It consists of a preproces- sor, main network, and output heads. The preprocessor is as follows: • Embed indicies corresponding to each tile into a 7D vector. Also concatenates with the number of occupy- ing entities. • Flatten the tile embeddings • Project visible attributes of nearby entities to 32D • Max pool over entity embeddings to handle variable number of observations • Concatenate the tile embeddings with the pooled entity embeddings • Return the resultant embedding Figure 13. Example map in the 2D client The main network is a single linear layer. The output heads are also each linear layers; they map the output hidden vector from the main network to the movement and combat action spaces, respectively. Separate softmaxes are used to sample movement and combat actions. Technical details • For foraging experiments, the attack network is still present for convenience, but the chosen actions are ignored. • Note that 1D max pooling is used to handle the variable number of visible entities. Attention (Bahdanau et al., 2014) may appear the more conventional approach, but recently (OpenAI, 2018) demonstrated that simpler and more efficient max pooling may suffice. We are unsure if this is true at our scale, but used max pooling nonetheless for simplicity. Figure 14. Example overhead map view in the 3D client Neural MMO Figure 15. Agents observe their local environment. The model embeds this observations and computes actions via corresponding value, movement, and attack heads. These are all small fully connected networks with 50-100k parameters. Training Algorithm Policy Gradients(Williams, 1992) Adam Parameters Parameter Weight Decay Entropy Bonus Discount Factor Table 1. Training details and parameters for all experiments Value lr=1e-3 1e-5 1e-2 0.99 Notes + Value function baseline Pytorch Defaults Training stability is sensitive to this To stabilize training; possibly redundant No additional trajectory postprocessing Figure 16. Perspective screenshot of 3D environment
1905.08041
1
1905
2019-04-10T09:33:03
Inventory Management - A Case Study with NetLogo
[ "cs.MA" ]
Multi-Agent Systems (MAS) have been applied to several areas or tasks ranging from energy networks controlling to robot soccer teams. MAS are the ideal solution when they provide decision support in situations where human decision and actions are not feasible to operate the system in control and in real-time. Thus, we present a case study that is related to dynamic simulation of an automatic inventory management system. We provide two types of agents, the clients, and the seller agents. Through a system of communication, the agents exchange messages to fulfill their inventory needs. The client agents trade products in quantities according to their needs and rely on seller agents if other clients in the retailer chain cannot provide the needed items. Additionally, it is expected that the trading between a client and the sellers is done through a reverted type of auction. This case study MAS uses BDI and FIPA-ACL in its implementation resulting in a clear simulation of the system. We expect to provide a comparison between two distinct situations. One with only external transactions with providers, and a situation where both internal and external transactions are allowed.
cs.MA
cs
INVENTORY MANAGEMENT - A CASE STUDY WITH NETLOGO Rui Portocarrero Sarmento PRODEI - Faculty of Engineering, University of Porto Rua Dr. Roberto Frias, s/n 4200-465 Porto, Portugal [email protected] May 21, 2019 ABSTRACT Multi-Agent Systems (MAS) have been applied to several areas or tasks ranging from energy net- works controlling to robot soccer teams. MAS are the ideal solution when they provide decision support in situations where human decision and actions are not feasible to operate the system in control and in real-time. Thus, we present a case study that is related to dynamic simulation of an automatic inventory management system. We provide two types of agents, the clients, and the seller agents. Through a system of communication, the agents exchange messages to fulfill their inventory needs. The client agents trade products in quantities according to their needs and rely on seller agents if other clients in the retailer chain cannot provide the needed items. Additionally, it is expected that the trading between a client and the sellers is done through a reverted type of auction. This case study MAS uses BDI and FIPA-ACL in its implementation resulting in a clear simulation of the system. We expect to provide a comparison between two distinct situations. One first situation where there are no transactions between retail stores and only external transactions with providers and other situation where both internal and external transactions are allowed. Keywords MAS · Inventory Management · BDI · FIPA-ACL 1 Introduction We are aware of small size retail chains where the store's managers execute stocks management of several stores but in a manual fashion, not automatically. The stores also have to communicate with the providers when in need of inventory. The manager also does this manually and doesn't use any auction to acquire products. One of the contributions of this work is to establish automatic inventory control for the manager. We wish to provide electronic communication of items needs between supermarket agents. Each supermarket agent communicates with other supermarkets to check if they have an excess of some particular item in stock. Thus, if another agent has excess stock, it can provide the item to the chain agent in need of stock, lowering the costs with external providers and also the costs of item storage. Moreover, we want the retail chain stores to establish communication with external providers that might automatically provide the best price from the provider. For this, we wish to create a reverse auction with providers. Some ad hoc multi-agent systems are often created by researchers and developers without using frameworks. Nonethe- less, some frameworks have arisen recently, and these frameworks implement common standards. Some of these stan- dards like, for example, the FIPA agent system platforms and communication languages, have an important role for the framework user. These frameworks save developers time and also aid in the standardization of MAS development. Relevant surveys were previously written and provide insight over several frameworks available [13, 1]. Another contribution of this work is to provide a contextualization of a hypothetical NetLogo user. BDI and FIPA-ACL are standards that provide a more structured way to program MAS, and this is now possible with NetLogo. Thus, by providing additional knowledge of the NetLogo features the user is empowered to do a better and more professional MAY 21, 2019 work with NetLogo. Additionally, the provided inventory management case study is done by applying introduced concepts in NetLogo. Therefore, there is needed contextualization. Introducing this work structure, we start by providing contextualization in 2. Thus, we provide significant related work in this area. Then, we describe our case study in 3. In 5, we exhibit results obtained from the simulation of the MAS system built and described in 3. In 6 we provide a discussion of the results we gathered from the simulations. Finally, we conclude our work, and we also provide some insight into future developments of this work in 7. 2 Related Work In this section, we provide several milestones and previous work on the subject of MAS for inventory management and also the NetLogo framework. Thus, we introduce the earlier work on this concept and also the relevant features of NetLogo that will provide a solution for the development of a simulation scenario. 2.1 Inventory Management In [21], Signorile emphasizes that "the dynamics of the enterprise and the market make the inventory management difficult: materials do not arrive on time, production facilities fail, and employees are ill, causing deviations from the plans. In some cases, these events may be dealt with locally". In particular, Signorile demonstrated that agents "can be used to control an important part of the supply chain, the inventory of a retail store. In fact, the agent model outperforms the current EOQ (Economic order quantity) model" that the retail institution where the case study took place, is using (2002). In [22], Signorile expands their previous work and their decision support system to the inventory system (excluding supply chain activities) for a medium-sized department store in the United States (2005). In [10], Jiang and Sheng approach this problem in a supply chain with non-stationary customer demand. They use MAS with reinforcement learning proved experimentally to be effective (2009). In [5], Boudouda and Boufaida mention that "the agent-based model proposed consists of a set of subsystems agent, each subsystem is an actor in the SC (Supply Chain); these subsystems are grouped into several levels. They seek to coordinate and synchronize different activities. Each subsystem is structured by three cognitive agents (Purchaser Agent, manager stock agent and delivery agent), these agents interact with each other to accomplish their tasks and can communicate, negotiate and collaborate with other subsystems through a communication interface. Two types of interaction between subsystems are defined: internal interaction for the actors belonging to the same level, the second type external can occur between subsystems of different levels..". Additionally, the authors stress that their model "provides a collaboration and negotiation between different actors in the supply chain. It does not replace existing tools and strategies for the SC, but it can be used as a supplement which improves it" (2012). 2.2 NetLogo NetLogo is a platform independent environment used for modelization of social and natural phenomena as multi-agent systems. It provides means to simulate with a great number of agents. The NetLogo platform was developed by Uri Wilensky in 1999 and is under continuous development at the Northwestern's Center for Connected Learning and Computer-Based Modeling (CCL). The CCL is a research group headed by Prof. Uri Wilensky. The center includes staff and students at Northwest- ern working together and in association with researchers from around the world. The group includes educational researchers, curriculum developers, software engineers, and model builders. The center is funded by Northwestern, the USA National Science Foundation, and a few commercial sponsors. Using the NetLogo language, students and researchers have constructed large numbers of models of complex phe- nomena in the natural and social worlds. The Models Library that comes with NetLogo covers phenomena in biology [9, 23], chemistry [8, 11], informatics [4], economics [3], sports [12], sociology [24, 14, 2, 6], medicine [20, 7] and a variety of other domains. Although the NetLogo platform offers support for reactive agent systems, modeling BDI agents and explicit symbolic message exchange is not supported. Sakellariou et al. [17, 18, 19] have extended NetLogo with libraries to support both and used it for setting coursework in an Intelligent Agents unit. According to Sakellariou et al. [18], in the context of an Agent and Multi-Agent Systems course, the student's demands poses an interesting problem regarding practice procedures. Educators have reported a variety of environments and 2 MAY 21, 2019 techniques they use to increase active learning. The authors report their experience using NetLogo as part of the prac- tical coursework that students need to carry out within an Intelligent Agents course. Also, Sakellariou et al. describe two extra NetLogo libraries provided to students, one for BDI-like agents and one for ACL-like communication. Sakellariou et al., describe the two additional NetLogo libraries with more detail than previously in [17]. One for BDI-like agents and one for ACL-like communication that, according to the authors, provide effortless development of goal-oriented agents, that communicate using FIPA-ACL messages. The authors include one simulation scenario that employs these libraries to provide an implementation in which agents cooperate under a Contract Net protocol. 2.2.1 BDI The BDI library for NetLogo provides several NetLogo reports and procedures to implement belief -- desire -- intention software model. The library is built using the standard programming language provided by NetLogo. The only requirements by the authors of the library are that [15]: 1. ALL complex agents MUST have two declared -own variables:"beliefs" and "intentions". These are the variables to which beliefs and intentions are recorded. So, in the users model if there is a breed of agents which you wish to model as "BDI" agents, then the user should have a BREED-own [beliefs intentions] declaration (along with any other variables the user wishes to include in his model). The authors also stress that when the user creates the variables, they should initially set their values to empty a list ([ ]). 2. The users also must have ticks in his model or timeout facilities of the library will not function. 3. The user's model and interface should include a "switch" in the interface, named "show-intentions". This is necessary since the code of the receive message procedure checks in each cycle whether to output the messages or not. In this section, we introduce and explain the most prevalent and essential code to understand other tasks described in this paper. A belief in the library is a list of two elements: the type and the content [15]. could include any string, e.g. "position", "agent", etc. Types facilitate belief management. • The belief type declares the type of the belief, i.e., indicates a "class" that the belief belongs to. Examples • The belief content is the content of a certain type of belief. It can be any NetLogo structure (integer, string, list, etc.). The authors emphasize that there might be many beliefs of the same type with different content. However, two beliefs of the same type and content cannot be added. The following code creates a new belief. (does not stores it in beliefs memory): 1 to−r e p o r t 2 r e p o r t 3 end c r e a t e −b e l i e f ( l i s t b−t y p e [ b−t y p e c o n t e n t ) c o n t e n t ] To enable adding information to the beliefs structure, the following code is provided by the library: 1 t o add−b e l i e f 2 3 4 end [ b e l ] i f member ? b e l b e l i e f s s e t b e l i e f s f p u t b e l b e l i e f s [ s t o p ] To be possible to remove a belief from the list of beliefs the authors provided the following code: 1 t o remove−b e l i e f 2 3 end s e t b e l i e f s [ b e l ] remove b e l b e l i e f s To update the information of some particular belief, the following code was created by the authors: 1 t o update−b e l i e f remove−b e l i e f 2 add−b e l i e f b e l 3 4 end [ b e l ] read−f i r s t −b e l i e f −of−t y p e b e l i e f −t y p e b e l 3 Regarding intentions, several pieces of code were developed by the authors to provide an abstraction for a BDI-like implementation of MAS in NetLogo. The following code provides the execution of an agent intention: MAY 21, 2019 [ myInt ] 1 t o e x e c u t e−i n t e n t i o n s 2 ; ; ; l o c a l s ; ; 3 i f empty ? i n t e n t i o n s l e t myInt get−i n t e n t i o n 4 run i n t e n t i o n −name myInt 5 6 i f 7 i f 8 end r u n r e s u l t show−i n t e n t i o n s [ s e t f i r s t [ s t o p ] i n t e n t i o n s i n t e n t i o n −done myInt [ remove−i n t e n t i o n myInt ] l a b e l i n t e n t i o n s ] ; ; J u s t f o r debugging . As implemented by the authors, the intentions are stored in a STACK of intentions. The first argument is the intention name that should be some executable procedure the library user encodes in NetLogo. The second argument should be a NetLogo REPORTER that when evaluates to true, the intention is removed (either accomplished or dropped). As the authors designed the library, both values have to be STRINGS. Thus, the following code adds an intention in the intentions list: 1 t o add−i n t e n t i o n [ name done ] 2 3 end i n t e n t i o n s f p u t s e t ( l i s t name done ) i n t e n t i o n s Finally, for the removal of a specific intention from the intention stack, we have the following code: 1 t o remove−i n t e n t i o n [ bdi−l i b ## i n t e n t i o n ] 2 3 end i n t e n t i o n s s e t remove−i t e m ( p o s i t i o n bdi−l i b ## i n t e n t i o n i n t e n t i o n s ) i n t e n t i o n s 2.2.2 FIPA-ACL This library for NetLogo implements FIPA-ACL like messages in NetLogo [16]. In this section, we introduce and explain the most common and important code to understand other tasks described in this paper. The library authors have some requirements for the user of the library in NetLogo: 1. All agents that can communicate MUST have a declared -own variable incoming-queue. This is the variable to which all messages are recorded. So, in the user's model, if there is a breed of agents which the user desires to communicate, then the user should have a BREED-own [incoming-queue] declaration (along with any other variables that the user wishes to include in his model. The authors stress that when the user creates the variables, he should set its values to an empty list ([ ]). 2. The user's model should include a "switch" named "show-messages" in the interface. The authors explain this is necessary since the code of the received message checks in each cycle whether to output the messages or not. The code to enable sending of messages provides the definition of the sender and a receiver(s). In agents simulation, some issues might arise from communications like, for example, if the agent that should receive the message is "killed". One solution to this problem is nothing happens. Other solution could yield an error message. An alternative would be to create a safe send. The following code implements the author solution [16]: r e c i p i e n t s get−r e c e i v e r s msg r e c v 0 l e t l e t f o r e a c h r e c i p i e n t s [ 1 t o send [ msg ] 2 3 4 5 6 s e t i f s t r i n g i s 7 ] 8 end r e c v t u r t l e r e c v != nobody [ w i t h o u t−i n t e r r u p t i o n [ ask r e c v [ r e c e i v e msg ] ] ] ( read−from−s t r i n g ? ) ; ; read−from− r e q u i r e d t o c o n v e r t t h e s t r i n g t o number Message reception deals with updating incoming-queue: 4 MAY 21, 2019 [ msg ] 1 t o r e c e i v e 2 3 4 end i f s e t show messages incoming−queue l p u t msg incoming−queue [ show msg ] The following NetLogo reporter returns the next message in the list and removes it from the queue: 1 to−r e p o r t get−message 2 3 4 5 6 end i f empty ? incoming−queue [ r e p o r t " no message " ] l e t nextmsg f i r s t remove−msg r e p o r t nextmsg incoming−queue The following code represents an explicit remove-msg procedure. This is needed since reporters in NetLogo cannot change a variable's value: 1 t o remove−msg 2 3 end s e t incoming−queue but− f i r s t incoming−queue To enable broadcasting to all agents of breed of type t-breed, the following code was provided by the library authors: a g e n t s o f b r e e d t−b r e e d t−b r e e d [ i f e l s e ? = a g e n t f o r e a c h [ who ] o f 1 ; ; b r o a d c a s t i n g t o a l l 2 t o b r o a d c a s t −t o [ t−b r e e d msg a g e n t ] 3 4 5 6 7 8 9 ] 10 end ; ; ; do n o t h i n g ] [ send add−r e c e i v e r ? msg [ ] NOTE: We introduced the exclusion of the agent that broadcasts the message since, as we will see later in this docu- ment, in the case of a client broadcasting to other clients we were not interested that the client agent emitted messages to himself. To create Messages and add the sender, the following reporter code is essential: 1 to−r e p o r t 2 3 end r e p o r t c r e a t e −message [ p e r f o r m a t i v e ] ( l i s t p e r f o r m a t i v e ( word " s e n d e r : " who ) ) Finally, to provide means to add fields to a message the following pieces of code were created by the authors: [ s e n d e r msg ] s e n d e r t o a message . add a r e c e i v e r r e p o r t add msg " s e n d e r : " r e p o r t add msg " r e c e i v e r : " 1 ; ; ; ADDING FIELDS TO A MESSAGE 2 ; ; Adding a s e n d e r 3 to−r e p o r t add−s e n d e r 4 5 end 6 7 ; ; 8 to−r e p o r t add−r e c e i v e r 9 10 end 11 12 ; ; 13 to−r e p o r t add−m u l t i p l e −r e c e i v e r s 14 15 16 17 18 19 end 20 s e t msg add−r e c e i v e r ? msg f o r e a c h r e c e i v e r s [ ] r e p o r t msg a d d i n g m u l t i p l e r e c i p i e n t s [ r e c e i v e r msg ] r e c e i v e r [ r e c e i v e r s msg ] 5 MAY 21, 2019 [ c o n t e n t msg ] c o n t e n t t o a message r e p o r t add msg " c o n t e n t : " 21 ; ; Adding c o n t e n t 22 to−r e p o r t add−c o n t e n t 23 24 end 25 26 ; ; P r i m i t i v e Add command 27 to−r e p o r t add [ msg f i e l d v a l u e ] 28 29 30 31 end f i e l d = " c o n t e n t : " l p u t v a l u e l p u t i f e l s e [ r e p o r t [ r e p o r t l p u t f i e l d msg ] ( word f i e l d v a l u e ) msg ] We should stress that the previous code also provides means to add a primitive associated with the message. This, simultaneously with the other pieces of code provided by the authors, enables a FIPA-ACL like structure for our messages between agents. 3 Case Study We carried several experiments with the work of Sakellariou et al. [17, 18, 19]. We established a simulation environ- ment with the following characteristics 1: 1. Client Agents (retailer group agents) in their fixed locations and with an item database with the following information for each item (a) current item quantity (b) minimum item quantity (c) maximum item quantity (d) price paid for item in last transaction 2. Seller Agents (providers) with an items database with the following information for each item (a) current item price (b) minimum item price (c) maximum item price With these characteristics, we had an idea of simulating several client and seller agents. Thus, we needed to start the simulation with both type of agents database previously configured. Therefore, we had to state the initial state for each agent. 3.1 Initial State The initial state might be different for each client agent since we randomly select from 3 different item database. Thus, we vary the initial state of the client agents regarding item quantity in stock and price paid for each item in the last transaction. One example of the initial conditions of a client agent database is available in table 1. item id pao leite 1lt bolachas cerveja fraldas peixe carne Table 1. Client Initial State Example stock min stock max stock 120 100 50 250 15 20 30 120 100 50 250 15 20 30 25 10 15 12 5 2 5 buy price 0.12 0.54 0.8 0.35 1.7 2.75 2.1 Additionally, the seller agents might also vary with five different initial conditions. Therefore, we change values from seller to seller, for example, regarding item price and also minimum item price. 1Available Code at https://github.com/Sarmentor/InventoryManagement. 6 Another example of initial conditions, this time for seller agent database is available in the following table: MAY 21, 2019 Table 2. Seller Initial State Example item id pao leite 1lt bolachas cerveja fraldas peixe carne price min price unit max price unit 0.12 0.54 0.7 0.35 1.5 2.5 2.25 0.1 0.45 0.5 0.27 1.3 2.2 1.95 0.15 0.65 0.8 0.45 1.9 3.2 2.73 After selecting initial conditions settings for each agent, we can start the simulation. The agents follow predetermined behaviors we describe in the next subsections. 3.2 Client Agents Succinctly, the Client Agents have the following behaviors: 1. Appear randomly at a location in the environment 2. listen to messages (a) if an "cfp" was received from another client i. checks if there are enough items in stock to provide the other client. If the answer is yes sends a message "propose" to the other client with the item quantity and price. ii. if there are not enough items available then it sends a "refuse" message to the other client. (b) if an "accept-proposal" message was received: i. update stocks and reduce the quantity of the available item in the database (c) if no message was received continues to 3. 3. simulate selling items to virtual buyers and in random quantities 4. check inventory (a) if an item stock reached its possible minimum and internal trading is not allowed, then jumps to 4(a)v. If it is allowed then: i. broadcasts cfps message to other retail clients in the group ii. collects proposals iii. adds beliefs "proposal-from-clients" iv. evaluates beliefs ("proposal-from-clients") A. if the proposal was accepted then: • sends "accept-proposal" message to the client with best proposal. • updates stock by increasing the quantity of the item provided by the other client agent and returns back to 2. B. if all clients sent "refuse" message then jumps to 4(a)v. v. broadcasts cfps message to sellers vi. collects proposals from sellers vii. adds beliefs "proposal" viii. evaluates beliefs ("proposal") A. if the proposal has the best price and was accepted after some specified quantity of auction rounds then: • sends "accept-proposal" message to the winning seller. • updates item stock in database after receiving "success" message from wining seller. B. if the proposal was not accepted then back to 2. (b) if no item stock reached its admissible minimum returns to 2. 7 MAY 21, 2019 3.3 Seller Agents Succinctly, the Seller Agents have the following behaviors: 1. Listen to cfps from clients 2. Evaluate and reply proposal with the price for the item. This price is a random number between the asked price and the seller's minimum admissible price for the item 3. Listen to replies from clients, if its a new cfp then 2 or else: (a) if the proposal was accepted (primitive "accept-proposal") then: i. Sends items to client ii. Updates current price for item (b) if the proposal was not accepted (primitive "reject-proposal") then back to 1. 3.4 Auction System When the client agents need to be provided by external agents, we will need to implement an auction system so the offered price for the items would be the best possible. As the external providers have different rates, it is mandatory to establish an auction when the "cfp" messages are broadcasted. Thus, we choose to create a reverse auction, and the following workflow is executed: 1. Client A needs an item and broadcasts "cfp" messages to all seller agents with the current needed item and its price. Two different situations can happen: (a) If all sellers are not able to provide the item with the requested price they refuse to propose and the auction is interrupted (b) If sellers can provide the item they will propose their best price. This best price is a random value between the asked price in the current auction round and the minimum acceptable price for the provider/seller. 2. Client A then broadcasts yet another set of "cfp" to the sellers with the best price in 1(b). 3. Client A then selects the best offer after a predefined amount of auction rounds or if there is only one seller biding. If there is a tie of price between sellers, Client A selects the first seller to have provided the best price. 4 Metrics for Evaluation There are two possible situations in our MAS system: 1. Only external transactions between clients and sellers 2. Both internal (between clients, i.e., the agents belonging to the retail chain) and external transactions (between retail chain agents, i.e., the clients, and the seller agents) For the evaluation of our inventory management MAS we decided that for the comparison of both situations we should measure several metrics: • Average item price, for the clients, given by the formula: • Average time a transaction takes, from consulting the internal/external agents until stock update if transaction is successful, given by the formula: • Internal/external ratio (Only in case of internal and external buying), given by the formula: IT R = T otalInternalT rades T otalExternalT rades With these measures, we expect to have an idea of how these metrics evolve over the simulation period. These are generic measures that might provide some insight into the system behavior, nonetheless, as we will see, the initial conditions of the client agents influence the evolution of the simulations. 8 (cid:80)k (cid:80)k k k AIP = i=1 ItemT radeP ricei AIT T = i=1 ItemT radeT icksi MAY 21, 2019 5 Results In this section, we will provide the results of our simulations. We choose to simulate with five external providers (sellers) and a retail chain of two agents (the clients). 5.1 External Trading Only The external transactions only mode, for the clients, imply we have no internal transactions. Figure 1 captures the NetLogo interface of such simulation. Figure 1. Interface with external trading mode simulation In this mode, the results we obtained were stable after around 25000 ticks of simulation. This translated into 62 external buying transactions for the client agents. Figure 2 provides evidence of the decreasing of ticks it takes for a client to be provided in this mode. It is clear that the implementation of the reverse auction gets faster as the simulation evolves. Figure 2. Interface with external trading mode simulation This is explained by the fact that the clients register the best prices after the first auction is finished. Additionally, when they need to buy the same product later, they request a lower price to the seller agents which makes further auctions successful in fewer auction rounds, thus, the value of 2.242 ticks when the simulation stabilizes. Regarding the average buying price, the value stabilizes at around 1.284. This value starts higher at the beginning of the simulation but, similarly to the previous results of this mode and for the same reasons, it lowers as the simulation evolves. 5.2 Internal and External Trading Depending on the initial conditions, the simulation has different results and takes a different number of ticks to get to a stable state. For example, with an initial state with one client agent with the maximum number of items available for all the products, and the other agent with low amounts of items, we can expect to have more internal trades than external trades for a long period or many ticks. 9 MAY 21, 2019 Figure 3. Time to Provide and Internal/External Ratio with internal and external trading mode simulation Thus, in these conditions and for approximately 3000 ticks, the client agents did 1238 internal buys and 0 external buys. Additionally, the average number of ticks it takes for a client to be provided is 0 which is the main advantage of having only internal trades. This is explained by our number of client agents which is low and the fact that we do not execute any auction in this situation of only having internal trading. Regarding the average buying price, the value is 1.373. Compared with another mode where we can only have external trades, this value is higher which is expected as we do not have external transactions that rely on the reverse auction. This leads clients to be provided with the lowest price possible, thus lowering the average buying price with external trading. We did additional simulations, this time with other initial conditions. With unbalanced client's stocks, for example, with maximum stock for some items and minimum for others, there is more chance for a balance between internal and external trading. Figure 3 shows that, with 10000 ticks of simulation, ten internal buys, and four external solicitations, an interesting case is simulated. It is visible that as the internal/external ratio decreases the time it takes until the client providing finishes are higher. This means that initially in the simulation, more internal transactions were done than external transactions. Then, further in the simulation, some external transactions occur which increases the time needed to provide the clients with the items they need. At this point, the average number of ticks it takes for a client to be provided is 5.286. Additionally, regarding the average buying price, the value is 0.7. This value is lower than previous simulations; this might be due to the items that were sparse in the initial conditions and their lower price. Thus, with more simulation ticks, this value is expected to increase as more expensive items are bought. Additionally, as the simulation progresses, there are more auctions, the price of the items naturally lowers. Figure 4 and Figure 5 shows this situation. 10 MAY 21, 2019 Figure 5. Fish item price evolution Figure 4. Meat item price evolution Both meat and fish price in this simulation starts higher. This is due to the internal transactions at higher initial prices for both items. As the simulation evolves more and more external transactions occur. Thus, with more auctions happening, there is a natural progression of prices towards the minimum possible price regarding the providers in the simulation. An example of a provider context after several thousands of simulation ticks is provided in the following table 3. Table 3. Seller Final State Example item id pao leite 1lt bolachas cerveja fraldas peixe carne price min price unit max price unit 0.15 0.5 0.6 0.3 1.6 3.1 1.7 0.13 0.5 0.6 0.29 1.45 2.9 1.7 0.14 0.54 0.8 0.37 1.75 3.3 2.8 In this table, taken from a simulation after several external transactions, it is clear that for example the item "leite 1lt" as well as "bolachas" and "carne" reached the lowest price possible in the simulation. Recording the initial prices for this provider, we had, at the beginning of the simulation, the following table 4. Table 4. Seller Initial State Example item id pao leite 1lt bolachas cerveja fraldas peixe carne price min price unit max price unit 0.15 0.5 0.6 0.3 1.6 3.1 1.8 0.13 0.5 0.6 0.29 1.45 2.9 1.7 0.14 0.54 0.8 0.37 1.75 3.3 2.8 11 MAY 21, 2019 Both these tables make us conclude that this provider had already the lowest prices possible for "leite 1lt" as well as "bolachas". Nonetheless, the item meat, designated by "carne" reached its lowest price of 1.7 after the simulation. 6 Discussion With these results, it is clear that initial client states regarding item stocks influence, on a large scale, the evolution of the simulation. Therefore, it is expected that due to the relative randomness of initial states the simulation provides less similar results. Nevertheless, the implemented system provides a testbed for further improvements, and the preliminary results are logical and seem intuitive. In a real situation, other factors should be regarded, like for example, the costs with item storage, the costs of trans- portation of items between clients and also the validity of products. Additionally, the providers (seller agents) should also have stock limitations as in real situations. Thus, the reduction of stock and, therefore, the capacity to provide or not a client agent should be studied. These factors would improve further the realism of the simulations and could provide better decision support to the manager of the retail chain group. 7 Conclusions and Future Work With this work, our goal was to provide an introduction to the inventory management problem and how to approach it with MAS frameworks, more specifically, with the NetLogo and its expanded libraries. These libraries help to implement BDI and FIPA-ACL based MAS. We provided the most important concepts of these libraries. Thus, by using these tools, we developed a trading system where we could focus on the inventory management per- formed by agents that could communicate with each other. We provided results by exposing the results of this communication. We used several metrics to compare two situations of trading, with and without internal trading between agents belonging to the retail chain. Furthermore, we imple- mented a reverse auction when the agents belonging to the retail chain would need to buy from external providers. We conclude that, by using these libraries, we increase comprehensibility and efficiency in the development and implementation of this MAS system. Additionally, by exploring the MAS system, we can easily simulate a complex system. The expected complexity of studying a real and similar system makes it imperative to use models that provide a test bench for different situations. These conditions would be very hard to test in real systems, and this is one of the main advantages of MAS. Acknowledgments This work was fully financed by the Faculty of Engineering of the Porto University. Rui Portocarrero Sarmento also gratefully acknowledges funding from FCT (Portuguese Foundation for Science and Technology) through a Ph.D. grant (SFRH/BD/119108/2016). References [1] Allan, R. (2010). Survey of agent based modelling and simulation tools. http://www.grids.ac.uk/NWGrid/ABMS/. [2] Balaraman, V. and Singh, M. (2014). Exploring norm establishment in organizations using an extended axelrod model and with two new metanorms. In Proceedings of the 2014 Summer Simulation Multiconference, SummerSim '14, pages 39:1 -- 39:9, San Diego, CA, USA. Society for Computer Simulation International. [3] Biondo, A. E., Pluchino, A., and Rapisarda, A. (2013). Return migration after brain drain: A simulation approach. Journal of Artificial Societies and Social Simulation, 16(2):11. [4] Blum, C., Lozano, J. A., and Davidson, P. P. (2015). An artificial bioindicator system for network intrusion detection. Artif. Life, 21(2):93 -- 118. [5] Boudouda, S. and Boufaida, M. (2012). A methodological approach for modeling supply chain management. In Communications and Information Technology (ICCIT), 2012 International Conference on, pages 38 -- 43. 12 MAY 21, 2019 [6] Dickerson, M. (2014). Multi-agent simulation, netlogo, and the recruitment of computer science majors. J. Comput. Sci. Coll., 30(1):131 -- 139. [7] Fekir, A. and Benamrane, N. (2011). Segmentation of medical image sequence by parallel active contour. In Software Tools and Algorithms for Biological Systems, pages 515 -- 522. Springer. [8] Galic, N., Ashauer, R., Baveco, H., Nyman, A.-M., Barsi, A., Thorbek, P., Bruns, E., and Van den Brink, P. J. (2014). Modeling the contribution of toxicokinetic and toxicodynamic processes to the recovery of gammarus pulex populations after exposure to pesticides. Environmental toxicology and chemistry, 33(7):1476 -- 1488. [9] Gheorghe, M., Stamatopoulou, I., Holcombe, M., and Kefalas, P. (2005). Modelling dynamically organised In Banatre, J.-P., Fradet, P., Giavitto, J.-L., and Michel, O., editors, Unconventional colonies of bio-entities. Programming Paradigms, volume 3566 of Lecture Notes in Computer Science, pages 207 -- 224. Springer Berlin Heidelberg. [10] Jiang, C. and Sheng, Z. (2009). Case-based reinforcement learning for dynamic inventory control in a multi-agent supply-chain system. Expert Systems with Applications, 36(3, Part 2):6520 -- 6526. [11] Liu, C., Sibly, R. M., Grimm, V., and Thorbek, P. (2013). Linking pesticide exposure and spatial dynamics: An individual-based model of wood mouse (apodemus sylvaticus) populations in agricultural landscapes. Ecological Modelling, 248:92 -- 102. [12] Martins Ratamero, E. (2015). Modelling peloton dynamics in competitive cycling: A quantitative approach. In Cabri, J., Pezarat Correia, P., and Barreiros, J., editors, Sports Science Research and Technology Support, volume 464 of Communications in Computer and Information Science, pages 42 -- 56. Springer International Publishing. [13] Nikolai, C. and Madey, G. (2009). Tools of the trade: A survey of various agent based modeling platforms. Journal of Artificial Societies and Social Simulation, 12(2):2. [14] Pluchino, A., Garofalo, C., Inturri, G., Rapisarda, A., and Ignaccolo, M. (2014). Agent-based simulation of pedestrian behaviour in closed spaces: A museum case study. Journal of Artificial Societies and Social Simulation, 17(1):16. [15] Sakellariou, I. (2010a). Agents with beliefs and intentions in netlogo. http://users.uom.gr/iliass/projects/NetLogo/AgentsWithBeliefsAndIntentionsInNetLogo.pdf. [16] Sakellariou, I. (2010b). An attempt to simulate fipa acl message passing in netlogo. http://users.uom.gr/iliass/projects/NetLogo/FIPA ACL MessagesInNetLogo.pdf. [17] Sakellariou, I., Kefalas, P., and Stamatopoulou, I. (2008a). Enhancing netlogo to simulate bdi communicating agents. In Darzentas, J., Vouros, G. A., Vosinakis, S., and Arnellos, A., editors, SETN, volume 5138 of Lecture Notes in Computer Science, pages 263 -- 275. Springer. [18] Sakellariou, I., Kefalas, P., and Stamatopoulou, I. (2008b). Teaching intelligent agents using netlogo. Pro. of the ACM-IFIP IEEIII Informatics Education Europe III Conference, Venice, Italy. [19] Sakellariou, I., Kefalas, P., and Stamatopoulou, I. (2009). Mas coursework design in netlogo. [20] Seal, J. B., Alverdy, J. C., Zaborina, O., An, G., et al. (2011). Agent-based dynamic knowledge representation of pseudomonas aeruginosa virulence activation in the stressed gut: Towards characterizing host-pathogen interactions in gut-derived sepsis. Theor Biol Med Model, 8(33):1742 -- 4682. [21] Signorile, R. (2002). Simulation of a multiagent system for retail inventory control: A case study. Simulation, 78(5):304 -- 311. [22] Signorile, R. (2005). Innovations in Applied Artificial Intelligence: 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2005, Bari, Italy, June 22- 24, 2005. Proceedings, chapter A Decision Support System for Inventory Control Using Planning and Distributed Agents, pages 192 -- 196. Springer Berlin Heidelberg, Berlin, Heidelberg. [23] Stamatopoulou, I., Sakellariou, I., and Kefalas, P. (2007). Formal modelling for in-silico experiments with social insect colonies. In in Current Trends in Informatics, pages 79 -- 89. [24] Wallentin, G. and Loidl, M. (2015). Agent-based bicycle traffic model for salzburg city. GI Forum -- Journal for Geographic Information Science, 2015(1):558 -- 566. 13
1909.01885
1
1909
2019-09-04T15:33:09
Agent-based model for tumour-analysis using Python+Mesa
[ "cs.MA", "q-bio.TO" ]
The potential power provided and possibilities presented by computation graphs has steered most of the available modeling techniques to re-implementing, utilization and including the complex nature of System Biology (SB). To model the dynamics of cellular population, we need to study a plethora of scenarios ranging from cell differentiation to tumor growth and etcetera. Test and verification of a model in research means running the model multiple times with different or in some cases identical parameters, to see how the model interacts and if some of the outputs would change regarding different parameters. In this paper, we will describe the development and implementation of a new agent-based model using Python. The model can be executed using a development environment (based on Mesa, and extremely simplified for convenience) with different parameters. The result is collecting large sets of data, which will allow an in-depth analysis in the microenvironment of the tumor by the means of network analysis.
cs.MA
cs
AGENT-BASED MODEL FOR TUMOR-ANALYSIS USING PYTHON+MESA Ghazal Tashakor (a), Remo Suppi (a) (a) Universitat Autònoma de Barcelona, Department Computer Architecture & Operating Systems, School of Engineering, Campus Bellaterra, Cerdanyola del Vallès, Barcelona, 08193, Spain (a) [email protected] (a) [email protected] ABSTRACT The potential power provided and possibilities presented by computation graphs has steered most of the available modeling techniques to re-implementing, utilization and including the complex nature of System Biology (SB). To model the dynamics of cellular population, we need to study a plethora of scenarios ranging from cell differentiation to tumor growth and etcetera. Test and verification of a model in research means running the model multiple times with different or in some cases identical parameters, to see how the model interacts and if some of the outputs would change regarding different parameters. In this paper, we will describe the development and implementation of a new agent-based model using Python. The model can be executed using a development environment (based on Mesa, and extremely simplified for convenience) with different parameters. The result is collecting large sets of data, which will allow an in-depth analysis in the microenvironment of the tumor by the means of network analysis. Keywords: Agent-based models, Python, System Biology, Graph, Simulation modeling 1. INTRODUCTION At the cellular level, Systems Biology (SB) is mainly a complex natural phenomenon that today has become important for research in certain areas such as drug development and biotechnological productions and applications. Mathematical models of cellular level are built in bio repeated cycles at a portion of time to arrive at a decision. The primary idea behind the bio iterative cycles is to develop systems by allowing software developers to redesign and translate the cellular metabolism. The objective is bringing the desired decision or result closer to discovery in each iteration; these experiments on multi-scale iterative cycle of computational modeling - besides experimental validation and data analysis- would produce incremental samples for the high-throughput technologies. Also the behavior of the cell emerges at the network- level and requires much integrative analysis. Moreover, due to the size and complexity of intercellular biological Alongside networks, computational model should be a considerate part of the production or application. In the following whole simulation challenges, SB would not be needless of developing integrated frameworks for analysis and data management. the intercellular level, many researches in SB also address the issue of cellular population. In evolutionary versions of these scenarios, modeling the interactions of these type of models across large multi- scale would need agent-based modeling. Each agent has a Boolean network for its own expression, much like a gene. So a proper production or application for SB must support not only a compatible simulation method but also suitable methods for model parameter estimations which represent the experimental data (D.2011; An2008). Therefore, ABMs start with rules and mechanisms to reconstruct through the mathematical or computational form and observe the pattern of data. Processing the heterogeneous behavior of individual agent within a dynamic population of agents -which cannot be controlled by an overall controller- needs a higher-level system parallelism which ABMs supports. Biological systems include random behaviors and ABMs accommodate this via generation of population agents in the agent's rules. ABMs have a level of abstraction to create new cellular states or environmental variables without changing core aspects of the simulation. To aggregate the paradoxical nature of emergent behavior which could be observed from any agent in contrast to a conceptual rules of the model, ABMs reproduce emergent behavior. Emergent behavior has a range of stochasticity similar to real world Systems Biology (Bonabeau2002). Finding software platforms for scientific agent-based models require comparing certain software design parameters such as emulating parallelism, and developing schedulers for multiple iterations, which manage ABM run. Many references reviewed and compared different agent- based modeling toolkits. However, from the perspective of biotechnological application and biotechnologists, most of them share a key weakness. It is using complex languages which are not Python. Perhaps re- implementing ABMs in Python would be a wiser technical strategy since it is becoming the language of can induce important role and pathohistological angiogenesis scientific computing, facilitating the web servers for direct visualization of every model step, debugging and developing an intuition of the dynamics that emerge from the model, also allowing users to create agent-based models using built-in core components such as agent schedulers and spatial grids (Villadsen and Jensen 2013). 2. BACKGROUND Spontaneous tumor, which progresses from the initial lesion to highly metastatic forms are generally profiled by molecular parameters such as prognosis response, characteristics. morphology lymph- Tumors angiogenesis, which plays an in promoting cancer spread. Previous studies have shown that the cancer stem cell (CSC) theory could become a hypothesis for tumor development and progression. These CSCs have the capability of both self-renewal and differentiation into diverse cancer cells, so one small subset of cancer cells has characteristics of stem cells as their parents. Hereditary characteristics play a certain role in malignant proliferation, invasion, metastasis, and tumor recurrence. In recent researches the possible relationship between cancer stem cells, angiogenesis, lymph-angiogenesis, and tumor metastasis is becoming a challenge. Due to many evidences and reviews such as (Li 2014; Weis and Cheresh 2011; Carmeliet, P., & Jain, R. K. 2000), metastasis is defined as the spread of cancer cells from the site of an original malignant primary tumor to one or more other places in the body. More than 90% of cancer sufferings and death is associated with metastatic spread. In 1971, Folkman proposed that tumor growth and metastasis are angiogenesis-dependent, and hence, blocking angiogenesis could be a strategy to intercept tumor growth. His hypothesis later confirmed by genetic approaches. Angiogenesis occurs by migration and proliferation of endothelial cells from original blood vessels (Weis and Cheresh 2011). Accordingly, has contributed to the understanding of the molecular and cellular mechanisms occurring in the tumor and in its microenvironment which causes metastasis and this could present a model relatively similar to physiology of human or at the capability of going through genetic manipulations that bring them closer to humans. Hence high spatiotemporal resolution combined with parametric opportunities has been rapidly applied in technology (Granger and Senchenkova 2010). 2.1. Agent-based Models in Systems Biology A primary tumor model addressing the avascular growth state depends on differential equations. They are classified as "lumped models" to predict the temporal evolution of overall tumor size. Since lumped models just provide a quantitative prediction of tumor size over time with only a few parameters and very low computational results, they would not be enough for an tumor modeling with translational cancer research and least has a explicit investigation of many other events such as spatiotemporal dynamics of oxygen and nutrients or cell to cell interactions; also, stromal cells which play a major role in cancer growth and progression in the interaction with tumor cells. The result is disregarding the mutations in the tumor microenvironment and metastasis. These shortcomings lead us to In Silico models of tumor microenvironment. In Silico (Edelman, Eddy & Price 2010) refers to computational models of biology and it has many applications. It is an expression performed on a computer simulation. In Silico models are divided to three main categories (Thorne, Bailey, & Peirce 2007; Soleimani et al., 2018): 1. Continuum based models which solve the spatiotemporal evolution problems of density and concentration of cellular population in the tumor microenvironment. 2. Discrete or agent based on a set of rules which change the cells' states and manage the cells' interactions tumor microenvironment. within the 3. Adaptive Hybrid models which integrate the above solutions. research on Mathematical and computational models of the tumor should cover different aspects of tumor interactions in its microenvironment. Most of the avascular tumor models address the tumor growth dynamics not taking into account the angiogenesis setting; but computational models have started tumor-induced angiogenesis since the beginning of cancer research. Therefore, the angiogenesis models have a very strong background in experimental observations. The most established researches have explicitly focused on the stromal cells to achieve a close computational model of angiogenesis. For example, according to Monte Carlo simulations and energy minimization, cellular models are expanded and elaborated on cellular automata to allocate more than one lattice site to each cell and describe cell to cell and tumor stroma interactions. Nevertheless, building a bulky model over a range of matrix densities -which covers numerous factors for a large domain size and 3D simulations- is restricted by computational and application costs. Based on a paper written by Soleimani et al. (2018), a minimal coupling of a vascular tumor dynamics to tumor angiogenic factors through agent-based modeling has progressed the experimental studies in the recent years. They have mentioned in both reviews that it is challenging to mathematically simulate all the process of a complex system such as tumor growth, metastasis and tumor treatments, because mathematical modeling is still a simplification of the system biology and the results requires validation. Also, building a predictive experimental plus theoretical application without clinical data requires parametrizing and validating again. The best improvement which is expected would be predictive modeling in both response The main problem with this implementation was the limitations of the execution environment (Java memory limitations) and loss of performance with a high number of metastasis cells. In addition, this model did not allow capturing in detail the interactions between the different parameters at the microenvironment level. investigation interaction towards biology preclinical and clinical states (Thorne, Bailey, & Peirce 2007). 2.2. Complex Networks in Biological Models Another interesting approach is the network models. Networks follow patterns and rules and have a specific topology, which allows scientists to go through with a deeper information extraction. Within the fields of biology and medicine, Protein- protein (PPI) networks, biochemical networks, transcriptional regulation networks, signal transduction or metabolic networks are the highlighted network categories in systems biology which could detect early diagnosis. All these networks need compatible data to be produced experimentally or retrieved from various databases for each type of network; but besides analyzing data structures for computational analysis, several topological models have been built to describe the global structure of a network (Girvan, Newman 2002; 2004). 3. MODELING AND SIMULATION Our approach to the generation of an ABM model considered different temporal and spatial scales, focusing first on mitosis as the main axis of tumor growth. This model and its analysis developed in Netlogo (section 3.1). Then large number of environment limitations were detected with a high number of agents and difficulties to analyze the microenvironment of emergent growth. The second approximation is presented in this paper (section 3.2) used dynamic networks based on a large number of interactive agents. This model makes it possible to help researchers in carrying out more detailed research on intercellular network interactions and metastasis in a multiple scale model (Grimm2005). 3.1. Netlogo Model and Experimental Results Our ABM NetLogo model is designed as a self- organized model that illustrates the growth of a tumor and how it resists chemical treatment. This model in NetLogo (based on Wilensky's tumor model (Wilensky 1999)) permits us to change the parameters that affect tumor progression, immune system response, and vascularization. Outputs included the number of living tumor cells and the strength of the immune system which control cells. In this model the tumor has two kinds of cells: stem cells and transitory cells. In the model, tumor cells are allowed to breed, move, or die. The simulation presented cells' control with different and constant immune responses through killing transitory cells, moving stem cells and original cells. Figure 1 shows the steady state of a tumor metastasis visualization with 6 stem cells and the grow-factor =1.75, replication-factor=high, and apoptosis=low. As it could be seen, the growth of metastasis is more aggressive and through reducing apoptosis, there is a greater number of cells that do not die, amounting to near 200,000 cells (agents) (Tashakor, Luque & Suppi, 2017). Figure 1: stem cells evolution and metastasis visualization with grow-factor=1.75, apoptosis=low and replication-factor=high (near 200,000 cells in steady state). 3.2. Python Model and Experimental Results To solve the aforementioned problems, we started a new development using Python +Mesa. Mesa is the agent- based Python project, which has started recently and it has rapidly found its place among the researchers. Mesa is modular and its modeling, analysis and visualization components are integrated and simple to use. This feature convinced us to re-implement our tumor model with Mesa network structure. Furthermore, it supports multi-agent and multi-scale simulations, which is suitable for creating dynamic agent-based models. This paper documents our work with the Python +Mesa to design an agent model based on the tumor model scenario. At the beginning, Mesa was just a library for agent-based modeling in Python but now it is a new open-source, Apache 2.0 licensed package meant to fill the gap in the modeling complex of dynamical systems. In Mesa, the Model class to define the space where the agents evolve handles the environment of an agent-based model. The environment defines a scheduler which manages the agents at every step. For studying the behavior of model under different conditions, we needed to collect the relevant data of the model while it was running; Data Collector class was defined for this task. The adapting modules of Mesa allow us to make changes in the existing ABMs for the purpose of conforming with the requirements of our future framework. Also, monitoring the data management issues when processing actions happen in parallel seems facile in Mesa, since each module has a Python part which runs on the server and turns a model state into JSON data (Masad & Kazil, 2015). The advantage of Mesa is its browser for visualization which allows the user to see the model while running in the browser. Tumor progression is a complex multistage process and the tumor cells have to acquire several distinct properties either sequentially or in parallel. The first problem using NetLogo framework for simulation was using behavioral space which supports multithreading. In this way, performance is limited to the number of cores at the local infrastructure. To solve the local processing problem, we utilized the parametric simulations using a HPC cluster in order to reduce the necessary time to explore a determinate model data space. Since we needed to distribute our model through the distributed architecture to explore the model states in the microenvironment scale, it was revealed that NetLogo also has scalability issues in designing graph networks. Although there are available extensions for scaling up the model in the form of graph, it still depends on the size of the tumor and it could be a very slow process, taking days to finish experiment considering the checkpoints and performance bottlenecks while using a HPC cluster. We had to translate and move our model to a new framework such as the style and structure of Mesa to facilitate our distributed executions. The newest changes in the ground of the old scenario is increasing the population of agents, obtaining graph- based representation of biological network and consideration of multi-state and multi-scale components (An2008). The initial design aspect of the multi-scale architecture of out tumor growth model in Python comes from the acute inflammation based on the key factors such as angiogenesis. Tumor angiogenesis is critical for tumor growth and maintenance (Kaur et al., 2005). Our new model strategy begins with an initial identification of a minor population of cells with the characteristics of "tumor-initiating" cancer stem cells and these cancer stem cells in the assumed tumor reside in close proximity to the blood vessels. Therefore, we chose an angiogenetic switch for our model which have to balance this dynamic. We had angiogenetic and anti- angiogenetic factors. In the case of anti-angiogenetic, we will have the probability of quiescent tumor. In this agent-based model, tumor cells are affected, inflamed and turn quiescent. Table 1 shows the range of parameters we implemented to control the factors. Based on these factors, we can achieve a simulation evolution of metastasis and measure the tumor volume ratio along with the dynamics of the tumor under the influence of the factors. Table 1: different control factors of tumor growth Factors Low Medium 0.0 0.1 0.1 0.4 0.3 0.5 High 1 1 1 Angiogenesis Recovery Quiescent To select a network topology for tumor model, we selected a random graph. Barabasi-Albert model is a scale-free network and it is one of the most basic models since it describes most of the biological networks - especially in evolutionary models; but since there is a need to manage the cell interactions and stromal cells behavior within the tumor microenvironment and due to the time-dependency of the connections, we developed our Python agent-based model on Erdös-Rényi topology. The visualization of the model is a network of nodes (using the Mesa architecture) that shows the distribution of agents and their links. Considering the architecture of Mesa, the creation of agents occurs based on the assignment of nodes to a graph. A scheduler (time module) activates agents and stores their locations and updates the network. The total operation time is directly related to the number of steps necessary to deploy all the agents. Since each agent changes in three states, the process goes on until the tumor agent's volume appears as metastasis. Thus, for P as a Probability and for edge creation in n number of nodes, if (Ps > log (n)/n)) almost all vertices are connected and this function returns a directed graph as we described in Algorithm 1. Erdös-Rényi model takes a number of vertices N and connecting nodes by selecting edges from the (N (N-1)/2) possible edges randomly. The pseudo-code generating a random network is described in Algorithm 1: Algorithm 1 Input: (n,p, p* ) Output: (True, False) Begin Algorithm For n in enumerate(nodes): For p in enumerate(Ps): If p > p* then p_connected(n, p) = 1 Else return 0 Endif Endfor Endfor End Algorithm The interactive visualization in Mesa helps us to identify insights and generate value from connected data. Considering the data analysis for life sciences such as tumor which is almost about connections and dependencies, the large amount of data makes it difficult for researchers to identify insights. Graph visualization makes large amounts of data more accessible and easier to read, as it has been illustrated in Figure 2. Figure 2: Graph visualization for three states (normal, dead and metastatic) shown in three colors Figure 3: Tumor stabilization challenges for cancer stem cells (CSC) with control factors more than medium Figure 3 shows the reduction of cancer stem cells in 550 initial stem cells which are affected by control factors in the time it took, which was about 8 minutes for this simulation. Tumor growth curves are used for derivation of the Tumor Control Index (TCI), such as tumor progression, rejection and stabilization. We tried to combine both rejection and stabilization challenges to show the potential of Python agent-based modeling with different control factors. According to (Peskin 2009), we need a statistical method that leads to volume ratio measurements of tumor, as it could be seen in figure 3. To calculate tumor volume using (Monga.s 2000) we needed tumor width (W) and tumor length (L) which is presented in formula 1: (cid:1)(cid:2)(cid:3)(cid:4)(cid:5) (cid:7)(cid:4)(cid:8)(cid:2)(cid:3)(cid:9) = (cid:11)(cid:12) × (cid:14) 2 This calculation which works pretty well for clinical issues, was made based upon the assumption that solid tumors are more or less spherical like the version we had before in Netlogo Wilensky's tumor model, but not proper for the metastatic diseases, which due to the phase (1) (cid:3) = (cid:16) N= (cid:23)(cid:24) (cid:20) (cid:21)(cid:22)(cid:16) (cid:12)∑ (cid:18)(cid:19) 2(cid:25), K={3,4,5,6,7,8} (2) transition and spreading dynamics will be defined by graph presentations in the future. According to Rai (2017), the model which have the same size and number of connections as of a given network could maintain the degree sequence of the given network. By generating a random network with a given average degree (K) and initial size of tumor (N), we could construct degree sequence (m) and it is presented in formula 2: For volume calculation, we start by assuming that every cell inside the tumor has three states (normal, dead and metastatic) which corresponds to tumor by edges. With the given K degree from three to eight and N initial nodes, we constructed an ER (Erdös-Rényi) network, whose degree sequence of (m) could lead us to the tumor volume ratio. The pseudo-code using the dynamic of degree sequence under the influence of above factors producing tumor volume in graph network is described in Algorithm 2: Algorithm 2 Input: (N,K=3) Output: (Tumor Volume) Begin Algorithm While p_connected= 1 For N in nodes(G) If P (cid:23)(cid:26) Return m/n Endif Endfor End Algorithm (cid:27)(cid:25) < Factor then In Figure 4, we executed the model with different angiogenesis control factor in (0.1 to 0.9) for 60, 360, 650, 100 and 1200 cancer stem cells (CSCs) to produce the tumor volume analysis based on the density distribution of the graph. Figure 3: Tumor Angiogenesis volume ratio for 60 to 1200 cancer stem cell (CSC) 4. CONCLUSION In summary, agent-based modeling in Python with Mesa project represents a valuable and time-saving simulation technique, which allowed us to re-implement our tumor model across a network based space. Mesa enable a modeler to quickly write down the code and quickly explore the results. Mesa also collect the results easily and help us in data integration which is very important in the case of phase transition and pattern- oriented modeling. We migrated successfully from Netlogo to Python-Mesa, which will allow us to reintegrate our system quicker and reiterate simulations taken on previous system with more data in considerably less time. In the future, we will extend the model to run on cloud infrastructure in parallel. This could be an impressive achievement for fast analysis purposes in clinics, both on the predictive diagnostic and therapeutic side. As advantages of this contribution, we have a scalable model that together with Python can be distributed over an HPC architecture eliminating the limitations of other environments (e.g. Netlogo due to memory limitations of the JVM). When Python + Mesa can be deployed over an HPC architecture, there will be a notable increase in scalability and performance since, in this type of environment, the simulation will not be limited by memory. One of the most important disadvantages is the model visualization and animation for oncologists. Netlogo has a cells visualization and animation that can be useful to medical environments. Mesa only has the visualization of the network of agents and their interconnections, so graphic functions must be developed to see the evolution of the cells and the degree of metastasis/apoptosis and other relevant parameters for the medical analyst. Another important aspect that must be addressed will be the functional validation of the whole model since at this moment only a verification and partial validation of the behavior of the affected cells has been carried out. ACKNOWLEDGMENTS The MINECO Spain under contract TIN2014-53172-P and TIN2017-84875-P have supported this research. REFERENCES Wilensky, U., 1998. NetLogo Tumor model. Center for Connected and Computer-Based Modeling, Northwestern University, Evanston, IL. Project Simulation & Model Environment. National Science Foundation REC- 9814682 and REC-0126227 Integrated Learning Li, S., & Li, S., 2014. Cancer stem cells and tumor metastasis (Review). International Journal of Oncology, 44, 1806-1812. Weis, S. M., & Cheresh, D. A., 2011. Tumor angiogenesis: Molecular pathways and therapeutic targets. Nature Medicine. Carmeliet, P., & Jain, R. K., 2000. Angiogenesis in cancer and other diseases. Nature. Thorne, B. C., Bailey, A. M., & Peirce, S. M., 2007. Combining experiments with multi-cell agent- based modeling tissue patterning. Briefings in Bioinformatics. study biological to Edelman, L. B., Eddy, J. A., & Price, N. D., 2010. In silico models of cancer. Wiley Interdisciplinary Reviews: Systems Biology and Medicine. Soleimani, S., Shamsi, M., Ghazani, M. A., Modarres, H. P., Valente, K. P., Saghafian, M., Sanati-Nezhad, A., 2018. Translational models of tumor angiogenesis: A nexus of in silico and in vitro models. Biotechnology Advances. Tashakor, G., Luque, E., & Suppi, R., 2017. High Performance Computing for Tumor Propagation Agent-based Model. Granger, D. N., & Senchenkova, E, 2010. Inflammation and the Microcirculation. Colloquium Series on Integrated Systems Physiology: From Molecule to Function, 2(1), 1 -- 87. Girvan, M., & Newman, M. E. J., 2002. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA, 99(12), 7821 -- 7826. Tashakor, G., Suppi, R., 2017. HpcNetlogo. Frontend for the concurrent execution of Netlogo experiments using SGE HPC cluster. Cho, D.-Y., Kim, Y.-A., & Przytycka, T. M., 2012. Chapter 5: Network Biology Approach to Complex Diseases. PLoS Computational Biology, 8(12), e1002820. Masad, D., & Kazil, J., 2015. MESA: An Agent-Based Modeling Framework. Proceedings of the 14th Python in Science Conference.53 -- 60. Xing, F., Eisele, J., Bastian, P., & Heermann, D. W., 2015. Computational complexity of agent-based multi-scale cancer modeling. Simulation Series, 47(10), 351 -- 358. Villadsen, J., Jensen, A. S., Ettienne, M. B., Vester, S., Andersen, K. B., & Frøsig, A., 2013. Reimplementing a multi-agent system in python. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7837 LNAI, pp. 205 -- 216). An, G. 2008. Introduction of an agent-based multi-scale modular architecture for dynamic knowledge representation of acute inflammation. Theoretical Biology and Medical Modelling. Railsback, S. F., Lytinen, S. L., & Jackson, S. K., 2006. Agent-based Simulation Platforms: Review and Development Recommendations. Simulation, 82(9), 609 -- 623. Bonabeau, E., 2002. Agent-based modeling: methods and techniques for simulating human systems. Proceedings of the National Academy of Sciences, 99(suppl. 3), 7280 -- 7287. Norton, K.-A., McCabe Pryor, M. M., & Popel, A. S., 2015. Multiscale Modeling of Cancer. bioRxiv, 33977. D., M., R.S., C., M., R., E.C., F., B., T., & I., R., 2011. Modeling formalisms in systems biology. AMB Express, 1(1), 1 -- 14. Grimm, V., Revilla, E., Berger, U., Jeltsch, F., Mooij, W. M., Railsback, S. F, DeAngelis, D. L. (2005). Pattern-oriented modeling of agent-based complex systems: Lessons from ecology. Science. ALITALO, K., TAMMELA, T. and PETROVA, T.V. 2005. Lymphangiogenesis in development and human disease. Nature 438: 946-953. Kerbel, Robert S., (2008). Tumor angiogenesis. New England Journal of Medicine 358.19 2039-2049. Peskin, A., Kafadar, K., Santos, A., & Haemer, G. 2009. Robust Volume Calculations of Tumors of Various Sizes. D., Singh, Monga, S. P. S., Wadleigh, R., Sharma, A., Adib, H., Strader, L. 2000. Intratumoral therapy of cisplatin/epinephrine injectable gel for palliation in patients with obstructive esophageal cancer. American Journal of Clinical Oncology: Cancer Clinical Trials, 23(4), 386-392 G. Mishra, Rai, A., Pradhan, P., Nagraj, J., Lohitesh, K., Chowdhury, R., & Jalan, S. 2017. Understanding cancer complexome using networks, spectral graph theory and multilayer framework. Scientific Reports, 7. AUTHORS BIOGRAPHY GHAZAL TASHAKOR is Research Fellow and PhD Candidate for trainee research staff position (PIF) at the Computer Architecture & Operating Systems Department (CAOS) of the University Autònoma de Barcelona. Her include high performance simulation, agent-based modelling and their applications, service systems, integration, resource consumption, and execution time. Her e-mail address is: [email protected] research interests REMO SUPPI received his diploma in Electronic Engineering from the Universidad Nacional de La Plata (Argentina), and the PhD degree in Computer Science from the Universitat Autonoma de Barcelona (UAB) in 1996. At UAB, he spent more than 20 years researching on topics including computer simulation, distributed systems, high performance and distributed simulation applied to ABM or individual-oriented models. He has published several scientific papers on the topics above and has been the associate professor at UAB since 1997, also a member of the High Performance Computing for Efficient Applications and Simulation Research Group (HPC4EAS) is: [email protected]. at UAB. His address email
1706.08501
2
1706
2017-07-25T09:58:24
A Simulator for Hedonic Games
[ "cs.MA", "cs.AI" ]
Hedonic games are meant to model how coalitions of people form and break apart in the real world. However, it is difficult to run simulations when everything must be done by hand on paper. We present an online software that allows fast and visual simulation of several types of hedonic games. http://lukemiles.org/hedonic-games/
cs.MA
cs
A Simulator for Hedonic Games Luke Harold Miles University of Kentucky 1 A Story Mr Holt, the kindergarten teacher, gives his class these instructions: Hello class, The Metropolitan Museum of Art has a sudden shortage of sculptures and needs several new ones to fill its shelves. Please break into groups so that each group can build a Lego tower. The director of the museum will be here in an hour to pick up the towers and put them in the museum with your names on them. Please do the best job you can; you don't want to be professionally embarrassed. Each kindergartener wants to be in a group with her friends, but she also wants her friends to be happy in the group; she doesn't want her friends to be miserable. The graph below is a map of who is friends with whom in the small class. Notice that a would have more friends in the group {a, b, c, d, e} than {a, b, c, d}, but maybe a doesn't want e to be in the group because a knows that would make b, c, and d less happy. Strangely, a prefers {a, b, c, d} to {a, b, c, d, e}. You can imagine that the kindergarteners might try to choose the best group in some other way. The class would split into groups one way, but then people would be unhappy and keep changing their groups. How can we model all this? How could we easily visualize all this? 2 Hedonic Games Below is the original definition of a hedonic game. Hedonic games [Banerjee, Konishi, and Sonmez, 2001] were invented to model the formation and reforma- tion of groups. Definition 1. [Banerjee, Konishi, and Sonmez, 2001] A coalition formation game is a pair G = (N, ((cid:23)i)i∈N ), where N is a finite set of players and for every i ∈ N , (cid:23)i is a reflexive, complete, and transitive binary relation on N i = {C ∈ 2N : i ∈ C}. If C, D ∈ N i and C (cid:23)i D and D (cid:54)(cid:23)i C, then we write C (cid:31)i D. Definition 2. [Banerjee, Konishi, and Sonmez, 2001] A coalition structure Γ = {C1, . . . , Ck} is a partition of N . The coalition containing a player i ∈ N is denoted Γ (i). Any subset of N is called a coalition. That's a very minimal definition, and these most general hedonic games don't have many computationally useful properties. For that reason, several subclasses of hedonic games have been invented and studied. First though, let's look at stability. 2.1 The Core If Mr Holt were assigning groups, instead of letting the kids form their own groups, then he might want a way to predict if a given partition will stick before he actually moves people around. "Will the students stay in their groups or will they form new ones?" There are many ways you can ask the question "Is this coalition formation stable?" Seven good ways are mentioned in [Nguyen, Rey, Rey, Rothe, and Schend, 2016]. One of the most important ways to ask the question (and the focus of the survey [Woeginger, 2013]) is "Is this this coalition formation core stable?". Definition 3. In a hedonic game G with a partition Γ , if there is a nonempty set C ⊆ N where ∀i ∈ C : C (cid:31)i Γ (i), then we say that C blocks Γ , or C is a blocking coalition in Γ . If Γ cannot be blocked, then it is called core stable. The set of core stable partitions for a game G is called the core of G. 3 Varieties of Hedonic Games In the below paragraphs, n = N is the number of players, i is a player in N , and C, D ∈ N i are coalitions which contain i. 3.1 Fractional Hedonic Games [Aziz, Brandt, and Harrenstein, 2014] In fractional hedonic games, i assigns some real value vi(j) to every player j ∈ N . It's assumed that vi(i) = 0.1 We say C (cid:23)FR (C) ≥ uFR (D), where i D if uFR i i (cid:88) j∈C uFR i (C) = vi(j). 1 Raising your own score is equivalent to lowering everyone else's score. Lowering your own score is equivalent to raising everyone else's score. A fractional hedonic game is called simple if ∀i, j ∈ N : vi(j) ∈ {0, 1} and is called symmetric if ∀i, j ∈ N : vi(j) = vj(i). Aziz, Brandt, and Harrenstein show that even in fractional hedonic games which are both simple and symmetric, the core is sometimes empty and that checking core emptiness is Σp 2 -complete. 3.2 Friend and Enemy Oriented Hedonic Games [Dimitrov, Borm, Hendrickx, and Sung, 2006] In both of these kinds of games, i splits the other players in N into a set of friends, Fi, and a set of enemies, Ei. In friend-oriented games, i prefers coalitions with more friends and breaks ties by considering the number of enemies. In other words, C (cid:23)FO i D ⇐⇒ C ∩ Fi > D ∩ Fi ∨ (C ∩ Fi = D ∩ Fi ∧ C ∩ Ei ≤ D ∩ Ei) ⇐⇒ uFO where uFO (C) ≥ uFO (C) = nC ∩ Fi − C ∩ Ei. (D), i i i So if C has 8 of i's friends and 600 of i's enemies and D has 7 of i's friends and 0 of i's enemies, then i would still rather be in C. In enemy-oriented games, i tries to minimize enemies and only considers friends to break a tie. In other words, C (cid:23)EO i D ⇐⇒ C ∩ Ei < D ∩ Ei ∨ (C ∩ Ei = D ∩ Ei ∧ C ∩ Fi ≥ D ∩ Fi) ⇐⇒ uEO where uEO (C) ≥ uEO (C) = C ∩ Fi − nC ∩ Ei. (D), i i i Dimitrov, Borm, Hendrickx, and Sung show that the core is guaranteed to be non-empty in both kinds of games. However, finding a core stable partition is NP-hard in enemy-oriented games2 but polynomial time in friend-oriented games. 3.3 Altruistic Hedonic Games Three levels of altruism are considered. Let avg(S) =(cid:80) [Nguyen, Rey, Rey, Rothe, and Schend, 2016] As in friend and enemy oriented hedonic games, i divides the other players into friends, Fi, and enemies, Ei. The idea is that a player wouldn't want to be in a coalition C where his friends were miserable, even if C had all of his friends and none of his enemies. x∈S x/S denote the average of a multiset of numbers. And, as above, the utilities ui are defined so that C (cid:23)i D ⇐⇒ ui(C) ≥ ui(D). 2 More precisely, if you could always find a core stable coalition structure in polyno- mial time, then you could also find the largest clique in any (undirected, unweighted) graph in polynomial time. In selfish-first altruistic games, a player cares most about his own hap- piness and uses his friends' preferences to break ties. 'Happiness' here means the friend-oriented score. This is distinct from friend-oriented games in that a tightly connected coalition C with 6 friends and 3 enemies is preferred to a sparse coalition D with 6 friends and 3 enemies, because i's friends in C are happier than i's friends in D. uSF i (C) = n5uFO i (C) + avg(uFO j (C) : j ∈ C ∩ Fi). In equal-treatment altruistic games, a player takes his and all his friends' opinions into account equally when evaluating a partition: uEQ i (C) = avg(uFO j (C) : j ∈ C ∩ Fi ∪ {ı}). And in altruistic-treatment altruistic games (i.e., truly altruistic games), a player prefers coalitions where his friends are happy and breaks ties by consid- ering his own happiness. uAL i (C) = uFO i (C) + n5avg(uFO j (C) : j ∈ C ∩ Fi). Nguyen, Rey, Rey, Rothe, and Schend show that selfish-first altruistic games always have an nonempty core. Whether equal-treatment altruistic games and truly altruistic games ever have empty cores are open questions. I suspect that the core is always nonempty in both games. 4 The Simulator I wrote software to simulate hedonic games and put in on the internet. You can draw graphs, choose partitions, choose several different player types, and check the stability of the partition under several different measures. Hopefully this will help others and myself quickly understand different hedonic games and speed up the process of finding stable partitions. http://lukemiles.org/hedonic-games The website works better on laptops than smartphones. Updates may have been made to the website since this arXiv version was uploaded. Bibliography Haris Aziz, Felix Brandt, and Paul Harrenstein. Fractional hedonic games. In Proceedings of the 2014 international conference on Autonomous Agents & Multi-Agent Systems (AAMAS), 2014. Suryapratim Banerjee, Hideo Konishi, and Tayfun Sonmez. Core in a simple coalition formation game. Social Choice and Welfare, 2001. Dinko Dimitrov, Peter Borm, Ruud Hendrickx, and Shao Chin Sung. Simple priorities and core stability in hedonic games. Social Choice and Welfare, 2006. Nhan-Tam Nguyen, Anja Rey, Lisa Rey, Jorg Rothe, and Lena Schend. Altru- istic hedonic games. In Proceedings of the 2016 international conference on Autonomous Agents & Multi-Agent Systems (AAMAS), 2016. Gerhard J Woeginger. Core stability in hedonic coalition formation. In Proceed- ings of SOFSEM 2013: Theory and Practice of Computer Science, 2013.
1610.07901
1
1610
2016-10-25T14:45:24
Avoid or Follow? Modelling Route Choice Based on Experimental Empirical Evidences
[ "cs.MA" ]
Computer-based simulation of pedestrian dynamics reached meaningful results in the last decade, thanks to empirical evidences and acquired knowledge fitting fundamental diagram constraints and space utilization. Moreover, computational models for pedestrian wayfinding often neglect extensive empirical evidences supporting the calibration and validation phase of simulations. The paper presents the results of a set of controlled experiments (with human volunteers) designed and performed to understand pedestrian's route choice. The setting offers alternative paths to final destinations, at different crowding conditions. Results show that the length of paths and level of congestion influence decisions (negative feedback), as well as imitative behaviour of "emergent leaders" choosing a new path (positive feedback). A novel here illustrated model for the simulation of pedestrian route choice captures such evidences, encompassing both the tendency to avoid congestion and to follow emerging leaders. The found conflicting tendencies are modelled with the introduction of a utility function allowing a consistent calibration over the achieved results. A demonstration of the simulated dynamics on a larger scenario will be also illustrated in the paper.
cs.MA
cs
Proceedings of the 8th International Conference on Pedestrian and Evacuation Dynamics (PED2016) Hefei, China - Oct 17 – 21, 2016 Paper No. 84 Avoid or Follow? Modelling Route Choice Based on Experimental Empirical Evidences Luca Crociani1∗ Daichi Yanagisawa2 Giuseppe Vizzari1 Katsuhiro Nishinari2 and Stefania Bandini1,2 1 Complex Systems and Artificial Intelligence research center, University of Milano–Bicocca Viale Sarca 336 – Ed. U14, 20126 Milano (ITALY) {name.surname}@disco.unimib.it 2 Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba, Meguro-ku, Tokyo 153-8904 (JAPAN) [email protected]; [email protected] Abstract - Computer-based simulation of pedestrian dynamics reached meaningful results in the last decade, thanks to empirical evidences and acquired knowledge fitting fundamental diagram constraints and space utilization. Moreover, computational models for pedestrian wayfinding often neglect extensive empirical ev- idences supporting the calibration and validation phase of simulations. The paper presents the results of a set of controlled experiments (with human volunteers) designed and performed to understand pedestrian's route choice. The setting offers alternative paths to final destinations, at different crowding conditions. Re- sults show that the length of paths and level of congestion influence decisions (negative feedback), as well as imitative behaviour of "emergent leaders" choosing a new path (positive feedback). A novel here illustrated model for the simulation of pedestrian route choice captures such evidences, encompassing both the tendency to avoid congestion and to follow emerging leaders. The found conflicting tendencies are modelled with the introduction of a utility function allowing a consistent calibration over the achieved results. A demonstration of the simulated dynamics on a larger scenario will be also illustrated in the paper. Keywords: Pedestrian Dynamics, Route Choice, Experiment, Simulation, Validation 1. Introduction The simulation of pedestrians and crowds is a consolidated research and application area that, al- though existing results are currently employed on a daily basis by designers and decision makers, still presents challenges for researchers in different fields and disciplines. Innovations in the field come from diverse contributions, from attempts to integrate automated analysis of crowd behaviour and simula- tion [1] to investigations on the impact of emotional aspects on crowd dynamics [2], and even on the usage of simulation as a real-time support to crowd management [3]. Even if we only consider choices and actions related to walking in normal situations, modelling human decision making activities and actions is a complicated task. Decisions on pedestrian's actions are taken at different levels of abstraction, from path planning to the regulation of distance from other pedestrians (potentially having different kinds of relationships, as recent results on the impact of groups indicate [4]) and obstacles present in the environment. A factor making the evaluation of simulation results more com- plicated is the fact that the measure of success and validity of a model is not the optimality of pedestrian dynamics with respect to some cost function (either on the individual or on the aggregated dynamics), as (for instance) in robotics. The success of a simulation model is associated to its plausibility, the adherence of the simulation results to data that can be acquired by means of observations or experiments. The present research effort is aimed at producing insights on this aspect: an experiment involving pedestrians has been set up to investigate to which extent pedestrians facing a relatively simple choice (i.e. choose one of two available gateways leading to the same target area) in which, however, they can ∗Corresponding author. Figure 1: Configuration of the setting for the experiment. face a trade-off situation between length of the trajectory to be covered and estimated travel time. The closest gateway, in fact, is initially selected by most pedestrians but it is too narrow to allow a smooth passage of so many pedestrians, and it quickly becomes congested. The other choice can therefore become much more reasonable, allowing a higher average walking speed and comparable (if not even lower) travel time. We observed that several pedestrians choose longer paths to preserve high walking speed, and often do so following a first emerging leader. Modelling this kind of choices with current approaches can be problematic. The model presented in this paper represents a step in the direction fitting this kind of evidences but providing a general approach to this kind of pedestrian decisions. The proposed model encompasses, in fact, both a proxemic tendency to avoid congestion, as well as an imitation mechanism: these conflicting tendencies can be calibrated according to empirical evidences. The former aspect represents a sort of negative feedback caused by crowding conditions (i.e. avoid a congested exit) but, on the other hand, the incentive to following another pedestrian that just decided to choose a more distant but less crowded passage represents a positive feedback on this choice. In the following, we will first describe the experiment and the achieved results. The description of the model will be given in Section 3, followed by the discussion of its calibration and achieved results. 2. Experimental Study The experiment has been performed at the University of Tokyo in November 2015. A group of 46 persons has participated, uniformly composed of male students aged around 20 years old. The setting has been configured with the intention to acquire empirical evidences on the influence of crowding conditions on route choice decisions. The setting is designed to describe an elementary choice: it is characterized by a rectangular environment of 7.2 × 12 m2 divided in two areas of equal size; the access is regulated by three gates positioned to create three paths of different lengths. A schematic representation of the scenario is illustrated in Figure 1. The entrance and exits of the environment are aligned on the x-axis, in order to generate a shortest path (patha) and to induce the decisions of the participants. The average lengths of the three possible paths –calculated as the sum of distances between the central points of the crossed openings– is as following: (i) patha 12.08; (ii) pathb 12.85; (iii) pathc 14.76. The difference between Patha and Pathb is relatively small (< 1 m) while Pathc is significantly longer than the shortest path. These differences will be reflected on the achieved results pointing out, as generally known, that the main element influencing the route choice is the distance. After each run, the participants were asked to regroup in the starting area right after the exit point, in order to optimize the procedural times. This has also allowed to balance the potential influence of the cultural elements related to left–right preference of movement, by reversing the direction of flow in the scenario. The openings related to Pathb and Pathc were eventually closed to configure different procedures. Each procedure has been repeated 4 times to achieve a more consistent dataset. The procedures are described in the following: 1. only Patha allowed; 2. Patha and Pathb allowed; 84 - 2 3. Patha and Pathc allowed; 4. all gates are open. The procedure iterations have been performed with a randomized schedule, to possibly avoid bias provided by the learning of participants. Finally, to stimulate the will to minimize the travelling time towards the destination, the participants have been asked to reach quickly the opposite side of the setting. 2.1. Methodology for the Analysis The experiment has been performed under an arcade of the university buildings, due to weather conditions. The lack of safe points to attach any camera to the ceiling did not allow to have a zenithal perspective in the video recordings, which would be useful for an automatic tracking. Hence, four HD cameras positioned on tall tripods (5m circa) have been used to record the experiment. The videos have been synchronized by means of a global chronometer shown to the cameras at the beginning of the recording. Since the frame rate of the two cameras with the highest resolution was slightly variable (a small number of frames was skipped during the recording), some manual adjustment has been done to the video synchronization. This was possible by using visible events in the overlapping areas of multiple camera views and also by using the audio track of the videos. The software AviSynth has been employed to achieve the synchronization and merge the multiple video tracks. The results that will be presented in the following subsection has been achieved by means of manual counting and tracking. 2.2. Results and Discussion The video footages of the performed experiments did not allow us to perform a fine tracking of the exact trajectories followed by the different pedestrians, mainly due to the positioning of cameras. Nonetheless, different types of analysis will be carried out to acquire novel empirical evidences on pedestrian route choice decisions in presence of crowding conditions. So far, we focused on a relatively simple analysis that regarded the number of participants who passed through each gate depending on the experimental procedure, and therefore on the level of congestion. Our aim was to verify if the experimental results supported the conjecture that pedestrians, when the perceived level of congestion makes less appealing the shortest path, choose a longer trajectory to preserve their walking speed. Additional analyses will be carried out, within the limits posed by the vantage point, as a consequence of the results of this first round of integrated analysis and synthesis activities [1]. The Table 1 shows the counting of people passing through each gate for procedures with multiple open gates. As already briefly discussed, procedure 2 and 3 are characterized by a decision among two choices of different lengths; in procedure 2 the difference among the alternatives is quite small (i.e. less than a meter, less than 10% of the shortest trajectory, considering the middle point of the gates for the measurement), whereas in procedure 3 the longer trajectory is more significantly worse than the shortest path (i.e. over 20% longer). Finally, procedure 4 allows pedestrians to choose among all three alternatives. Intermediate gates are relatively small (1 m) but the evidence shown that they still allow the passage of two pedestrians almost at the same time. Moreover, the passage between the starting area and the region before the gates is relatively wide (2.4 m) and here pedestrians are able to walk side by side; this implies that some of them are naturally closer to the best trajectory while for others the worst ones are not that longer. Results are essentially in line with the expectations on the conjecture that pedestrians would dis- tribute among the alternative passages in case of congestion. In fact, in procedure 2, almost half of the pedestrians chooses the slightly longest path to avoid the congested path. The fact that, in procedure 3, the longer alternative (P athc) is more significantly worse, makes this choice appealing to a lower number of pedestrians. Procedure 4, finally, shows that the P atha and P athb are perceived as almost equivalent, but a few pedestrians even choose P athc in order to preserve a high walking speed by avoiding congestion on the best alternatives. In particular, a few general qualitative considerations on all the analyzed procedures can be done: • pedestrians choosing longer paths (P athb and P athc) generally enter the area before the gates on upper side, referring to the map of the scenario in Figure 1; • pedestrians choosing longer paths generally do so after some preceding ones have perceivably cho- sen the best path, and therefore can be considered as potential future competitors either for the 84 - 3 (a) 19 s (b) 21 s (c) 23 s (d) 25 s Figure 2: Video camptures from one camera during procedure 4. The behaviours considered in this paper can be recognized: at 19 s of the video, the crowding of P atha and P athb leads a person to employ P athc. After 2 s, other students have taken the same decision, successively followed by others. In the bottom images, a decision change is apparent: the highlighted person is firstly headed to the central gate, but after a short while he notices that P atha is getting empty again and he employs it. occupation of the gate or for the path leading to it; this is particularly apparent for procedure 3 and 4; • sometimes, when choosing the longest path (P athc) pedestrians seem to follow someone before them that had chosen this trajectory before and, at the same time, avoiding much closer pedestrians that have perceivably chosen other shorter paths. Figure 2 emphasizes these considerations by showing 4 sequential screen-shots from one iteration of procedure 4. While these results are still quite aggregated, they suggest that pedestrians are driven by the expected travel time rather than just the length of the trajectory. Moreover, the observed following dynamics could be explained as a form of cooperative behaviour by which those who are on the back select a preceding pedestrian whose choice is assumed to be promising, at a glance, without actually computing the expected quickest time to the exit. To some extent, this reminds conflicting but simultaneously present behavioural components of cohesion and separation, considered in simulation models [5]. In particular, the modelling approach that will be introduced in the following Section, will consider both the fact that other pedestrians are generally perceived as repulsive but also the fact that the decision of a pedestrian to detour (i.e. change a previous decision on the path to be followed) is a locally perceivable event that might trigger a similar reconsideration by nearby pedestrians. 3. A Novel Model for Pedestrian Wayfinding The proposed agent-based model defines two components of the agent, respectively dedicated to the low level reproduction of the movement towards a target (i.e. the operational level, considering a three level model described in [6]) and to the decision making activities related to the next destination to be pursued (i.e. the wayfinding). Due to lack of space, the mechanisms for the physical reproduction of movement will not be described† and the discussion will be limited to the different representations of the environment composing the knowledge needed for the wayfinding. †For technical details of this aspect it is referred to [7]. 84 - 4 Procedure Patha Pathb Pathc 2 22 23 25 23 24 23 21 23 Average 23.25 22.75 3 Average 4 27 28 30 27 28 18 22 21 22 Average 20.75 0 0 0 0 0 16 19 18 19 18 0 0 0 0 0 19 18 16 19 18 12 5 7 5 7.25 Table 1: Counting of number of people passed through each path for procedures 2, 3 and 4. 3.1. The Representation of the Environment and the Knowledge of Agents The environment [8] is discrete and modelled with a rectangular grid of 40 cm sided square cells, as usually applied in this context. The simulation scenario is drawn by means of several markers. Basic markers of the scenario are start areas, obstacles and final destinations –ultimate targets of pedestrians. To allow the wayfinding, two other markers are introduced. Openings are sets of cells that divide the environment into regions, together with obstacles. These objects constitutes decision elements for the route choice, which will be denoted as intermediate targets. Finally, regions are markers that describe the type of the region: with them it is possible to design particular classes of regions (e.g. stairs, ramps). This model uses the floor fields approach [9], spreading potentials from cells of obstacles and desti- nations to provide information about distances. The two types of floor fields are denoted as path field, spread from each target, and obstacle field, a unique field spread from all obstacle cells. In addition, a dynamic floor field that has been denoted as proxemic field is used to reproduce plausible distance towards the agents in low density situations. The presence of intermediate targets allows the computation of a graph-like representation of the walkable space, based on the concept of cognitive map [10]. The algorithm for the computation of this data structure is defined in [11] and it uses the information of the floor fields associated to openings and final destinations. Recent approaches explores also the modelling of partial and incremental knowledge of the environment by agents (e.g. [12]), but this aspect goes beyond the scope of the current work. The data structure identifies regions (e.g. a room) as nodes of the labelled graph and openings as edges. Overall the cognitive map allows the agents to identify their position in the environment and it constitutes a basis for the generation of an additional knowledge base, which will enable the reasoning for the route calculation. This additional data structure is denoted as Paths Tree and it contains the free flow travel times‡ related to plausible paths towards a final destination, from each intermediate target in the environment. The concept of plausibility of a path is encoded in the algorithm for the computation of the tree, which is thoroughly discussed in [13]. Formally, for the choice of paths the agents access the information of a Paths Tree, generated from a final destination End, with the function P aths(R, End). Given the region R of the agent, this outputs a set of couples {(Pi, tti)}. Pi = {Ωk, . . . , End} is the ordered set describing paths starting from Ωk, belonging to Openings(R) and leading to End. tti is the respective free flow travel time. 3.2. The Route Choice Model of Agents This novel part of the model is inspired by the behaviour observed in the experiment. The aim is to propose an approach that would enable agents to choose their path considering distances as well as the evolution of the dynamics, being able to follow emerging leaders as well as to avoid congestions. At the same time, the model must provide a sufficient variability of the results and a calibration over possible empirical data. The life-cycle of the agent is illustrated in Figure 3. First of all, the agent performs a perception of his situation, aimed at understanding its position in the environment and the perceivable markers from its region. At the very beginning of its life, the agent does not have any information about its location, ‡Calculated with their desired speed of walking. 84 - 5 Figure 3: The life-cycle of the agent, emphasizing the two components of the model. thus the first assignment is its localization, inferring the location in the Cognitive Map. Once the agent knows its region, it loads the Paths Tree and evaluates the possible paths towards its final destination. In this model, the evaluation and choice of paths is designed with the concept of path utility, computed to assign a probability to be chosen. The probabilistic choice outputs a new intermediate target of the agent, which will be followed at the operational level. The functions introduced for the wayfinding model are Evaluate Paths and Choose Paths, which will be now discussed. 3.2.1. The Utility and Choice of Paths The function that computes the probability of choosing a path is exponential with respect to the utility value associated to it. This is analogous to the choice of movement at the operational layer: P rob(P ) = N · exp (κttEvaltt(P ) − κqEvalq(P ) + κf Evalf (P )) (1) The exponential function is used to emphasize differences in the perceived utility values of paths, limiting the choice of relatively bad solutions. The exponent comprises the three observed components influencing the route choice decision, which are aggregated with a weighted sum. In particular, the first element evaluates the expected travel times, the second considers the queuing conditions through the considered path and the last one introduces a positive influence of choices of nearby agents to pursue the associated path (i.e. imitation of emerging leaders). Each of the three functions provide normalized values within the range [0, 1]. 3.2.2. The Evaluation of Travelling Times Distances and travel times are elements that significantly affect our choice of route and this is observed also in the experiment, where the shortest path resulted as the most chosen on average. First of all, the free flow travel time tti of a path Pi is achieved with P aths(R, End) (End is the agent's final destination, identifying the appropriate Paths Tree, and R is the region of the agent) and it is summed with the free flow travel time to reach the first opening Ωk described by each path: TravelTime(Pi) = tt i + P FΩk (x, y) Speed d (2) P FΩk (x, y) is the value of the path field associated to Ωk in the position of the agent and Speed d is its desired speed. The value of the travelling time is then evaluated by means of the following function: Eval tt(P ) = Ntt · min Pi∈Paths(r) (TravelTime(Pi)) TravelTime(P ) (3) Ntt is the normalization factor. The minimum value of travel times provides a range of the function of (0,1], being 1 for the path with minimum travel time and decreasing as the difference with the other 84 - 6 paths increases. This modelling choice, makes this function describe the utility of the route in terms of travel times, instead of its cost. 3.2.3. The Evaluation of Congestion The competition arisen between the participants of the experiment made some of them choose longer paths, in order to avoid the possible queue. The behaviour modelled in the agent reflects this effect, by considering congestion as a negative element for the evaluation of the path. For the evaluation of this component, a function is firstly introduced for denoting agents a(cid:48) that precedes the evaluating agent a in the route towards the opening Ω of a path P : Forward (Ω, a) = {a (cid:48) ∈ Ag\{a} : Dest(a (cid:48) ) = Ω ∧ PF Ω(Pos(a (cid:48) )) < PF Ω(Pos(a))} (4) where P os and Dest indicates respectively the position and current destination of the agent; the fact that PF Ω(Pos(a(cid:48))) < PF Ω(Pos(a)) assures that a(cid:48) is closer to Ω than a,. Each agent is therefore able to perceive the main direction of the others (its current destination). This kind of perception is plausible considering that only preceding agents are counted, but we want to restrict its application when agents are sufficiently close to the next passage. To introduce a way to calibrate this perception, the following function and an additional parameter γ is introduced: PerceiveForward (Ω, a) = Forward (Ω, a), 0, if PF Ω(Pos(a)) < γ otherwise (5) (cid:40) (cid:40) The function Eval q is finally defined with the normalization of PerceiveForward values for all the openings connecting the region of the agent: Eval q(P ) = Nq · PerceiveForward (FirstEl (P ), myself ) width(FirstEl (P )) (6) where FirstEl returns the first opening of a path, myself denotes the evaluating agent and width scales the evaluation over the width of the door. 3.2.4. Propagation of Choices - Following behaviour Another behaviour observed in the experiment described a substantial following of emerging leaders who sudden change their route due to the surrounding crowding conditions. The final component of this model aims at representing the effect of additional stimulus for the agents, generated by decision changes of other persons. An additional grid is then introduced to model this event, whose functioning is similar to the one of a dynamic floor field. The grid, called ChoiceField, is used to spread a gradient from the positions of agents that, at a given time-step, change their plan due to the perception of congestion. The functioning of this field is described by two parameters ρc and τc, which defines the diffusion radius and the time needed by the values to decay. The diffusion of values from an agent a, choosing a new target Ω(cid:48), is performed in the cells c of the grid with Dist(Pos(a), c) ≤ ρc with the following function: Diffuse(c, a) = 1/Dist(Pos(a), c) 1 if Pos(a) (cid:54)= c otherwise (7) The diffused values persist in the ChoiceField grid for τc simulation steps, then they are simply discarded. The index of the target Ω(cid:48) is stored together with the diffusion values, thus the grid contains in each cell a vector of couples {(Ωm, diff Ωm ), . . . , (Ωn, diff Ωn)}, describing values of influence associated to each opening of the related region. While multiple neighbour agents change their choices towards the opening Ω(cid:48), the values of the diffusion are summed up in the respective diff Ω(cid:48). Moreover, after having changed its decision, an agent spreads the gradient in the grid for a configurable amount of time steps represented by an additional parameter τa, thus it influences the choices of its neighbours for τa time. The existence of values diff Ωk > 0 for some opening Ωk implies that the agent is influenced in the evaluation phase by one of these openings, but the probability for which this influence is effective is, after all, regulated by the utility weight κf . In case of having multiple diff Ωk > 0 in the same cell, a individual influence is chosen with a simple probability function based on the normalized weights diff associated to the cell. Hence, for an evaluation performed by an agent a at time-step t, the utility component Evalf can be equal to 1 only for one path P , between the paths having diff Ωk > 0 in the position of a. 84 - 7 (a) Procedure 2 (b) Procedure 3 Figure 4: Comparison between empirical data and simulation results with different calibrations. (c) Procedure 4 4. Calibration of the Model and Conclusions To evaluate the reliability of the proposed model, we employed the observed data of the experiment for performing a comparison with results coming from the simulation of the same setting. A set of 50 simulation iterations per each experimental procedure has been configured and the counting of agents passing through each gate has been gathered. Results are shown in Figure 4. The value for parameters has two kinds of impact on the achieved results: it obviously determines the 84 - 8 number of pedestrians choosing a specific door, but it also affects the variance of these numbers. In fact, moving from the first calibration (κtt = 10, κq = 7, κf = 5) to the second (κtt = 10, κq = 2.5, κf = 0.5), we achieved average results closer to the empirical observation, however the variability was too high. This lead us to considering a final calibration (κtt = 100, κq = 25, κf = 5) that preserved the proportion among the weights, but increasing their values to reduce the effect of randomness, leading therefore to very similar average results but a much lower variability, more similar to the one observed in the experiments. In conclusion, the presented model is effective in reproducing the observed phenomena, but it is of general applicability and we are in the process of evaluating the effects of its usage in larger scale egress scenarios. Acknowledgement The experiment was authorised and supported by The University of Tokyo. The authors would like to thank Francesco Crippa for his support in the development and experimentation of the model. References [1] G. Vizzari and S. Bandini, "Studying pedestrian and crowd dynamics through integrated analysis and synthesis," IEEE Intelligent Systems, vol. 28, no. 5, pp. 56–60, 2013. [2] T. Bosse, M. Hoogendoorn, M. C. A. Klein, J. Treur, C. N. van der Wal, and A. van Wissen, "Modelling collective decision making in groups and crowds: Integrating social contagion and interacting emotions, beliefs and intentions," Autonomous Agents and Multi-Agent Systems, vol. 27, no. 1, pp. 52–84, 2013. [Online]. Available: http://dx.doi.org/10.1007/s10458-012-9201-1 [3] A. Tsiftsis, I. G. Georgoudas, and G. C. Sirakoulis, "Real data evaluation of a crowd supervising system for stadium evacuation and its hardware implementation," IEEE Systems Journal, vol. 10, no. 2, pp. 649–660, 2016. [Online]. Available: http://dx.doi.org/10.1109/JSYST.2014.2370455 [4] N. W. F. Bode, S. Holl, W. Mehner, and A. Seyfried, "Disentangling the impact of social groups on response times and movement dynamics in evacuations," PLoS ONE, vol. 10, no. 3, pp. 1–14, 03 2015. [Online]. Available: http://dx.doi.org/10.1371%2Fjournal.pone.0121227 [5] M. Moussaıd, N. Perozo, S. Garnier, D. Helbing, and G. Theraulaz, "The walking behaviour of pedestrian social groups and its impact on crowd dynamics." PloS one, vol. 5, no. 4, p. e10047, 2010. [6] S. P. Hoogendoorn and P. H. L. Bovy, "Pedestrian route-choice and activity scheduling theory and models," Transportation Research Part B: Methodological, vol. 38, no. 2, pp. 169–190, 2004. [7] S. Bandini, L. Crociani, and G. Vizzari, "An approach for managing heterogeneous speed profiles in cellular automata pedestrian models," Journal of Cellular Automata, (in press). [8] D. Weyns, A. Omicini, and J. Odell, Autonomous Agents Multi-Agent Systems, vol. 14, no. 1, pp. 5–30, 2007. [9] C. Burstedde, K. Klauck, A. Schadschneider, and J. Zittartz, "Simulation of pedestrian dynamics using a two-dimensional cellular automaton," Physica A: Statistical Mechanics and its Applications, vol. 295, no. 3 - 4, pp. 507–525, 2001. [10] E. C. Tolman, "Cognitive maps in rats and men." Psychological review, vol. 55, no. 4, pp. 189–208, 1948. [11] L. Crociani, A. Invernizzi, and G. Vizzari, "A hybrid agent architecture for enabling tactical level decisions in floor field approaches," Transportation Research Procedia, vol. 2, pp. 618–623, 2014. [12] E. Andresen, D. Haensel, M. Chraibi, and A. Seyfried, "Wayfinding and cognitive maps for pedestrian models," in Proceedings of Traffic and Granular Flow 2015 (TGF2015). Springer, (in press). [13] L. Crociani, A. Piazzoni, G. Vizzari, and S. Bandini, "When reactive agents are not enough: Tactical level decisions in pedestrian simulation," Intelligenza Artificiale, vol. 9, no. 2, pp. 163–177, 2015. 84 - 9
1807.08663
1
1807
2018-07-23T15:09:25
Measuring collaborative emergent behavior in multi-agent reinforcement learning
[ "cs.MA" ]
Multi-agent reinforcement learning (RL) has important implications for the future of human-agent teaming. We show that improved performance with multi-agent RL is not a guarantee of the collaborative behavior thought to be important for solving multi-agent tasks. To address this, we present a novel approach for quantitatively assessing collaboration in continuous spatial tasks with multi-agent RL. Such a metric is useful for measuring collaboration between computational agents and may serve as a training signal for collaboration in future RL paradigms involving humans.
cs.MA
cs
Measuring collaborative emergent behavior in multi- agent reinforcement learning Sean L. Barton1, Nicholas R. Waytowich2, Erin Zaroukian1, & Derrik E. Asher1 1Computational & Information Sciences Directorate, U.S. Army Research Laboratory 2Human Research & Engineering Directorate, U.S. Army Research Laboratory learning (RL) has Abstract. Multi-agent reinforcement important implications for the future of human-agent teaming. We show that improved performance with multi-agent RL is not a guarantee of the collaborative behavior thought to be important for solving multi-agent tasks. To address this, we present a novel approach for quantitatively assessing collaboration in continuous spatial tasks with multi-agent RL. Such a metric is useful for measuring collaboration between computational agents and may serve as a training signal for collaboration in future RL paradigms involving humans. Keywords: Multi-agent Reinforcement Learning · Deep Reinforcement Learning · Human-Agent Teaming · Collaboration 1 Introduction Reinforcement learning (RL) is an attractive option for providing adaptive behavior in computational agents because of its theoretical generalizability to complex problem spaces [1, 2]. In particular, deep RL recently produced striking results [3]. Extending RL to the multi-agent domain has received an increasing amount of attention as the need for human-agent teams has increased, especially with regards to training agents to behave collaboratively [1, 4 -- 8]. Unfortunately, the nature of multi-agent RL makes guaranteeing collaboration between agents impossible except in limited provable cases, even when these methods yield better task performance [1, 7]. Thus far, evaluating collaboration in multi-agent learning has been accomplished by measuring performance in tasks where coordination is required. While this may be satisfactory for discretized tasks where cooperative policies are provably optimal [1, 6 -- 8] it is not clear that this methodology generalizes well to more complex and continuous tasks (such as those presented in [4, 5] and here). The question at hand is how to assess performance enhancing coordination (or collaboration) between agents in multi-agent RL tasks. Here, we present a method borrowed from the field of ecology, called convergence cross mapping (CCM), and show how it can be used to measure collaboration between agents during a predator- prey pursuit task. Additionally, we show a striking result: a state-of-the-art multi-agent reinforcement learning algorithm does not exhibit coordinated behavior between agents during a collaborative task even though high task performance is achieved, indicating that performance metrics alone are not sufficient for measuring collaboration. 2 Methods Simulation Environment 2.1 In a modification of the classic predator-prey pursuit task (see Figure 1A-C), three slower predator agents score points each time they make contact with a prey agent in a continuous bounded 2D particle environment. Predator agents were identical in terms of capabilities (i.e., velocity and acceleration). This simulation environment was made available through the OpenAI Gym network [9] and was developed for the multi-agent deep learning algorithm discussed below [4]. Prey agents were capable of 33% greater acceleration and 25% greater maximum velocity than any predator agent, making capture by a solitary predator extremely difficult. All agents had the same mass, with minimal elastic properties to provide a small bump force upon collisions. Agent positions and velocities were randomized at the start of each episode, and acceleration was initially set to zero. Predator agents all received a fixed reward when any one of them made contact with the prey agent. Prey agents received a punishment when they were contacted. 2.2 Agents In order to evaluate our metric's ability to estimate collaboration between predators in the predator-prey task, we utilized two types of agents: learning agents and fixed- strategy (non-learning) agents. Learning agents' behaviors were guided by a multi- agent deep deterministic policy gradient (MADDPG) algorithm [4]. In all cases, prey agents were learning agents and thus utilized the MADDPG algorithm independent of predator behavior. Two types of distinct fixed-strategy predators were implemented to demonstrate upper and lower bounds of coordinated behaviors. The first (termed 'Chaser' predators, see Figure 1A) naively pursued prey agents by maximally accelerating in the instantaneous direction of the prey relative to the predator's own position. As such, Chasers were incapable of coordinating their behavior with each other. The second strategy (termed 'Spring' predators, see Figure 1B) also naively minimized distance to the prey, but predator movements were modified by spring forces which constrained their position and velocity relative to one another. A Spring predator's movement direction was a sum of the spring forces acting on it and its desired vector of movement towards the prey. In this case, predator actions were explicitly coordinated with their partners'. The MADDPG algorithm (Figure 1C and 1E) used to guide learning agent behavior is an extension of a deep deterministic policy gradient (DDPG) algorithm [3] into the multi-agent domain [4]. Like DDPG, MADDPG utilizes an actor-critic model with deep neural networks representing policy and Q-learners (Figure 1E). Multi-agent capabilities are achieved by passing information about each agent's state and actions to each critic network. As such, the learning agents are joint action learners as opposed to independent learners, giving them an advantage when coordinating their behaviors [8]. All conditions (Figure 1A-C) were trained for 100k episodes to ensure model convergence before evaluating collaborative behavior (Figure 1D). Each episode lasted for 25 time steps during learning and 2000 time steps during evaluation. These intervals were selected to match what was shown in literature for sufficient learning [4] and required for analysis [10]. During testing, 10 episodes were recorded without learning for each predator strategy in order to produce a distribution of agent behaviors with the same level of training over various random starting positions. Fig. 1. Experimental design. A-C) Yellow circles denote prey, while others represent predator strategies. Black arrows indicate actions. Panels show A) Chaser, B) Spring (coupling shown as grey dotted lines), and C) MADDPG agent conditions. D) At test time, one predator's behavior was determined by the physics of a double pendulum (grey circle). Agents coordinated with a modified predator should have their goal-seeking actions (grey dashed arrow) augmented by the actions of the modified predator. E) Schematic of MADDPG algorithm. 2.3 Collaboration Metrics In order to measure collaboration, we used predators' positions over time as time-series data to implement a technique called convergent cross mapping (CCM) which examines the causal influence one time-series has on another [10]. The CCM technique embeds a time-series in a high-dimensional attractor space and then uses this embedded data as a model to predict states of the other time-series in its own attractor space. To the extent that this is possible, the original time-series is said to be causally driven by the time- series it attempts to model. Thus, in multi-agent tasks with homogeneous agents, we are defining collaboration to be the amount of causal influence between agents as measured by the CCM. Importantly, this metric can be misleading when two time-series have a mutually causal relationship with a third. For the present task, this is important because the causal influence one predator has on another can be confounded by their mutual relationship with the prey. To address this, at test time we modified the behavior of one predator agent such that its previous behavior was replaced by a secondary behavior that did not pursue the prey1. If a causal influence exists between predators, the movements of the modified predator should change the behavior of the other predators, even though the modified predator no longer pursues the prey (see Figure 1D). 3 Results Table 1 shows the log scaled mean reward per episode for predator and prey agents in the Chaser, Spring, and MADDG cases. It is clear that MADDPG-equipped predators are betters performers of this pursuit task, achieving roughly an order of magnitude more average reward per trial. Table 1. Performance results for the different experimental conditions Chaser Spring MADDPG N 10 10 10 Mean Reward 1.85 4.29 13.70 SD 0.66 0.92 2.57 95% CI 0.47 0.66 1.84 While the capacity for coordinated actions afforded by the MADDPG algorithm coupled with the increased task performance may suggest collaboration between predator agents, the CCM analysis tells a different story (Figure 2). As shown, there is very little difference, in terms of causal influence, between MADDPG-equipped predators and naive Chasers. The causal influence of the modified agent might be marginally stronger for MADDPG predators (hinting at the shared action information afforded by this algorithm), but the effect is too weak to make any strong conclusions about the collaboration between the agents in this case. For Spring predators, on the other hand, there is a strong causal influence from the modified predator. The Spring experimental condition (see Figure 2) shows an example of coupled behaviors in the predator-prey pursuit task. This provides a strong validation for the CCM technique, and illustrates an ecological upper-bound on coordinated actions between learning agents. 1 In this case, the dynamics of a double pendulum were used to specify the movement of the modified predator. Fig. 2. CCM measure for causal influence of modified predator behavior on unmodified predators. True causal influence is indicated by an increase in CCM score (Y axis) as more of a trial (X axis) is used to build the model (so called "convergence" [10]). A clear causal relationship is shown for Spring predators. Minimal causal influence is detectable for MADDPG agents. Coordination for Chaser agents is indistinguishable from zero. 4 Discussion The MADDPG algorithm presented by Lowe et al. [4] is promising, because it suggests that multi-agent deep RL may be able to solve complex problems in continuous tasks involving multiple actors. However, as we demonstrate here the improved performance of the MADDPG algorithm does not necessarily indicate coordinated behavior between agents. Assessing collaboration between agents instead requires a direct measure of the coordination between agent actions. We present such a method here, in the form of CCM, and we validate the metric within the context of a continuous multi-agent task. Though we did not find strong evidence of coordination between the actions of learning predators, the marginal increase in coordination over Chaser predators points to potential for collaboration given sufficient learning pressure. Producing collaborative behavior in computational agents is critical for the future of human-agent teams. Human-factors research has long held that when computational systems fail to adapt to human needs, serious issues in performance and human satisfaction can arise [11]. These issues are often best alleviated by promoting a collaborative relationship between humans and computational agents, rather than forcing humans to act as overseers [12, 13]. Measures like CCM, which can be used to assess (and even promote) collaborative behaviors in multi-agent RL, constitute powerful tools for the future of human-computer interactions. Acknowledgements and Disclosure: This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-18-2-0058. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein. References 1. Matignon, L., Laurent, G.J., Le Fort-Piat, N.: Independent reinforcement learners in cooperative markov games: A survey regarding coordination problems. The Knowledge Engineering Review. 27, 1 -- 31 (2012). 2. Sen, S., Sekaran, M., Hale, J., others: Learning to coordinate without sharing information. In: AAAI. pp. 426 -- 431 (1994). 3. Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., Petersen, S., Beattie, C., Sadik, A., Antonoglou, I., King, H., Kumaran, D., Wierstra, D., Legg, S., Hassabis, D.: Human-level control through deep reinforcement learning. Nature. 518, 529 -- 533 (2015). 4. Lowe, R., WU, Y., Tamar, A., Harb, J., Pieter Abbeel, O., Mordatch, I.: Multi-Agent Actor- Critic for Mixed Cooperative-Competitive Environments. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., and Garnett, R. (eds.) Advances in Neural Information Processing Systems 30. pp. 6382 -- 6393. Curran Associates, Inc. (2017). 5. Foerster, J., Farquhar, G., Afouras, T., Nardelli, N., Whiteson, S.: Counterfactual Multi- Agent Policy Gradients. arXiv:1705.08926 [cs]. (2017). 6. Matignon, L., Laurent, G., Le Fort-Piat, N.: Hysteretic q-learning: An algorithm for decentralized reinforcement learning in cooperative multi-agent teams. In: IEEE/rsj international conference on intelligent robots and systems, iros'07. pp. 64 -- 69 (2007). 7. Lauer, M., Riedmiller, M.: An algorithm for distributed reinforcement learning in cooperative multi-agent systems. In: In proceedings of the seventeenth international conference on machine learning. Citeseer (2000). 8. Claus, C., Boutilier, C.: The dynamics of reinforcement learning in cooperative multiagent systems. AAAI/IAAI. 1998, 746 -- 752 (1998). 9. Brockman, G., Cheung, V., Pettersson, L., Schneider, J., Schulman, J., Tang, J., Zaremba, W.: OpenAI Gym. arXiv:1606.01540 [cs]. (2016). 10. Sugihara, G., May, R., Ye, H., Hsieh, C.-h., Deyle, E., Fogarty, M., Munch, S.: Detecting causality in complex ecosystems. science. 1227079 (2012). 11. Parasuraman, R., Sheriden, T.B., Wickens, C.D.: A model for types and levels of human interaction with automation. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans. 30, 286 -- 297 (2000). 12. Rovira, E., McGarry, K., Parasuraman, R.: Effects of Imperfect Automation on Decision Making in a Simulated Command and Control Task. Human Factors. 49, 76 -- 87 (2007). 13. Klein, G., Woods, D.D., Bradshaw, J.M., Hoffman, R.R., Feltovich, P.J.: Ten challenges for making automation a "team player" in joint human-agent activity. IEEE Intelligent Systems. 19, 91 -- 95 (2004).
1612.04299
1
1612
2016-12-13T17:51:59
Algorithms for Graph-Constrained Coalition Formation in the Real World
[ "cs.MA", "cs.AI" ]
Coalition formation typically involves the coming together of multiple, heterogeneous, agents to achieve both their individual and collective goals. In this paper, we focus on a special case of coalition formation known as Graph-Constrained Coalition Formation (GCCF) whereby a network connecting the agents constrains the formation of coalitions. We focus on this type of problem given that in many real-world applications, agents may be connected by a communication network or only trust certain peers in their social network. We propose a novel representation of this problem based on the concept of edge contraction, which allows us to model the search space induced by the GCCF problem as a rooted tree. Then, we propose an anytime solution algorithm (CFSS), which is particularly efficient when applied to a general class of characteristic functions called $m+a$ functions. Moreover, we show how CFSS can be efficiently parallelised to solve GCCF using a non-redundant partition of the search space. We benchmark CFSS on both synthetic and realistic scenarios, using a real-world dataset consisting of the energy consumption of a large number of households in the UK. Our results show that, in the best case, the serial version of CFSS is 4 orders of magnitude faster than the state of the art, while the parallel version is 9.44 times faster than the serial version on a 12-core machine. Moreover, CFSS is the first approach to provide anytime approximate solutions with quality guarantees for very large systems of agents (i.e., with more than 2700 agents).
cs.MA
cs
A Algorithms for Graph-Constrained Coalition Formation in the Real World FILIPPO BISTAFFA and ALESSANDRO FARINELLI, University of Verona JES ´US CERQUIDES and JUAN RODR´IGUEZ-AGUILAR, IIIA-CSIC SARVAPALI D. RAMCHURN, University of Southampton Coalition formation typically involves the coming together of multiple, heterogeneous, agents to achieve both their individual and collective goals. In this paper, we focus on a special case of coalition formation known as Graph-Constrained Coalition Formation (GCCF) whereby a network connecting the agents constrains the formation of coalitions. We focus on this type of problem given that in many real-world applications, agents may be connected by a communication network or only trust certain peers in their social network. We propose a novel representation of this problem based on the concept of edge contraction, which allows us to model the search space induced by the GCCF problem as a rooted tree. Then, we propose an anytime solution algorithm (CFSS), which is particularly efficient when applied to a general class of characteristic functions called m + a functions. Moreover, we show how CFSS can be efficiently parallelised to solve GCCF using a non-redundant partition of the search space. We benchmark CFSS on both synthetic and realistic scenarios, using a real-world dataset consisting of the energy consumption of a large number of households in the UK. Our results show that, in the best case, the serial version of CFSS is 4 orders of magnitude faster than the state of the art, while the parallel version is 9.44 times faster than the serial version on a 12- core machine. Moreover, CFSS is the first approach to provide anytime approximate solutions with quality guarantees for very large systems of agents (i.e., with more than 2700 agents). Categories and Subject Descriptors: I.2 [Computing Methodologies]: Artificial Intelligence General Terms: Algorithms ACM Reference Format: ACM Trans. Intell. Syst. Technol. V, N, Article A (January YYYY), 23 pages. DOI:http://dx.doi.org/10.1145/0000000.0000000 1. INTRODUCTION Coalition Formation (CF) is one of the key approaches to establishing collaborations in multi-agent systems. It involves the coming together of multiple, possibly heteroge- neous, agents in order to achieve either their individual or collective goals, whenever they cannot do so on their own. Building upon the seminal work of Shehory and Kraus [1998], Sandholm et al. [1999] identify the key computational tasks involved in the CF process: (i) coalitional value calculation: defining a characteristic function which, given a coalition as an argument, provides its coalitional value; (ii) coalition structure generation (CSG): finding a partition of the set of agents (into disjoint coalitions) that maximises the sum of the values of the chosen coalitions; and (iii) payment computa- tion: finding the transfer or payment to each agent to ensure it is fairly rewarded for its contribution to its coalition. Author's addresses: F. Bistaffa and A. Farinelli, Department of Computer Science, University of Verona, Verona, Italy; J. Cerquides and J. Rodr´ıguez-Aguilar, IIIA-CSIC, Barcelona, Spain; S. D. Ramchurn, Elec- tronics and Computer Science, University of Southampton, Southampton, United Kingdom. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is per- mitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or [email protected]. c(cid:13) YYYY ACM 2157-6904/YYYY/01-ARTA $15.00 DOI:http://dx.doi.org/10.1145/0000000.0000000 ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:2 Filippo Bistaffa et al. On the one hand, typical CF approaches assume that the values of all the coalitions are stored in memory, allowing to read each value in constant time. However, this assumption makes the size of the input of the CSG and payment computation prob- lems exponential, as the entire set of coalitions (whose size is 2n for n agents) must be mapped to a value. On the other hand, CSG and payment computation are combinato- rial in nature and most existing solutions do not scale well with the number of agents. In this paper, we focus on the CSG problem to provide solutions that can be applied to real-world problems, which usually involve hundreds or thousands of agents. The computational complexity of the CSG problem is due to the size of its search space,1 which contains every possible subset of agents as a potential coalition. How- ever, in many real-world applications, there are constraints that may limit the forma- tion of some coalitions [Rahwan et al. 2011]. Specifically, we focus on a specific type of constraints that encodes synergies or relationships among the agents and that can be expressed by a graph [Myerson 1977], where nodes represent agents and edges encode the relationships between the agents. In this setting, edges enable connected agents to form a coalition and a coalition is considered feasible only if its members represent the vertices of a connected subgraph. Such constraints are present in several real- world scenarios, such as social or trust constraints (e.g., energy consumers who prefer to group with their friends and relatives in forming energy cooperatives [Hampshire County Council 2014]), physical constraints (e.g., emergency responders may join spe- cific teams in disaster scenarios where only certain routes are available), or communi- cation constraints (e.g., non-overlapping communication loci or energy limitations for sending messages across a network from one agent to another). Hereafter, we shall refer to the CF problem where coalitions are encoded by means of graphs as Graph- Constrained Coalition Formation (GCCF). It is important to note that the addition of these constraints does not lower the complexity of the problem. In particular, Voice et al. [2012a] show that the GCCF problem remains NP-complete. In this work, we are primarily interested in developing CSG solutions for GCCF that are deployable in real-world scenarios involving hundreds or thousands of agents, such as collective energy purchasing [Vinyals et al. 2012; Farinelli et al. 2013] and ridesharing [Bistaffa et al. 2015]. Notice that, since the computation of an optimal solution is often infeasible for large-scale systems, our CSG algorithm should be able to provide anytime approximate solutions with good quality guarantees. Moreover, the memory requirements should scale well with the number of agents. In this context, the works by Voice et al. [2012a; 2012b] represent the state of the art for GCCF. However, there are some drawbacks that hinder their applicability. Voice et al. [2012a] make assumptions that do not hold in most real-world applica- tions (see Section 2.1.4), whereas the memory requirements of the approach in [Voice et al. 2012b] grow exponentially in the number of agents, hence limiting the scalabil- ity. To overcome these drawbacks, in this paper we propose CFSS (Coalition Formation for Sparse Synergies), the first approach for GCCF that computes anytime solutions with theoretical quality guarantees for large systems (i.e., more than 2700 agents). As recently noticed in a survey on CSG by Rahwan et al. [2015], previous approaches in the CF literature have been either applied to small-scale synthetic scenarios, or, in the case of heuristic approaches, cannot provide any theoretical guarantees on the quality of their solutions. Moreover, we provide P-CFSS, a parallelised version of CFSS that exploits multi-core CPUs. Finally, we identify a general class of closed-form functions, denoted as m + a, for which we provide upper bounds, allowing for coalitional values to be computed online (i.e., their storage can be avoided). 1A set of n agents can be partitioned in Ω(( n ln(n) )n) ways, i.e. the nth Bell number [Berend and Tassa 2010]. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:3 In more detail, this paper advances2 the state of the art in the following ways: (1) We provide a new representation for GCCF which, by using edge contractions on the graph, can efficiently build a search tree where each node is a feasible coalition structure, while avoiding redundancy (i.e., each solution appears only once). (2) We identify a general class of characteristic functions, i.e., m + a functions, which are expressive enough to represent a wide range of real-world GCCF problems. (3) We propose CFSS, a branch and bound algorithm that, when applied to CF with m + a functions, can solve the CSG problem for GCCF and can provide anytime approximate solutions with good quality guarantees. (4) We propose P-CFSS, a parallel version of CFSS that is up to 9.44 times faster than the serial version on a 12-core machine. The rest of the paper is organised as follows. Section 2 discusses the relationship be- tween our work and the existing literature, and Section 3 formally defines GCCF. Sec- tion 4 explains how we generate our search space, and Section 6 details the domains used to benchmark CFSS, our branch and bound approach described in Section 5, and Section 7 discusses our empirical evaluation. Finally, Section 8 concludes the paper. 2. RELATED WORK In this section we elaborate on related work in the areas of CF (Section 2.1), team formation (Section 2.2), graph theory (Section 2.3) and optimisation (Section 2.4). 2.1. Coalition Formation 2.1.1. Classic CSG algorithms. A number of algorithms have been developed to solve CSG for the general CF problem where all coalitions can be formed (i.e., non-GCCF). These range from mixed-integer programming to branch and bound techniques [Rah- wan et al. 2009] through Dynamic Programming (DP) [Rahwan and Jennings 2008b]. In particular, Sandholm et al. [1999] and Dang and Jennings [2004] focused on provid- ing anytime solutions with quality guarantees. However, their solutions do not scale (growing in O(nn)) and, as discussed by Voice et al. [2012b], they cannot be employed to solve CSG for GCCF, since assigning artificially low values (such as −∞) to in- feasible coalitions would not be suitable for assessing valid bounds. Finally, Rahwan et al. [2008a; 2009; 2012] developed IDP-IP∗, the state of the art algorithm for classic CSG. However, IDP-IP∗ is limited to tens of agents (30 at most) due to its memory requirements (i.e., Θ (2n)), as such approaches need to store all coalition values. To overcome the intractability due to such memory requirements, a number of works [Ohta et al. 2009; Ueda et al. 2011; Tran-Thanh et al. 2013] have examined alternative function representations, which allow to reduce the computational com- plexity of the associated CF problems. Unfortunately, their models may not be able to capture the realistic nature of functions such as the collective energy purchasing one we consider here. On the one hand, this function cannot be concisely expressed as a MC network, as its MC network would require an exponential amount of memory with respect to the number of agents. On the other hand, the concepts of agent types/skills imply that it is possible to fully characterise the contribution of each agent on the ba- sis of a small set of features, in order to achieve the conciseness of the representation. However, in our scenario each agent is associated to its own energy consumption pro- file, resulting in a number of types/skills equal to the number of agents. Hence, we do not compare against these works, since we are interested in developing techniques that can handle complex functions such as the collective energy purchasing function. 2This paper subsumes the work of Bistaffa et al. [2014b] and the non-archival work of Bistaffa et al. [2014a]. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:4 Filippo Bistaffa et al. 2.1.2. CSG algorithms based on heuristics. Very few heuristic solutions to the CSG prob- lem have been developed over the last few years. For example, Sen and Dutta [2000] propose a solution based on genetic algorithms, Dos Santos and Bazzan [2012] pro- pose an approach based on swarm intelligence (the bee clustering algorithm) for task allocation in the RoboCup Rescue domain, and Farinelli et al. [2013] propose an ap- proach based on hierarchical clustering. Meta-heuristic approaches to CSG have also been investigated, for example Keinanen [2009] proposes a CSG algorithm based on Simulated Annealing, while Di Mauro et al. [2010] use a stochastic local search ap- proach (GRASP) to iteratively build a coalition structure of high quality. Even if these approaches are not able to provide any guarantees on the solution quality, they can compute solutions for large numbers of agents. Hence, in Section 7.5 we compare CFSS against C-Link, since it is the most recent heuristic approach for CSG and it has been tested using the collective energy purchasing function, which we also consider. 2.1.3. Constrained CF. The works discussed above focus on unconstrained CF and can- not be directly used in contexts where constraints of various types may limit the for- mation of some coalitions. In this respect, Shehory and Kraus [1998] first introduced the idea, arising in many realistic scenarios, of restricting the maximum cardinality k of the coalitions in CSG, highlighting that, even though this constraint lowers the number of coalitions from exponential, i.e., 2n, to polynomial, i.e., O(cid:0)nk(cid:1), the problem ity guarantees, which, however, can be used if all O(cid:0)nk(cid:1) coalitions are valid. On the remains NP-hard. Therefore, the authors propose an approximate algorithm with qual- other hand, Rahwan et al. [2011] developed a model of Constrained Coalition Forma- tion (CCF), differing from standard CF due to the presence of constraints that forbid the formation of certain coalitions. However, authors provide an algorithm for optimal CSG only for Basic CCF (BCCF) games, which cannot be used to represent every GCCF problem, as shown in Section A.1 of the Appendix. Finally, in a recent work, Iwasaki et al. [2015] proposed an approach to check the non-emptiness of the core when the grand coalition does not form, hence effectively addressing a CSG problem. Notice that, even though such an approach is tested on 1000 agents, the authors assume that the number of feasible coalitions is less than 10000. This assumption is not reasonable for large-scale scenarios we are interested to solve. For the sake of comparison, the number of feasible coalitions with 50 agents and m = 1 (i.e., the simplest network topology we consider in our tests) is ∼ 150 billions, thus severely limiting the scalability of such an approach on large-scale scenarios due to its memory requirements. 2.1.4. State of the art algorithms for GCCF. Voice et al. [2012a; 2012b] were the first to propose algorithms for the GCCF problem. However, there are some drawbacks that hinder their applicability. First, [Voice et al. 2012a] can only be applied to character- istic functions fulfilling the independence of disconnected members (IDM) property. The IDM property requires that, given two disconnected agents i and j, the presence of agent i does not affect the marginal contribution of agent j to a coalition. This as- sumption is rather strong for real-world applications. As noticed by Shehory and Kraus [1998] considering task allocation, the addition of a new agent to a coalition could re- sult in intra-coalition coordination and communication costs, which increase with the size of the coalition. Hence, realistic functions capturing such costs (such as the ones in Section 6.1) do not satisfy the IDM property, hence this approach cannot be applied. Second, the DyCE algorithm [Voice et al. 2012b] uses DP to find the optimal coalition structure by progressively splitting the current solution into its best partition. DyCE is not an anytime algorithm and requires an exponential amount of memory in the num- ber of agents (i.e., Θ (2n)). Hence, the scalability of this approach is limited to systems consisting of tens of agents (around 30). ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:5 2.2. Team formation The problem of forming groups of agents has also been widely studied in the context of Team Formation, in which several formal definitions of such problem have been pro- posed. As an example, Gaston and desJardins [2005] devise a heuristic to modify the graph connecting the agents based on local autonomous reasoning, without consider- ing any concept of global optimal solution. The problem studied by Lappas et al. [2009] focuses on finding a single group of agents who possess a given set of skills, so as to minimise the communication cost within such a group. Marcolino et al. [2013] focus on forming a single group of agents that has the maximum strength in the set of world states. Finally, Liemhetcharat and Veloso [2014] are interested in modelling the values of the characteristic function, based on observations of the agents. In this paper, we ad- dress the specific group formation problem in which groups must form a partition (into disjoint coalitions) of a given set of agents, with the objective of maximising the sum of the coalitional values. Such problem is equivalent to the complete set partitioning problem [Yun Yeh 1986], i.e., the standard definition adopted in the CF literature. 2.3. Graph theory techniques Our approach enumerates all the feasible partitions of the set of agents by means of the edge contraction operation, a graph theoretic technique known for its application in the algorithm to solve the Min-Cut problem [Karger 1993]. Edge contraction has never been employed in CF [Rahwan et al. 2015], hence we aim at investigating its use in this paper. In this context, the problem of enumerating all the connected subgraphs (corresponding to feasible coalitions in GCCF scenarios) of a given graph has been studied in a number of works [Voice et al. 2012b; Skibski et al. 2014]. Nonetheless, such algorithms can only be used to enumerate feasible coalitions, and cannot be applied to enumerate feasible coalition structures (as CFSS does), which are sets of disjoint feasible coalitions that collectively cover the entire set of agents. 2.4. Submodular-supermodular decomposition Submodular functions have been widely studied in the optimisation literature [Schri- jver 2003] in virtue of their natural diminishing returns property, which makes them suitable for many applications [Nemhauser et al. 1978; Narayanan 1997]. Moreover, Shekhovtsov et al. [2006; 2008] focused on general functions that can be decomposed as the sum of supermodular and submodular components, exploiting such a property to achieve better results in the solution of several optimisation problems. While this approach is similar to the decomposition we propose in Section 6.1, our result holds for superadditive and subadditive functions (cf. Definition 4), which are weaker (i.e., more general) properties with respect to supermodularity and submodu- larity. In fact, it is easy to show that supermodularity (resp. submodularity) implies superadditivity (resp. subadditivity), but the converse is not true [Schrijver 2003]. 3. GCCF PROBLEM DEFINITION The Coalition Structure Generation (CSG) problem [Sandholm et al. 1999; Shehory and Kraus 1998] takes as input a finite set of n agents A and a characteristic function v : 2A → R, that maps each coalition C ∈ 2A to its value, describing how much collec- tive payoff a set of players can gain by forming a coalition. A coalition structure CS is a partition of the set of agents into disjoint coalitions. The set of all coalition structures is Π(A). The value of a coalition structure CS is assessed as the sum of the values of its composing coalitions, i.e., (cid:88) C∈CS V (CS) = v(C). (1) ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:6 Filippo Bistaffa et al. CSG aims at identifying CS∗, the most valuable coalition structure, i.e., CS∗ = arg maxCS∈Π(A) V (CS). Graphs have been used in different scenarios to encode syn- ergies, coordination among players, possible collaborations or cooperation structures [Myerson 1977; Voice et al. 2012b; Meir et al. 2012]. Myerson [1977] and Demange [2004] pioneered the study of graphs to model cooperation structures. Given an undi- rected graph G = (A,E), where E ⊆ A×A is a set of edges between agents, representing the relationships between them, Myerson considers a coalition C to be feasible if all of their members are connected in the subgraph of G induced by C. That is, for each pair of players from a, b ∈ C there is a path in G that connects them without going out of C. Thus, given a graph G the set of feasible coalitions is FC(G) = {C ⊆ A The subgraph induced by C on G is connected}. A Graph-Constrained Coalition Formation (GCCF) problem is a CSG problem together with a graph G, in which a coalition C is considered feasible if C ∈ FC(G). Moreover, a coalition structure CS is considered feasible if each of its coalitions is feasible, i.e., CS(G) = {CS ∈ Π(A) CS ⊆ FC(G)}. A GCCF problem aims at identifying the most valuable coalition structure, defined as CS∗ = arg maxCS∈CS(G) V (CS). on the concept of edge contraction. In the next section, we propose a novel representation of the GCCF problem based 4. A GENERAL ALGORITHM FOR GCCF We now present a general algorithm to solve GCCF by showing that all feasible coali- tion structures induced by G can be modelled as the nodes of a search tree in which each feasible coalition structure is represented only once. Specifically, we first detail how we use edge contractions to represent the GCCF problem and then we provide a depth-first approach to build and traverse the search tree to find the optimal solution. 4.1. Generating feasible coalition structures via edge contractions In this section we show that each CS ∈ CS(G) can be represented by a corresponding graph GCS = (V,F), where V ⊆ 2A and F ⊆ V × V, i.e., each node u ∈ V represents a particular coalition. Notice that in the initial graph G = (A,E) each vertex u ∈ A represents a single agent, and hence, G can be seen as the representation of the feasible coalition structure formed by all the singletons. In what follows, we will show that, for each CS ∈ CS(G), the corresponding GCS can be obtained as the contraction of a set of edges of G, and that each contraction of a set of edges of G represents a feasible coalition structure CS ∈ CS(G). In more detail, let us define an edge contraction as follows. DEFINITION 1. Given a graph G = (V,F), where V ⊆ 2A and F ⊆ V × V, and an edge e = (u, v) ∈ F, the result of the contraction of e is a graph G(cid:48) obtained by removing e and the corresponding vertices u and v, and adding a new vertex w = u ∪ v. Moreover, each edge incident to either u or v in G will become incident to w in G(cid:48), merging the parallel edges (i.e., the edges that are incident to the same two vertices) that may result. Intuitively, one edge contraction represents the merging of the coalitions associated to the incident vertices. Figure 1 shows the contraction of the edge ({A} ,{C}), which results in a new vertex {A, C} connected to vertex {B}. Notice that edge contraction is a commutative operation (i.e., first contracting e and then e(cid:48) results in the same graph as first contracting e(cid:48) and then e). Hence, we can define the contraction of a set of edges as the result of contracting each of the edges of the set in any given order. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:7 Fig. 1. Example of an edge contraction (the dashed edge is contracted). Fig. 2. Example of a 2-coloured edge contraction (the dashed edge is contracted). Remark 4.1. Given a graph G, the graph G(cid:48) resulting from the contraction of any set of edges of G represents a feasible coalition structure, where coalitions correspond to the vertices of G(cid:48). Remark 4.2. Given a graph G, any feasible coalition structure CS can be generated by contracting a set of edges of G. Thus, a possible way of listing all feasible coalition structures is to list the contraction of every subset of edges of the initial graph. However, notice that the number of sub- sets of edges is larger than the number of feasible coalition structures over the graph. For example, in the triangle graph in Figure 1a, the number of subsets of edges is 2E = 23 = 8, but the number of feasible coalition structures is 5 (i.e., {A}{B}{C}, {A, B}{C}, {A, C}{B}, {A}{B, C} and {A, B, C}). This redundancy is due to the fact that the contraction of any two or three edges leads to the same coalition structure, i.e., the grand coalition A = {A, B, C}. Thus, we need a way to avoid listing feasible coalition structures more than once. To avoid such redundancies, we mark each edge of the graph to keep track of the edges that have been contracted so far. Notice that there are only two different alternative actions for each edge: either we contract it, or we do not. If we decide to contract an edge, it will be removed from the graph in all the subtree rooted in the current node, but if we decide not to contract it, we have to mark such edge to make sure that we do not contract it in the future steps of the algorithm. To represent such marking, we will use the notion of 2-coloured graph. DEFINITION 2. A 2-coloured graph Gc = (V,F, c) is composed of a set of vertices V ⊆ 2A and a set of edges F ⊆ V × V, as well as a function c : F → {red, green} that assigns a colour (red or green) to each edge of the graph. In our case, a red edge means that a previous decision not to contract that edge was made. On the one hand, green edges can be still contracted. Figure 2a shows an exam- ple of a 2-colour graph in which edge ({A} ,{D}) is coloured in red (dotted line). Hence, in any subsequent step of the algorithm it is impossible to contract it. On the other hand, all other edges in such graph can still be contracted. In a 2-coloured graph, we define a green edge contraction (e.g., dashed line in Figure 2a) as follows. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. AlgorithmsforGraph-ConstrainedCoalitionFormationintheRealWorldA:7{A}{B}{C}(a)Beforecontraction{A,C}{B}(b)AftercontractionFig.1:Exampleofanedgecontraction(thedashededgeiscontracted).{A}{B}{C}{D}{F}(a)Beforecontraction{B}{A,C}{D}{F}(b)AftercontractionFig.2:Exampleofa2-colourededgecontraction(thedashededgeiscontracted).Remark4.1.GivenagraphG,thegraphG(cid:48)resultingfromthecontractionofanysetofedgesofGrepresentsafeasiblecoalitionstructure,wherecoalitionscorrespondtotheverticesofG(cid:48).Remark4.2.GivenagraphG,anyfeasiblecoalitionstructureCScanbegeneratedbycontractingasetofedgesofG.Thus,apossiblewayoflistingallfeasiblecoalitionstructuresistolistthecontractionofeverysubsetofedgesoftheinitialgraph.However,noticethatthenumberofsub-setsofedgesislargerthanthenumberoffeasiblecoalitionstructuresoverthegraph.Forexample,inthetrianglegraphinFigure1a,thenumberofsubsetsofedgesis2E=23=8,butthenumberoffeasiblecoalitionstructuresis5(i.e.,{A}{B}{C},{A,B}{C},{A,C}{B},{A}{B,C}and{A,B,C}).Thisredundancyisduetothefactthatthecontractionofanytwoorthreeedgesleadstothesamecoalitionstructure,i.e.,thegrandcoalitionA={A,B,C}.Thus,weneedawaytoavoidlistingfeasiblecoalitionstructuresmorethanonce.Toavoidsuchredundancies,wemarkeachedgeofthegraphtokeeptrackoftheedgesthathavebeencontractedsofar.Noticethatthereareonlytwodifferentalternativeactionsforeachedge:eitherwecontractit,orwedonot.Ifwedecidetocontractanedge,itwillberemovedfromthegraphinallthesubtreerootedinthecurrentnode,butifwedecidenottocontractit,wehavetomarksuchedgetomakesurethatwedonotcontractitinthefuturestepsofthealgorithm.Torepresentsuchmarking,wewillusethenotionof2-colouredgraph.DEFINITION2.A2-colouredgraphGc=(V,F,c)iscomposedofasetofverticesV⊆2AandasetofedgesF⊆V×V,aswellasafunctionc:F→{red,green}thatassignsacolour(redorgreen)toeachedgeofthegraph.Inourcase,arededgemeansthatapreviousdecisionnottocontractthatedgewasmade.Ontheonehand,greenedgescanbestillcontracted.Figure2ashowsanexam-pleofa2-colourgraphinwhichedge({A},{D})iscolouredinred(dottedline).Hence,inanysubsequentstepofthealgorithmitisimpossibletocontractit.Ontheotherhand,allotheredgesinsuchgraphcanstillbecontracted.Ina2-colouredgraph,wedefineagreenedgecontraction(e.g.,dashedlineinFigure2a)asfollows.ACMTransactionsonIntelligentSystemsandTechnology,Vol.V,No.N,ArticleA,Publicationdate:JanuaryYYYY.AlgorithmsforGraph-ConstrainedCoalitionFormationintheRealWorldA:7{A}{B}{C}(a)Beforecontraction{A,C}{B}(b)AftercontractionFig.1:Exampleofanedgecontraction(thedashededgeiscontracted).{A}{B}{C}{D}{F}(a)Beforecontraction{B}{A,C}{D}{F}(b)AftercontractionFig.2:Exampleofa2-colourededgecontraction(thedashededgeiscontracted).Remark4.1.GivenagraphG,thegraphG(cid:48)resultingfromthecontractionofanysetofedgesofGrepresentsafeasiblecoalitionstructure,wherecoalitionscorrespondtotheverticesofG(cid:48).Remark4.2.GivenagraphG,anyfeasiblecoalitionstructureCScanbegeneratedbycontractingasetofedgesofG.Thus,apossiblewayoflistingallfeasiblecoalitionstructuresistolistthecontractionofeverysubsetofedgesoftheinitialgraph.However,noticethatthenumberofsub-setsofedgesislargerthanthenumberoffeasiblecoalitionstructuresoverthegraph.Forexample,inthetrianglegraphinFigure1a,thenumberofsubsetsofedgesis2E=23=8,butthenumberoffeasiblecoalitionstructuresis5(i.e.,{A}{B}{C},{A,B}{C},{A,C}{B},{A}{B,C}and{A,B,C}).Thisredundancyisduetothefactthatthecontractionofanytwoorthreeedgesleadstothesamecoalitionstructure,i.e.,thegrandcoalitionA={A,B,C}.Thus,weneedawaytoavoidlistingfeasiblecoalitionstructuresmorethanonce.Toavoidsuchredundancies,wemarkeachedgeofthegraphtokeeptrackoftheedgesthathavebeencontractedsofar.Noticethatthereareonlytwodifferentalternativeactionsforeachedge:eitherwecontractit,orwedonot.Ifwedecidetocontractanedge,itwillberemovedfromthegraphinallthesubtreerootedinthecurrentnode,butifwedecidenottocontractit,wehavetomarksuchedgetomakesurethatwedonotcontractitinthefuturestepsofthealgorithm.Torepresentsuchmarking,wewillusethenotionof2-colouredgraph.DEFINITION2.A2-colouredgraphGc=(V,F,c)iscomposedofasetofverticesV⊆2AandasetofedgesF⊆V×V,aswellasafunctionc:F→{red,green}thatassignsacolour(redorgreen)toeachedgeofthegraph.Inourcase,arededgemeansthatapreviousdecisionnottocontractthatedgewasmade.Ontheonehand,greenedgescanbestillcontracted.Figure2ashowsanexam-pleofa2-colourgraphinwhichedge({A},{D})iscolouredinred(dottedline).Hence,inanysubsequentstepofthealgorithmitisimpossibletocontractit.Ontheotherhand,allotheredgesinsuchgraphcanstillbecontracted.Ina2-colouredgraph,wedefineagreenedgecontraction(e.g.,dashedlineinFigure2a)asfollows.ACMTransactionsonIntelligentSystemsandTechnology,Vol.V,No.N,ArticleA,Publicationdate:JanuaryYYYY. A:8 Filippo Bistaffa et al. Algorithm 1 SOLVEGCCF(Gc) 1: best ← Gc, F ← ∅ 2: F.PUSH(Gc) 3: while F (cid:54)= ∅ do 4: 5: 6: 7: 8: return best node ← F.POP() if V (node) > V (best) then best ← node F.PUSH(CHILDREN (node)) (cid:46) Initialise solution with singletons and search frontier F with empty stack (cid:46) Push Gc as the first node to visit (cid:46) Search loop (cid:46) Get current node (cid:46) Check function value (cid:46) Update current best solution (cid:46) Update frontier F (cid:46) Return optimal solution Algorithm 2 CHILDREN(Gc) 1: G(cid:48) ← Gc, Ch ← ∅ 2: for all e ∈ Gc : c (e) = green do 3: 4: 5: return Ch Ch ← Ch ∪ {GREENEDGECONTRACTION (G(cid:48), e)} Mark edge e with colour red in G(cid:48) (cid:46) Initialise graph G(cid:48) with Gc and empty set of children (cid:46) For all green edges (cid:46) Return the set of children DEFINITION 3. Given a 2-coloured graph G = (V,F, c) and a green edge e ∈ F, the result of the contraction of e is a new graph G(cid:48) obtained by performing the contraction of e on G. Whenever two parallel edges are merged into a single one, the resulting edge is coloured in red if at least one of them is red-coloured, and it is green-coloured otherwise. The rationale behind marking parallel edges in this way is that, whenever we mark an edge e = (u, v) to be red, we want the agents in u and v to be in separate coalitions, hence whenever we merge some edges with e we must mark the new edge as red to be sure that future edge contractions will not generate a coalition that contains both the agents corresponding to nodes u and v. For example, note that in Figure 2 the red edge ({A} ,{D}) (dotted in the figure) and the green edge ({D} ,{C}) are merged as a consequence of the contraction of edge ({A} ,{C}), resulting in an edge ({D} ,{A, C}) marked in red. In this way, we enforce that any possible contraction in the new graph will keep agents A and D in separate coalitions. Having defined how we can use the edge contraction operation to generate feasi- ble coalition structures, we now provide a way to generate the whole search space of feasible coalition structures. 4.2. Generating the entire search space Given the green edge contraction operation defined above, we can generate each feasi- ble coalition structure only once. In more detail, at each point of the generation process, each red edge indicates that it has been discarded for contraction from that point on- wards, and hence its vertices cannot be joined. Observe that the way we defined green edge contraction guarantees that the information in red edges is always preserved. Thus, given a 2-coloured graph, its children can be readily assessed as follows: for each edge in the graph, we generate the graph that results from contracting that edge. Moreover, we colour the selected edge in red so that it cannot be contracted again in subsequent edge contractions. Algorithm 1 implements the depth-first3 generation and traversal of our search tree, in which each feasible coalition structure is evaluated by means of the characteristic function and compared with the best (i.e., the one with the highest value) coalition structure so far, hence computing the optimal solution. 3The DFS strategy allows us to traverse the entire tree with polynomial memory requirements, since at each stage of the search we only need to store the ancestors of the current node. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:9 {A} {B} {D} {C} {A, B} {D} {C} {B} {A, D} {C} {A} {B, C} {D} {A} {B} {C, D} {A, B} {C, D} {A, B, D} {C} {B, C} {A, D} {B, C, D} {A} {A, C, D} {B} {A, B, C} {D} {A, B, C, D} Fig. 3. Search tree for a square graph. As an example, Figure 3 shows the search tree generated starting from a square graph, highlighting each generation step with labels on the edges. We now prove that Algo- rithm 1 visits all feasible coalition structures and each of them is visited only once. PROPOSITION 4.3. Given Gc, the tree generated by Algorithm 1 rooted at Gc con- tains all the coalition structures compatible with Gc, each appearing only once. SKETCH OF PROOF. By induction on the number of green edges. Full proof is pro- vided in the Online Appendix. PROPOSITION 4.4. The complexity of Algorithm 1 is O(CS(G) · E). PROOF. There is a bijection between CS(G) and the nodes visited by Algorithm 1, by direct application of Proposition 4.3 to G with all green edges. The creation of each new node yields a GREENEDGECONTRACTION(G, e) operation, whose complexity is O(E) (Definition 3). Hence, the complexity of creating the search tree is O(CS(G) · E).4 Notice that, even for sparse graphs, the number of feasible coalition structures can be very large, as, in general, the GCCF problem is NP-complete [Voice et al. 2012a]. Hence, in the next section we propose a branch and bound technique that helps prune significant parts of the search space, allowing us to compute the optimal solution for any GCCF problem based on an m + a function by generating only a minimal portion of the solution space (i.e., less than 0.32% in our experiments in Section 7.2). In addition, such a bounding technique is employed in the approximate version of our approach, which can compute solutions with quality guarantees for large-scale systems. It is important to note that, in contrast with the optimal version, our approx- imate approach is not characterised by the above discussed exponential complexity, as the search for the solution is executed only for a given time budget (see Section 5.2). 5. A GENERAL BRANCH AND BOUND ALGORITHM FOR m + a FUNCTIONS We now describe CFSS (Coalition Formation for Sparse Synergies), our branch and bound approach to GCCF when applied to the family of m + a characteristic functions. DEFINITION 4. Given a graph G, a function v : FC(G) → R is superadditive (resp. subadditive) if the value of the union of disjoint coalitions is no less (resp. no greater) than the sum of the coalitions' separate values, i.e., v(S ∪ T ) ≥ (resp. ≤) v(S) + v(T ) for all S, T ⊆ A such that S ∩ T = ∅. 4Notice that, since Coalition Structure Generation (CSG) is a particular case of GCCF (i.e., CSG is a GCCF problem with a complete graph), CS(G) can be, in the worst case, equivalent to the nth Bell number, i.e., ln(n) )n) [Berend and Tassa 2010], where n is the number of agents. Nonetheless, in the problems we Ω(( n consider G is sparse and, hence, CS(G) contains a lower number of feasible coalition structures. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:10 Filippo Bistaffa et al. We also define such properties for the function V : CS(G) → R defined in Equation 1. DEFINITION 5. Given a graph G, a function V : CS(G) → R defined according to Equation 1 is superadditive (resp. subadditive) if the underlying function v : FC(G) → R is superadditive (resp. subadditive). DEFINITION 6. Given a graph G, V : CS(G)→R is an m+a function if it is the sum of a superadditive (i.e., monotonic increasing) function V + : CS(G)→R and a subadditive (i.e., antimonotonic) function V − : CS(G)→R. This family is interesting because it allows us to provide an upper bound that underlies our branch and bound strategy, so as to prune significant portions of the search space and have a computationally affordable solution algorithm. We provide a technique to compute an upper bound for the value assumed by the characteristic function in every coalition structure of the subtree ST (CSi) rooted at a given coalition structure CSi. In order to explain how to compute such an upper bound, we first define the element CSi. DEFINITION 7. Given a feasible coalition structure CSi represented by a 2-coloured graph Gc, we define CSi as the coalition structure obtained by removing all red edges from Gc and then contracting all the remaining green edges. Intuitively, CSi represents the connected components in the graph after the removal of all red edges. THEOREM 5.1. Given an m+a function V : CS(G) → R, then M (CSi) = V − (CSi)+ V +(cid:0)CSi SKETCH OF PROOF. V − (CSi) (resp. V +(cid:0)CSi (cid:1) is an upper bound for the value assumed by such function in every coalition M (CSi) = V − (CSi) + V +(cid:0)CSi (cid:1)) is an upper bound for the subaddi- (cid:1) ≥ max{V (CSj) CSj ∈ ST (CSi)}. structure of the subtree ST (CSi) rooted at CSi, i.e., (2) tive (resp. superadditive) component, hence M (CSi) is an upper bound for the charac- teristic function. Full proof is provided in the Online Appendix. Remark 5.2. Given CSi represented by a 2-coloured graph Gc = (V,F, c), it is pos- sible to compute a more precise upper bound for the edge sum with coordination cost function (see Section 6.1.2) by replacing V +(cid:0)CSi (cid:1) with(cid:80) e∈F :c(e)=green w+(e). Building upon Theorem 5.1, we can efficiently assess an upper bound for the value of the characteristic function in any subtree and prune it, if such a value is smaller than the value of the best solution found so far. Algorithm 3 implements CFSS, our branch and bound approach to solve the GCCF problem. We remark that Algorithm 3 is correct and complete, i.e., it computes the optimal solution regardless of the order in which the children of the current node are visited, namely the operation of the CHILDREN function. However, such an order has a strong influence on the performance of CFSS (as shown in Section 7.3), since it can be used Algorithm 3 CFSS(Gc) 1: best ← Gc, F ← ∅ 2: F.PUSH(Gc) 3: while F (cid:54)= ∅ do 4: 5: 6: 7: 8: return best node ← F.POP() if M (node) > V (best) then if V (node) > V (best) then best ← node F.PUSH(CHILDREN (node)) (cid:46) Initialise solution with singletons and search frontier F with empty stack (cid:46) Push Gc as the first node to visit (cid:46) Branch and bound loop (cid:46) Get current node (cid:46) Check bound value (cid:46) Update current best solution (cid:46) Update frontier F (cid:46) Return optimal solution ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:11 Si C E I C1 F D J H C2 B A G Fig. 4. Example of a partition with a cut-set of 3 edges. to compute an upper bound that better resembles the characteristic function (hence improving the effectiveness of the branch and bound pruning). 5.1. Edge ordering heuristic In this section we propose a heuristic to define a total ordering among the edges of a graph G, in order to guide the traversal of the search tree. This results in a significant speed-up of the algorithm, by means of an improvement of the upper bound. In partic- ular, we notice that the value of M (CSi) = V − (CSi) + V +(cid:0)CSi by the value of V +(cid:0)CSi (cid:1) is heavily influenced (cid:1). In fact, it is possible that CSi = {A} (i.e., the grand coali- tion), when CSi contains enough green edges to connect all the nodes of the graph G. This results in a poor bound, since V + is a superadditive function and it reaches its maximum value for A. On the other hand, if red edges form a cut-set for the 2-coloured graph, the procedure in Definition 7 results in a coalition structure CSi = {C1, C2}, as Fig- ure 4 shows. In this case, our bounding technique produces a lower upper bound M (CSi) = V − (CSi) + v+ (C1) + v+ (C2), since v+ (·) is superadditive and, therefore, v+ (C1) + v+ (C2) ≤ v+ (A) . Notice that, having an upper bound that provides a lower overestimation of the characteristic function is crucial for the performance of CFSS, as the condition at line 5 in Algorithm 3 would be verified less often, hence allowing us to prune bigger portions of the search space. Also, it easy to see that when the value of the characteristic function increases in a non-linear way with respect to the size of the coalitions (such as the functions we consider in this paper), the more C1 and C2 are closer to a bisection of A (i.e., the more C1 and C2 are close to A/2), the more pronounced such improvement is. Following this observation, it is preferable to visit the edges that produce a cut of the graph in the first steps of the algorithm, since they will result in the above-explained improvement once such edges are marked in red. Henceforth, we define a total order- ing among the edges of G, producing an ordered graph Go by means of Algorithm 4. Intuitively, such algorithm computes small5 cut-sets by means of the routine CUT(G), which outputs the subgraphs G1 = (V1,F1) and G2 = (V2,F2) resulting from the cut, and the cut-set F(cid:48). Once the cut-set has been found, we label its edges as the first ones in the ordered graph, recursively applying such procedure for all the subsequent subgraphs resulting at each partitioning, until every edge has been ordered. Remark 5.3. In the worst-case, Algorithm 4 makes E calls to CUT, whose complex- ity is O(E) [Karypis and Kumar 1998]. Hence, its worst-case complexity is O(E2). In addition to this edge ordering heuristic, our bounding technique can be employed to provide anytime approximate solutions, as shown in the next section. 5To traverse the minimum number of edges necessary to partition the graph, we need the smallest cut-set. Unfortunately, such a problem (known as the Minimum Bisection problem) is a well known NP-complete problem [Garey and Johnson 1990]. However, our heuristic does not need an optimal solution, since if a suboptimal cut-set (i.e., bigger than the optimal one) is used, our algorithm will still partition the graph in a higher number of steps, resulting in a slightly smaller improvement. Therefore, we adopt an approximate algorithm implemented with the METIS graph partitioning library [Karypis and Kumar 1998]. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:12 Filippo Bistaffa et al. Algorithm 4 ORDER(G) 1: i ← 1, Go ← G, Q ← ∅ 2: Q.PUSH(G) 3: while Q (cid:54)= ∅ do 4: 5: 6: 7: 8: 9: 10: 11: return Go (cid:104)G1, G2, F(cid:48)(cid:105) ← CUT (Q.POP()) Label in Go each edge ∈ F(cid:48) from i to i + F(cid:48) − 1 i ← i + F(cid:48) if V1 > 1 then Q.PUSH(G1) if V2 > 1 then Q.PUSH(G2) (cid:46) Initialise edge counter, ordered graph, and empty queue (cid:46) Push G as the first graph to partition (cid:46) Partitioning loop (cid:46) Partition current graph (cid:46) Increase edge counter (cid:46) If the first subgraph has at least 2 nodes... (cid:46) ... enqueue it (cid:46) If the second subgraph has at least 2 nodes... (cid:46) ... enqueue it (cid:46) Return ordered graph 5.2. Anytime approximate properties Theorem 5.1 can be directly applied to compute an overall bound of an m + a function, with anytime properties. More precisely, let us consider frontier F in Algorithm 3. When we expand frontier F (Line 9) we keep track of the highest value of V (·) in the visited nodes. Hence, given a frontier F , the bound B(F ) is defined as B(F ) = max{V (best) , max CS∈F (3) Thus, B(F ) is the maximum between the values assumed by V (·) inside the frontier (i.e., V (best)) and an estimated upper bound outside of it (i.e., maxCS∈F M (CS)). No- tice that since each M (CS) is an overestimation of the value of V (·) in the correspond- ing subtree, such a maximisation provides a valid upper bound for V (·) in the portion of search space not visited yet. Furthermore, the quality of B(F ) can only be improved by expanding frontier F . More formally, if F (cid:48) is such an expansion, then M (CS)} B (F ) ≥ B (F (cid:48)) ≥ max{V (CS) CS ∈ CS (G)}. (4) This can be easily verified using the definition of M (·). In fact, each bound resulting from the children of a substituted node u ∈ F must be less or equal to M (u) and, hence, Inequality 4 holds. Intuitively, the larger the search space explored, the better is the bound provided. Finally, notice that the fastest way to compute a bound for V (·) is to consider a frontier formed exclusively by the root (i.e., the coalition structure formed by all singletons). Assessing this bound has the same time complexity of computing M, i.e., O(E), and its quality can be satisfactory, as shown in Section 7.4. After the discussion of our branch and bound algorithm for m + a functions, in the next section we discuss some scenarios in which GCCF can be applied, and, in partic- ular, we present three m + a functions that will be used to evaluate our approach. 6. APPLICATIONS FOR GCCF As previously discussed, GCCF is a well known model in cooperative game theory that can be applied to several realistic scenarios. In what follows, we focus on two real- world scenarios, namely social ridesharing and collective energy purchasing, that can be modelled as GCCF problems. In the ridesharing domain, Ma et al. [2013] adopted an heuristic approach in order to increase the potential passenger coverage of a fleet of taxis, while decreasing the total travel mileage of the system. Later on, Bistaffa et al. [2015] tackled the optimisa- tion problem of arranging one-time shared rides among a set of commuters connected through a social network, with the objective of minimising the overall travel cost. Un- like Ma et al. [2013], Bistaffa et al. [2015] explicitly consider coalitions, showing that such a scenario can be modelled as a GCCF problem where the set of feasible coalitions is restricted by the social network. Intuitively, each group of agents that travel in the ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:13 same car is mapped to a feasible coalition, whose coalitional value is defined as the total travel cost of that particular car, i.e., the cost of driving through its passengers' pick-up and destination points. Bistaffa et al. [2015] show that the adoption of the GCCF model in this scenario leads to a cost reduction of up to −36.22% when applied to realistic datasets for both spatial and social data. In the collective energy purchasing scenario [Vinyals et al. 2012], each agent is char- acterised by an energy consumption profile that represents its energy consumption throughout a day. A profile records the energy consumption of a household at fixed intervals (every half hour in our case). The characteristic function of a coalition of agents is the total cost that the group would incur if they bought energy as a collec- tive in two different markets: the spot market, a short term market (e.g., half hourly, hourly) intended for small amounts of energy; and the forward market, a long term one in which larger amounts of energy (spanning weeks and months) can be bought at cheaper prices [Vinyals et al. 2012]. In the edge sum with coordination cost scenario, every edge is associated to a value that represents how well (or bad) those agents perform together, or the cost of completing a coordination task in a robotic environ- ment [Dasgupta et al. 2012]. In the coalition size with distance cost scenario, the for- mation of coalitions favours bigger groups and maximises the similarity of the opinion among their members. Such application could be employed to cluster public opinion, or to detect the presence of "virtual coalitions" among members of a parliament based on their recorded votes (e.g., the votes by the Democratic and the Republican parties). In addition to such practical motivations, these three scenarios are particularly in- teresting as they are modelled by characteristic functions (Equation 5) part of a large family of functions, i.e., m + a functions. In what follows, we discuss the properties of such functions, showing how they can be exploited to significantly speed-up the solu- tion of the associated GCCF problem (see Section 5). 6.1. Benchmark m + a functions We now present three benchmark functions for GCCF, namely the collective energy purchasing function, the edge sum with coordination cost function and the coalition size with distance cost function. In particular, we are interested in their characterisa- tion as m + a functions, showing that they can be seen as the sums of the superadditive and the subadditive parts [Owen 1995]. Such characteristic functions are particularly interesting as they enable an efficient bounding technique to prune part of the search space during the execution of our branch and bound algorithm, presented in Section 5. 6.1.1. Collective energy purchasing. In the collective energy purchasing scenario, energy(C) where T = 48 is the number of energy measurements in each profile, pS ∈ R− and pF ∈ R− represent the unit prices of energy in the spot and forward market respectively, qF : FC(G) → R− stands for the time unit amount of electricity to buy in the forward S : FC(G) → R− for the amount to buy in the spot market at time slot t.6 market and qt energy : FC(G) → R− represents the total energy cost. 6Unit prices (whose values are reported in Section 7) are negative numbers, i.e., they belong to the set R− = {i ∈ R i ≤ 0}, to reflect the direction of payments. Thus, the values of the characteristic function are negative as well, hence they represent costs that, maintaining the maximisation task, we aim to minimise. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Farinelli et al. [2013] proposed the characteristic function (cid:125) S (C) · pS + T · qF (C) · pF qt (cid:123)(cid:122) v (C) = (cid:88)T (cid:124) t=1 +κ (C) , A:14 Filippo Bistaffa et al. Finally, κ : FC(G) → R− stands for a coalition management cost that depends on the size of the coalition and captures the intuition that larger coalitions are harder to manage. The definition of this cost depends on several low level issues (e.g., the capacity of the power networks connecting the customers in the groups, legal fees, and other costs associated to group contracts, etc.), hence a precise definition of this term goes beyond the scope of this paper. Following Farinelli et al. [2013] we use κ(C) = −Cγ with γ > 1 to introduce a non-linear element that penalises the formation of larger coalitions. Hence, the collective energy purchasing function is defined as (cid:20)(cid:88)T (cid:88) (cid:124) V (CS) = C∈CS t=1 (cid:123)(cid:122) S (C) · pS + T · qF (C) · pF qt V +(CS) κ (C) . (5) (cid:123)(cid:122) C∈CS V −(CS) (cid:125) (cid:21) (cid:125) (cid:88) (cid:124) + PROPOSITION 6.1. The collective energy purchasing function is m + a. SKETCH OF PROOF. The cost of the energy necessary to fulfil the aggregated con- sumption profiles of the coalitions, i.e., V + (CS), is clearly superadditive, while the sum of the coalition management costs, i.e., V − (CS), is subadditive, as they increase when coalition sizes increase. Full proof is provided in the Online Appendix. 6.1.2. Edge sum with coordination cost. In the edge sum with coordination cost function every edge of G is mapped to a real value by a function w : E → R [Deng and Papadim- itriou 1994]. Each coalitional value is the sum of the weights of the edges among its members. In order to have a better description of the management and communication costs in larger coalitions, we also introduce a penalising factor κ (C),7 with the same definition given in the previous section. Hence, we define this function as v (C) = (6) where the function edges : FC(G) → 2E provides the set of all the edges connecting any two members of a given coalition C, i.e., edges (C) = {(v1, v2) ∈ E v1 ∈ C and v2 ∈ C}. In order to characterise this scenario with an m + a function, we rewrite Equation 6 as w(e) + κ (C) , e∈edges(C) (cid:88) (cid:2)w+(e) + w−(e)(cid:3) + κ (C) , v (C) = (cid:88) (cid:26)w(e), if w(e) ≥ 0, e∈edges(C) 0, (cid:26)w(e), if w(e) < 0, where w+(e) = otherwise, w−(e) = In other words,(cid:80) edges in edges (C), while (cid:80) e∈edges(C) w+(e) represents the sum of all the positive weights of the e∈edges(C) w−(e) represents the sum of the negative ones. (cid:20)(cid:88) (cid:88) (cid:123)(cid:122) (cid:124) The edge sum with coordination cost function is then defined as w−(e) + κ (C) (cid:88) (cid:124) (cid:20)(cid:88) otherwise. e∈edges(C) e∈edges(C) w+(e) + V (CS) = (cid:21) (cid:125) . (cid:21) (cid:125) (cid:123)(cid:122) C∈CS C∈CS 0, V +(CS) V −(CS) PROPOSITION 6.2. The edge sum with coordination cost function is m + a. 7Such penalising factor makes the edge sum with coordination cost function to violate the IDM property (cf. Section 2.1.4), therefore the approach proposed by Voice et al. [2012a] cannot be used. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:15 SKETCH OF PROOF. It is easy to verify that V + (CS), i.e., the sum of all positive edges, is superadditive, while the sum of the negative ones, i.e., V − (CS), is subaddi- tive. Full proof is provided in the Online Appendix. 6.1.3. Coalition size with distance cost. The coalition size with distance cost can be mod- elled evaluating each coalition C with the function (7) where α ≥ 1, and d : A × A → R+ is a function that measures the distance between the opinions of agent i and agent j. From Equation 7 it follows that the input of our problem has size N 2, where N is the total number of agents, since we must know the distances between each pair or agents. The coalition size with distance cost function of a coalition structure CS is then defined as (i,j)∈C×C d (i, j) , v (C) = Cα −(cid:88) (cid:88) (cid:124) (cid:123)(cid:122) C∈CS V +(CS) Cα + (cid:125) (cid:88) (cid:124) (cid:20) −(cid:88) (cid:123)(cid:122) V −(CS) V (CS) = C∈CS (i,j)∈C×C d (i, j) . (cid:21) (cid:125) PROPOSITION 6.3. The coalition size with distance cost function is m + a. PROOF. On the one hand, it is easy to verify that v+(C) = Cα is a superadditive (i,j)∈C×C d (i, j) is sub- function, assuming that α ≥ 1. On the other hand, v−(C) = −(cid:80) additive, since v−(C1∪C2) = v−(C1)+v−(C2)−(cid:80) d (i, j) ≤ v−(C1)+v−(C2). i∈C1,j∈C2 These functions will be used in our experimental evaluation in the next section. 7. EMPIRICAL EVALUATION The main goals of our empirical evaluation of CFSS are: (1) To evaluate its runtime performance with respect to DyCE considering a variety of graphs, both realistic (i.e., subgraphs of the Twitter network) and synthetic (i.e., scale-free networks). Additional experiments on community networks and a de- tailed discussion on these network topologies are in the Online Appendix. (2) To evaluate the effectiveness of our bounding technique. (3) To evaluate the anytime performance and guarantees that our approach can pro- vide when scaling to very large numbers of agents (i.e., more than 2700). (4) To compare the quality of our approximate solutions with the ones computed by C-Link [Farinelli et al. 2013] on large-scale instances. (5) To evaluate the speed-up that can be obtained by using multi-core machines. (6) To evaluate the speed-up produced by our edge ordering heuristic. Following Voice et al. [2012b], we consider scale-free networks generated with the Barab´asi-Albert model with m ∈ {1, 2, 3}. This parameter determines the sparsity of the graph, as every newly added node is connected, on average, to m existing nodes. It is easy to verify that the average degree of a scale-free network is ∼ 2 · m. We compare our approach with DyCE in our three reference domains, measuring the runtime in seconds. In our characteristic functions we use the following parameters: - Following Farinelli et al. [2013], in the collective energy purchasing function we set pS=−80 and pF =−70. The consumption data is provided by a realistic dataset, com- prising the measurements collected over a month from 2732 households in the UK. - In the edge sum with coordination cost function we assigned a uniformly distributed random weight within [−10, 10] to each edge. - Following Farinelli et al. [2013], in both the above scenarios we considered γ = 1.3. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:16 Filippo Bistaffa et al. - In the coalition size with distance cost function we assigned a uniformly distributed random value within [0, 100] to each distance between a pair of different agents (with d(i, i) = 0), and we considered α = 2.2, motivated by the remarks in Section 7.4. We conducted an additional set of experiments in which the graph G is a subgraph of a large crawl of the Twitter social graph. Specifically, such dataset is a graph with 41.6 million nodes and 1.4 billion edges published as part of the work by Kwak et al. [2010]. We obtain G by means of a standard algorithm [Russell 2013] to extract a subgraph from a larger graph, i.e., a breadth-first traversal starting from a random node of the whole graph, adding each node and the corresponding arcs to G, until the desired number of nodes is reached. Moreover, we implemented a multi-threaded version of CFSS, namely P-CFSS (i.e., Parallel CFSS), and we analysed the speed-up of P-CFSS using Amdahl's law [Amdahl 1967], as it provides the maximum theoretical speed-up that can be achieved. All our results refer to the average value over 20 repetitions for each experiment. CFSS8 and C-Link are implemented in C, while we used the DyCE implementation provided by its authors. We run our tests on a machine with a 3.40GHz CPU and 32 GB of memory. 7.1. DyCE vs CFSS: runtime comparison In our experiments using scale-free networks, CFSS outperforms DyCE when coalition values are shaped by the above-described benchmark functions (as shown in Figures 6a, 6b and 6c). Specifically, for the edge sum with coordination cost function, CFSS outperforms DyCE by 4 orders of magnitude on networks with average connectivity (i.e., for m = 2), and by 3 orders of magnitude on networks with higher connectivity (i.e., for m = 3). Most probably this is due to the fact that the upper bound we adopt in this case closely resembles the function, allowing us to prune significant portions of the search space (see Section 7.2 for a more detailed discussion). In the collective energy purchasing scenario with 30 agents and m = 2, CFSS is 4.7 times faster than DyCE, and it is at least 2 orders of magnitude faster for m = 1. However, DyCE is significantly faster (44 times) than CFSS for m = 3. The adoption of the coalition size with distance cost function produces a similar behaviour, with a performance improvement for our method. In fact, CFSS is 17 times faster than DyCE for m = 2, and only 3 times slower for m = 3. On the other hand, the runtime of DyCE equals the previous case, since this approach is not sensitive to the values of the characteristic function. In our tests using subgraphs of the Twitter network, CFSS is at least four orders of magnitude faster than DyCE when solving instances with 30 agents (the biggest instances that DyCE can solve), and it can scale up to 45 agents. These results confirm the very good performance of CFSS when considering sparse networks. In fact, the average degree of these subgraphs is comparable with the one of a scale-free network with 1 < m < 2. In all our tests, we increased the number of agents until the execution time reached 105 seconds. Notice that, in general, DyCE cannot scale over 30 agents (due to its exponential memory requirements), while CFSS does not have such limitation, hence it is possible to reach instances with thousands of agents, as shown in Section 7.4. CFSS (m = 1) DyCE (m = 1) CFSS (m = 2) DyCE (m = 2) CFSS (m = 3) DyCE (m = 3) Fig. 5. Legend for scale-free networks. 8Our implementation of CFSS is publicly available at https://github.com/filippobistaffa/CFSS. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:17 Fig. 6. Runtime to compute the optimal solution. 7.2. Bounding technique effectiveness Here we compare the number of configurations explored by CFSS w.r.t. the entire search space, i.e., the one explored by Algorithm 1, to measure of the number of search nodes pruned by our bounding technique. We consider n = 30, adopting scale-free net- works with m = 2. When the coalitional values are provided by the collective energy purchasing function, CFSS can compute the optimal solution exploring a number of configurations which is, on average, 0.32% of the entire search space. We measured a similar value in the coalition size with distance cost scenario (i.e., 0.28%). In the edge sum with coordination cost scenario (which allows a more precise upper bound, as explained in Remark 5.2), only 0.0045% of the entire search space is explored. 7.3. Edge ordering heuristic The above table shows the speed-up obtained by using the ordering heuristic described in Section 5.1 and considering the collective energy purchasing and the coalition size with distance cost functions. Even though our heuristic is applicable also in the edge sum with coordination cost scenario, such function has not been included in this anal- ysis since, as stated in Remark 5.2, it allows an ad-hoc bounding method that is more effective than the general one. Our experiments show a clear benefit in the adoption of such a heuristic, producing a maximum performance gain of 843% in the first scenario and 338% in the second one. Across all experimental scenarios, such a heuristic allows an average speed-up of 295% considering both domains. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. AlgorithmsforGraph-ConstrainedCoalitionFormationintheRealWorldA:1720253035404550556010−310−210−1100101102103104105106105slimitDyCElimitNumberofagentsExecutiontime(s)(a)Edgesumwithcoordinationcost,scale-freenetworks.152025303540455010−310−210−1100101102103104105106105slimitDyCElimitNumberofagentsExecutiontime(s)(b)Collectiveenergypurchasing,scale-freenetworks.152025303540455010−310−210−1100101102103104105106105slimitDyCElimitNumberofagentsExecutiontime(s)(c)Coalitionsizewithdistancecost,scale-freenetworks.1520253035404510−310−210−1100101102103104105106105slimitDyCElimitNumberofagentsExecutiontime(s)CFSSDyCE(d)Collectiveenergypurchasing,Twittersubgraphs.Fig.6:Runtimetocomputetheoptimalsolution.7.2.BoundingtechniqueeffectivenessHerewecomparethenumberofconfigurationsexploredbyCFSSw.r.t.theentiresearchspace,i.e.,theoneexploredbyAlgorithm1,tomeasureofthenumberofsearchnodesprunedbyourboundingtechnique.Weconsidern=30,adoptingscale-freenet-workswithm=2.Whenthecoalitionalvaluesareprovidedbythecollectiveenergypurchasingfunction,CFSScancomputetheoptimalsolutionexploringanumberofconfigurationswhichis,onaverage,0.32%oftheentiresearchspace.Wemeasuredasimilarvalueinthecoalitionsizewithdistancecostscenario(i.e.,0.28%).Intheedgesumwithcoordinationcostscenario(whichallowsamorepreciseupperbound,asexplainedinRemark5.2),only0.0045%oftheentiresearchspaceisexplored.7.3.EdgeorderingheuristicTheabovetableshowsthespeed-upobtainedbyusingtheorderingheuristicdescribedinSection5.1andconsideringthecollectiveenergypurchasingandthecoalitionsizewithdistancecostfunctions.Eventhoughourheuristicisapplicablealsointheedgesumwithcoordinationcostscenario,suchfunctionhasnotbeenincludedinthisanal-ysissince,asstatedinRemark5.2,itallowsanad-hocboundingmethodthatismoreeffectivethanthegeneralone.Ourexperimentsshowaclearbenefitintheadoptionofsuchaheuristic,producingamaximumperformancegainof843%inthefirstscenarioand338%inthesecondone.Acrossallexperimentalscenarios,suchaheuristicallowsanaveragespeed-upof295%consideringbothdomains.ACMTransactionsonIntelligentSystemsandTechnology,Vol.V,No.N,ArticleA,Publicationdate:JanuaryYYYY. A:18 Filippo Bistaffa et al. Characteristic function Collective energy purchasing Coalition size with distance cost Minimum Average Maximum 176% 136% 367% 222% 843% 338% 7.4. Anytime approximate performance We evaluate the performance of the approximate version of CFSS on instances with thousands of agents considering the Performance Ratio (PR) [Ausiello et al. 2012], a standard measure to evaluate approximate algorithms defined as the ratio between the approximate solution and the optimal one on a given instance I. As computing the optimal solution for such large instances is not possible, we define the Maximum Performance Ratio (MPR) as the ratio between the approximate solution and the upper bound on the optimal solution defined in Equation 3. DEFINITION 8. Given an instance I, an approximate solution Approx(I) and an upper bound on the optimal solution as Bound(I), we define the Maximum Performance Ratio M P R(I) = max . (cid:17) (cid:16) Approx(I) Bound(I) , Bound(I) Approx(I) M P R(I) represents an upper bound of the PR on the instance I. The MPR provides an important quality guarantee on the approximate solution Approx(I), since Approx(I) cannot be worse than by a factor of M P R(I) w.r.t. the optimal solution. 7.4.1. Collective energy purchasing. Figure 7a shows the value of the MPR in the col- lective energy purchasing scenario, using n ∈ {100, 500, 1000, 1500, 2000, 2732}, adopting scale-free networks with m = 4 and Twitter subgraphs as network topologies, and con- sidering a time budget of 100 seconds. Other values for m show a similar behaviour (not reported here). We plot the average and the standard error of the mean over 20 repetitions. It is clear that the network topology does not impact the quality guarantees of our approach, hence we only adopt scale-free networks in the following experiments. In contrast, the MPR is heavily influenced by the nature of the characteristic function, as clarified later in this section. In addition, the results show that, for 100 agents, the provided bound is only 4.7% higher than the solution found within the time limit, reaching a maximum of +11.65% when the entire dataset is considered, i.e., with 2732 agents. Such small decrease is due to the fact that, for bigger instances, it is possible to explore a smaller part of the search space in the considered time budget, leaving a bigger portion to the estimation of the bound. Nonetheless, in this experiment CFSS provides a MPR of at most 1.12 and thus solutions that are at least 88% of the optimal. This confirms the effectiveness of this bounding technique when applied to the energy domain, which allows us to provide solutions and quality guarantees for problems in- volving a very large number of agents. In our tests, the bound is assessed at the root, without any frontier expansion, so it can be computed almost instantly, thus devoting all the available runtime to the search for a solution. This choice is further motivated by the fact that, in this scenario, the bound improves of a negligible value in the first levels of the search tree, due to the particular definition of the characteristic function. More precisely, if we consider a frontier formed by the children of the root, in each of them the bound of V −(·) will improve by a factor of 2γ − 2 ≈ 1.5 (i.e., the difference between the coalition management cost of the new coalition and the ones of the two merged singletons). On the other hand, the bound of V +(·) will remain constant: in fact, since we are taking the maximum (i.e., the worst) bound at the frontier (as shown in Equation 3), the result of this maximisation will still be equal to v+(A), because in at least one of the children nodes the computation of CS will result in joining all the agents together. In this case, it is not worth to expand the frontier from the root, since the gain would be insignificant w.r.t. the additional computational cost. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:19 Fig. 7. Maximum Performance Ratio (MPR) in the considered domains. 7.4.2. Edge sum with coordination cost. We further evaluate the scalability of our ap- proach by considering Twitter subgraphs as network topologies, and the edge sum with coordination cost function, which allows to generate coalitional values for instances with any number of agents. Such a function can be either positive or negative (in con- trast with the collective energy purchasing one, which is always negative to represent its nature of cost). Hence, it is possible that Approx(I) is negative and Bound(I) is pos- itive, resulting in a negative MPR. In order to avoid this unreasonable behaviour, here we consider M P R(I) = Bound(I)−LB(I) Approx(I)−LB(I), where LB(I) is a lower bound on the charac- teristic function considering the instance I. Notice that it is always possible to compute LB(I) for the edge sum with coordination cost function as LB(I) = V −(A). Figure 7b shows that, on our machine, CFSS can scale up to instances with 30000 agents, providing solutions with a MPR of 1.127 (at least 89% of the optimal). C∈CS (cid:80) additive component (i.e., −(cid:80) (i.e.,(cid:80) 7.4.3. Coalition size with distance cost. The MPR exhibits a different behaviour when con- sidering the coalition size with distance cost function, being heavily influenced by the value of the α exponent. Figure 7c shows how the MPR varies significantly with respect to α ∈ [2, 3], growing up to 41825.6 for α = 2.4 and then falling down to 1.13 for α = 2.7, with a tendency to 1 when increasing this exponent. This behaviour can be explained by reasoning about the structure of the characteristic function. Up to α = 2.4, the sub- (i,j)∈C×C d (i, j)) dominates the superadditive one C∈CS Cα), hence the search for a solution is not able to find any coalition struc- ture better than the initial one (i.e., the coalition structure with all singletons, which is probably the optimal one). Nonetheless, the MPR keeps growing when we increase N = N α−1, i.e., the bound computed at the root (i.e., V +(A) = N α) α, since it equals N α divided by the value of the initial solution (i.e., N). On the other hand, when α is sufficiently large (i.e., for α = 2.5), this behaviour is inverted, because V +(·) has a greater impact and the entire characteristic function tends to become superadditive. Thus, coalition structures closer to the grand coalition represent good solutions, which explains why the MPR tends to 1 when we increase α. These remarks motivate us to study the impact of α also on the optimal algorithm. Figure 8 displays the runtime needed to find the optimal solution on random instances with 25 agents on scale-free networks with m = 2, showing that the performance of CFSS decreases when we in- crease α from 2 to 3. The value of the bound provided by Equation 2 is larger when α grows, hence its quality decreases, producing a less effective bounding technique and, thus, a higher runtime. To summarise, the adoption of a bigger α in the coalition size with distance cost function negatively impacts the performance of our approach when computing optimal solutions, while improving approximate solutions as α grows. This ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. AlgorithmsforGraph-ConstrainedCoalitionFormationintheRealWorldA:1910050010001500200027321.051.061.071.081.091.101.111.12NumberofagentsMPRScale-freenetworksTwittersubgraphs(a)Collectiveenergypurchasing.500010000150002000025000300001.1211.1221.1231.1241.1251.1261.1271.1281.1291.130NumberofagentsMPR(b)Edgesumwithcoordinationcost.10050010001500200022.22.42.62.83100101102103104105NumberofagentsαMPR100101102103104105(c)Coalitionsizewithdistancecost.Fig.7:MaximumPerformanceRatio(MPR)intheconsidereddomains.7.4.2.Edgesumwithcoordinationcost.Wefurtherevaluatethescalabilityofourap-proachbyconsideringTwittersubgraphsasnetworktopologies,andtheedgesumwithcoordinationcostfunction,whichallowstogeneratecoalitionalvaluesforinstanceswithanynumberofagents.Suchafunctioncanbeeitherpositiveornegative(incon-trastwiththecollectiveenergypurchasingone,whichisalwaysnegativetorepresentitsnatureofcost).Hence,itispossiblethatApprox(I)isnegativeandBound(I)ispos-itive,resultinginanegativeMPR.Inordertoavoidthisunreasonablebehaviour,hereweconsiderMPR(I)=Bound(I)−LB(I)Approx(I)−LB(I),whereLB(I)isalowerboundonthecharac-teristicfunctionconsideringtheinstanceI.NoticethatitisalwayspossibletocomputeLB(I)fortheedgesumwithcoordinationcostfunctionasLB(I)=V−(A).Figure7bshowsthat,onourmachine,CFSScanscaleuptoinstanceswith30000agents,providingsolutionswithaMPRof1.127(atleast89%oftheoptimal).7.4.3.Coalitionsizewithdistancecost.TheMPRexhibitsadifferentbehaviourwhencon-sideringthecoalitionsizewithdistancecostfunction,beingheavilyinfluencedbythevalueoftheαexponent.Figure7cshowshowtheMPRvariessignificantlywithrespecttoα∈[2,3],growingupto41825.6forα=2.4andthenfallingdownto1.13forα=2.7,withatendencyto1whenincreasingthisexponent.Thisbehaviourcanbeexplainedbyreasoningaboutthestructureofthecharacteristicfunction.Uptoα=2.4,thesub-additivecomponent(i.e.,−(cid:80)C∈CS(cid:80)(i,j)∈C×Cd(i,j))dominatesthesuperadditiveone(i.e.,(cid:80)C∈CSCα),hencethesearchforasolutionisnotabletofindanycoalitionstruc-turebetterthantheinitialone(i.e.,thecoalitionstructurewithallsingletons,whichisprobablytheoptimalone).Nonetheless,theMPRkeepsgrowingwhenweincreaseα,sinceitequalsNαN=Nα−1,i.e.,theboundcomputedattheroot(i.e.,V+(A)=Nα)dividedbythevalueoftheinitialsolution(i.e.,N).Ontheotherhand,whenαissufficientlylarge(i.e.,forα=2.5),thisbehaviourisinverted,becauseV+(·)hasagreaterimpactandtheentirecharacteristicfunctiontendstobecomesuperadditive.Thus,coalitionstructuresclosertothegrandcoalitionrepresentgoodsolutions,whichexplainswhytheMPRtendsto1whenweincreaseα.Theseremarksmotivateustostudytheimpactofαalsoontheoptimalalgorithm.Figure8displaystheruntimeneededtofindtheoptimalsolutiononrandominstanceswith25agentsonscale-freenetworkswithm=2,showingthattheperformanceofCFSSdecreaseswhenwein-creaseαfrom2to3.ThevalueoftheboundprovidedbyEquation2islargerwhenαgrows,henceitsqualitydecreases,producingalesseffectiveboundingtechniqueand,thus,ahigherruntime.Tosummarise,theadoptionofabiggerαinthecoalitionsizewithdistancecostfunctionnegativelyimpactstheperformanceofourapproachwhencomputingoptimalsolutions,whileimprovingapproximatesolutionsasαgrows.ThisACMTransactionsonIntelligentSystemsandTechnology,Vol.V,No.N,ArticleA,Publicationdate:JanuaryYYYY. A:20 ) s ( e m i t n o i t u c e x E 104 103 102 101 100 n o i t u l o s S S F C / n o i t u l o s k n i L C - 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 3 NαN 1.10 1.09 1.08 1.07 1.06 1.05 1.04 1.03 Filippo Bistaffa et al. Amdahl's Law (94%) CFSS 12 11 10 9 8 7 6 5 4 3 2 1 p u - d e e p S 100 500 1500 1000 2000 Number of agents 2732 4 6 8 10 12 14 16 18 20 22 24 Number of threads Fig. 8. Runtime w.r.t. α. Fig. 9. C-Link vs. CFSS. Fig. 10. Parallel speed-up. motivates our choice of defining α = 2.2 in the previous experiments, as it represents a good value to benchmark CFSS. In fact, it is big enough to avoid excessively low run- times in the optimal version, but it does not exceed the 2.4 boundary, beyond which the quality guarantees it provides are extremely good (i.e., the MPR tends to 1). 7.5. CFSS vs C-Link: solution quality comparison We further evaluate the approximate performance of CFSS by comparing it against C-Link [Farinelli et al. 2013], an heuristic approach to solve CSG based on hier- archical clustering. We chose C-Link among the other approaches discussed in Sec- tion 2.1.2 because it is the most recent one and it has also been tested using the collec- tive energy purchasing function by its authors. Here we adopt the same experimental setting discussed in the previous section, i.e., we consider scale-free networks with n∈{100, 500, 1000, 1500, 2000, 2732} and m=4 (generating 20 random repetitions of each experiment), and we adopt the collective energy purchasing characteristic function. We solve each instance with C-Link (adopting the best heuristic proposed by Farinelli et al. [2013], i.e., Gain-Link) and then we run CFSS on the same instance with a time budget equal to C-Link's runtime. Figure 9 shows the average and the standard error of the mean of the ratio between the value of the solution computed by C-Link and the one computed by CFSS. Since we consider solutions with negative values, when such ratio is > 1 the solution computed by C-Link is better (i.e., has a lower cost) than the one computed by CFSS. Our results show that, even though C-Link can compute bet- ter solutions, the quality of our solutions is worse only by 3% for 100 agents. When we consider the entire dataset (i.e., with 2732 agents) the quality of our solutions is still within the 9% w.r.t. the counterpart. Notice that C-Link slightly outperforms CFSS. This comes as no surprise since the fundamental difference between C-Link and CFSS is that C-Link does a backtrack-free visit of the search graph adopting a greedy heuris- tic to determine the choice at each step. In other words, C-Link explores only one path of the search graph. On the other hand, CFSS does not employ any heuristic as it is designed to execute a systematic visit of the search graph with backtracking. Notice that we can easily include the C-Link's greedy heuristic into CFSS to guide the visit of the children nodes in the search. With C-Link's heuristic, CFSS first explores the same path explored by C-Link, and then, if given more time, continues the visit of the rest of the search space by backtracking. Since we provide CFSS with a time budget equal to C-Link's runtime, if we employ C-Link's heuristic then CFSS effectively becomes the same algorithm as C-Link, and hence returns solutions of the same quality. 7.6. P-CFSS Here we detail the parallelisation approach of the multi-threaded version of CFSS, analysing the speed-up with respect to its serial version. Following Bader et al. [2005], parallelisation is achieved by having different threads searching different branches ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:21 rightmost subtrees are computed by a team of ta −(cid:80)i of the search tree. The only required synchronisation point is the computation of the current best solution that must be read and updated by every thread. In particular, the distribution of the computational burden among the ta available threads is done by considering the first i subtrees rooted in every node of the first generation (starting from the left) and assigning each of them to tj threads (1 ≤ j ≤ i). The remaining j=1 tj threads using a dynamic schedule.9 Parameters i and tj are arbitrarily set, since it is assumed (and verified by an empirical analysis) that the distribution of the nodes over the search tree does not significantly vary among different instances. More advanced techniques, such as estimating the number of nodes in the search tree as suggested by Lelis et al. [2013], will be considered in the future. We run P-CFSS on random instances with 27 agents on scale-free networks with m = 2, using a machine with 2 Intel R(cid:13) Xeon R(cid:13) E5-2420 processors. The speed-up measured during these tests has been compared with the maximum theoretical one provided by Amdahl's Law, considering an estimated non- parallelisable part of 6%, due to memory allocation and thread initialisation. As can be seen in Figure 10, the actual speed-up follows the theoretical one up to 12 threads, the number of physical cores. After that, hyper-threading still provides some improvement, reaching a final speed-up of 9.44 with all 24 threads active. 8. CONCLUSIONS In this paper we considered the GCCF problem and proposed a branch and bound solu- tion (the CFSS algorithm) that can be applied to a general class of functions (i.e., m + a functions). Our empirical evaluation shows that CFSS outperforms DyCE, the state of the art algorithm, when applied to three characteristic functions. Specifically, CFSS is at least 3 orders of magnitude faster than DyCE in the first scenario, while solving bigger instances for the remaining two. Moreover, the adoption of our edge ordering heuristic provides a further speed-up of 296%. P-CFSS, the parallel version of CFSS, achieves a speed-up of 944% on a 12-core machine, close to the maximum theoreti- cal speed-up. Finally, our algorithm provides approximate solutions with good quality guarantees (i.e., with a MPR of 1.12 in the worst case) for systems of unprecedented scale (i.e., more than 2700 agents). Overall, our work is the first to show how coalition formation techniques can start coping with real-world scenarios, opening the possi- bility of employing coalition formation on practical applications, rather than purely synthetic, small-scale environments. Future work will look at applying our approach to other realistic scenarios (e.g., the formation of team of experts connected by a social network [Lappas et al. 2009]) and focusing on different multi-threading models (e.g., GPUs). ELECTRONIC APPENDIX The electronic appendix for this article can be accessed in the ACM Digital Library. ACKNOWLEDGMENTS COR (TIN 2012-38876-C02-01), Collectiveware TIN 2015-66863-C2-1-R (MINECO/FEDER), and the Gener- alitat of Catalunya 2014-SGR-118 funded Cerquides and Rodr´ıguez-Aguilar. This work was also supported by the EPSRC-Funded ORCHID Project EP/I011587/1. REFERENCES Gene M. Amdahl. 1967. Validity of the single processor approach to achieving large scale computing capa- bilities. In American Federation of Information Processing Societies. 483–485. 9Once a thread has completed the computation of one subtree, it starts with one of the remaining ones. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:22 Filippo Bistaffa et al. Giorgio Ausiello, Pierluigi Crescenzi, Giorgio Gambosi, Viggo Kann, Alberto Marchetti-Spaccamela, and Marco Protasi. 2012. Complexity and approximation: Combinatorial optimization problems and their approximability properties. Springer. David A. Bader, William E. Hart, and Cynthia A. Phillips. 2005. Parallel Algorithm Design for Branch and Bound. In Emerging Methodologies and Applications in Operations Research. Springer, 5–44. Daniel Berend and Tamir Tassa. 2010. Improved bounds on Bell numbers and on moments of sums of ran- dom variables. Probability and Mathematical Statistics 30 (2010), 185–205. Filippo Bistaffa, Alessandro Farinelli, Jes ´us Cerquides, Juan Rodr´ıguez-Aguilar, and Sarvapali D. Ram- churn. 2014a. Anytime Coalition Structure Generation on Scale-Free and Community Networks. In International Joint Workshop on Optimisation in Multi-Agent Systems and Distributed Constraint Rea- soning. Filippo Bistaffa, Alessandro Farinelli, Jes ´us Cerquides, Juan Rodr´ıguez-Aguilar, and Sarvapali D. Ram- churn. 2014b. Anytime Coalition Structure Generation on Synergy Graphs. In International Conference on Autonomous Agents and Multi-Agent Systems. 13–20. Filippo Bistaffa, Alessandro Farinelli, and Sarvapali D. Ramchurn. 2015. Sharing Rides with Friends: a Coalition Formation Algorithm for Ridesharing. In AAAI Conference on Artificial Intelligence. 608–614. Viet Dung Dang and Nicholas R. Jennings. 2004. Generating coalition structures with finite bound from the optimal guarantees. In International Conference on Autonomous Agents and Multi-Agent Systems. 564–571. Prithviraj Dasgupta, Vladimir Ufimtsev, Carl Nelson, and S. G. M. Hossain. 2012. Dynamic reconfiguration in modular robots using graph partitioning-based coalitions. In International Conference on Autonomous Agents and Multi-Agent Systems. 121–128. Gabrielle Demange. 2004. On Group Stability in Hierarchies and Networks. Political Economy 112 (2004), 754–778. Xiaotie Deng and Christos H. Papadimitriou. 1994. On the Complexity of Cooperative Solution Concepts. Mathematics of Operations Research 19 (1994), 257–266. Nicola Di Mauro, Teresa M A. Basile, Stefano Ferilli, and Floriana Esposito. 2010. Coalition Structure Gen- eration with GRASP. In International Conference on Artificial Intelligence: Methodology, Systems, Ap- plications. 111–120. Daniela Dos Santos and Ana Bazzan. 2012. Distributed clustering for group formation and task allocation in Multi-Agent systems: A swarm intelligence approach. Applied Soft Computing 12 (2012), 2123–2131. Alessandro Farinelli, Manuele Bicego, Sarvapali Ramchurn, and Mauro Zucchelli. 2013. C-link: A Hier- archical Clustering Approach to Large-scale Near-optimal Coalition Formation. In International Joint Conference on Artificial Intelligence. 106–112. Michael R. Garey and David S. Johnson. 1990. Computers and Intractability: A Guide to the Theory of NP- Completeness. W. H. Freeman & Co. Matthew E. Gaston and Marie desJardins. 2005. Agent-organized Networks for Dynamic Team Formation. In International Conference on Autonomous Agents and Multi-Agent Systems. 230–237. Hampshire County Council. 2014. Switch Hampshire. (2014). http://www3.hants.gov.uk/switch Atsushi Iwasaki, Suguru Ueda, Naoyuki Hashimoto, and Makoto Yokoo. 2015. Finding core for coalition structure utilizing dual solution. Artificial Intelligence 222 (2015), 49–66. David R. Karger. 1993. Global Min-cuts in RNC, and Other Ramifications of a Simple Min-out Algorithm. In ACM-SIAM Symposium on Discrete Algorithms. 21–30. George Karypis and Vipin Kumar. 1998. A Fast and High Quality Multilevel Scheme for Partitioning Irreg- ular Graphs. SIAM Journal on Scientific Computing 20 (1998), 359–392. Helena Keinanen. 2009. Simulated Annealing for Multi-Agent Coalition Formation. In Agent and Multi- Agent Systems: Technologies and Applications. 30–39. Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is Twitter, a Social Network or a News Media?. In World Wide Web. 591–600. Theodoros Lappas, Kun Liu, and Evimaria Terzi. 2009. Finding a team of experts in social networks. In ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 467–476. Levi H. S. Lelis, Lars Otten, and Rina Dechter. 2013. Predicting the Size of Depth-First Branch and Bound Search Trees. In International Joint Conference on Artificial Intelligence. 594–600. Somchaya Liemhetcharat and Manuela Veloso. 2014. Weighted synergy graphs for effective team formation with heterogeneous ad hoc agents. Artificial Intelligence 208 (2014), 41–65. Shuo Ma, Yu Zheng, and Ouri Wolfson. 2013. T-share: A large-scale dynamic taxi ridesharing service. In International Conference on Data Engineering. 410–421. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. Algorithms for Graph-Constrained Coalition Formation in the Real World A:23 Leandro Soriano Marcolino, Albert Xin Jiang, and Milind Tambe. 2013. Multi-agent Team Formation: Di- versity Beats Strength?. In International Joint Conference on Artificial Intelligence. 279–285. Reshef Meir, Yair Zick, and Jeffrey S Rosenschein. 2012. Optimization and stability in games with restricted interactions. In Workshop on Cooperative Games in Multi-Agent Systems. Roger B. Myerson. 1977. Graphs and Cooperation in Games. Mathematics of Operations Research 2 (1977), 225–229. Hariharan Narayanan. 1997. Submodular functions and electrical networks. Elsevier. George L Nemhauser, Laurence A Wolsey, and Marshall L Fisher. 1978. An analysis of approximations for maximizing submodular set functions. Mathematical Programming 14 (1978), 265–294. Naoki Ohta, Vincent Conitzer, Ryo Ichimura, Yuko Sakurai, Atsushi Iwasaki, and Makoto Yokoo. 2009. Coalition structure generation utilizing compact characteristic function representations. In Principles and Practice of Constraint Programming. 623–638. Guillermo Owen. 1995. Game Theory. Academic Press. Talal Rahwan and Nicholas. R. Jennings. 2008a. Coalition Structure Generation: Dynamic Programming Meets Anytime Optimisation. In AAAI Conference on Artificial Intelligence. 156–161. Talal Rahwan and Nicholas R. Jennings. 2008b. An improved dynamic programming algorithm for coali- tion structure generation. In International Conference on Autonomous Agents and Multi-Agent Systems. 1417–1420. Talal Rahwan, Tomasz P. Michalak, Edith Elkind, Piotr Faliszewski, Jacek Sroka, Michael Wooldridge, and Nicholas R Jennings. 2011. Constrained Coalition Formation. In AAAI Conference on Artificial Intelli- gence. 719–725. Talal Rahwan, Tomasz P. Michalak, and Nicholas R. Jennings. 2012. A hybrid algorithm for coalition struc- ture generation. In AAAI Conference on Artificial Intelligence. 1443–1449. Talal Rahwan, Tomasz P Michalak, Michael Wooldridge, and Nicholas R Jennings. 2015. Coalition structure generation: A survey. Artificial Intelligence 229 (2015), 139–174. Talal Rahwan, Sarvapali Ramchurn, Nicholas Jennings, and Andrea Giovannucci. 2009. An anytime algo- rithm for optimal coalition structure generation. Journal of Artificial Intelligence Research 34 (2009), 521–567. Matthew A. Russell. 2013. Mining the Social Web. O'Reilly Media. Tuomas Sandholm, Kate Larson, Martin Andersson, Onn Shehory, and Fernando Tohm´e. 1999. Coalition structure generation with worst case guarantees. Artificial Intelligence 111 (1999), 209–238. Alexander Schrijver. 2003. Combinatorial optimization: polyhedra and efficiency. Springer. Sandip Sen and Partha S. Dutta. 2000. Searching for optimal coalition structures. In International Confer- ence on Autonomous Agents and Multi-Agent Systems. 287–292. Onn Shehory and Sarit Kraus. 1998. Methods for task allocation via agent coalition formation. Artificial Intelligence 101 (1998), 165–200. Alexander Shekhovtsov. 2006. Supermodular decomposition of structural labeling problem. Control systems and computers 1 (2006), 20. Alexander Shekhovtsov, Vladimir Kolmogorov, Pushmeet Kohli, V´aclav Hlav´ac, Carsten Rother, and Philip Torr. 2008. LP-relaxation of binarized energy minimization. Technical Report. Czech Tech. University. Oskar Skibski, Tomasz P. Michalak, Talal Rahwan, and Michael Wooldridge. 2014. Algorithms for the Shap- ley and Myerson Values in Graph-restricted Games. In International Conference on Autonomous Agents and Multi-Agent Systems. 197–204. Long Tran-Thanh, Tri-Dung Nguyen, Talal Rahwan, Alex Rogers, and Nicholas R Jennings. 2013. An effi- cient vector-based representation for coalitional games. In International Joint Conference on Artificial Intelligence. 383–389. Suguru Ueda, Makoto Kitaki, Atsushi Iwasaki, and Makoto Yokoo. 2011. Concise characteristic function representations in coalitional games based on agent types. In International Conference on Autonomous Agents and Multi-Agent Systems. 1271–1272. Meritxell Vinyals, Filippo Bistaffa, Alessandro Farinelli, and Alex Rogers. 2012. Coalitional energy purchas- ing in the smart grid. In IEEE International Energy Conference. 848–853. Thomas Voice, Maria Polukarov, and Nicholas R. Jennings. 2012a. Coalition structure generation over graphs. Journal of Artificial Intelligence Research 45 (2012), 165–196. Thomas Voice, Sarvapali D. Ramchurn, and Nicholas R. Jennings. 2012b. On coalition formation with sparse synergies. In International Conference on Autonomous Agents and Multi-Agent Systems. 223–230. D. Yun Yeh. 1986. A dynamic programming approach to the complete set partitioning problem. BIT Numer- ical Mathematics 26 (1986), 467–474. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
1903.09259
1
1903
2019-03-21T22:14:46
Local Interactions for Cohesive Flexible Swarms
[ "cs.MA" ]
Distributed gathering algorithms aim to achieve complete visibility graphs via a "never lose a neighbour" policy. We suggest a method to maintain connected graph topologies, while reducing the number of effective edges in the graph to order n. This allows to achieve different goals and swarming behaviours: the system remains connected but flexible, hence can maneuver in environments that are replete with obstacles and narrow passages, etc.
cs.MA
cs
Local Interactions for Cohesive Flexible Swarms Rotem Manor1, Ariel Barel2, and Alfred M. Bruckstein3 Center for Intelligent Systems (CIS) Computer Science Department Technion, Haifa 32000, Israel. 9 1 0 2 r a M 1 2 ] A M . s c [ 1 v 9 5 2 9 0 . 3 0 9 1 : v i X r a Abstract -- Distributed gathering algorithms aim to achieve complete visibility graphs via a "never lose a neighbour" policy. We suggest a method to maintain connected graph topologies, while reducing the number of effective edges in the graph to order n. This allows to achieve different goals and swarming behaviours: the system remains connected but flexible, hence can maneuver in environments that are replete with obstacles and narrow passages, etc. INTRODUCTION We present a novel method for distributed control of multi-agent systems, which ensures maintaining flexible and connected spatial constellations. Such a requirement is needed in the context of many tasks that swarms of agents must carry out, such as mapping unknown environments, and deploying a connected network of sensors to cover unknown regions. The agents are assumed to be identical, anonymous (i.e. indistinguishable) and simple in the sense of having little or no memory (i.e. oblivious), with limited computation and sensing capabilities. In this paper we assume limited sensing range, denoted by V . The swarm remains connected, never splits into disjoint groups, hence remains able to perform tasks cohesively. We consider systems comprising mobile agents that interact solely by adjusting their motion according to the relative location of their neighbours. The agents are assumed capable of sensing the presence of other agents within the given sensing range. The agents then implement rules of motion based on information on the geometric constellation of their neighbours. The motion of agents is designed to ensure global connectivity without attempting to maintain all existing visibility connections between agents. Therefore, we obtain swarms that are cohesive but not rigid, allowing the agents to move more freely and assume various desirable formations, for example in order to pass through narrow passages between obstacles, and reduce communication loads when agents must act as a backbone network for communication, etc. Our algorithm is truly distributed, hence insensitive to the size of the swarm, since each agent carries out simple calculations and makes local individual decisions, rendering it suitable for swarms with very large numbers of agents. set of edges (representing connections between the agents). The neighbourhood set of a vertex is the set of vertices Interactions between agents in multi-agent systems are often mathematically described using a graph, commonly labelled as G(V,E), where V = {ν1, ν2, ..., νn} is the set of vertices (representing the agents), and E ⊆V×V is the connected to it, i.e. Niá{νj∈V{νi, νj}∈E}. the plane R2), i.e. on the set{piá(xi, yi)}i=1,2,3,.... In the V , and the interconnection graph G(V,E) is the visibility G(V,E), the setE is defined as follows: ei,j∈E ⇐⇒ pi− pj≤ V The connection between the agents is either fixed and known in advance, or it is defined based on geometric relationships between the agents' positions (in space, say in limited visibility case, agents are visible to each other if their mutual distance does not exceed the visibility range limit graph corresponding to the agents' locations. In this case, in A fundamental issue in a multi-agent system is to maintain cohesiveness, i.e. the interconnection graph corresponding to the system configuration, must stay connected, otherwise the system splits into disjoint parts. For a graph to be connected, there must always be a path between each pair of nodes in the graph. In a recent survey on multi-agent geometric consensus [1], different types of distributed gathering algorithms are presented in detail, where gathering agents with limited vis- ibility is addressed, as discussed in [2], [3], [4], [5], [6], [7], [8], [9]. Other recent articles e.g. [10], [11], [12], [13], [14] also deal with the consensus problem in distributed multi- agent systems. A common principle in the distributed control algorithms dealing with gathering, rendezvous, clustering, and aggregation of multi-agent systems is the "never lose a neighbour" policy, requiring: ∀i and ∆t≥ 0 ∶ j∈ Ni(t)⇒ j∈ Ni(t+ ∆t) that is, once agents become neighbours, they must remain neighbours forever, hence the number of edges in the interconnection graph never decreases. Local behaviours for the agents that enforce this policy, with additional bias aiming to gradually add more edges to the graph, are often sufficient for the graph to become complete in finite expected time. In the limited visibility case, such systems between agents i and j. Coordination between the agents is already a feature built into this method because the decision of two agents whose connection is not necessary to maintain connectivity is symmetrical, that is, if a "bridging" agent k exists, we have that j∉ N e i ⇐⇒ i∉ N e j . is an agent k inside the intersection lens of these circles, it is necessarily Fig. 1. Two circles of radiuspi− pj< V centered at pi and pj. If there closer to i than j and closer to j than i. Hence in this case j ∈ Ni but i , and i∈ Nj but i∉ N e j∉ N e Define Ge as G(V,E e), i.e. Ge is a subgraph of the visibility graph G whose set of edgesE e is defined by (1). j . An example of a neighbourhood graph vs. effective neigh- bourhood graph is shown in Figure 2, where both solid and dashed lines belong to the neighbourhood graph, but only the solid lines belong to the effective neighbourhood graph. In this example only half of the edges remain after reducing unnecessary edges due to rule (1). necessarily gather to a region with "diameter" less than V . Hence, the "never lose a neighbour" policy is optimally suited for the purpose of gathering, since increasing the number of connected agents leads to clustering of agents to a small, visibility-horizon-defined area. However, for connectivity maintenance only, the "never lose a neighbour" policy is certainly too conservative and stringent: maintaining connectivity only requires a connected neighbourhood graph, rather than a complete graph, and this goal may be achieved if some existing mutually visible agents cease to be defined as neighbours. The conservative policy is quite popular in the multi- agent distributed control field since the lack of coordination between agents' decisions, may, in general, cause the graph to become disconnected. We here propose a local method for maintaining a connected graph in distributed multi-agent systems, which ensures, along with preserving the graph connectivity, that the number of edges does not exceed 3n, where n=V is the number of agents in the system. The proposed method maintains graph connectivity withE≤ 3n as compared toE= n(n−1) in the complete graph. 2 Why can such a generic method be useful? A swarm in which the constraints that apply to agents are fewer is more flexible, so it can be steered through regions full of obstacles and narrow passages. A swarm that is connected but the number of neighbourhood defining edges in the graph is small, may self-organise in more interesting and useful constellations. A swarm in which the connections are determined according to the proposed algorithm can be spread and stretched so that the distance between its agents can attain distance of the order of (n− 1)V , i.e. in some cases it can even be arranged to form a line. Hence we envisage that the proposed method can be a useful basic process in designing multi-agent swarming algorithms that are usually called upon to ensure cohesiveness in various cases of controlled swarm actions, where, for example, the swarm is guided by leaders or by some exogenous broadcast controls. Following THE COHESION ENSURING PROCESS on Toussaint's work relative neighbourhood graphs (RNG) the [15], we define N e i , "effective neighbourhood" of agent i, as a subset of Ni: (1980) ∀j∈ Ni i ⇐⇒ ࢜k∶ ∶ j∈ N e pi− pk<pi− pj &pj− pk<pi− pj Fig. 2. In this example, the original neighbourhood graph on 20 nodes, contain 42 edges between every pair of agents distanced V or less (both solid and dashed lines). In the effective neighbourhood graph, 21 edges that are unnecessary for connectivity maintenance due to rule (1) are shown dashed, and only 21 edges, shown in solid line, remain. (1) i.e. if agents i and j are neighbours, and there is an agent k whose distance from agent i and from agent j is smaller than the distance between agents i and j (see Figure 1), then the edge eij is not necessary to maintain connectivity Lemma 1: If G is connected, then Ge is connected. Proof: We prove this Lemma by contradiction. Assume G is connected and Ge is disconnected to two disjoint connected setsV1 andV2. Hence, by assumption, ∀(i∈V1, j∈V2)∶∃k∶ pi− pk<pi− pj &pj− pk<pi− pj without loss of generality, assume i∈V1 and j∈V2 are the closest agents between the two groupsV1 andV2. Since G is connected by assumption, we have that pi− pj ≤ V , i∉ N e j and j∉ N e being the closest pair. By assumption these two agents are not effective neighbours, hence are not connected in Ge, i.e. i . But by (1) there is necessarily an agent k that links them, see (2). Hence i and j can not be the closest agents. (2) We note that the RNG has been proposed in multi- agent robotics in conjunction with multi-agent gathering and/or deployment algorithms, e.g. [16], [17], [18], [19]. The novelty in our work is (1) proposing the use of the operations, and (2) defining and using, along with various RNG and some extensions for maximally flexible swarm goal oriented constraints, the largest local allowable regions for displacement that ensure maintenance of connectivity, in the spirit of [4]. We note that methods to reduce the number of edges in geometric graphs while maintaining connectivity are also used for purposes that do not concern dynamics of agents, but, for example, for saving energy in ad-hoc communication networks, see e.g. [20]. THE MOTION LAWS In order to allow the agents free movement that does not violate the preservation of connectivity, we define for each agent an "Allowable Region". If all agents move into their allowable regions, preservation of connectivity is satisfied. Recalling Ando et. al. [2] for a pair of agents, the Allowable 2 centered at the Region of each agent is a disc of radius V midpoint position between the two agents mij (see figure 3). ARij= ARji= D V 2  pi+ pj 2  If an agent has more than one neighbour, its allowable region is defined by the union of is allowable regions given by (3), see Figure 4: ARi=  j∈Ni ARij (4) Fig. 4. regions, illustrated here by the dashed area ARi. The allowable region of an agent is the union of its allowable clearly if an agent moves to the union of its allowable regions defined by (4), it is guaranteed that the distance from all its neighbours will not exceed V . Similar to (4),we define an "Effective Allowable Region": i=  j∈N e i ARe ARij (5) the effective allowable region of agent the i.e. intersection of all its allowable regions relative to all the agents in its effective neighbourhood, defined by Ge. is i Hence, the motion law will be: pi(t) -- → pi(t+ 1)∈ ARe i(t) (3) i.e. the next position of agent i is any point inside its current effective allowable region (5). Since ARi(t)⊆ ARe i(t), the restriction of movement in (5) is less constrained than that of (4). (6) The freedom to move to any location inside allowable regions rather to a specific point, provides flexibility and allows other considerations and optimisations to be carried out by the agents. maintains connectivity. Theorem 1: A system of agents obeying dynamic law (6) ated with the system is connected by assumption. We have Proof: The initial visibility graph G(V,E)(0) associ- by Lemma 1 that Ge(V,E)(t) is connected. If all agents obey motion law (6), we have that E e(t) ⊆ E(t+ 1), i.e. all edges of Ge(V,E) are preserved. Therefore G(V,E)(t+ 1) is connected. Since G(V,E)(t+ 1) is connected, also Ge(V,E)(t+ 1) will be connected. Fig. 3. The Allowable Region ARij of two agents i and j is a disc of radius V 2 centered at their meadpoint position mij. If two agents whose mutual distance is smaller or equal V move into their allowable region defined in (3) that they both can calculate, they keep their mutual distance smaller than V , hence the agents will stay connected. APPLICATIONS AND SIMULATION RESULTS The distributed meta-algorithm presented so far opens up many possibilities of applications for distributed control of swarms. A number of interesting research directions that we consider relevant are algorithms with the ability to move a swarm of agents through narrow passages and obstacles, algorithms for mapping unknown areas, and reducing communication load when agents constitute a relay station for transmitting messages, as well as other topics requiring geometrically flexible swarms. We discuss below several examples. Fig. 6. (a) Edges exist between every pair of mutually visible agents at a distance V or less (b) Evolution of the network: only the necessary edges are kept (c) Final constellation: a required structured is achieved. This simulation result is based on the "RNG Plus" approach described at the end of this article with the value m= 1. Example 1: Traversal of narrow passages Example 3: Following a leader In this example (Figure 5), which will be discussed in detail in a subsequent article, the swarm is required to pass through a narrow passage. we implemented a rule of motion that prevents two agents from approaching each other closer 10 V . Then the agents movement is also governed by than 1 the cohesion rule (6) with two additional restrictions on the agents' allowable regions: (1) they exclude the obstacle areas (1) they ensure line-of-sight preservation between effective neighbours. One designated "leader" agent pulls the rest of the agents through the narrow passage. Because the swarm is not rigid, this passage is possible. By comparison, if the "never lose a neighbour" policy would have been applied together with the minimum distance limit ( 1 10 V ), the swarm would have been too rigid to pass through the narrow passage. Fig. 5. Passing through a narrow passage. (a) Initial constellation (b) The leader pulls the rest of the agents while only necessary edges are preserved (c) The swarm successfully completed the passage. This simulation result is based on the "RNG Plus" approach described at the end of this article with the value m= 1. Example 2: Formation This example presents simulations of convergence to quasi regular formation (Figure 6). In a topology where each agent relates to all other agents (i.e. in complete graph), by geometry it is impossible to create a structure in which all the lengths of the edges are identical. In this simulation, each agent worked according to rule (1) in order to choose only its effective neighbours, and only in relation to these (effective) neighbours he aspires to maintain a 10 V . The system "anneals" to a nice quasi fixed distance of 1 regular formation enabling nice and uniform area coverage as presented in the network evolution below. In this example (Figure 7), one random agent in the group becomes a designated leader which will seek to move along a predetermined path. A process is shown in which the number of edges in the neighbourhood graph decreases, while the graph remains connected, until a linear constellation of agents is formed, and the linear "snake-like" swarm follows the leader. Fig. 7. Following the leader. The randomly designated leader agent is shown as a large red circle, and the evolution of forming a line is presented from left to right. (a) Edges exist between every pair of agents distanced V or less, and a random leader is selected (b) gradually unnecessary edges disappear while the graph remains connected (c) Final constellation: the required line structured is achieved while all the agents follow the leader agent. Example 4: Ad-hoc networking In this example, each node describes an agent with limited communication and visibility range V , and each solid-line edge describe an "active" communication channel. In order to receive information from all the agents, a connected graph is required, but since the operation of transmission and reception consumes energy, there is motivation to reduce the number of necessary communication channels. In this simulation (see Figure 2), all lines (both solid and dashed) are shorter than V , but not all the lines are necessary for maintaining connectivity, i.e. communication is guaranteed using the solid lines only. The sub graph shown in solid lines was distributedly established by the agents themselves, each agent having information only about neighboring agents in the range V . The upper limit of number of edges is n(n−1) (i.e. clique). Under the geometric law (1), in the 2d case, each agent can have up to 6 effective agents, and therefore the upper limit of effective edges in this case will be 3n. 2 [11] Dimos V Dimarogonas and Kostas J Kyriakopoulos. On the ren- dezvous problem for multiple nonholonomic agents. IEEE Transac- tions on automatic control, 52(5):916 -- 922, 2007. [12] Housheng Su, Xiaofan Wang, and Guanrong Chen. Rendezvous of multiple mobile agents with preserved network connectivity. Systems & Control Letters, 59(5):313 -- 322, 2010. [13] Ariel Barel, Rotem Manor, and Alfred M Bruckstein. Proba- arXiv preprint bilistic gathering of agents with simple sensors. arXiv:1902.00294, 2019. [14] Rotem Manor and Alfred M Bruckstein. Chase your farthest neigh- bour: A simple gathering algorithm for anonymous, oblivious and non-communicating agents. In Proc. 13th Int. Symp. Distrib. Auton. Robotic Syst, 2016. [15] Godfried T Toussaint. The relative neighbourhood graph of a finite planar set. Pattern recognition, 12(4):261 -- 268, 1980. [16] Shouwei Li, Christine Markarian, Friedhelm Meyer auf der Heide, and Pavel Podlipyan. A continuous strategy for collisionless gathering. In International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, pages 182 -- 197. Springer, 2017. [17] Anurag Ganguli, Sara Susca, Sonia Mart´ınez, Francesco Bullo, and Jorge Cortes. On collective motion in sensor networks: sample problems and distributed algorithms. In Proceedings of the 44th IEEE Conference on Decision and Control, pages 4239 -- 4244. IEEE, 2005. [18] Jorge Cort´es, Sonia Mart´ınez, and Francesco Bullo. Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions. Automatic Control, IEEE Transactions on, 51(8):1289 -- 1298, 2006. [19] Sonia Mart´ınez, Jorge Cortes, and Francesco Bullo. Motion coordina- tion with distributed information. Control Systems, IEEE, 27(4):75 -- 88, 2007. [20] Farinaz Koushanfar, Abhijit Davare, David T Nguyen, Alberto Sangiovanni-Vincentelli, and Miodrag Potkonjak. Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints. ACM Transactions on Embedded Computing Systems (TECS), 6(3):16, 2007. Toussaint [15] proved that finite planar set RNG, similar to ours effective graphs, contains at most 3n−6 edges. It is clear that using the method reduces overall energy consumption associated with communication [20]. SUMMARY A general method was introduced for the distributed control of multi-agent systems, which maintains connected but flexible swarms. An algorithm was introduced, allowing to locally and in a distributed manner, to remove edges in an interconnection graph between agents, without risking disconnecting it, which reduces the number of edges in the graph over time from order n2 to order n. DISCUSSION AND FURTHER INVESTIGATION The examples presented by simulation, did not include formal proofs. In a forthcoming article, we deal with formal definitions of motion laws in the presence of obstacles, and a formal analysis that the system indeed converges in finite expected time to the desired constellation. An interesting extension of the ideas presented above is the design of local rules based on allowing "at most m" agents of the swarm to be present in the intersection between the visibility discs of neighbours, in order to maintain the connection between them. In our previous analysis on RNG we took m = 0. This extension named "RNG Plus" will ensure more reliable connectivity at the expense of slightly less flexibility. This tradeoff too will be the subject of further investigation. A video of some of the simulations shown above is avail- able on-line at https://youtu.be/A3jnYpY15DY. REFERENCES [1] Ariel Barel, Rotem Manor, and Alfred M Bruckstein. Come together: multi-agent geometric consensus (gathering, rendezvous, clustering, aggregation). arXiv preprint arXiv:1902.01455, 2019. [2] Hideki Ando, Yoshinobu Oasa, Ichiro Suzuki, and Masafumi Ya- mashita. Distributed memoryless point convergence algorithm for mobile robots with limited visibility. Robotics and Automation, IEEE Transactions on, 15(5):818 -- 828, 1999. [3] Noam Gordon, Israel A Wagner, and Alfred M Bruckstein. Gathering In Ant multiple robotic a (ge) nts with limited sensing capabilities. Colony Optimization and Swarm Intelligence, volume 3172 of Lecture Notes in Computer Science, pages 142 -- 153. Springer, 2004. [4] Noam Gordon, Israel A Wagner, and Alfred M Bruckstein. A ran- domized gathering algorithm for multiple robots with limited sensing capabilities. In Proc. of MARS 2005 workshop at ICINCO Barcelona, 2005. [5] Veysel Gazi and Kevin M. Passino. Stability analysis of swarms. IEEE Transactions on Automatic Control, 48:692 -- 697, 2003. [6] Veysel Gazi and Kevin M Passino. Stability analysis of social foraging swarms. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 34(1):539 -- 557, 2004. [7] Reza Olfati-Saber, J Alex Fax, and Richard M Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215 -- 233, 2007. [8] Luc Moreau. Stability of continuous-time distributed consensus algo- rithms. In Decision and Control, 2004. CDC. 43rd IEEE Conference on, volume 4, pages 3998 -- 4003. IEEE, 2004. [9] Ali Jadbabaie, Jie Lin, and A. Stephen Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. Automatic Control, IEEE Transactions on, 48(6):988 -- 1001, 2003. Ozdemir, Melvin Gauci, Salom´e Bonnet, and Roderich Gross. Finding consensus without computation. IEEE Robotics and Automa- tion Letters, 3(3):1346 -- 1353, 2018. [10] Anıl
1007.0803
1
1007
2010-07-06T04:00:10
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent
[ "cs.MA" ]
This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called 'Soft Control', which keeps the local rule of the existing agents in the system. We show the feasibility of soft control by a case study. Consider the simple but typical distributed multi-agent model proposed by Vicsek et al. for flocking of birds: each agent moves with the same speed but with different headings which are updated using a local rule based on the average of its own heading and the headings of its neighbors. Most studies of this model are about the self-organized collective behavior, such as synchronization of headings. We want to intervene in the collective behavior (headings) of the group by soft control. A specified method is to add a special agent, called a 'Shill', which can be controlled by us but is treated as an ordinary agent by other agents. We construct a control law for the shill so that it can synchronize the whole group to an objective heading. This control law is proved to be effective analytically and numerically. Note that soft control is different from the approach of distributed control. It is a natural way to intervene in the distributed systems. It may bring out many interesting issues and challenges on the control of complex systems.
cs.MA
cs
PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 1 Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent Jing Han, Ming Li and Lei Guo Abstract This paper asks a new question: how can we control the collective behavior of self-organized multi- agent systems? We try to answer the question by proposing a new notion called 'Soft Control', which keeps the local rule of the existing agents in the system. We show the feasibility of soft control by a case study. Consider the simple but typical distributed multi-agent model proposed by Vicsek et al. for flocking of birds: each agent moves with the same speed but with different headings which are updated using a local rule based on the average of its own heading and the headings of its neighbors. Most studies of this model are about the self-organized collective behavior, such as synchronization of headings. We want to intervene in the collective behavior (headings) of the group by soft control. A specified method is to add a special agent, called a 'Shill', which can be controlled by us but is treated as an ordinary agent by other agents. We construct a control law for the shill so that it can synchronize the whole group to an objective heading. This control law is proved to be effective analytically and numerically. Note that soft control is different from the approach of distributed control. It is a natural way to intervene in the distributed systems. It may bring out many interesting issues and challenges on the control of complex systems. Index Terms Collective Behavior, Multi-agent System, Soft Control, Boid Model, Shill Agent This work was supported by the National Natural Science Foundation of China. Jing Han and Lei Guo are with the Institute of Systems Science, AMSS, Chinese Academy of Sciences, Beijing, 100080, China. Ming Li is with the Institute of Theoretical Physics, Chinese Academy of Sciences. Corresponding author: [email protected]. 0 1 0 2 l u J 6 ] A M . s c [ 1 v 3 0 8 0 . 7 0 0 1 : v i X r a PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 2 I. INTRODUCTION Collective behavior is the high level (macroscopic) property of a self-organized system which consists of a large number of (microscopic) individuals (agents). Examples are synchronization, aggregation, phase transition, pattern formation, swarm intelligence, fashion, etc. People found this kind of phenomena in many systems, such as flocking of birds, schools of fish, cooperation in ant colonies, panic of crowds [10], norms in economic systems [9], etc. Without any question, collective behavior is one of the fundamental and difficult topics of the study of complex systems. We classify the research on collective behavior into three categories. (I) Given the local rules of agents, what is the collective behavior of the overall system? Many people have been working on this category which is about the mechanism of how collective behavior emerges from multi-agent systems. "More is different"[1]. The physicists have applied theory of statistical physics to explored some simple models, from the Ideal Gas model, Spin Glasses, to the panic model and network dynamics. (II) Given the desired collective behavior, what are the local rules for agents? Some people work on this category. One typical example is Swarm Intelligence. Since the high level function of the overall system can be more than the sum of all individuals, how do we construct robust intelligence by a large number of locally interacting simple agents? An ant is simple and often moves randomly. But a colony of ants can efficiently find the shortest path from their nest to a food source. This natural phenomenon inspired the Ant Colony Optimization Algorithm[2]. (III) Given the local rules of agents, how we control the collective behavior? In some real applications, it is very difficult or even impossible to change the local rules of agents, such as the behavioral rules of people in panic and the flying strategies of birds. Yet we need to control the system to avoid danger or improve efficiency. Then what is the feasible way to intervene in the collective behavior? There should be a way especially for the multi-agent system that utilizes the property of collective behavior. This question is not well noticed in the control literature. In this paper, we propose a new control notion, called 'soft control'1, which keeps the basic local rule of the existing agents in the system. There are no global parameters can be adjusted 1The idea of soft control in this paper was inspired by discussions at the "Systems, Control and the Complexity Science" Xiangshan Science Conference (May, 2004, Beijing) and the preliminary result was presented at the 2nd Chinese-Swedish Conference on Control [13]. PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 3 to achieve the control purpose, such as adjusting the temperature to change water from liquid phase to gas/solid phase or broadcasting orders directly to all agents by a controller. This feature makes a difference between soft control and the traditional control. These three categories are tightly related. The first category (I) is about how a distributed system behaves and what emerges from the system. Both of (II) and (III), however, require the system to behave at the high level as what we expected, i.e., we know what collective behavior should be emerged from the system. But (II) focuses on how to design a distributed system by constructing(changing) the local rules for interaction among agents, and (III) focuses on how to intervene in the existing system by a nondestructive way. Since collective behavior is a kind of macroscopic feature of a multi-agent system, usually adding one or a few more agents will not affect it. But if those agents are special ones which can be controlled, even though only a small number (in some cases, only one), it can dramatically change the collective behavior as will be shown in Section 3. So in this paper, a way to control the system without changing the local rules of the existing agents is to add one (or a few) special agent which can be controlled. Therefore its behavior does not necessarily obey the local rules as the ordinary agents do. However, the existing agents still treat the special agent as an ordinary agent, so the special agent only affects the local area with limited power. The special agent is the only controlled part of the system and it indeed changes the collective behavior of the system by 'cheating' and 'seducing' its neighboring ordinary agents. So we do not call the special agent a leader. Instead, we call it a 'Shill'. Soft control is different from distributed control. Distributed control recently gets more and more attention because many real-world applications are distributed systems, such as power networks and traffic systems. The system consists of many interacting subsystems that all have their own controllers with local feedback. The study of the relationship about performance between the overall system and the subsystems falls into category (I). On the other hand, designing a practical distributed system for resource sharing and cooperation is a demanding and complicated task. This research is of the category (II). So we can see that both soft control and distributed control concern with the macroscopic collective behavior (such as synchronization) of the self-organized multi-agent system with local rules. But in distributed control, every agent is treated as a control system and has its control law (which is the set of local rules); while in soft control framework, all these agents are treated as one system and the control law is for PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 4 the shill. So soft control can be regarded as a way of intervention in the distributed systems. With the growing literature on complex systems, the challenge of controlling complex systems is likely to become a key problem for control scientists. This paper is going to explore the idea of soft control by a case study, where we will show how a shill can be used to control the headings of a group of mobile agents demonstrated based on the modified Boid model [4] proposed by Vicsek et al [3]. The current control theory cannot be applied directly to this problem because our soft control is a nondestructive intervention in a locally interacting autonomous multi-agent system, which is not allowed to change the local rules of the existing agents. The formation control [5] mainly focuses on how to design the local rules of a team of robots to maintain a geometric configuration during movement, which is a very special kind of collective behavior, and its approach belongs to distributed control. The pinning control [12] is especially for stabilizing dynamical networks (with special topology, such as random networks, small-world and scale-free networks) by imposing controllers on a small fraction of selected nodes in the network. No one appear to have directly studied the above mentioned soft control problem in the literature. Recently, Jadbabie et al [6] investigated a multi- agent model which is slightly different from the one proposed by Vicsek et al, they showed that under some a priori connectivity conditions, the group will eventually move in a same direction even without centralized control. This is a problem of the category (I) of collective behavior study. An idea in [6] worthy of mention is the Leader Following model, which has a leader agent with fixed heading. But it did not tell how to implement synchronization by a leader. The so-called 'virtual leader'[7] is not treated as an agent but part of the potential, which requires to introduce new rules for the ordinary agents to recognize it. The rest of this paper is organized as follows: The modified BOID model proposed by Vicsek et al and the notion of soft control are set up in Section 2. Section 3 is a case study for soft control. We will solve a simple but non-trivial problem by constructing an effective control law for the shill. Both theoretical analysis and computer simulation show that one shill is possible to turn the direction of the whole group. Some concluding remarks are given in Section 4. II. SOFT CONTROL OF THE MODIFIED BOID MODEL Eighteen years ago, Renolds proposed a simultaneous discrete-time multi-agent model, which is called Boid[4], to catch the natural phenomenon of flocking of birds and fish and make PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 5 computer animation. In this model, each bird decides its flying direction only by looking at its current neighboring birds and using three rules (Alignment, Separation and Cohesion) based on the status of its neighbors. These rules are local and simple but the overall system exhibits the flocking behavior. The Boid model became very popular in complex systems studies. Unfortunately, this simple model is not simple at all for theoretical analysis. In 1995, to investigate the emergence of self-ordered motion, Vicsek et al [3] proposed a model which is actually a modified version of Boid, by only keeping the Alignment rule– steer towards the average heading of neighbors, which still can catch the flocking behavior. There are n agents (xi(·), θi(·)) for n birds, labelled from 1 through n, all moving simultaneously in the two-dimensional space. The velocity of agent i at time t is defined by vi(t) = (v cos(θi(t)), v sin(θi(t))) (1) which is constructed to have an absolute value v and a heading given by the angle θi(t) ∈ [0, 2π). The position of agent i at time t is denoted as xi(t). The neighborhood of agent i at time t is defined as Ni(t) = {jkxj(t) − xi(t)k ≤ r, j = 1, 2, . . . , n}, where r is the radius of the neighborhood circle. For any agent i, its heading and position are updated by (2) and (3) below if ignoring noise: θi(t + 1) = hθi(t)ir xi(t + 1) = xi(t) + vi(t + 1) (2) (3) where vi(t + 1) is defined by (1), and hθi(t)ir is the angle of the sum of the velocity vectors of neighbors of agent i: Pj∈Ni(t) vj(t). In other words, hθi(t)ir can be obtained by arctan( X j∈Ni(t) sin(θj(t))/ X j∈Ni(t) cos(θj(t))) (4) with some necessary regulations reflecting angles of [0, 2π). Some recent results of Jadbabaie et al [6] have shown that under some connectivity conditions, the group will eventually move in a same direction. However, the model of [6] calculates hθi(t)ir by simply taking the average of angles of all neighbors. This brings convenience for mathematical analysis, but the system will sometimes exhibit counter-intuitive phenomena as they claimed in PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 6 their paper2. So this paper keeps the updating rule of the model proposed by Vicsek et al, even though the analysis result about synchronization of the model in [6] cannot be utilized3. One can think of many related questions: what is the way to help the group to synchronize if the group will not synchronize by self-organization? What if the group self-organize to a synchronized direction α which is not what we want? What if we want the group to fly to a desired destination? And so on. In this paper, we consider the case of adding one shill to control the collective behavior with the shill denoted as (x0, θ0). The ordinary agent (i = 1, . . . , n) still keep the local rule as formula (2)-(3) to update its heading and position. The only difference is that the neighborhood Ni(t) for agent i at time t will consider the shill: Ni(t) = {jkxj(t) − xi(t)k ≤ r, j = 0, 1, 2, . . . , n}. And the shill does not exactly obey the local rules as the ordinary agents do, its position and heading is decided by the control law u: (x0(t), θ0(t)) = u(x1(t), . . . , xn(t), θ1(t), . . . , θn(t), t) Note that (x0, θ0) may be subject to some constraints. For example, the constraint of x0(t+1) = x0(t) + v0(t + 1) will make the shill behave like an ordinary agent except the way it decides its own heading. Without any constraint, the shill can fly to anywhere with a 'deceptive' heading. The control law u will be different for different control purposes/tasks, such as to synchronize headings of the group (n agents), to keep the group connected or to dissolve a group, to turn 2 This is because the zero angle is special than other angles in (0, 2π). The angles do not symmetrically behave. 3 The result about synchronization for the model of [6] is not true for the model of Vicsek et al. Here is a counterexample: when v = 0, six agents are regularly put on the edge of a circle with radius of r, which form an ordinary hexagon. So each agent has three neighbors (because itself is also counted). The headings are 0, π/3, 2π/3, π, 4π/3, 5π/3. This case will synchronize for the model in [6]. But it will not for the model we consider here, i.e. the Vicsek et al model without noise. PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 7 headings of the group (minimal circling), to lead the group to a destination (in a shortest time), to avoid hitting an object, etc. There are many problems to be considered in terms of control: under what conditions we can use the shill to control the state of the multi-agent system (the controllability problem); which kind of state information can be used for control (the observation problem), e.g., the shill can only see some nearest agents but not all other agents; how can one design the control law when the local rule and other information is not clear (the learning and adaptation problem), etc. We do not intend to answer all these questions in this paper. As a beginning, we will just show how it works for a specific case, which is to synchronize and turn the headings of a group. III. A CASE STUDY Flocking of birds in airports is dangerous. How we drive them away? In this case, obviously we can not use centralized control, such as broadcasting orders to the birds to change to the desired flying direction. The current solution is to use cannon to shoot them away. But can we drive them away by soft control? If the modified Boid model proposed by Vicsek et al works for real birds flocking, and if we can make a controllable powerful robot bird, can we use this robot bird as the shill and guide flight of the birds? In this section, we will study a simple but non-trivial related problem 4. The problem we consider here is: for a group of n agents with initial heading of θi(0) ∈ [0, π), 1 ≤ i ≤ n, what is the control law for the shill, so that all agents will move to the direction of π eventually? Suppose the local rule about the ordinary agents is known. Suppose also that the position x0(t) and heading θ0(t) of the shill can be controlled at any time step t. Suppose further that the state information (headings and positions) of all ordinary agents are observable at any time step. Now we propose an effective control law uβ which is defined as (see Fig. 2): 4In flocking behavior of real animals, more factors such as different sensory systems should be considered. The Boid model is an abstract model which successfully simulates the flocking behavior. But no one has proved it to be true for real birds. So in this paper we just want to use a simple model to demonstrate how soft control works for self-organized multi-agent systems in general, but not to solve the specified airport birds problem. PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 8 x0(t) = xs(t)(t) θs(t)(t) + β π if if θs(t) ≤ π − β; θs(t) > π − β; (5) (6) θ0(t) =   where β ∈ (0, π) is a constant, and s(t) is defined as the 'worst' agent (or one of the 'worst' agents): s(t) = argmin {θi(t)}; 1≤i≤n The intuition behinds uβ is to put the shill to the position of the 'worst' agent s(t) at each time step t and try to 'pull' it to the desired direction π. This greatly reduces the search space of positions and simplifies the control strategy. Note that we can not use θ0(t) = π for all the time because: (A) in the case where θs(t)(t) = 0 and the all the neighboring ordinary agents of the shill have headings of zero degree, the shill with θ0(t) = π can not change θs(t)(t) according to the update rule (2); (B) to avoid the ill-case where both of the numerator and denominator in (4) are zero5. But in the final stages we do need θ0 = π to help the system to synchronize. In the sequel, we use ∆(t) = π − θs(t)(t) to denote the distance between the angel of the 'worst' agent and the objective angel π at time t. We now have the following main technical result of the paper: sin(θj(t)) = 0 implies θj(t) = 0 or π for all j ∈ Ni(t) because sin α > 0 for α ∈ (o, π). cos(θj (t)) = 0 we further conclude that half of the headings should be zero and the other half should 5In the ill-case, Pj∈Ni(t) Consequently, by Pj∈Ni(t) be π. So there must be at least one agent j 6= 0 such that θj(t) = 0 (since θ0(t) > 0 for t > 0 by the control law), which means θs(t)(t) = 0, and so we must have θ0(t) = β ∈ (0, π) if 0 ∈ Ni(t). However, this will contradict with the fact that θj(t) = 0 or π for all j ∈ Ni(t). On the other hand, if 0 /∈ Ni(t), Pj∈Ni(t) sin(θj(t)) = 0 only holds when θj(t) = 0 for all j ∈ Ni(t) since obviously θj (t) < π for all j = 1, . . . , n and t ≥ 0, but in this case we have Pj∈Ni(t) ill-case will never happen in (4). cos(θj (t)) > 0. So the PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 9 Theorem 1. For any n ≥ 2, r ≥ 0, v ≥ 0, and any initial headings and positions θi(0) ∈ [0, π), xi(0) ∈ R2, (1 ≤ i ≤ n), the update rule (2)-(3) and the soft control law uβ defined by (5)-(6) will lead to the asymptotic synchronization of the group, i.e., limt→∞ ∆(t) = 0. Proof. Because π ≥ θ0(t) > θs(t)(t) ≥ 0, and π > θi(t) ≥ θs(t)(t) for 1 ≤ i ≤ n, it is obvious by the update rule (2) that π > θi(t + 1) ≥ θs(t)(t) for 1 ≤ i ≤ n which implies that θs(t)(t) ≤ θs(t+1)(t + 1). Hence by definition of ∆(t), we have ∆(t) ≥ ∆(t + 1) ≥ 0, so ∆(t) will converge to some limit µ ≥ 0. If µ > 0, then for any 0 < ε < µ, we know that ∆(t) ≥ ε > 0 holds for all large t.Consequently, by letting t → ∞ in the following Lemma 2, we have µ ≤ µ − δ which contradicts with δ >0.So we can conclude µ = 0. This completes the proof of Theorem 1. The main task now is to prove the following lemma. Lemma 2. If for some t > 0 and ε > 0, ∆(t) ≥ ε > 0, then there exists a constant δ ∈ (0, ε) which does not depend on t, such that ∆(t + n) ≤ ∆(t) − δ. Proof. At any time step t, the shill is affecting the agent s(t) with heading θ0(t). We now proceed to analyze the lower bound to the angle change θs(t)(t + k) − θs(t)(t) for 1 ≤ k ≤ n, which is denoted by η(k). For k = 1, the shill is affecting the agent s(t), so the worst case where η(1) has the smallest value is that the agent s(t) is surrounded by n − 1 agents with heading θs(t)(t) (see Fig.3-(a)). For k ≥ 2, however, the shill may not affect the agent s(t), so the worst case where η(k) has the smallest value is that the agent s(t) is surrounded by n − 1 agents with heading θs(t)(t) again, but without the shill in its neighborhood (see Fig.3-(b)). Now by the definition of η(k) we have θs(t)(t + k) ≥ θs(t)(t) + η(k), and a simple calculation will give η(k) =   min{arctan(sin β/(n + cos β)), arctan(sin ε/(n + cos ε))}, k = 1; arctan(sin(η(k − 1))/(n − 1 + cos(η(k − 1))), 2 ≤ k ≤ n; (7) (8) First, note that ∆(t) ≥ ε > 0 and the function ψ(α) = arctan(sin α/(m + cos α)), (m > 0) is monotonically increasing when α ∈ [0, arccos(−1/m)] and monotonically decreasing when α ∈ [arccos(−1/m), π]. PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 Second, to explain the definition of η(1) in (8) we need to show that 0 < η(1) ≤ arctan(sin(θ0(t) − θs(t)(t))/(n + cos(θ0(t) − θs(t)(t)))). 10 (9) In fact, by the control law (6) and the expression of η(1) in (8), the above inequality (9) is trivial in the case where θs(t) ≤ π − β. So we only need to consider the case where θs(t) > π − β. In this case the control law is θ0(t) = π. We consider two subcases as follows: (i) θ0(t)−θs(t)(t) ≥ arccos(− 1 n ). Since θ0(t)−θs(t)(t) ≤ π −(π −β) = β, by the monotonicity of the function ψ(·), we know that the claim (9) is true. (ii) θ0(t) − θs(t)(t) < arccos(− 1 n ). Since θ0(t) − θs(t)(t) = ∆(t) ≥ ε, by the monotonicity of the function ψ(·) again, we know that the claim (9) is also true. Hence, (9) holds in any case. Now, note that 0 < η(1) < π/2, and again by the monotonicity of the function ψ(·), we have 0 < η(n) < η(n − 1) < . . . < η(1) < π/2. Let us take δ = η(n) which is a finite positive value depending on n, β and ε only. Obviously, we have θs(t)(t + n) − θs(t)(t) ≥ δ. Next, we consider the other agents: i = 1, 2, . . . , n, i 6= s(t). Let Λ(k) denote the set of agents whose angles are inside (θs(t)(t), θs(t)(t) + δ) at time step t + k, i.e., Λ(k) = {iθs(t)(t) < θi(t + k) < θs(t)(t) + δ, i = 1, 2, . . . , n}. We now proceed to show that we must have Λ(n) = ∅. First of all, as shown above, s(t) does not belong to Λ(k) for 1 ≤ k ≤ n because θs(t)(t+k) ≥ θs(t)(t) + η(k) ≥ θs(t)(t) + δ. So we have Λ(k) ≤ n − 1 for 1 ≤ k ≤ n. Therefore, at time step t + 1, there are at most n − 1 agents with angles which are less than θs(t)(t) + δ. If Λ(1) 6= ∅, s(t + 1) will be picked up from Λ(1). The shill will change the heading of agent s(t + 1). Because θs(t+1)(t + 1) ≥ θs(t)(t) and θs(t)(t + k) ≥ θs(t)(t) + η(k) for any t, we have for k ≥ 2, θs(t+1)(t + k) ≥ θs(t+1)(t + 1) + η(k − 1) ≥ θs(t+1)(t + 1) + δ ≥ θs(t)(t) + δ. So s(t + 1) will not belong to Λ(k) for any k ∈ [2, n], we have Λ(k) ≤ n − 2 for 2 ≤ k ≤ n. By repeating this argument, we get for 1 ≤ d ≤ k ≤ n, θs(t+d)(t + k) ≥ θs(t)(t) + δ and PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 11 Λ(k) ≤ n − d. So by taking d = k = n, we have Λ(n) = 0. This means that after at most n steps, Λ will be empty. Consequently, we know that θi(t + n) ≥ θs(t)(t) + δ for all i. Then we get θs(t+n)(t + n) ≥ θs(t)(t) + δ ⇒ ∆(t + n) ≤ ∆(t) − δ. This complete the proof of Lemma 2. The snapshots of the relating computer simulation are showed in Figure 4. The video of demo and the simulation program can be downloaded from the project website [14]. Although our case study is a simple starting point, it shows that it is possible to change the collective behavior (headings) of a group by soft control. Based on this work, we are going to explore more complicated control problems, such as what if the energy of the shill is concerned (the energy of the shill is limited so that it can not 'jump' as in (5)), what if the shill only can see locally, and what if the shill also needs to keep the group connected while turning the group, etc. To support this research, we have put a computer demo for soft control of the modified Boid model which is like a computer game on the project homepage [14]. After initially putting n agents on the two-dimensional space, the user can manually control the position and heading of the shill by keyboard and mouse. It is an open competition for the best control strategy. IV. CONCLUDING REMARKS The collective behavior of complex systems is the macroscopic feature that we concerned and studied in this paper. How we control or intervene in a multi-agent system without changing PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 12 the local rule of the existing agents is an important issue but has not been well recognized yet. The idea of soft control that we introduced and explored here appear to be an initial attempt to tackle this issue. We believe that our general soft control framework reflects a large class of control problems in complex systems. In this paper, we have restricted ourselves on the study of the modified Boid model which does catch certain key properties of many real world complex systems (see, e.g.,[3][4][6]). Without changing the local rule of the existing agents, we have added a shill in the distributed system and designed the control law for the shill carefully for the control purpose. Although the shill does not behave as the ordinary agents do, it is not recognized by the ordinary agents and is therefore still treated as an ordinary agent by them. This soft control idea works well as we have shown in the case study. We would like to emphasis that the idea of adding a shill is just one of the methods of soft control, and for different systems, they would be certainly different. There are many potential applications of soft control. Currently a project called Claytronics [11], a new form of programmable matter, is to study how to form interesting dynamic shapes and configurations by simple and local interactions of a billion micro-scale units. This research is in the category (II) of collective behavior. Using soft control to help to form shapes may release us from designing subtle local rules. Another possible case is to use soft control in the language diffusion model to guide evolution of language, and it might be able to save dying language [8]. A recent study in economics [9] shows that a small proportion of special agents who have preferences can dramatically alter the expected waiting time between norm transitions in a population of agents who repeatedly play the Nash demand game. If those special agents have feedbacks, how does the soft control help changing the transition of norms more efficiently ? How we use soft control to avoid and handle panic of crowd [10] ... In conclusion, we need a theory of soft control to efficiently intervene in many complex systems. The first author would like to thank Prof. John Holland, Dr. Liu Zhixin and Prof. Eric Smith ACKNOWLEDGMENT for helpful discussions. [1] P.W.Anderson. More is Different. Science 177, 393-396, 1972. REFERENCES PUBLISHED IN JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY, 2006(19):54-62 13 [2] E. Bonabeau, M. Dorigo, G. Theraulaz. Swarm intelligence: from natural to artificial systems. Oxford University Press, New York, 1999. [3] T. Vicsek, A. Czirok, E.B. Jacob, I. Cohen, and O. Schochet. Novel type of phase transitions in a system of self-driven particles. Physical Review Letters, 75:1226–1229, 1995. [4] C. Reynolds. Flocks, birds, and schools: a distributed behavioral model. Computer Graphics, 21:25–34, 1987. The demo can be downloaded from http://www.red3d.com/cwr/boids/applet/. [5] J. Desai, J. Otrowski, and V. Kumar. Modeling and control of formations of nonholonomic robots. IEEE Trans. on Robotics and Automation, 17(6):905–908, 2001. [6] A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Trans. Automatic Control, vol. 48, pp. 988–1001, June 2003. [7] N.E. Leonard and E.Fiorelli. Virtual Leaders, Artificial Potentials and Coordinated Control of Groups. In Proceedings of the 40th IEEE Conference on Decision and Control. Orlando, FL, December 2001, 2968–2973. [8] W.S-Y.Wang, J.Ke and J.W.Minett. Computational studies of language evolution. In Computational Linguistics and Beyond,R. Huang and W. Lenders, eds. Nankang, 65-106, 2004. [9] R.L. Axtell, S. Chakravarty. Radicals, Revolutionaries and Reactionaries in a Multi-Agent Model of Class Norms. [10] D. Helbing, I. Farkas and T. Vicsek. Simulating dynamical features of escape panic. Nature vol.407, 487-490, 2000. [11] Synthetic Reality project at Carnegie Mellon. http://www-2.cs.cmu.edu/∼claytronics/. [12] X.F. Wang, G. Chen. Pinning control of scale-free dynamical networks. Physica A, Vol. 310, pp. 521-531, July 2002. [13] J. Han, L. Guo, M. Li. Guiding a Group of Locally Interacting Autonomous Mobile Agents. The 2nd Chinese-Swedish Conference on Control, October 16-17, 2004, Beijing. [14] Project of soft control, 2004-. http://complex.amss.ac.cn/hanjing/softcontrol/. Videos and demos can be downloaded from http://complex.amss.ac.cn/hanjing/softcontrol/demo.html.
1902.06228
1
1902
2019-02-17T09:08:52
Optimizing Online Matching for Ride-Sourcing Services with Multi-Agent Deep Reinforcement Learning
[ "cs.MA" ]
Ride-sourcing services are now reshaping the way people travel by effectively connecting drivers and passengers through mobile internets. Online matching between idle drivers and waiting passengers is one of the most key components in a ride-sourcing system. The average pickup distance or time is an important measurement of system efficiency since it affects both passengers' waiting time and drivers' utilization rate. It is naturally expected that a more effective bipartite matching (with smaller average pickup time) can be implemented if the platform accumulates more idle drivers and waiting passengers in the matching pool. A specific passenger request can also benefit from a delayed matching since he/she may be matched with closer idle drivers after waiting for a few seconds. Motivated by the potential benefits of delayed matching, this paper establishes a two-stage framework which incorporates a combinatorial optimization and multi-agent deep reinforcement learning methods. The multi-agent reinforcement learning methods are used to dynamically determine the delayed time for each passenger request (or the time at which each request enters the matching pool), while the combinatorial optimization conducts an optimal bipartite matching between idle drivers and waiting passengers in the matching pool. Two reinforcement learning methods, spatio-temporal multi-agent deep Q learning (ST-M-DQN) and spatio-temporal multi-agent actor-critic (ST-M-A2C) are developed. Through extensive empirical experiments with a well-designed simulator, we show that the proposed framework is able to remarkably improve system performances.
cs.MA
cs
1 Optimizing Online Matching for Ride-Sourcing Services with Multi-Agent Deep Reinforcement Learning Jintao Ke, Feng Xiao, Hai Yang, and Jieping Ye, Senior Member, IEEE Abstract -- Ride-sourcing services are now reshaping the way people travel by effectively connecting drivers and passengers through mobile internets. Online matching between idle drivers and waiting passengers is one of the most key components in a ride-sourcing system. The average pickup distance or time is an important measurement of system efficiency since it affects both passengers' waiting time and drivers' utilization rate. It is naturally expected that a more effective bipartite matching (with smaller average pickup time) can be implemented if the platform accumulates more idle drivers and waiting passengers in the matching pool. A specific passenger request can also benefit from a delayed matching since he/she may be matched with closer idle drivers after waiting for a few seconds. Motivated by the potential benefits of delayed matching, this paper establishes a two-stage framework which incorporates a combinatorial optimization and multi-agent deep reinforcement learning methods. The multi-agent reinforcement learning methods are used to dynamically determine the delayed time for each passenger request (or the time at which each request enters the matching pool), while the combinatorial optimization conducts an optimal bipartite matching between idle drivers and waiting passengers in the matching pool. Two reinforcement learning methods, spatio-temporal multi-agent deep Q learning (ST-M-DQN) and spatio-temporal multi-agent actor-critic (ST-M-A2C) are developed. Through extensive empirical experiments with a well-designed simulator, we show that the proposed framework is able to remarkably improve system performances. Index Terms -- ride-sourcing, dispatching, delayed matching, multi-agent reinforcement learning. ! 1 INTRODUCTION W ITH the rapid development of mobile internet based technologies and the popularity of smart phones, ride- sourcing services, such as Uber, Lyft, and DiDi, has been reshaping the way we travel. In contrast to traditional taxi markets that rely on the physical meeting between drivers and passengers, the ride-sourcing platforms implement an on-line matching process that can match unserved passengers and idle drivers more efficiently. Besides, the tremendous amount of information collected through the APPs, such as the real-time locations, trajectories and travel patterns of passengers and drivers, can further enhance the on- line matching procedure by reducing the search frictions between passengers and drivers. There are two main modes of matching process [1], [2]. One is the broadcast mode, in which the ride-sourcing platforms collect requests from passengers and broadcasts them to nearby idle drivers, each of whom opts for one of the requests by considering his/her individual benefits (such as trip fare) and costs (such as the distance to pick-up the passenger). Another is the dispatch mode, in which the ride-sourcing platforms collect • • • J. Ke and H. Yang are with the Department of Civil and Environmental Engineering, Hong Kong University of Science and Technology, Hong Kong, China. E-mail: [email protected], [email protected]. F. Xiao (corresponding author) is with School of Business Administration, Southwestern University of Finance and Economics, Chengdu, China. E-mail: [email protected] J. Ye . is with AI Labs, Didi Chuxing, Beijing, China E-mail: [email protected] Manuscript submitted March 10, 2019 the information of idle drivers and requests of passengers on the fly and implement a centralized algorithm to match these drivers and passengers pair by pair. Among these two modes, the dispatch mode is thought to be more efficient and thus widely adopted in various ride-sourcing platforms. For example, DiDi's statistics showed that a significant improvement on system efficiency - the request completion rate being improved by more than 10% - was observed when DiDi switched from broadcast mode to dispatch mode [1]. In dispatch mode, during each short match time interval (such as one or two seconds), the ride-sourcing platforms collect all idle drivers and unserved passenger requests, and then execute matching between drivers and passengers with combinatorial optimization approaches. These approaches aim to improve the overall system performance by increasing the matching rate (the number of matching driver-passenger pairs per unit time), decreasing the passengers' waiting time (from announcing a request to being matched by the on- line platform), and reducing the passengers' pick-up time (from being matched to dropping on the corresponding vehicle). Of particular importance here is the trade-off among pick-up time, waiting time, and success rate of matching. When the platforms wait for a few match time intervals to accumulate sufficient pairs of idle drivers and unserved passengers, instead of immediately matching them, a better matching are expected, and as a result, the average pick- up time will be reduced. As shown in Fig. 1, if a delayed matching is used, more drivers and passengers will occur in the matching pool, and thus a more efficient matching between drivers and passengers with shorter average pickup time can be implemented. As for a single passenger, he/she 2 be executed with a combinatorial optimization algorithm. Clearly, under this setting, the action space of each agent reduces to a binary decision (delayed or not) in each match time interval, which makes the originally intractable problem available to be solved. The problem setting of this paper is different from the recent related studies in this domain, such as [1], [4], [8], [9], [10], in the following aspects. These studies majorly focused on employing reinforcement learning methods to control the dispatching from orders to drivers and drivers' movements. However, none of these studies considered the potential benefits of delayed matching or investigated the dynamic control of matching time intervals. Moreover, most of these studies treated drivers as agents and tried to optimize the long-term revenue of drivers, whereas our paper focus more on the passenger side, and try to minimize passengers' pickup time through a dynamic control of delayed matching. The main contributions of this paper are listed below: • We propose a two-stage framework that first determines the delayed time of each passenger request through multi-agent reinforcement learning methods and then executes optimal matching between idle drivers and unserved passengers in the matching pool with a combinatorial optimization model. • We formulate the delayed matching problem as a MMDP by a proper design of agent, state, action, and reward. Two types of rewards, global reward and individual reward, are used and then tested. • We propose two learning methods, named spatio- temporal multi-agent deep Q-learning (ST-M-DQN) and spatio-temporal multi-agent actor-critic (ST-M-A2C), which observe the spatio-temporal patterns of supply and demand and find optimal policies that make a sequence of delayed-or-not decisions for each agent. • We build a simulator that characterizes passengers' and drivers' activities and is calibrated with both synthetic datasets and actual mobility datasets provided by DiDi. Experiment results show that the proposed framework can significantly improve the system efficiency. The rest of the paper is organized as follows. Section 2 describes the research problem, highlights the potential benefits of delayed matching, and points out the main challenges. Section 3 presents the proposed multi-agent reinforcement learning framework and algorithms. The sim- ulator settings, experimental results and sensitivity analyses are demonstrated in Section 4, while the related work is presented in Section 5. Section 6 summarizes the study and outlook future research. 2 RESEARCH PROBLEM This section presents the relevant background knowledge and formulates a combinatorial optimization problem for the matching between unserved passengers and idle drivers. In a ride-sourcing system, when a passenger raises an on- demand ride request, he or she will be placed in a queue (or matching pool) and wait for being matched with a driver through the platform. The time from raising a request to being matched is referred to as the waiting time. After the passenger is matched with a driver, the driver should drive to the location of the passenger and pick him/her up (the time Fig. 1. Potential benefits of delayed matching may be matched with a much closer idle driver (much lower pick-up distance) if his/her request is delayed for a few match time intervals by the platform. However, holding passengers and drivers for too many match time intervals brings a long passengers' waiting time, under which some impatient passengers may cancel their requests. With no doubt, determining the delayed time (or the number of match time intervals to wait) for each passenger request is essential and has potentials to well balance these trade-offs. In reality, with the help of high-efficient computing resources, it is applicable for the ride-sourcing platforms to dynamically determine the delayed time of each request in response to the real-time supply-demand conditions. Nevertheless, in a highly stochastic and dynamic system, in which passengers' requests and idle drivers pop up and disappear at any time, to simultaneously determine an optimal delayed time for each passenger request is non- trivial. Although rich historical and real-time information is available, the decisions on the delayed time of each request will impact the future supply-demand conditions (such as the number of unserved requests left from the previous match time interval), which in turn affects the decisions in the following match time intervals. The dynamic interactions between the decisions and the environment (i.e. the supply- demand conditions) cannot be directly characterized by the widely used supervised learning methods. One solution to this problem is the reinforcement learning (RL) [3] that learns a policy of sequential decision makings by interacting with a complex environment. Recent years have witnessed tremendous success of RL in many transportation problems, such as taxi fleet management [4] [5], signal control [6], and adaptive routing problems [7]. However, with the traditional RL approaches that use a centralized agent, the action space that includes the decisions for the delayed time of all passengers will become extremely large. To tackle these issues, we model the dynamics of the dispatch system as a multi-agent Markov decision process (MMDP), in which each passenger request is viewed as an agent. During each match time interval, each agent decides to be delayed or not to be delayed towards the next time interval. If it is delayed, it will not join the matching pool during this match time interval (simultaneously, one match time interval is added to its delayed time); otherwise, it will join the matching pool, then a bipartite matching between unserved requests and idle drivers in the matching pool will wasted in this process is denoted as pick-up time). When a passenger drops-on a vehicle and reaches the destination, or cancels his/her request halfway (during the waiting time or the pick-up time), the life cycle of his/her request is viewed as terminated. On the supply side, at each instant, each registered ride-sourcing driver has three status: off-line, occupied, and available (idle). Off-line status means that a driver closes his/her APP and is not willing to be dispatched by the platform, occupied status indicates that a driver has been already dispatched to a passenger (on the road to pick- up the passenger or to take the passenger to the destination), while the available status implies that a driver waits for being dispatched. With no doubt, the major concerns of the online matching are the unserved passengers, and available drivers. The goal of the online matching can be formulated as a bipartite matching problem between the unserved passengers and available drivers in the matching pool at each match time interval. To be specific, during each time interval, given I unserved passengers (i = 1, 2, . . . , I) and J idle drivers (j = 1, 2, . . . , J), the objective function and constraints for optimizing the online matching can be formulated as: min aij s.t. J(cid:88) i=1 I(cid:88) I(cid:88) J(cid:88) i=1 j=1 [c(i, j) − B]aij j=1 aij ≤ 1, j = 1, 2, . . . , J (1) aij ≤ 1, i = 1, 2, . . . , I where c(i, j) is the cost of assigning driver j to passenger i, which is equal to the pick-up time from driver j to passenger i in this study. aij are the index variables to be optimized, with the following definitions: (cid:40) aij = 1, 0, if passenger i is matched with driver j if passenger i is not matched with driver j And, B is a large number which ensures at least one of the two constraints in Eq. 1 is binding. It implies that: if the number of available drivers is greater than the number of unserved passengers, then every unserved passenger will be matched (the first constraint is binding while the second constraint is non-binding); otherwise, then every available driver will be matched (the first constraint is non-binding while the second constraint is binding). As aforementioned, a passenger request may experience a lower cost if its matching is delayed for a few match time intervals. Unlike most of the previous studies that focused on developing efficient bipartite graph matching algorithms or using reinforcement learning to control drivers' decisions, the main goal of this study is to propose a method that automatically determine the delayed time of each unserved passenger request, for better balancing the trade-offs among pick-up time, waiting time and matching success rate. Our proposed method is established on top of the bipartite graph matching and determines the time when each unserved request enters the matching pool to be matched with an idle driver. Fig. 2 illustrates the online matching procedure of 3 Fig. 2. Online matching of a ride-sourcing system. a ride-sourcing system, which first determines the delayed time for each passenger and then implements the bipartite graph matching. 3 A MULTI-AGENT LEARNING FRAMEWORK This section first builds an MMDP in which each passenger request represents an agent, and the action of each agent during each match time interval is simplified as a binary choice - delayed or not delayed. Then the two reinforcement learning methods for optimal policy learning are presented. 3.1 Problem formulation The problem of determining each passenger's delayed time is modelled as an MMDP Game, with the agents, states, actions, state transitions, and rewards defined as follows. Agent: we regard each passenger request as an agent, who emerges when it is raised and terminates when it is successfully matched with a driver or cancelled by the passenger. Clearly, the number of agents in each match time interval, denoted as Nt, may vary across different match time intervals t. This multi-agent based definition can greatly reduce the magnitude of the action space in comparison to the way that defines the centralized platform as an agent. t,(G), and the local-view state si State: states in each match time interval are spatio- temporal patterns of supply and demand that the agents observe. To be specific, the state for agent i in match time interval t, si t, consists of two components: the global-view state si t,(L). Suppose the whole examined area is partitioned into M small grids (such as squares and hexagons), then global-view state vector si t,(G) includes four types of spatio-temporal supply-demand features: 1) the number of remaining unserved passengers left from the previous match time interval in each grid; 2) the number of remaining idle drivers left from the previous match time interval in each grid; 3) the expected arrival rate of new unserved passengers in each grid; 4) the expected arrival rate of new idle drivers in each grid; The latter two types of features can be predicted with historical and real-time data. Clearly, global-view state vector t,(G) ∈ RM×4. Evidently, the is of M × 4 dimensions, i.e. si global-view state is shared by all agents in match time interval t. Note that more relevant spatio-temporal features can be incorporated into the global-view state vector. The local-view state vector si t,(L) includes three components: 1) the location of agent i that is represented with one- hot encoding; 2) agent i's cumulative waiting time; 3) the expected distance from agent i to its matched driver T i t , which is estimated according to a combinatorial optimization program shown in Eq. 1. Note that here the optimization program is run virtually for getting the features, i.e. T i t for all agents, rather than for actually matching unserved passengers and idle drivers. . t , . . . , sNt t Clearly, the local-view state is different across agents and has a dimensionality of M + 2. Therefore, the state for agent i during match time interval t can be written as si agents in match time interval t can be represented st = (cid:3) ∈ RM×5+2, then the joint state of all t = (cid:2)st,(G), st,(L) (cid:111) (cid:110) t ∈ {0, 1}, where ai t , s2 s1 Action: agent i in match time interval t has two available actions, ai t = 1 denotes that the agent enters the matching pool where a bipartite matching is implemented, while ai t = 0 indicates that the agent choose to not enter the matching pool and be delayed to the next match time interval. Then the joint action of all agents in match time interval t can be written as at = t , a2 a1 t , . . . , aNt t (cid:110) (cid:111) . State Transition: When time moves from time interval t to time interval t + 1, the state of each agent gets updated according to the interactions between the agents' actions and environment. First, the agents at time interval t with action equal to 1 are assigned to idle drivers based on a combinatorial optimization algorithm. Clearly, some old agents are matched and leave the system. Second, the environment changes according to the simulator (which will be presented in the next section), and particularly, some new agents (passenger requests) may enter the system. Third, the states of the agents at time interval t + 1 (including those unmatched agents and new agents) are calculated based on the current environments. It is worthy mentioned that the dimensionality of st is not necessarily equal to the dimensionality of s(t + 1), in other words, the number of agents in match time interval t is not necessarily identical to that in match time interval t + 1. This is because the number of matched agents at time interval t is not necessarily equal to the number of newly coming agents at time interval t + 1. Reward: to examine the trade-offs on cooperation and competition among agents, two types of reward, i.e. global reward and individual reward, are considered. The individ- ual reward of agent i in match time interval t, denoted as ri t, is designed as follows. (cid:40) ri t = 0, V − c(i, j), if t < Ti if t = Ti (2) where Ti is the last match time interval of agent i (the life of an agent is terminated when it is matched or cancelled by the passenger). V refers to the positive reward (benefit) for successfully matching one pair of passenger and driver. Although this positive reward can depend on the characteristics of the request, such as the trip fare and expected trip time, we do not consider request discrimination and set a constant value V for all successfully matched agents. To encourage agents to cooperate with each other, we further introduce a notion of global reward, which is defined as the average reward of all agents. Formally, the global reward assigned to agent i in match time interval t, denoted as ¯ri t, equals to: 4 (cid:40) 0, 1 N ¯ri t = (cid:80)N (cid:80)N i [V − c(i, j)] , if t < Ti if t = Ti (3) i where N refers to the number of agents that have appeared in the whole epoch. Notice that the average reward [V − c(i, j)], is calculated at the of all agents, i.e. 1 N end of the epoch (when the life of some agents has already terminated) and then assigned to the terminal match time interval Ti for each agent. The final reward assigned to agent i in match time interval t can be written as: t + (1 − ρ) · ¯ri (4) where ρ ∈ [0, 1] is a weighted factor that balance the tradeoff between the individual reward ri t and global reward ¯ri t. Clearly, ρ = 1 indicates that each agent aims to optimize its own reward instead of considering other agents' reward, while ρ = 0 implies that each agent tries to maximize the total reward of all agents. The goal of each agent i is to maximize t=0 γtri t its own total expected discounted return Ri = (cid:80)Ti t = ρ · ri ri t where γt is a discount factor. 3.2 Simulator One of the most important component for applying deep reinforcement learning methods is the learning environment, with which the agents interact. For training multi-agent reinforcement learning algorithms, many hand-crafted envi- ronments are designed [11] [12], such as cooperative naviga- tion where agents cooperate to reach various landmarks while avoiding colliding with each other, and predator- prey where some slower agents cooperate to chase the faster adversary. Multi-agent reinforcement learning methods are shown to achieve great performance in these human- designed games. However, implementation of these methods on real-world applications is much more difficult, due to the high dimensionality of action and state space, non-stationary environment, and improper reward design. The real-world environment is of high stochasticity and randomness, which makes the training and evaluation for the reinforcement learning algorithms difficult. Moreover, the training of reinforcement learning algorithms requires a large number of epochs, which may not be supported by limited historical data. One common solution is to build simulators which are calibrated with real historical data. In this section, we design a simulator that explicitly describes the dynamics in an online matching system. As shown in Algorithm 1, each match time interval includes the following steps: policy implementation of DRL that separates agents into two groups (entering the matching pool or being delayed to the next interval), bipartite matching between unserved passengers and idle drivers in the matching pool, update of drivers' status due to completed trip and online/offline activities, and generation of new requests, etc. In essence, the simulator iteratively updates the waiting list of unserved requests and the status of drivers ("idle", "occupied" or "offline"). When a new request is generated, it is appended to the waiting list; when an unserved request is matched with an idle driver, it is removed from the waiting list. When a driver gets online (or offline), his/her status changes from "offline" to "idle" (or from "idle" to "offline"), respectively. When a driver is matched with a request or completes his/her trip, his/her status changes from "idle" to "occupied" (or from "occupied" to "idle"). Note that the number of agents N t may change with the match time interval since new agents join and some old agents may leave the waiting list of unserved requests. This setting is different from most of the previous studies related to multi-agent reinforcement learning, in which the number of agents is unchanged. It makes the design of the multi-agent learning algorithms more intractable. It is also worthy mentioned that the bipartite matching is executed virtually for estimating the expected pickup distance for agent i while preparing the joint states for the next match time interval. Algorithm 1 Simulator for an online matching system 1: Input: information of the historical passenger requests and distributions of drivers' online/offline time. 2: Initialize joint states st. 3: for every match time interval of the online dispatching system (t = 0 to T ) do 4: 5: 6: 7: 8: 9: 10: Implement policies of DRL: Execute the joint actions at = π(st) according to the policies of multi-agent DRL algorithms, where at determines whether each agent i should enter the matching pool or be delayed to t + 1. Bipartite matching: Collect unserved passenger re- quests with action equal to 1 (i.e. entering the matching pool) and idle drivers, and execute bipartite matching according to Eq. 1. Update matching outcomes: The matched requests are removed from the waiting list of unserved passenger requests; the status of the matched drivers are updated from "idle" to "occupied". Completed trips update: Update the status of drivers who completes their trips from "occupied" to "idle". Request generation: new passenger requests are boot- strapped from historical requests occurred in the same time period. The new requests are appended to the waiting list of unserved requests. Note that the number of agents Nt changes after this step. Online/offline status update: update the status of drivers who become online (available to serve) or offline (unavailable to serve) in the current interval, according to real historical distributions. Generate next states: collect the spatio-temporal demand-supply conditions and update the state for each agent, outputting st+1. Particularly, for estimating the expected distance from each agent i to its matched driver, we execute Eq. 1 with the input of all unserved agents and idle drivers. 11: end for 3.3 Reinforcement learning methods The objective of reinforcement learning is to identify a policy π that achieves optimal accumulated reward for one agent or multiple agents. For single-agent applications, 5 Q-learning is one widely used method. It estimates the expected total discounted rewards of state-action pairs, which can be approximated by a Q-function table that is solved with Bellman equation. A recent extension of Q- learning is Deep Q-network (DQN) which uses a neural network for approximating the Q-function table. DQN tries to minimize the difference between predicted Q-values and target Q-values that combines the current reward and estimated value of next state. The adaptation of Q-learning to multi-agent settings has been examined in the literature [13], however, it is still an open question and the theoretical guarantees for multi-agent DQN remain unsolved. There are two main solutions: decentralized and centralized methods. In decentralized methods, each agent is characterized with separate neural network, and the only interaction among agents is the environment. For example, [14] established a decentralized DQN in Pong game environment where two (players) agents try to beat each other (in competition setting) or keep the ball bouncing between them (in cooperative setting). However, the decentralized methods are not well adapted to our problem for the two reasons below. First, the number of agents change with intervals, thus it is hard to identify the number of neural networks to be constructed ex ante. Second, there are numerous requests popping up and disap- pearing dynamically, indicating that the number of agents is extremely large. Modelling each agent with one neural net- work must require high amount of computational resources. Therefore, in this paper, we resort to centralized methods, which use one neural network to model the behaviors of all agents, in other words, the weights of the centralized neural network is shared by all agents. The parameter of the centralized network θ is updated by minimizing the total difference between the predicted value of the Q-networks and the target Q values, as shown in Eq. 5, in terms of the transitions of all agents (cid:0)si (cid:1). As shown t+1, di t in Eq. 6, the target Q values are estimated by the obtained reward if the current state is the terminated state, and by the sum of the obtained reward and the discounted estimated value of next state otherwise. t, ai t, ri t, si (cid:104) t θ) − y)2(cid:105) L(θ) = Esi t,ai t,ri t,si t+1 (Q(si t, ai (cid:40) y = ri t, ri t + γ maxai t+1 Q(si t+1, ai t+1), if di if di t = 1 t = 0 The details of the algorithm of the proposed ST-M-DQN are shown in Algorithm 2. To avoid instable training, the replay memory is used. In each match time interval, we first sample action for each agent with -greedy policy based on the centralized Q network, then execute the joint actions in the simulator. The simulator will re-compute the spatio- temporal patterns of supply and demand and then returns rewards and next states for all agents, then the transitions of (cid:1) are stored in the reply memory. each agent(cid:0)si t+1, di t For training the centralized Q-network, we randomly sample a mini-batch of transitions from the reply memory each time, and update the network parameter θ by minimizing the loss function in Eq. 5. t, ai t, ri t, si (5) (6) Algorithm 2 ST-M-DQN 1: Initialize replay memory D; 2: Use random weights θ to initialize the action-value function. 3: for k = 1 to number of epochs do 4: Reset the environment and obtain the initial joint 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: for every match time interval (t = 0 to T ) do states s0. for i = 1 to Nt do Sample action of each agent, ai t, according to -greedy policy: ai t, ai t) with probability 1 −  otherwise choose a random action. t = arg maxai Q(si t end for Execute the simulator (Algorithm 1) with the input of the joint actions at, then observe joint reward rt and next joint state st+1. For agent i, we denote di t = 1 if its life is terminated, i.e. t = Ti, and di t = 0 otherwise. t, si ∀i = 1, . . . , Nt in the replay memory D. Store transitions of all agents(cid:0)si (cid:0)si (cid:1), ∀i = 1, . . . , Nt transitions from mini-batch a t, ri t, si Sample t+1, di t (cid:1), t, ai t, ri of end for for m = 1 to M1 do t, ai t+1, di t replay memory D. Calculate target value according to Eq. 6. Update the parameters of Q-network by: θ ← θ + β1∇θL(θ)2. end for 16: 17: end for The second reinforcement learning method is the spatio- temporal multi-agent actor-critic (ST-M-A2C). Actor-critic (A2C) is a popular policy gradient method for reinforcement learning tasks. A2C establishes two networks, one policy network (known as critic and used to output policy) and one value network (known as actor and used to evaluate the performance of the policy network). It updates the parameters of the policy network θp, and that of the value network θv iteratively. Similar to the DQN, due to the large and dynamically changing number of agents, we design a centralized multi-agent A2C. The weights of the centralized value network θv are shared across all agents, and the update of θv can be achieved by minimizing a loss function presented in Eq. 7, where Vθv (Si t) is the predicted value of value network and Vtarget(Si v, π) is the target value constituted of immediate reward and discounted estimated value of next state, as shown in Eq. 8. t+1; θ(cid:48) (cid:104) L(θv) = Vθv (Si (cid:105) t+1; θ(cid:48) v, π) Vtarget(si t+1; θ(cid:48) v, π) = ri t + γVθ(cid:48) v(si t+1) ai t With the parameters of the value network θv, ST-M- A2C updates the parameters of the policy network θp by a gradient descent rule θp ← θp + β2∇θp J(θp), where β2 is the learning rate for actor, and the gradient ∇θp J(θp) is given by Eq. 9. To reduce high variability of value functions, t) − Vtarget(Si (cid:104) (cid:88) t si t) π(ai (cid:105) (7) (8) an advantage function estimated by the TD-error defined in Eq. 10 rather is used for calculating the policy gradient. 6 ∇θp J(θp) = ∇θp log πθp (ai t ai t)A(si t, ai t) A(si t, ai t) = ai t+1 + γVθ(cid:48) v t+1) − Vθv (si (si t) (9) (10) The details of the ST-M-A2C is illustrated in Algorithm 3. Algorithm 3 ST-M-A2C 1: Initialize replay memory D; 2: Use random weights θv to initialize the value network. 3: for k = 1 to number of epochs do 4: Reset the environment and obtain the initial joint 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: for every match time interval (t = 0 to T ) do states s0. for i = 1 to Nt do Sample action of each agent, ai t based on the action probability P (si t). end for Execute the simulator (Algorithm 1) with the input of the joint actions at, then observe joint reward rt and next joint state st+1. t, si t, ai 1, . . . , Nt in the replay memory D. Store transitions of all agents(cid:0)si Sample a mini-batch of transitions(cid:0)si (cid:1), ∀i = (cid:1), end for for m = 1 to M2 do t+1 t, ai t, si t+1 from the replay memory D. Update the parameters of value network θv by maximizing Eq. 7. Compute the advantage A(si t) by Eq. 10 and update the parameters of policy network θp by θp ← θp + β2∇θp L(θp), where ∇θp L(θp) is calculated with Eq. 9. t, ai end for 16: 17: end for 4 EXPERIMENTS In this section, extensive experiments and sensitivity analyses are conducted to evaluate the performance of the proposed methods and investigate the impacts of the key parameters. 4.1 Experiments on a customized environment Here we first design a customized environment for illustrat- ing the effectiveness of the proposed methods. We consider an 4 km × 4 km area with 30 match time intervals (each interval equals 1 s), and a simplified scenario the waiting passengers arrival at a rate of qd (in unit/s), while the idle drivers arrival at a rate of qs (in unit/s). Meanwhile, new arrival waiting passengers' and idle drivers' are generated based on a two-component mixture of Gaussians in each match time interval. The mean and standard deviation of arrival locations of waiting passengers are (1.2 km, 1.2 km) and (0.8 km, 0.8 km), while the mean and standard deviation of arrival locations of idle drivers are (2.8 km, 2.8 km) and (0.8 km, 0.8 km). Without considering the traffic congestions, we assume a constant vehicle speed as 25 km/h. The road distance between any two points is estimated by the Manhattan distance, and given the constant vehicle speed, then the pickup time between each pair of waiting passenger and idle driver can be identified. The whole examined area is uniformly partitioned into 10 × 10 zones. Then the spatio- temporal features or states can be extracted by counting the number of idle drivers and waiting passengers in each zone during each time interval. Note that the partitioned zones are only used for perceiving the spatio-temporal features. Other features, such as the agent's expected pickup distance, are calculated based on a continuous space. The two proposed approaches, ST-M-DQN and ST-M- A2C, are compared with two benchmarks: pure optimization strategy and tabular Q-learning. Pure optimization strategy matches idle drivers and waiting passengers immediately without considering any delayed matching with a combi- natorial optimization depicted in Eq. 1. In this simplified customized environment, we do not consider the request cancelling behaviors of passengers, and thus the answer rate (proportion of the successfully matched passengers) is always equal to 1 if supply (idle drivers) is larger than or equal to demand (waiting passengers). The tabular Q-learning learns a Q-table that maps the states to action, with -greedy policy. In tabular Q-learning, the state only includes the location and time of the agents, and thus the Q-table has a dimension of T × N × 2, where N is the total number of separated zones. Three metrics are used for comparing the effectiveness of the proposed models and benchmarks: mean reward of each agent (Ri for agent i), answer rate and mean pickup time. The reward function is specified as follows. Let the positive reward (benefit) for successfully matching one passenger- driver pair, V = 800s. It is noteworthy that V is a decision variable determined by the platform and reflects the trade- offs between different objectives. A large V indicates that the platform focuses more on successfully matching drivers and passengers with less considerations on the cost of pickup time, and vice versa. Therefore, the decision variable V can be adjusted according to the objectives of different platforms. To compare the effectiveness of the models under different environments, three environmental settings are implemented: qd=qs=1 unit/s, qd=qs=2 unit/s, and qd=qs=3 unit/s. Both the value function approximation networks and policy networks are three-layer networks, with 512, 256, and 128 neurons from the first to last hidden layer. The activations of all hidden units are ReLu, while output layers of the value function approximation networks and policy networks use Linear and Softmax activations, respectively. All the experiments are repeated by 5 times to ensure the robustness of the results. Fig. 3 shows the resulting mean reward of each agent, answer rate, and mean pickup time of Pure optimization, Q- learning, ST-M-DQN, ST-M-A2C on the three environments. The results show that the mean reward of each agent increases with the arrival rate of drivers and passengers. This is intuitive since a better bipartite matching (with lower mean pickup time) becomes available as the increase of the density (dominated by the arrival rates) of drivers and passengers. In addition, it can be observed that the two proposed reinforcement learning methods significantly outperform the pure optimization and the tabular Q-learning methods in terms of the mean reward of each agent (which is the objective of the algorithms). The ST-M-A2C achieves 7 the best performance in all environmental settings, which demonstrates its robustness. From Fig. 3 (b)-(c), we find that the delayed matching controlling by the two deep multi-agent reinforcement learning methods can significantly reduce the mean pickup time of passenger-driver pairs with little loss on the answer rate. For example, when qd=qs=1 unit/s, the implementation of ST-M-A2C reduced the mean pickup time by 14.3% while decreasing the mean answer rate by 3.8%, resulting in 19.1% of increase in agents' mean reward. Fig. 4 shows the trends of average reward of agents with respect to training epochs of the three examined reinforce- ment learning models under different environment settings. Results show that ST-M-A2C and ST-M-DQN significantly outperform Tabular Q-learning in terms of converging speed, converged agents' reward, and robustness. In general, ST-M- A2C shows more robust training curves and achieves higher converged agents' reward than ST-M-DQN. t and total reward ¯ri 4.2 Sensitivity analysis in terms of reward weighted factor Next we conduct sensitivity analysis to look at the effects of reward weighted factor ρ for the training of the pro- posed deep multi-agent reinforcement learning methods. As aforementioned, ρ measures the tradeoff between individual reward ri ti. The higher the ρ, the more emphasis that each agent pays to its individual reward versus total reward of all agents. It is naturally expected that using the total reward as signals for agents has potential to achieve better overall system performance. However, as [15] mentioned, the use of total reward generates weak incentives to each agent, and may make some agents "lazy" to obtain rewards. Consequently, the resulting total rewards of all agents can be even worse than the algorithms using individ- ual reward for each agent. Here, we train and test ST-M-A2C under the environmental settings of qd = qs = 1 unit/s, given five groups of reward weighted factor ρ (from 0.0 to 1.0 with a step of 0.25). Table 1 demonstrates the answer rate, average pickup time and average agents' reward of ST-M-A2C given different reward weighted factor ρ. Fig. 5 further plots the training trends of the agents' average reward with episodes under different reward weighted factors. The results show that the effectiveness and robustness of ST-M-A2C increases with the reward weighted factor ρ, indicating that the multi-agent framework behaves better when they are rewarded by their individual rewards in our problem. The possible reason is that the global reward (the sum of rewards of all agents) may be not strong enough to guide each agent and may encourage the "lazy" behaviors of agents. Those "lazy" agents do not learn from trial and error but simply select action 1 (not- delayed action) when they interact with any environment states. This observation is also consistent to the previous studies in the domain of taxi order dispatching or fleet management [1] [4] which normally use individual rewards as incentives for each agent in the multi-agent environments. 4.3 Model performances on a real environment Apart from the customized environment, we further evaluate the performances of the proposed methods based on a 8 (a) Mean reward of agent (b) Mean pickup time (c) Answer rate Fig. 3. Model comparisons on a customized environment. (a) Arrival rates qd = qs = 1 unit/s (b) Arrival rates qd = qs = 2 unit/s (c) Arrival rates qd = qs = 3 unit/s Fig. 4. Convergence curves of different models. Model performances under different reward weighted factors TABLE 1 Model ST-M-A2C ST-M-A2C ST-M-A2C ST-M-A2C ST-M-A2C Pure Optimization Weighted factor ρ Answer rate Mean pickup time (s) Average reward (s) 0 0.25 0.5 0.75 1 - 0.997 1.000 0.986 0.986 0.944 1.000 494.68 474.34 439.11 436.37 405.65 495.56 302.36 323.88 352.70 355.70 371.13 302.17 Fig. 5. Evolution of episode mean reward under different reward weighted factor ρ simulator calibrated with real mobility data. The dataset, provided by the largest ride-sourcing platform in China, Didi Chuxing, includes four-week orders and drivers' information in the downtown area (20km × 20km) of a city of China. As shown in Algorithm 1, the input of the simulator includes a table of passenger requests and a table of drivers' status. The former table contains the following trip-based attributes: the time and location (longitude and latitude) at which the passenger requests her order, the destination location, and the trip duration (from the time at which the passenger gets aboard to the time at which she drops off), and passenger ID. These attributes are extracted from the real-happened trips. The later table records the following driver-based attributes: the time and location at which the driver gets online and starts listening to orders, the time at which she gets offline and terminates her work, and driver ID. These attributes of drivers are also retrieved from the actual ride-sourcing drivers who register with the platform. With these two calibrated tables as input, the simulator with Algorithm 1 can be executed. The performances in terms of average pickup time, answer rate and reward are evaluated on the four models, including the two proposed models, ST-M-DQN, ST- M-A2C, and two baselines, Pure optimization, Q-learning. In terms of spatio-temporal features, we partition the examined 7;07,3/!,88030777;,7,908:39 8       0,3584/0#0,7/147,.039!:704592,943" 0,733$%  "$%  7;07,3/!,88030777;,7,908:39 8      0,3!.:5%20!:704592,943" 0,733$%  "$%  7;07,3/!,88030777;,7,908:39 8        0,33807#,90!:704592,943" 0,733$%  "$%          54.08      0,370,7/41,0398%,-:,7" 0,733$%  "$%          54.08     0,370,7/41,0398%,-:,7" 0,733$%  "$%          54.08    0,370,7/41,0398%,-:,7" 0,733$%  "$%          584/08      584/00,3#0,7/= = = = = Effectiveness of models in comparison to pure optimization TABLE 2 Agent Increases in answer rate Increases in mean pickup time Increases in average reward Tabular Q-learning ST-M-DQN ST-M-A2C -0.78% -0.508% -0.468% -1.408% -1.318% -12.938% 0.098% 0.108% 6.028% Fig. 6. Evolution of episode scaled reward in real environment area into 20 × 20 zones, each of which occupies an area of 1 square kilometer. At each step, the number of idle drivers and the number of waiting passengers within each zone are counted and fed into the deep reinforcement models as spatio-temporal features. Table 2 shows the performance measures (answer rate, mean pickup time and mean reward of agents) of the three reinforcement learning models compared to pure optimization. Fig. 6 shows the evolution of the mean reward of agents (which is scaled to a range from 0 to 1 due to privacy concerns) with episodes. It can be observed ST-M- A2C has the best performance; it significantly reduces the mean pickup time by 12.93% with minor decrease on answer rate (by 0.46%), and as a result achieves 6.02% higher mean reward of agents than pure optimization. However, neither of ST-M-DQN and Tabular Q-learning has a good performance in an environment calibrated by real historical data. From Fig. 6, we can also observe that the training of ST-M-A2C is more robust and effective than ST-M-DQN and Tabular Q-learning. As a supplement to the experiments on a customized environment, this experiment on a simulator calibrated by real mobility data further evaluates the effectiveness of the proposed methods. 5 RELATED WORK Taxi dispatch: Taxi dispatch, or driver dispatch, is a term usually referring to the process of matching vacant drivers with passengers' requests using some algorithms to maxi- mize the system's performance. Traditional dispatch systems maximize the driver acceptance rate for each individual order by sequentially dispatching taxis to riders. [16] proposed to 9 dispatch taxis to server multiple bookings at the same time thus to maximize the global success rate. [17] considered the individual participant's benefit and proposed a notion of a stable match. [18] constructed an end-to-end framework to predict the future supply and demand in order to optimally schedule the drivers in advance. [16] investigated the pre- ferred service and proposed a recommendation system to enhance the prediction accuracy and reduce the user's effort in finding the desired service. [1] proposed an order dispatch algorithm that combined an offline learning step and an online planning step. The offline learning step estimated the value functions for the spatio-temporal patterns of passenger demand and taxi supply, then the online planning step executed an optimal matching between drivers and orders with the learned value functions. Their main focus was to enhance the traditional combinatorial optimization algorithm, such as Kuhn-Munkres (KM) algorithm, by adding the action- space values to the objective function. [4] proposed a multi- agent reinforcement learning framework to tackle the fleet management problem that relocated the idle taxis to improve taxi utilization rate. [9] proposed a Mean Field Multi-Agent Reinforcement Learning for order dispatching in Didi's platform. They found that the mean field approximation was able to globally capture the demand and supply dynamics by propagating many local interactions between agents and the environment. [10] combined a deep Q-network with transfer learning techniques in a large-scale online order dispatching system. They showed that the strategies learned by knowl- edge transfer from sources city to target cities remarkably improved the system efficiencies, compared to strategies without transfer learning. However, as aforementioned, none of these studies have investigated the impacts of matching time intervals as well as the potential benefits of delayed matching. Deep Reinforcement Learning: Deep Reinforcement Learning (DRL) is a rapidly developed field which has attracted great attention especially since the emergence of AlfaGo [19], [20]. DRL combines the advantages of both deep learning (DL) and reinforcement learning (RL), where DL learns abstract or hidden features from large-scale data with the capability of using multiple processing layers [21] and RL enables agent learning by interacting with its environment. Regarding the application of DRL in the transportation system, it is a multi-agent problem in the high-dimensional and non-stationary space. The powerful DRL provides a possible way to solve the multi-agent system problem, which is conventionally encountered in a variety of domains including robotics, control and communication [22]. [14] evaluated the cooperation and competition between different agents when they share same environment. [23] investigated the wireless sensor networks using a multi-agent framework and found that cooperative neighbors effectively help the sensor to relay packets. 6 CONCLUSIONS This study proposes a two-stage framework for online matching in ride-sourcing systems. The lower part contains a traditional convex combinatorial optimization algorithm that matches idle drivers and waiting passengers in the matching        54.08      $.,0/70,7/%,-:,7" 0,733$%  "$%   10 [12] I. Mordatch, and P. Abbeel. "Emergence of grounded composi- tional language in multi-agent populations". In Thirty-Second AAAI Conference on Artificial Intelligence, 2018. [13] H. M. Schwartz. "Multi-agent machine learning: A reinforcement approach". John Wiley & Sons, 2014. [14] A. Tampuu, T. Matiisen, D. Kodelja, I. Kuzovkin, K. Korjus, J. Aru, ... and R. Vicente. "Multiagent cooperation and competition with deep reinforcement learning". PloS one, 12(4), e0172395, 2017. [15] P. Sunehag, G. Lever, A. Gruslys, W. M. Czarnecki, V. Zambaldi, M. Jaderberg, ... and T. Graepel. "Value-decomposition networks for cooperative multi-agent learning". arXiv preprint arXiv:1706.05296, 2017. [16] L. Zhang, T. Hu, Y. Min, G. Wu, J. Zhang, P. Feng, ... and J. Ye. "A taxi order dispatch model based on combinatorial optimization". In the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017. [17] X. Wang, N. Agatz, and A. Erera. "Stable matching for dynamic ride-sharing systems". Transportation Science, 2017. [18] D. Wang, W. Cao, J. Li, and J. Ye. "DeepSD: supply-demand predic- tion for online car-hailing services using deep neural networks". In 2017 IEEE 33rd International Conference on Data Engineering (ICDE), 2017. [19] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van Den Driessche, ... and S. Dieleman. "Mastering the game of Go with deep neural networks and tree search". nature, 529(7587), 484, 2016. [20] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton and Y. Chen. "Mastering the game of Go without human knowledge." Nature, 550(7676), 354, 2017. [21] Y. LeCun, Y. Bengio, and G. Hinton. "Deep learning". nature, 521(7553), 436, 2015. [22] L. Busoniu, R. Babuska, and B. De Schutter. "A comprehensive survey of multiagent reinforcement learning". IEEE Transactions on Systems, Man, And Cybernetics-Part C: Applications and Reviews, 38 (2), 2008. [23] D. Ye, M. Zhang, and Y. Yang. "A multi-agent framework for packet routing in wireless sensor networks". sensors, 15(5), 10026-10047, 2015. pool with minimum cost measured by pickup time. The upper part establishes two multi-agent deep reinforcement learning models, named ST-M-DQN and ST-M-A2C, which serve as multiple gates to control whether an agent should enter the matching pool in each matching time interval. These reinforcement learning models essentially determine the delayed time of each agent and help improve the effec- tiveness of the matching process, while the potential benefits of delayed matching are discussed in the literature. Through extensive experiments, we show that the proposed ST-M- DQN and ST-M-A2C well balance the trade-off between pickup time and matching rate and significantly improve the matching effectiveness in comparison to pure optimization and other benchmarks. It shows that the delayed matching controlled by the reinforcement learning methods can indeed remarkably reduces the average pickup time by incurring little loss on answer rate. This paper provides a novel frame- work that combines reinforcement learning and bipartite matching and evaluate its effectiveness in a ride-sourcing online matching system. ACKNOWLEDGMENTS The work described in this paper was supported by Hong Kong Research Grants Council under projects HKUST16222916, NHKUST627/18 and the National Nat- ural Science Foundation of China under projects 71622007, 7181101024. REFERENCES [1] Z. Xu, Z. Li, Q. Guan, D. Zhang, Q. Li, J. Nan, ... and J. Ye. "Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach". In the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018. [2] H. Yang, J. Ke, and J. Ye. "A universal distribution law of network detour ratios". Transportation Research Part C: Emerging Technologies, 96, 22-37, 2018. [3] R. S. Sutton, and A. G. Barto. "Introduction to reinforcement learning". Cambridge: MIT press, 1998. [4] K. Lin, R. Zhao, Z. Xu, and J. Zhou. "Efficient Large-Scale Fleet Management via Multi-Agent Deep Reinforcement Learning". In the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2018. [5] T. Oda, and C. Joe-Wong. "MOVI: A Model-Free Approach to Dynamic Fleet Management". arXiv preprint arXiv:1804.04758, 2018. [6] H. Wei, G. Zheng, H. Yao, and Z. Li. "Intellilight: A reinforcement learning approach for intelligent traffic light control". In the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018. [7] C. Mao and Z. Shen. "A reinforcement learning framework for the adaptive routing problem in stochastic time-dependent network". Transportation Research Part C: Emerging Technologies, 93, 179-197, 2018. [8] I. Jindal, Z. T. Qin, X. Chen, M. Nokleby, and J. Ye. "Optimizing Taxi Carpool Policies via Reinforcement Learning and Spatio-Temporal Mining". In 2018 IEEE International Conference on Big Data (Big Data) (pp. 1417-1426). IEEE, 2018. [9] M. Li, Y. Jiao, Y. Yang, Z. Gong, J. Wang, C. Wang, ... and J. Ye. "Efficient Ridesharing Order Dispatching with Mean Field Multi- Agent Reinforcement Learning". In ACM WWW (Web Conference 2019), May 2019, San Francisco, USA, 2019. [10] Z. Wang, Z. Qin, X. Tang, J. Ye, and H. Zhu. "Deep Reinforcement Learning with Knowledge Transfer for Online Rides Order Dispatch- ing". In 2018 IEEE International Conference on Data Mining (ICDM) (pp. 617-626). IEEE, 2018. [11] R. Lowe, Y. Wu, A. Tamar, J. Harb, O. P. Abbeel, and I. Mordatch. "Multi-agent actor-critic for mixed cooperative-competitive environ- ments". In Advances in Neural Information Processing Systems, 2017.
0911.3723
1
0911
2009-11-19T08:38:30
Applications of the Dynamic Distance Potential Field Method
[ "cs.MA" ]
Recently the dynamic distance potential field (DDPF) was introduced as a computationally efficient method to make agents in a simulation of pedestrians move rather on the quickest path than the shortest. It can be considered to be an estimated-remaining-journey-time-based one-shot dynamic assignment method for pedestrian route choice on the operational level of dynamics. In this contribution the method is shortly introduced and the effect of the method on RiMEA's test case 11 is investigated.
cs.MA
cs
Applications of the Dynamic Distance Potential Field Method Tobias Kretz PTV Planung Transport Verkehr AG Stumpfstrasse 1 D-76131 Karlsruhe [email protected] June 13, 2021 Abstract Recently the dynamic distance potential field (DDPF) was intro- duced as a computationally efficient method to make agents in a simu- lation of pedestrians move rather on the quickest path than the short- est. It can be considered to be an estimated-remaining-journey-time- based one-shot dynamic assignment method for pedestrian route choice on the operational level of dynamics. In this contribution the method is shortly introduced and the effect of the method on RiMEA's test case 11 is investigated. 1 Introduction In traffic science a lot of effort is put into work discussing dynamic assign- ment methods: trying to find proofs on the existence of an equilibrium and/or implementing it in an efficient manner for the simulation of real- world networks. This effort is justified by the conviction that Wardrop's first principle "The journey times in all routes actually used are equal and less than those which would be experienced by a single vehicle on any un- used route." [1] is at least a good approximation for real world traffic flow distribution. Compared to this strong emphasize of (estimated remaining) journey time in vehicular traffic science as a determinant of route choice, explicit discussion of the influence on the dynamics of pedestrians [2, 3] is surpris- ingly scarce. Although evidently in case of emergency it's their egress time that occupants desire to minimize and not their egress path length, models of pedestrian evacuation dynamics are often constructed such that various 1 influences change the basic direction of desired velocity, which is calculated as a gradient of the field of distances toward the exit and not a field of es- timated remaining journey time. While this is not to say that pedestrian traffic always moves on quickest paths -- there are probably more occasions than in vehicular traffic when it deviates from it -- there are at least numer- ous situations, where it is close to travel time referred user-equilibrium or at least travel time is relevant for route choice. Recently introduced dynamic distance potential fields [4, 5] do not hold information on remaining journey time either, but -- on any spatial scale -- on the load of the remaining path and implicitly the possibility to detour jams. With this information it is possible to shift the agents' walking behavior toward user-equilibrium. In the two subsequent sections of this paper at first the method of dy- namic distance potential fields is shortly sketched and then applied in a simulation of RiMEA's test case 11 [6]. 2 Dynamic Distance Potential Field Let's begin with a summary of the method: a dynamic distance potential field can be imagined as a "shadow" (as shown in figure 1) of agents cast "upwards" the static potential, i.e. away from the destination. One can think of a destination area as a source of light sending light rays that travel under consideration of obstacles on approximate geodisces away from the destination area. When an agent or a group of agents throws a shadow, successive agents will try to avoid the shadow, as it is a hint for upcoming delays. A shadow is the longer the larger and denser a group of agents (i.e. a jam) is. This functionality is achieved using flood fills, where a value of 1 is added, if a cell is unoccupied and some larger value sadd, if it is occupied by an agent. But the two simple flood fill methods (over common edges or common edges and corners) result in Manhattan or Chebyshev but not the desired Euclidean metric. In this sense these two methods produce large errors and unwanted artifacts in the movement. However, the errors can be reduced for once by combining the two methods and second by using as heuristic not the time dependent potential, but its difference to the potential calculated on the empty (unoccupied) geometry. For two mutually visible coordinates (x0, y0) and (x1, y1), Manhattan (1) (2) distance (i.e. a distance according to Manhattan metric) is dM = x1 − x0 + y1 − y0 = ∆x + ∆y and Chebyshev distance is dC = max(∆x,∆y) 2 Figure 1: A visualization of the dynamic distance potential field. The green line is the exit, agents are located on the bright white spots, which by that have a large value of the dynamic distance potential field. The darker a spot is, the smaller is its dynamic potential field value. The gradient of the dynamic distance potential field enters into the calculation of the direction of desired motion. 3 From this the "minimum distance" follows: and therefore the Euclidean distance is dm = dM − dC = min(∆x,∆y) (cid:113) (cid:113)∆x2 + ∆y2 dE = (dC)2 + (dm)2 = (3) (4) Combining the whole potentials cell by cell in this manner -- even if cells are not mutually visible -- will now be called "method V1". All mentioned metrices and norms are depicted in figure 2. A discussion of the resulting errors of this method compared to Euclidean distance is given in [7]. Let's call the potential calculated on the empty (no agents) geometry V 1 and the potential after a certain time step SV 1(t). Then the heuristic S0 influencing the motion of pedestrians is Sdyn(t) = SV 1(t) − S0 V 1. This has been used and coupled to the F.A.S.T. model [8 -- 12] as an additional partial probability pdyn = e−kSdynSdyn(t), (5) multiplied to the original probability that a cell is selected as destination cell and normalized accordingly p = N · p · pdyn. (6) Figure 2: F.l.t.r.: Manhattan metric, Chebyshev metric, Minimum norm, and Variant 1 (which here is identical to Euclidean metric). 3 RiMEA Test Case 11 In RiMEA's test case 11 a group of 1000 agents is meant to leave a room using two doors, which have different distance to the agents' starting area. The geometry of test case 11 is shown in figure 3. RiMEA prescribes an exit width of 1 m for the simulations. As space is discretized into cells of width 40 cm in the F.A.S.T. model, the exit width has been set to 80 cm. The parameters of the F.A.S.T. model were set to kS = 1.0 and any other k = 0. The speeds were normal distributed (3.5 cells/s, ± 1.0 cell/s) with cut-offs at 1 and 4 cells/s. All results given are averages of 100 simulation runs. In the description of the test case the shape and position of the actual destination area, i.e. the area from which agents are taken out of the sim- ulation upon arrival, is not defined. Therefore three variants were tested, which are shown in figure 4. 4 Figure 3: Test case 11 of RiMEA. Figure 4: Three variants of geometric exit modelling. Agents are taken out of the simulation as soon as they reach the green area, obstacles are grey, free space black. Note that in any case there is only one destination area with one static floor field, such that the exit choice method proposed in [10] is not made use of in the simulations for this contribution. 5 Exit geometry 1 2 3 588.8 447.9 539.5 474.9 289.1 400.4 T w/o DDPF T with DDPF Ti w/o DDPF Ti with DDPF 270.4 212.6 248.0 229.1 143.5 191.3 Table 1: Total times T and average individual egress times Ti without and with dynamic distance potential field. In the latter case kSdyn = 1.0 and sadd = 10. Exit geometry w/o DDPF with DDPF 1 2 3 407.0 198.2 338.9 495.7 483.4 492.3 Table 2: Number of agents that leave through the right exit. Tables 1 and 2 show in numbers the effect the dynamic distance potential field has. Simulated evacuation times shrink as the agents distribute more equally on the two exits. As a by-observation the effect of the exit geometry becomes obvious. Ammending table 2 figure 5 shows for exit geometry 2 the dependence of the number of agents leaving through the right exit in dependence on parameter sadd. Figure 5: Number of agents leaving through the right exit in dependence on parameter sadd (exit geometry 2). The difference becomes even more obvious, if one looks at the situation after 100 seconds in figure 6. One gets the impression that without dynamic distance potential field the agents are either only in small numbers "aware" of the existence of the right exit or are reluctant to walk five extra meters. This is totally different with dynamic distance potential field. Here it's almost difficult to distinguish the shape of the crowd from a geometry, where 6 there is only one exit placed between the two actually existing ones. Figure 6: Situation after 100 seconds without (left) and with (right) dynamic distance potential field. 4 Summary and Conclusions The dynamic distance potential field method has shortly been described. It is a computationally efficient heuristic method to mimic the effects of esti- mated remaining journey time on route choice on the operational level of pedestrian dynamics. For fundamental reasons, but also to keep computa- tion times small, deviations from real remaining journey time and limited errors in the metric of the field are accepted. The method has been applicated in a simulation of RiMEA test case 11. This led to the agents utilizing the exit 5 m further away almost as well as the nearby exit, which could best be seen in a snapshot from the simulation's animation. As long as there is no experiment for test case 11 or an observation that resembles test case 11, it's not safe to say that the dynamic distance potential field makes the simulation in this case more realistic. But with the two parameters that control the method a planner has the flexibility to model almost any point between strong preference for shorter walking paths and strong preference for shorter walking times, respectively shorter evacuation times. References [1] J.G. Wardrop, "Some Theoretical Aspects of Road Traffic Research. Proceedings", Institution of Civil Engineers 11 (1952) no. 1, 325 -- 378. [2] A. Schadschneider, W.W.F. Klingsch, H. Klupfel, T. Kretz, C. Rogsch, and A. Seyfried, "Evacuation Dynamics: Empirical Results, Modeling and Applications", in Meyers [18], p. 3142. arXiv:0802.1620 [physics.soc-ph]. ISBN:978-0-387-75888-6. 7 [3] A. Schadschneider, H. Klupfel, T. Kretz, C. Rogsch, and A. Seyfried, "Fundamentals of Pedestrian and Evacuation Dynamics", in Bazzan and Klugl [17], ch. VI, pp. 124 -- 154. ISBN:978-1-60566-226-8. [4] T. Kretz, "Pedestrian Traffic: on the Quickest Path", Journal of Statistical Mechanics: Theory and Experiment P03012 (2009) , arXiv:0901.0170 [physics.soc-ph]. [5] T. Kretz, "The use of dynamic distance potential fields for pedestrian flow around corners", in First International Conference on Evacuation Modeling and Management. TU Delft, 2009. arXiv:0804.4336 [cs.MA]. contribution to ICEM09 conference, eprint. [6] U. Brunner, H. Kirchberger, C. Lebeda, M. Oswald, R. Konnecke, M. Kraft, A. Thoss, L. Mulli, A. Seyfried, C. Hartnack, S. Wader, G. Spennes, and T. Kretz, RiMEA -- Richtlinie fur Mikroskopische Entfluchtungs-Analysen. Initiatoren des RiMEA-Projekts: M. Schwendimann, N. Waldau, P. Gattermann, C. Moroge, T. Meyer-Konig, and M. Schreckenberg, 2.2.0 ed., 2009. (eprint from http://www.rimea.de/). (in German). [7] T. Kretz, C. Bonisch, and P. Vortisch, "Comparison of Various Methods for the Calculation of the Distance Potential Field", in Rogsch et. al. [16], pp. 335 -- 346. arXiv:0804.3868 [physics.comp-ph]. ISBN: 978-3-642-04503-5. [8] T. Kretz and M. Schreckenberg, "The F.A.S.T.-Model", in El Yacoubi et. al. [13], pp. 712 -- 715. arXiv:0804.1893 [cs.MA]. ISBN:3-540-40929-7. [9] T. Kretz and M. Schreckenberg, "F.A.S.T. -- Floor field- and Agent-based Simulation Tool", in Transport simulation: Beyond traditional approaches, E. Chung and A.-G. Dumont, eds., ch. 8, pp. 125 -- 135. EPFL press, Lausanne, CH, April, 2009. arXiv:physics/0609097. ISBN:978-1420095098. [10] T. Kretz, Pedestrian Traffic -- Simulation and Experiments. PhD thesis, Universitat Duisburg-Essen, February, 2007. urn:nbn:de:hbz:464-20070302-120944-7. [11] T. Kretz, M. Kaufman, and M. Schreckenberg, "Counterflow Extension for the F.A.S.T.-Model", in Umeo et. al. [14], pp. 555 -- 558. arXiv:0804.4336 [cs.MA]. ISBN:978-3-540-79991-7. [12] T. Kretz, "Computation Speed of the F.A.S.T. Model", in Traffic and Granular Flow '09, S. Dai et al., ed. 2010. arXiv:0911.2900 [cs.MA]. (to appear in TGF09 proceedings). 8 [13] S. El Yacoubi, B. Chopard, and S. Bandini, eds., Cellular Automata - 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006. Springer-Verlag Berlin Heidelberg, Perpignan, France, September, 2006. ISBN:3-540-40929-7. [14] H. Umeo, S. Morishita, K. Nishinari, T. Komatsuzaki, and S. Bandini, eds., Cellular Automata -- 8th International Conference on Cellular Automata for Research and Industry, ACRI 2008, Proceedings. Springer-Verlag Berlin Heidelberg, Yokohama, Japan, September, 2008. ISBN:978-3-540-79991-7. [15] N. Waldau, P. Gattermann, H. Knoflacher, and M. Schreckenberg, eds., Pedestrian and Evacuation Dynamics 2005. Springer Berlin Heidelberg New York, Vienna, December, 2006. ISBN:978-3-540-47062-5. [16] C. Rogsch, A. Schadschneider, W.W.F. Klingsch, and M. Schreckenberg, eds., Pedestrian and Evacuation Dynamics 2008. Springer Berlin Heidelberg New York, Wuppertal, 2009. ISBN: 978-3-642-04503-5. [17] A. Bazzan and F. Klugl, eds., Multi-Agent Systems for Traffic and Transportation Engineering. Information Science Reference, Hershey, PA, USA, April, 2009. ISBN:978-1-60566-226-8. [18] R.A. Meyers, ed., Encyclopedia of Complexity and Systems Science. Springer, Berlin Heidelberg New York, 2009. ISBN:978-0-387-75888-6. 9
1805.09090
1
1805
2018-05-23T12:30:23
Volunteers in the Smart City: Comparison of Contribution Strategies on Human-Centered Measures
[ "cs.MA" ]
Several smart city services rely on users contribution, e.g., data, which can be costly for the users in terms of privacy. High costs lead to reduced user participation, which undermine the success of smart city technologies. This work develops a scenario-independent design principle, based on public good theory, for resource management in smart city applications, where provision of a service depends on contributors and free-riders, which benefit from the service without contributing own resources. Following this design principle, different classes of algorithms for resource management are evaluated with respect to human-centered measures, i.e., privacy, fairness and social welfare. Trade-offs that characterize algorithms are discussed across two smart city application scenarios. These results might help Smart City application designers to choose a suitable algorithm given a scenario-specific set of requirements, and users to choose a service based on an algorithm that matches their preferences.
cs.MA
cs
Volunteers in the Smart City: Comparison of Contribution Strategies on Human-Centered Measures Stefano Bennati, Ivana Dusparic, Rhythima Shinde, Catholijn M. Jonker Keywords: Participatory Sensing , Smart Cities , Public Good , Privacy , Fairness This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. Abstract Several smart city services rely on users contribution, e.g., data, which can be costly for the users in terms of privacy. High costs lead to reduced user participation, which undermine the success of smart city technologies. This work develops a scenario-independent design principle, based on public good theory, for resource management in smart city applications, where provision of a service depends on contributors and free-riders, which benefit from the service without contributing own resources. Following this design principle, different classes of algorithms for re- source management are evaluated with respect to human-centered mea- sures, i.e., privacy, fairness and social welfare. Trade-offs that character- ize algorithms are discussed across two smart city application scenarios. These results might help Smart City application designers to choose a suitable algorithm given a scenario-specific set of requirements, and users to choose a service based on an algorithm that matches their preferences. 1 Introduction Recent years have seen a substantial increase in active user participation in the smart city, and with it an increase in the resources contributed by the citizens. Sensor data is one type of user-contributed resource that is at the base of many smart city applications [1]. Collecting data in a smart city allows to predict the needs of the citizens [2], thus enabling the creation of more advanced and more efficient services with a high potential for innovation [3]. User participation is crucial for the success of several smart city applications, but it entails costs that disincentivize users. For example, transmitting privacy-sensitive data in a participatory sensing scenario increases the risk of disclosure and misuse of private information, e.g., discrimination. Similarly, increasing energy availability in the smart grid scenario, e.g., by postponing the use of appliances, comes with a risk of unfair treatment and disproportinatelly low access to the resource [4]. In order for the 1 smart city applications to be successful, these costs have to be reduced. Examples of existing solutions for reducing contribution costs are privacy-enhancing technologies [5] that reduce the risks associated with disclosing information [6], and fair resource- management technologies [7], which improve the perceived fairness of the system. Comparing different implementations of these mechanisms is difficult because they are tied to specific assumptions about the scenario and the resource. To enable a comparison of different scenarios, resources and contribution strategies, this paper introduces a design principle for developing smart city algorithms, which allows the evaluation of privacy-enhancing technologies in a scenario-independent approach. Sev- eral smart city services are produced from user-contributed data. Proposed approach is based on the theory of public goods and voluntary contribution games [8], as it is an approach well suited for modeling scenarios where a common resource, i.e. the smart-city service, depends on the action of a population [9]. The orchestration of de- mand and offer of some resource is driven by contribution strategies, algorithms that determine which users should contribute to the system at each point in time, based on the state of the system and a set of system requirements. By acting on the decision of whether to participate, a contribution strategy is independent of the characteristics of the resource, hence it can be combined with existing mechanism that work at the content level, e.g., privacy-preserving algorithms. Additionally, it makes data shar- ing across smart city applications easier, thanks to the uniform way of dealing with different kinds of data. Following this design principle, a simulation framework is developed [10] that allows a comparison of multiple algorithms for resource contribution, to address the research question: how do different contribution strategies compare in terms of privacy, fairness and social welfare? The first contribution of this paper is to introduce the design principle and verify its applicability to two different application scenarios, i.e., traffic congestion information and charging of electric vehicles, by means of real-world datasets. Similar validation in different scenarios can provide useful insights for the design of other resource-based smart city applications. The second contribution is to showcase the generality of the framework by imple- menting two classes of algorithms -- centralized optimization and localized reinforce- ment learning in two flavors, with and without contextual awareness -- in these two smart city scenarios and evaluating them in terms of trade-offs between system effi- ciency, user privacy or resource distribution fairness, as opposed to optimizing them towards a single measure. The results presented show that the same trade-offs between algorithms repeat across the application scenarios. Specifically, a localized solution, which works only on local data, is found to deliver higher privacy and equality than a centralized solution. Centralized optimization offers instead higher efficiency thanks to the global knowledge of data. Localized algorithms with and without contextual knowledge are evaluated, and those considering the context in the decision-making are found to deliver higher fairness. This work can be of interest to designers of smart city applications and services that look for a guideline for the choice of algorithm, given specific scenario priorities in terms of different measures. Another target audience is that of citizens that are concerned with the risk of abuse of their data, and particularly privacy-aware prosumers. The results help quantify different service implementations along measures such as privacy and fairness, thus help the citizens choose a service provider that best matches their preferences, reducing the concerns about the system and fostering user participation. 2 The rest of the paper is organized as follows: Section 2 introduces the design principle and how it can be applied to two smart city scenarios, Section 3 describes and discusses the main results obtained from simulating voluntary contributions in different scenarios, and Section 4 concludes the paper discussing possible avenues for future work and giving general recommendations about the choice of contribution strategies. 2 Model This section introduces the design principle, based on the theory of public goods and Voluntary Contribution Games [8], and it describes how it can be applied to the smart city scenarios of participatory sensing, with the example of traffic congestion [11], and smart grids, with the example of electric vehicle charging [12]. Voluntary contribution games involve the need by a number of users to coordinate the provision of some public good, e.g., financing a playground with private donations. Table 1 illustrates the notation of the model, symbols are listed in order of appearance. Description The service provider Math symbol S V = {1, . . . , n} The set of n users T ∈ N>0 The number of rounds in the simulation rt The resource produced by user i at time t i ∈ R i vt The value associated to disclosing rt i ∈ R i The cost associated to transmitting rt ct i ∈ R i pt The privacy leaked when disclosing rt A = {D, C} i The action set i ∈ A at The action of user i at time t + ⊆ V At The set of contributors at time t qt ∈ R The service quality at time t f : V → R The quality function τ t ∈ R The quality requirement for time t S : R × R → R The success function Gt ∈ R G : R × R → R Bt ∈ R B : R × R → R U t i Q The payoff for a successful round at time t The payoff function for successful rounds The payoff for an unsuccessful round at time t The payoff function for unsuccessful rounds The utility of user i at time t The total quality of service after T rounds Scenario: smart grid The energy production of household i at time t The baseline consumption of household i at time t The energy surplus at time t i ∈ R πt i ∈ R βt σt ∈ R Table 1: Mathematical notation, in order of appearance. V = {1, . . . , n} is the set of users and S is a service provider. In each round t ≤ T each user produces a resource rt i . Users perform an action i ∈ A = {C, D}: C corresponds to contributing the resource and D to opt out from at i = C}. contribution. The set of contributors at time t is denoted as At i that depends on the char- acteristics of resource and communication medium. Contribution might also entail a privacy cost pt i, which models the risks of revealing private information to third parties. Contribution is costly, thus contributors pay a cost ct + = {i ∈ V : at i with value vt 3 Q = max(cid:80)T t=1 f t(At +). +) =(cid:80) i∈At The service provider determines the service quality qt = f (At satisfy the requirement τ t ≤ (cid:80) vt i based on all contributions received. A quality requirement τ t, either global or per user, is generated at every timestep. Not all users are required to contribute in order to i . A round is successful, i.e. the service can be provided, if the quality is higher than the threshold: the success function is defined as S(qt, τ t) = {Gt if qt ≥ τ t else Bt}. Each user gets the same positive payoff Gt = G(τ t, qt) from accessing the service, including those who did not contribute. If the quality threshold is not met, the service cannot be provided and every agent receives a large negative payoff B(τ t, qt) > 0. Given that payoffs are distributed equally, there is no incentive for users to contribute unilaterally: the public goods theory predicts the existence of an equilibrium where nobody contributes. i vt + The individual goal of the users is to maximize their individual utility over T rounds (see Table 2a): U t , where 1X is the goal the indicator function (equals 1 if event X is true). The social goal, i.e. of the service provider, is to maximize the total quality of the service over T rounds i = G(τ t, qt)1qt≥τ t − B(τ t, qt)1qt<τ t − ct i 1 at i The model relies on the following assumptions: • Users contribute their resources to a central entity, which uses them to provide a service. • Contributions cannot be doctored, e.g., to reduce the cost. • Users are not allowed to communicate with each other; this is generally the case for simple devices such as smart meters [13]. • The system implements a privacy-preserving resource-management algorithm that optimizes the use of the resource. 2.1 Applicability to real-world scenarios This section describes how the scenarios of smart and participatory sensing can be modelled using the proposed design principle. 2.1.1 Smart grid value is computed from the current production of renewable energy πt =(cid:80) the current network load βt =(cid:80) Electric vehicles (EVs), associated to households connected to the smart grid, are required to be periodically recharged. The public good consists of the total energy surplus σt = πt − βt, which is available to all households for charging the EVs, its i , and i , obtained from EirGrid data [14]. Contribution to the public good is then defined as opting out from consumption, i.e. renouncing to charge the EV of a charge vt i that might depend on contextual variables such as the current charge level, the availability of a charging station, and the current energy surplus. Contribution entails a comfort cost that is assumed to be proportional to the corresponding value, as the utility of an EV depends on it being charged. Values are determined in the experiments by sampling a uniform probability distribution, and costs are determined by sampling a normal distribution, centered around the respective value. i βt i πt 4 qt−i qt−i + vt i < τ t outcome i (ai = C) −B(τ t, qt) − ct U t −B(τ t, qt) U t i (ai = D) (a) Definition of utilities for agent i. Let qt−i =(cid:80) failure i τ t − vt i ≤ qt−i < τ t depends on ai G(τ t, qt) − ct −B(τ t, qt) i τ t ≤ qt−i success G(τ t, qt) − ct i G(τ t, qt) i be the total contributions, excluding agent i, and τ t be the global requirement. This game qualifies as a threshold public goods game if G(τ t, qt) + B(τ t, qt) > ct i, which is always verified for large enough values of G or B. j∈At +\{i} vt j = qt − vt Social welfare Measure Success a) b) Efficiency c) d) Privacy Definition Σt = min(1, qt/τ t) Et = τ t/qt if τ t ≤ qt else 0 W t = i P t = 1 − At T F t = 1 n Fairness, over time G = 1 n (cid:80)T (cid:16) t=1 U t +/n i (cid:16) n + 1 − 2 n + 1 − 2 (cid:16)(cid:80)n (cid:16)(cid:80)n (cid:80)n i=1(n+1−i)yi (cid:80)n i=1(n+1−i)yi Fairness e) f) i=1 yi i=1 yi (cid:17)(cid:17) (cid:17)(cid:17) where yi =(cid:80)T where yi = vt i t=1 vt i (b) Measures used during evaluation. Table 2: Analytical definition of criteria of performance. 2.1.2 Participatory sensing Traffic congestion is computed by aggregating speeds and locations reported by cars using a participatory sensing approach [15]. The value vt i of individual measurements reflects the novelty of the information, which might depend on the actions of other users [16], e.g., duplicated information due to local correlation in measurements. In the specific case, measurements cannot be linked with one another as the dataset lacks GPS coordinates [17], therefore the value of novelty is approximated with the change of speed, as a sudden change in speed is considered more informative than keeping a constant speed. Contributing data comes at a transmission cost ct i -- that might depend on the characteristics of the message, e.g., size, and of the medium, e.g., congestion, power consumption -- and a privacy cost pt i -- that might depend on disclosing private information, such as location and speed [18]. Costs are determined as the distance to the only points of interests known in the data: the origin and destination of a trip. The public good is created if the sum of individual contributions is higher than a certain threshold τ , which is set to 80% of the size of the population, which means that the service is successfully generated if at least 80% of the users contribute a value of 1. 2.2 Measures The performance of different contribution strategies are quantified with the following measures (see Table 2b): a) Success rate: The fraction of the threshold that has been covered by contribu- tions, or 1 if the total contribution is higher than the threshold. b) Efficiency: The ratio between the requirement and the sum of contributions. Efficiency is 1 if the sum of contributions is equivalent to the threshold e.g., all 5 agents contribute 1, it is lower than 1 if the sum of contributions is larger than the threshold. c) Social welfare: The average reward, sum of a constant benefit and a constant negative cost (only for contributors). d) Privacy: the fraction of agents that did not disclose private information during the current timestep. e) Fairness: The Gini coefficient represents the fairness of the current round of contributions (0 is total equality). It is computed for each timestep, as the Gini coefficient of the values that agents contributed in that timestep, and aggregated across time and repetitions. f) Fairness over time: It represents the fairness of the history of contributions. It measures the Gini coefficient computed across agents on the individual histories of contribution, from the start of the simulation to the current timestep. The definition of privacy can be made scenario-specific by adopting an appropriate privacy measure, e.g., K-anonymity, differential privacy [19]. 2.3 Algorithms This section describes the contribution strategy algorithms chosen for the analysis in our framework. The choice favored well-established and general-purpose algorithms as opposed to algorithms with state-of-the-art efficiency, as the goal is to highlight trade-offs between measures over different scenarios. The review and comparison of scenario-specific algorithms is not aligned to the goals of this paper and is therefore out of scope. 2.3.1 Centralized algorithms Centralized or top-down algorithms rely on a central optimizer that satisfies the public good while minimizing the cost of contribution. This problem can be modeled as the well-know Knapsack problem: i > τ t , where the weight of items is given by the contribution value and the value of each item is defined as the inverse of the cost. We chose a customized "fully polynomial time approximation scheme" (FPTAS) that reaches the knapsack constraints from above, instead of from below, such that the threshold can be met. (cid:40) minimize (cid:80)n subject to (cid:80)n i ∗ at i ∗ at i i=1 ct i=1 vt 2.3.2 Localized algorithms Decentralized algorithms distribute decision making at the local level and allow com- munication between agents for coordination [20] or learning [21]. In this paper we focus on localized algorithms, a type of decentralized algorithms that operate only on local knowledge, without assuming the availability of special hardware for communi- cation [13]. Aspiration learning is a learning algorithm that is specifically tailored for coordination games [22]; agents contribute based on their "satisfaction value", which depends on their previous experiences, but does not consider the current context, e.g., current value or cost. Q-Learning is a model-free unsupervised reinforcement learning approach that considers both the history and the current context in the decision [23]. A disadvantage of reinforcement learning is its sensitivity to initial conditions, for example a multi-agent learning process might converge to an inefficient equilibrium 6 where nobody contributes. In order to make this outcome less likely, agents are pre- trained to prefer contribution in order to bias the initial exploration period. Pre- training is a reasonable solution as it can be performed during device manufacturing and its effect on the behavior of agents fades off quickly as agents start learning. 3 Results and Analysis This section presents the results of computational experiments. Trade-offs are evalu- ated between the three contribution strategies presented in section 2.3 and two base- lines: a baseline in which users contribute "fully", i.e. always, and a "random" baseline in which users have 50% probability of contributing at each round 1. All experiments are performed in a simulation framework developed in Python and run on ETHs cluster Euler. Results presented in this paper represent the average state of 20 simulations after 5000 timesteps, and error bars represent the confidence intervals at 95%. The contribution strategies are tested with real-world datasets in two smart city applications, using cost, value and public good values as described in Section 2.1. The traffic dataset contains mobility traces of private cars obtained from U.S. Depart- ment of Energy National Renewable Energy Laboratory[17]. The electric vehicle (EV) dataset contains residential consumption data obtained from Irish Smart Meter trial and renewable energy production data from Irish elecriticy grid operator EirGrid [14]. Full results are shown in Figure 1 and present the comparisons of the contribution strategies by the six measures discussed in Section 2.2. Most measures do not show a dependency on the size of the population, i.e., the number of sensors, because the value of the public good threshold is chosen to be proportional to the size of the population. If the threshold would be constant, an increase in the number of sensors, i.e., potential contributors, would make the creation of the public good easier, hence affect all measures. In terms of success rate (Figure 1a), full contribution and centralized optimization always succeed,i.e., are always able to provide the services, while Q-Learning does not guarantee success and fails in about 2-3% of the cases. In terms of efficiency (Figure 1b), centralized optimization is the most efficient solution, as it finds the subset of users whose contribution satisfies the requirement 2 at the lowest cost 3. Efficiency measures how close the total contribution approaches the needs of the system, hence baseline in which all agents contribute will have the lowest possible efficiency. Efficiency increases with the size of the population as a higher number of possible solutions -- combinations of individual contributions -- makes it more likely to find an efficient solution. Similarly, in terms of social welfare (see Figure 1c), optimization scores the highest, while localized strategies reach a welfare around 30% lower. Social welfare is the difference between the rewards from the public good and the costs of contributions, so a negative value indicates that costs are higher than gains. Differently from the previous result, the performance of aspiration learning is equivalent to that of Q- Learning, as opposed to that of optimization. 150% chance of contribution does not imply that 50% chance of success, because each contribution has an average value greater than 1. 2Optimization is not successful if the total requirement is larger than the sum of contribu- tions from all agents, but the experiments are generated to be successful if all users contribute. 3The approximation algorithm used to solve the optimization problem does not guarantee to find the global minimum. 7 In terms of privacy (Figure 1d), centralized optimization achieves no privacy, like full contribution, as it requires knowledge about the state of all users. Random con- tribution offers the highest privacy -- around 50% of users -- at the expenses of other measures, e.g., success rate and efficiency. Localized contribution strategies allow a fraction of the user to keep their data private. This fraction increases with the pop- ulation size for aspiration learning, while Q-Learning trades a lower privacy off for a higher fairness. Fairness is measured in two ways: "fairness of contributions" compares the actions of all agents at the current time t (see Figure 1e), while "fairness of contribution over time" considers the histories of contribution up to time t (see Figure 1f). Full contribution requires all users to contribute, thus it trades perfect fairness off for other measures such as efficiency. Optimization offers low fairness because it considers only the current state, and users in certain states, e.g., with high values, are more likely to contribute than others. Conversely, optimization offers high fairness over time because agents are randomly assigned to states, hence the chance of being in any state is over time the same. This result might not hold if states are not randomly assigned, e.g., some users are more likely to obtain high values/costs than others. Aspiration learning bases decisions only on the history of decisions, this leads to higher fairness, as contributions are independent of the state, and to lower fairness over time, caused by individual differences in training that accumulate over time. These values decrease with the population size, while other contribution strategies are not affected by this parameter. Q-Learning scores high values in both measures as it considers both the current context and the history of actions, this allows agents to learn similar behaviors by interacting with one another. Algorithm Pros Full Random Type Baseline Baseline Centralized Knapsack Aspiration Localized Localized Q-Learning Success Privacy Success, Efficiency Privacy Fairness (over time) Efficiency Cons Efficiency Success Privacy, Fairness F. over time Table 3: Comparison of contribution strategies. Summary of trade-offs is presented in Table 3. Centralized optimization assures the success of the service and high efficiency, it is hence appropriate for mission critical services for which computation and network constraints are not an issue, e.g., measur- ing current load on the smart grid to prevent outages. Localized strategies are instead best suited for applications where privacy concerns might reduce user adoption, e.g., participatory sensing. Finally, Q-Learning offers the highest fairness, hence it is ideal for applications where fair access to the service is desirable, e.g., charging of electric vehicles. 4 Conclusions and Future Work This paper provides a scenario-independent design principle and simulation framework for smart city applications that rely on voluntary user contribution. Voluntary contri- butions empower users to control the ownership of their resource, e.g., by contributing 8 (a) Ratio of success in ser- vice creation. (b) Efficiency of total contri- butions. (c) Social welfare of the pop- ulation. (d) Average privacy of users. (e) Average fairness of con- tributions. (f) Average fairness over time. Figure 1: Comparison of contribution strategies, the x axis represents the population size. Dashed lines represent baselines, solid lines represent contribution strategies. The plots show trade-offs between centralized opti- mization, aspiration learning and Q-Learning in terms of efficiency, privacy and fairness. Optimization offers the highest success rate and efficiency, while as- piration learning and Q-Learning offers higher privacy. Q-Learning is the only contribution strategy to offer high fairness on both measures. 9 AspirationQ-LearningOptimizationRandomFull contrib.Legend:10203040500.750.800.850.900.951.00Success rateTraffic data10203040500.860.880.900.920.940.960.981.00Success rateEV data10203040500.30.40.50.60.70.80.9EfficiencyTraffic data10203040500.30.40.50.60.70.80.9EfficiencyEV data10203040504202468Social welfareTraffic data102030405012345678Social welfareEV data10203040500.00.10.20.30.40.5PrivacyTraffic data10203040500.00.10.20.30.40.5PrivacyEV data10203040500.50.60.70.80.91.0Fairness of contributionsTraffic data10203040500.50.60.70.80.91.0Fairness of contributionsEV data10203040500.750.800.850.900.951.00Fairness of contributions, over timeTraffic data10203040500.600.650.700.750.800.850.900.951.00Fairness of contributions, over timeEV data data towards a service, independently of the type of resource and its use. The applica- bility of this framework is verified using real-world data from the application scenarios of traffic congestion monitoring and electric vehicle charging. Results quantify trade-offs produced by different contribution strategies along mea- sures such as efficiency, privacy and fairness. The trade-offs identified hold in both scenarios, suggesting that they depend on characteristics of the algorithms and not on characteristics of the scenarios. Therefore the results can be used as implementa- tion recommendations to service providers and system designers about the choice of contribution strategies. Modeling and application in other scenarios with different cost and value character- istics is left to future work, for example "negative" contribution in traffic congestion, where users contribute to the public good by choosing a longer route instead of the shortest but congested route [24]. Incentives for contributions are important in scenar- ios that rely on user participation [25]. However, incentives mechanisms would require quantifying privacy [26], which could be addressed in future work. Another limitation of the current work is that only localized algorithms are considered. Relaxing this as- sumption is a worthy avenue for future work. Communication between agents would introduce privacy concerns during communication between agents, which would need to be measured, but would would allow analysis of new classes of algorithms, such as decentralized optimization. 5 Acknowledgements Stefano Bennati acknowledges support by the European Commission through the ERC Advanced Investigator Grant Momentum [Grant No. 324247] References [1] A. Gaur, B. Scotney, G. Parr, and S. McClean, "Smart city architecture and its applications based on iot," Procedia computer science, vol. 52, pp. 1089 -- 1094, 2015. [2] E. Al Nuaimi, H. Al Neyadi, N. Mohamed, and J. Al-Jaroodi, "Applications of big data to smart cities," Journal of Internet Services and Applications, vol. 6, no. 1, p. 25, 2015. [3] I. A. T. Hashem, V. Chang, N. B. Anuar, K. Adewole, I. Yaqoob, A. Gani, E. Ahmed, and H. Chiroma, "The role of big data in smart city," International Journal of Information Management, vol. 36, no. 5, pp. 748 -- 758, 2016. [4] S. Bennati and E. Pournaras, "Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping," Sustainable Cities and Society, 2018. [5] D. Eckhoff and I. Wagner, "Privacy in the smart city -- applications, technologies, challenges and solutions," IEEE Communications Surveys & Tutorials, 2017. [6] S. Finster and I. Baumgart, "Privacy-Aware Smart Metering: A Survey," IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1088 -- 1101, 2015. [7] C. K. Tham and T. Luo, "Fairness and social welfare in service allocation schemes for participatory sensing," Computer Networks, vol. 73, pp. 58 -- 71, nov 2014. 10 [8] M. Bagnoli and B. L. Lipman, "Provision of Public Goods: Fully Implement- ing the Core through Private Contributions," The Review of Economic Studies, vol. 56, no. 4, pp. 583 -- 601, 1989. [9] M. Wolsink, "The research agenda on social acceptance of distributed generation in smart grids: Renewable as common pool resources," Renewable and Sustainable Energy Reviews, vol. 16, no. 1, pp. 822 -- 835, jan 2012. [10] S. Bennati, "The simulation framework," 2018. [Online]. Available: https: //github.com/bennati/EnergyVCG [11] L. Duan, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, "Moti- vating smartphone collaboration in data acquisition and distributed computing," IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2320 -- 2333, 2014. [12] X. Wang, C. Shao, X. Wang, and C. Du, "Survey of electric vehicle charging load and dispatch control strategies," Proceedings of the CSEE, vol. 33, no. 1, pp. 1 -- 10, 2013. [13] Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward intelligent machine-to-machine communications in smart grid," IEEE Communications Magazine, vol. 49, no. 4, 2011. [14] EirGrid group. (2018) Smart grid dashboard. [Online]. Available: http: //smartgriddashboard.eirgrid.com/ [15] J. W. S. Brown, O. Ohrimenko, and R. Tamassia, "Haze," in Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems - SIGSPATIAL'13. New York, New York, USA: ACM Press, 2013, pp. 530 -- 533. [16] M. Vuran, O. Akan, and I. Akyildiz, "Spatio-temporal correlation: theory and applications for wireless sensor networks," Computer Networks, vol. 45, pp. 245 -- 259, 2004. [17] NREL. (2015) Transportation secure data center. [Online]. Available: www.nrel. gov/tsdc [18] G. Tsoukaneri, G. Theodorakopoulos, H. Leather, and M. K. Marina, "On the inference of user paths from anonymized mobility data," Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016, pp. 199 -- 213, 2016. [19] M. L. Damiani, "Location privacy models in mobile applications: conceptual view and research directions," GeoInformatica, vol. 18, no. 4, pp. 819 -- 842, 2014. [20] J. Kennedy and R. Eberhart2, "Particle Swarm Optimization," IEEE Interna- tional Conference on Neural Network, vol. 4, pp. 1942 -- 1948, 1995. [21] I. Dusparic, A. Taylor, A. Marinescu, F. Golpayegani, and S. Clarke, "Residen- tial demand response: Experimental evaluation and comparison of self-organizing techniques," Renewable and Sustainable Energy Reviews, vol. 80, pp. 1528 -- 1536, dec 2017. [22] G. C. Chasparis, J. S. Shamma, and A. Arapostathis, "Aspiration learning in co- ordination games," Proceedings of the IEEE Conference on Decision and Control, pp. 5756 -- 5761, 2010. [23] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction. MIT press Cambridge, 1998, vol. 1, no. 1. 11 [24] B. A. Huberman, "Social Dilemmas and Internet Congestion," Science, vol. 277, no. 5325, pp. 535 -- 537, 1997. [25] G. Radanovic and B. Faltings, "Incentive Schemes for Participatory Sensing." Aamas, pp. 1081 -- 1089, 2015. [26] P. A. Norberg, D. R. Horne, and D. A. Horne, "The privacy paradox: Personal information disclosure intentions versus behaviors," Journal of Consumer Affairs, vol. 41, no. 1, pp. 100 -- 126, 2007. 12
1902.07781
1
1902
2019-02-20T21:12:44
Empathic Autonomous Agents
[ "cs.MA" ]
Identifying and resolving conflicts of interests is a key challenge when designing autonomous agents. For example, such conflicts often occur when complex information systems interact persuasively with humans and are in the future likely to arise in non-human agent-to-agent interaction. We introduce a theoretical framework for an empathic autonomous agent that proactively identifies potential conflicts of interests in interactions with other agents (and humans) by considering their utility functions and comparing them with its own preferences using a system of shared values to find a solution all agents consider acceptable. To illustrate how empathic autonomous agents work, we provide running examples and a simple prototype implementation in a general-purpose programing language. To give a high-level overview of our work, we propose a reasoning-loop architecture for our empathic agent.
cs.MA
cs
Empathic Autonomous Agents Timotheus Kampik[0000−0002−6458−2252], Juan Carlos Nieves[0000−0003−4072−8795], and Helena Lindgren[0000−0002−8430−4241] Umea University, 901 87, Umea, Sweden {tkampik,jcnieves,helena}@cs.umu.se Abstract. Identifying and resolving conflicts of interests is a key challenge when designing autonomous agents. For example, such conflicts often occur when com- plex information systems interact persuasively with humans and are in the future likely to arise in non-human agent-to-agent interaction. We introduce a theoretical framework for an empathic autonomous agent that proactively identifies potential conflicts of interests in interactions with other agents (and humans) by consider- ing their utility functions and comparing them with its own preferences using a system of shared values to find a solution all agents consider acceptable. To illus- trate how empathic autonomous agents work, we provide running examples and a simple prototype implementation in a general-purpose programing language. To give a high-level overview of our work, we propose a reasoning-loop architecture for our empathic agent. Keywords: Multi-agent systems · Utility theory · Conflicts of interests 1 Background and Problem Description In modern information technologies, conflicts of interests between users and informa- tion systems that operate with a high degree of autonomy (autonomous agents) are of increasing prevalence. For example, complex web applications persuade end-users, possibly against the interests of the persuaded individuals1. Given the prevalence of autonomous systems will increase, conflicts between autonomous agents and humans (or between different autonomous agent instances and types) can be expected to occur more frequently in the future, e.g. in interactions with or among autonomous vehicles in scenarios that cannot be completely solved by applying static traffic rules. Conse- quently, one can argue for the need to develop empathic intelligent agents that consider the preferences or utility functions of others, as well as ethics rules and social norms when interacting with their environment to avoid severe conflicts of interests. As a sim- ple example, take two vehicles (A and B) that are about to enter a bottleneck. Assume they cannot enter the bottleneck at the same time. A and B can either wait or drive. Considering only its own utility function, A might determine that driving is the best action to execute, given that B will likely stop and wait to avoid a crash. However, A should ideally assess both its own and B's utility function and act accordingly. If B's 1 E.g., research provides evidence that contextual advertisement influences how users process online news [25]; social network applications have effectively been employed for political persuasion (see for an example: [4]. 2 T. Kampik et al. utility for driving is considered higher than A's, A can then come to the conclusion that waiting is the best action. As A does not only consider its own goals, but also the ones of B, one can regard A as empathic, following Coplan's definition of empathy, as "a process through which an observer simulates another's situated psychological states, while maintaining clear self -- other differentiation" [12]. While existing literature covers conflict resolution in multi-agent systems from a broad range of perspectives (see for a partial overview: [2]), devising a theoretical framework for autonomous agents that consider the utility functions (or preferences) of agents in their environment and use a combined utilitarian/rule-based approach to identify and resolve conflicts of interests can be considered a novel idea. However, existing multi-agent systems research can be leveraged to implement core components of such a framework, as is discussed later. In this chapter, we provide the following research contributions: 1. We create a theoretical framework for an empathic agent that uses a combination of utility-based and rule-based concepts to compromise with other agents in its environment when deciding upon how to act. 2. We provide a set of running examples that illustrate how the empathic agent works and show how the examples can be implemented in a general-purpose programing language. 3. We propose a reasoning-loop architecture for a generic empathic agent. The rest of this chapter is organized as follows: in Section 2, we present a theoreti- cal framework for the problem in focus. Then, we illustrate the concepts with the help of different running examples and describe the example implementation in a general- purpose programing language in Section 3. Next, we outline a basic reasoning-loop architecture for the empathic agent in Section 4. In Section 5, we analyze how the architecture aligns with the belief-desire-intention approach and propose an implemen- tation using the Jason multi-agent development framework. Finally, we discuss how our empathic agent concepts relate to existing work, propose potential use cases, highlight a set of limitations, and outline future work in Section 6, before we conclude the chapter in Section 7. 2 Empathic Agent Core Concepts In this section, we describe the core concepts of the empathic agent. To allow for a precise description, we assume the following scenario2: -- The scenario describes the interaction between a set of empathic agents {A0, ..., An}. -- Each interaction scenario takes place at one specific point in time, at which all agents execute their actions simultaneously. -- At this point in time, each agent Ai(0 ≤ i ≤ n) has a finite set of possible ac- tions Actsi := {Act0 i }, resulting in an overall set of action sets Acts := {Acts0, ..., Actsn}. Each agent can execute an action tuple that contains one or 2 As we will explain later, the scenario and the resulting specification can be gradually extended to allow for better real-world applicability. i , ..., Actm Empathic Autonomous Agents 3 multiple actions. In each interaction scenario, all agents execute their actions si- multaneously and receive their utility as a numeric reward based on the actions that have been executed. -- The utility of an agent Ai is determined by a function ui of the actions of all agents. The utility function returns a numerical value or null3: ui := Acts0 × ... × Actsn → {null,−∞, R,∞} The goal of the empathic agent is to maximize its own utility as long as no conflicts with other agents arise. We define a conflict of interests between several agents as any interaction scenario in which there is no tuple of possible actions that maximizes the 4. utility functions of all agents. I.e., we need to compare arg max uA0 , ..., arg max uAn Note that arg max uAi returns a set of tuples (that contains all action tuples that yield the maximal utility for agent Ai). For this, we create a boolean function c that the empathic agent uses to determine conflicts between itself and other agents, based on the utility functions of all agents: c(uA0, ..., uAn ) := arg max uA0 ∩ ... ∩ arg max uAn (cid:54)= {};  true, if : f alse, otherwise. Considering the incomparability property of the von Neumann-Morgenstern utility the- orem [24], such a conflict can be solved only if a system of values exists that is shared between the agents and used to determine comparable individual utility values. Hence, we introduce such a shared value system. To provide a possible structure for this system, we deconstruct the utility functions into two parts: -- An actions-to-consequences mapping (a function a2ci that takes the actions the agents potentially decide to execute and returns a set of consequences (proposi- tional atoms) Consqs := {Consq0 i , ..., Consqn i }): a2ci := Actsi × ... × Actsn → 2Consqs -- A consequences-to-utility mapping (utility quantification function uq). Note that the actions-to-consequences mapping is agent-specific, while the utility quantifica- tion function is generically provided by the shared value system5: uq := 2Consqs → {null,−∞, R,∞} 3 We allow for utility functions to return a null value for action tuples that are considered im- possible, e.g. in case some actions are mutually exclusive. While we concede that the elegance of this approach is up for debate, we opted for it because of its simplicity. 4 The arg max operator takes the function it precedes and returns all argument tuples that max- imize the function. 5 I.e., for the same actions, an agent should only receive a different utility outcome than another agent if the impact on the two is distinguishable in its consequences. We again allow for null values to be returned in case of impossible action tuples. 4 T. Kampik et al. Then, agents can agree on the utility value of a given tuple of actions, as long as the quality of the consequence is observable to all agents in the same way. In addition, the value system can introduce generally applicable rules, e.g. to hard-code a prioritization of individual freedom into an agent. With help of the value system, we create a prag- matic definition of a conflict of interests as any situation, in which there is no tuple of actions that is regarded as acceptable by all agents when considering the shared set of values, given each agent executes the actions that maximize their individual utility function. To support the notion of acceptability, we introduce a set of agent-specific acceptability functions accs := {accA0 , ..., accAn}. The acceptability functions are de- rived from the corresponding utility functions and the shared system of values and take a set of actions as their inputs. Acceptability functions are domain-specific and there is no generic logic to be described in this context: accAi := ActsA0 × ... × ActsAn → {null, true, f alse} The notion of acceptability rules adds a normative aspect to the otherwise consequen- tialist empathic agent framework. Without this notion, our definition of a conflict of interests would cover many scenarios that most human societies regard as not conflict- worthy, e.g. when one agent would need to accept large utility losses to optimize its own actions towards improving another agents' utility. Considering the acceptabil- ity functions, we can now determine whether a conflict of interests in terms of the pragmatic definition approach exists for an agent Ai by using the following func- tion cp that takes the utility function ui of agent Ai and the acceptability functions Accs := {accA0, ..., accAn} as input arguments: cp(ui, Accs) :=  true, if : (cid:64)acts ∈ arg max ui ∧ ∀acc∈Accs : acc(acts) = true f alse, otherwise. We define an empathic agent Ai as an agent that, when determining the actions it exe- cutes, considers the utility functions of the agents it could potentially affect and max- imizes its own utility only if doing so does not violate the acceptability function of any other agent; otherwise it acts to maximize the shared utility of all agents (while also considering the acceptability functions)6. Algorithm 1 specifies an initial, naive approach towards the empathic agent core algorithm. The empathic agent core algo- rithm of an agent Ai in its simplest form can be defined as a function that takes the utility functions {u0, ..., un} of the different agents, the set of all acceptability func- tions Accs := {acc0, ..., accl}, and all possible actions Actsi of agent Ai and returns the tuple of actions Ai should execute7. 6 As different aggregation approaches are possible (for example: sum, product) to deter- mine the maximal shared utility, we introduce the not further specified aggregation function aggregate(u0, ..., un). In our running examples (see Section 3), we use the product of the in- dividual utility function outcomes to introduce some notion of fairness; inequality should not be in the interest of the empathic agent. However, the design choice for this implementation detail can be discussed. 7 To facilitate readability, we switch to a pseudo-code notation for the following algorithms. Algorithm 1 Naive empathic agent algorithm: D A N (determine actions naive) 1: procedure D A Ni({u0, ..., un}, Accs, Actsi) (cid:46) Utility & acceptability functions of all Empathic Autonomous Agents 5 : ∀acc∈Accsacc(acts) = true if ∃acts ∈ arg max ui ∧ ∀acc∈Accs : acc(acts) = true then agents, actions of Ai(0 ≤ i ≤ n) best acceptable acts ← return Actsi ∩ f irst(actsk ∈ best acceptable acts) return Actsi ∩ f irst(arg max(aggregate(u(cid:48) 0, ..., u(cid:48) acts∈arg max ui (cid:83) else n)) 2: 3: 4: 5: 6: 7: 8: end procedure end if Note that in the context of the empathic agent algorithms, the function f irst(set) turns the provided set of tuples into a sequence of tuples by sorting the elements in decreasing alphanumerical order and then returns the first element of the sequence. This enables a deterministic action tuple selection. Moreover, we construct a set of new utility func- n} that assign all not acceptable action tuples a utility of null (Algo- tions {u(cid:48) rithm 2)8: 0, ..., u(cid:48) i(ui,{acts0, ..., actsn}, accs) is acceptable ← ∀ acc ∈ accs : acc(actsi) = true if is acceptable then Algorithm 2 Helper function: new utility function based on ui; all not acceptable action tuples yield utility of null. 1: procedure u(cid:48) 2: 3: 4: 5: 6: 7: 8: end procedure return ui(actsi, ..., actsn) return null end if else In Algorithm 1, we specify that the agent picks the first item in the sequence of determined action tuples if it finds multiple optimal tuples of actions. Alternatively, the agent could employ one of the following approaches to select between the optimal action tuples: -- Random. The agent picks a random action tuple from the list of the tuples it deter- mined as optimal. This would require empathic agents to use an additional protocol to agree on the action tuple that should be executed. -- Utilitarian. Among the action tuples that were determined as optimal, the agent picks the one that provides maximal combined utility for all agents and falls back to a random or first-in-sequence selection between action tuples if several of such tuples exist. 8 We already use null to denote impossible action tuples. This implies an acceptable action tuple should always exists. To achieve a distinction, a value of −∞ could be assigned. 6 T. Kampik et al. Still, the algorithm is somewhat naive, as agents that implement it will decide to execute suboptimal activities if the following conditions apply: -- Multiple agents find that the actions that optimize their individual utility are incon- sistent with the actions that are optimal for at least one of the other agents. -- Multiple agents find that executing these conflicting actions is considered accept- able. -- Executing these acceptable actions generates a lower utility for both agents than optimizing the shared utility would. Hence, we extend the algorithm so that the agent selects the tuple of actions that maxi- mizes its own utility, but falls back to maximize shared utility if the utility-maximizing action tuple is either not acceptable, or would lead to a lower utility outcome than maximizing the shared utility, considering the other agent follows the same approach (Algorithm 3): Algorithm 3 Lazy empathic agent algorithm: D A L (determine actions lazy) 1: procedure D A Li({u0, ..., un}, Accs) (cid:46) Utility & acceptability functions of all agents, actions of all agents {A0, ..., An} {acts max0, ..., acts maxn} ← DET ERM IN E ACT M AX(ui, Accs) {good acts max0, ..., good acts maxn} ← { DET ERM IN E GOOD ACT S M AX(u0, Accs, acts max0), ..., DET ERM IN E GOOD ACT S M AX(un, Accs, acts maxn), } if good acts max0 ∩ ... ∩ good acts maxn (cid:54)= {} then return Actsi ∩ f irst(good acts max) return Actsi ∩ f irst(arg max(aggregate(u(cid:48) 0, ..., u(cid:48) n))) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: end procedure end if else Algorithm 3 calls two helper functions. Algorithm 4 determines acceptable action tu- ples that maximize a provided utility function ui: Algorithm 4 Helper function: determine acceptable action tuples that maximize utility function ui 1: procedure DETERMINE ACT MAX(ui, Accs) 2: 3: end procedure : ∀acc∈Accsacc(acts) = true acts∈arg max ui return (cid:83) Algorithm 5 determines all action tuples that would maximize an agent's (Ai's) utility if this agent could dictate the actions of all other agents, given the action tuples provide Empathic Autonomous Agents 7 a better utility for this agent than the action tuples that maximize all agents' combined utility, given all agents execute an action tuple that maximizes their own utility if they could dictate the other agents' actions. Note that Algorithm 5 makes use of the previ- ously introduced algorithm (Algorithm 1): Algorithm 5 Helper function: determines all maximizing action tuples that would still yield a good utility result for agent Ai(0 ≤ i ≤ n), given all other agents also pick an action tuple that would maximize their own utility, if all other agents "played along". 1: procedure DETERMINE GOOD ACTS MAX(ui, Accs) 2: : ∀acc∈Accs : acc(acts) = true ∧ return (cid:83) acts∈arg max ui n(cid:83) ui( ≥ ui(acts max) k=0 D A Nk({u0, ..., un}, Accs, acts)) 3: 4: 5: end procedure However, this algorithm only considers two types of action tuples for execution: action tuples that provide the maximal individual utility for the agent and action tuples that provide the maximal combined utility for all agents. Action tuples that do not maximize the agent's individual utility, but are still preferable over the action tuples that maximize the combined utility, remain unconsidered. Consequently, we call an agent that imple- ments such an algorithm a lazy empathic agent. We extend the algorithm to also consider all action tuples that could possibly be relevant. I.e., if an action tuple is not considered acceptable, or if the tuple is considered acceptable but the agent chooses to not execute it, the agent falls back to the tuple of actions that provides the next best individual util- ity. We construct a function ne that returns the Nash equilibria based on the updated n}, considering we have a strategic game (cid:104)N, (Ai) (cid:37)i(cid:105), with utility functions {u(cid:48) N := {A0, ...An}, Ai := ActsAi, and acts (cid:37)i acts(cid:48) i(acts(cid:48))9. Then, we create the full empathic agent core algorithm D A Fi for an agent Ai that n} and all agents' possible actions as in- takes the updated utility functions {u(cid:48) puts {Acts0, ..., Actsn}. The algorithm determines the (first of) the Nash equilibria that provide the highest shared utility and, if no Nash equilibrium exists, chooses the first tuple of actions that maximizes shared utility: i(acts) ≥ u(cid:48) 0, ..., u(cid:48) 0, ..., u(cid:48) := u(cid:48) 9 See the Nash equilibrium definition provided by Osborne and Rubinstein [19, p. 11 et sqq.]. 8 T. Kampik et al. 0, ..., u(cid:48) 0, ..., u(cid:48) ∀acts ∈ equilibria : n},{Acts0, ..., Actsn}) n},{Acts0, ..., Actsn}) shared max equilibria ← acts∗ ∈ equilibria : Algorithm 6 Full empathic agent algorithm: D A F (determine actions full) 1: procedure D A Fi({u(cid:48) equilibria ← ne({u(cid:48) 2: if equilibria (cid:54)= {} then 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: end procedure return Actsi ∩ f irst(shared max equilibria) return Actsi ∩ f irst(arg max(aggregate(u0, ..., un)) end if (u(cid:48) 0(acts∗) × ... × u(cid:48) n(acts∗)) ≥ (u(cid:48) 0(acts) × ... × u(cid:48) n(acts)) else Going back to the selection between several action tuples that might be determined as optimal, it is now clear that a deterministic approach for selecting a final action tuple is preferable for both lazy and full empathic agents, as it avoids agents deciding upon executing action tuples that are not aligned with one another and lead to an unnecessary low utility outcome. Hence, we propose using a utilitarian approach with a first-in- sequence selection if the utilitarian approach is inconclusive10. The proposed agent can be considered a rational agent following the definition by Russel and Norvig in that it "acts so as to achieve the best outcome or, when there is uncertainty, the best expected outcome" [22, p. 4-5] and an artificially socially intelli- gent agent as defined by Dautenhahn as it instantiates "human-style social intelligence" in that it "manage[s] the individual's [its own] interests in relationship to the interests of the social system of the next higher level" [13]. 3 Running Examples In this section, we present two simple running examples of empathic agents and de- scribe the implementation of the examples in a general-purpose programming language (JavaScript). 3.1 Example 1: Vehicles We provide a running example for the "vehicle/bottleneck" scenario introduced above. Consequently, we have a two-agent scenario {A, B}. Each agent has a utility function uA,B := ActsA × ActsB → {−∞, R,∞}. ActsA and ActsB are the possible actions A and B, respectively, can execute. To fully specify the utility functions, we follow the approach outlined above and first construct the actions-to-consequences mappings a2cA and a2cB for both agents. The possible actions are ActsA = {driveA, waitA} and ActsB = {driveB, waitB}. I.e., Acts = {driveA, waitA, driveB, waitB}. To assess 10 As state above, we assume that the f irst function sorts the action tuples in a deterministic order before returning the first element. the consequences that include waiting, we assume B is twice as fast as A (without waiting, A needs 20 time units to pass the bottleneck while B needs 10)11: Empathic Autonomous Agents 9 We construct the following utility quantification functions and subtract an amount pro- portional to the waiting time from the utility value 1 of wait 0: a2cA(acts) := a2cB(acts) := crash, if : acts = (driveA, driveB); wait 0, if : acts = (driveA, waitB); wait ∞, if : acts = (waitA, waitB); wait 10, if : acts = (waitA, driveB); null, otherwise. crash, if : acts = (driveA, driveB); wait 20, if : acts = (driveA, waitB); wait ∞, if : acts = (waitA, waitB); wait 0, if : acts = (waitA, driveB); null, otherwise.   −∞, if : consqs = {crash}; if : consqs = {wait 20}; 0.9, if : consqs = {wait ∞}; 0 if : consqs = {wait 0}, 1, null, otherwise. −∞, if : consqs = {crash}; if : consqs = {wait 20}; 0.8, if : consqs = {wait ∞}; 0, if : consqs = {wait 0}; 1, null, otherwise. u2cA(consqs) := u2cB(consqs) :=     Actions-to-consequences mappings and utility quantification functions can then be com- bined to utility functions: uA(acts) = uB(acts) = 1, if : acts = (driveA, waitB); 0.9, if : acts = (waitA, driveB); 0, if : acts = (waitA, waitB); −∞, if : acts = (driveA, driveB); null, otherwise. if : acts = (driveA, waitB); 0.8, if : acts = (waitA, driveB); 1, if : acts = (waitA, waitB); 0, −∞, if : acts = (driveA, driveB); null, otherwise. 11 driveA ∧ waitA and driveB ∧ waitB, respectively, are mutually exclusive ({driveA ⊕ waitA, driveB ⊕ waitB}, with A ⊕ B := (A ∨ B) ∧ ¬(A ∧ B)). I.e., the functions re- turn null if driveA ∧ waitA ∨ driveB ∧ waitB. 10 T. Kampik et al. accA,B(acts) := We assume scenarios where both agents are driving or both agents are waiting are not acceptable by either agents and introduce the corresponding acceptability rules:  f alse, if : acts = (driveA, driveB) ∨ (waitA ∧ waitB); null, if : (driveA ∈ acts ∧ waitA ∈ acts) ∨ (driveB ∈ acts ∧ waitB ∈ acts); true, otherwise. Based on the utility functions (uA, uB), we create new utility functions (u(cid:48) consider the acceptability rules: A, u(cid:48) B) that 2 , 1 3 ,  1  1, 1 3 , u(cid:48) A(acts) := u(cid:48) B(acts) := if : acts = (driveA, waitB); if : acts = (waitA, driveB); null, otherwise. if : acts = (waitA, driveB); if : acts = (driveA, waitB); null, otherwise. Finally, we apply the empathic agent algorithms to our scenario. Using the naive al- gorithm, the agents apply the acceptability rules, but do not consider the other agent's strategy. Hence, both agents decide to drive, (and consequently crash). B,},{accA, accB}, ActsA) = driveA B,},{accA, accB}, ActsB) = driveB D A NA({u(cid:48) D A NB({u(cid:48) A, u(cid:48) A, u(cid:48) The resulting utility is −∞ for both agents. None of the two other algorithms (lazy, full) allows any agent to decide to execute an action tuple that does not optimize shared utility. I.e., both algorithms yield the same result: D A LA({u(cid:48) D A LB({u(cid:48) A, u(cid:48) A, u(cid:48) B,},{accA, accB}, ActsA) = waitA B,},{accA, accB}, ActsB) = driveB D A FA({u(cid:48) D A FB({u(cid:48) A, u(cid:48) A, u(cid:48) B,},{accA, accB}, ActsA) = waitA B,},{accA, accB}, ActsB) = driveB The resulting utility is 0.9 for agent A and 1 for agent B. As can be seen, the differ- ence between agent types is not always relevant. The following scenario will provide a distinctive outcome for all three agent variants. 3.2 Example 2: Concert As a second example, we introduce the following scenario12. Two empathic agents {A, B} plan to attend a concert of music by either Bach, Stravinsky, or Mozart (Acts := 12 The scenario is an adjusted and extended version of the "Bach or Stravinsky? (BoS)" example presented by Osborne and Rubinstein [19, p. 15 -- 16] Empathic Autonomous Agents 11 {BachA, StravinskyA, M ozartA, BachB, StravinskyB, M ozartB}). A considers the Bach and Mozart concerts of much greater pleasure when attended in company of B (utility of 6, respectively 3) and not alone (either concert: 1). In contrast, the Stravinsky concert yields good utility, even if A attends it alone (4). Attending it in company of B merely gives a utility bonus of 1 (total: 5). B prefers concerts in company of A as well (2 for Stravinsky and 4 for Mozart), but gains little additional utility from attending a Bach concert with A (1.1 with A versus 1 alone) because they dislike listening to A's Bach appraisals. Attending any concert alone yields a utility of 1 for B. As the utility is in this scenario largely derived from the subjective musical taste and social preferences of the agents and to keep the example concise, we skip the actions-to-consequences mapping and construct the utility functions right away13: null, 6, 5, 4, 3, 1, null, if : length(acts) (cid:54)= 2 ∨ length(set(BachA, StravinskyA, M ozartA) ∩ set(acts)) (cid:54)= 1∨ length(set(BachB, StravinskyB, M ozartB) ∩ set(acts)) (cid:54)= 1; else if : acts = (BachA, BachB); else if : acts = (StravinskyA, StravinskyB); else if : StravinskyA ∈ acts ∧ StravinskyB /∈ acts; else if : acts = (M ozartA, M ozartB); otherwise. if : length(acts) (cid:54)= 2 ∨ length(set(BachA, StravinskyA, M ozartA) ∩ set(acts)) (cid:54)= 1∨ length(set(BachB, StravinskyB, M ozartB) ∩ set(acts)) (cid:54)= 1; 1.1, else if : acts = (BachA, BachB); 2, 4, 1, else if : acts = (StravinskyA, StravinskyB); else if : acts = (M ozartA, M ozartB); otherwise.   uA(acts) = uB(acts) = We introduce the following acceptability function that applies to both agents (although it is of primary importance for agent A). As agent A is banned from the venue that hosts the Stravinsky concert, the action StravinskyA is not acceptable: accA,B(acts) := (cid:26) f alse, if : acts = StravinskyA ∈ acts; true, otherwise. 13 Note that the if-condition that triggers the return of a null value simply defines that BachA, StravinskyA, and M ozartA are mutually exclusive, as are BachB, StravinskyB, and M ozartB. 12 T. Kampik et al. Considering the acceptability function, we create the following updated utility func- tions: null, 6, 4, 3, 1, null,   u(cid:48) A(acts) = u(cid:48) B(acts) = if : length(acts) (cid:54)= 2 ∨ length(set(BachA, StravinskyA, M ozartA) ∩ set(acts)) (cid:54)= 1∨ length(set(BachB, StravinskyB, M ozartB) ∩ set(acts)) (cid:54)= 1∨ StravinskyB ∈ acts; else if : acts = (BachA, BachB); else if : StravinskyA ∈ acts; else if : acts = (M ozartA, M ozartB); otherwise. if : length(acts) (cid:54)= 2 ∨ length(set(BachA, StravinskyA, M ozartA) ∩ set(acts)) (cid:54)= 1∨ length(set(BachB, StravinskyB, M ozartB) ∩ set(acts)) (cid:54)= 1∨ StravinskyB ∈ acts; 1.1, else if : acts = (BachA, BachB); 4, 1, else if : acts = (M ozartA, M ozartB); otherwise. Now, we can run the empathic agent algorithms. The naive algorithm returns Bach for agent A and M ozart for agent B: B,},{accA, accB}, ActsA) = BachA A, u(cid:48) B,},{accA, accB}, ActsB) = M ozartB D A NA({u(cid:48) A, u(cid:48) D A NB({u(cid:48) The resulting utility is 1 for both agents. The lazy algorithm returns M ozart for both agents: D A LA({u(cid:48) D A LB({u(cid:48) A, u(cid:48) A, u(cid:48) B,},{accA, accB}, ActsA) = M ozartA B,},{accA, accB}, ActsB) = M ozartB The resulting utility is 3 for agent A and 4 for agent B. The full algorithm returns Bach for both agents: D A FA({u(cid:48) D A FB({u(cid:48) A, u(cid:48) A, u(cid:48) B,},{accA, accB}, ActsA) = BachA B,},{accA, accB}, ActsB) = BachB The resulting utility is 6 for agent A and 1.1 for agent B. JavaScript Implementation 3.3 We implemented the running examples in JavaScript14. As a basis for the implementa- tion, we created a simple framework that consists of the following components: -- Web socket server: environment and communications manager. The environ- ment and communications interface is implemented by a web socket server that consists of the following components: 14 The code, as well as documentation and tests, are available at http://s.cs.umu.se/qxgbfi. Empathic Autonomous Agents 13 • Environment and communications manager. The web server provides a generic environment and communications manager that relays messages between agents and provides the shared value system of acceptability rules. • Environment specification. The environment specification contains scenario- specific information and enables the server to determine and propagate the util- ity rewards to the agents. -- Web socket clients: empathic agents. The empathic agents are implemented as web socket clients that interact via the server described above. Each agent consists of the following two components: • Generic empathic agent library. The generic empathic agent library provides a function to create an empathic agent object with the properties ID, utilityMap- pings, acceptabilityRules, and type (naive, lazy, or full). The empathic agent object is then equipped with an action determination function that implements the empathic agent algorithm as described above. • Agent specifications. The agent specification consists of the scenario-specific information of all agents in the environment, as well as of the current agents' identifier and type (naive, lazy, or full) and is used to instantiate a specific em- pathic agent. Note that in the implementation, we construct the utility functions right away and do not use actions-to-consequences mappings. The implementation assumes that the specifications provided to both agents agents and to the server is consistent. Fig. 1 depicts the architecture of the empathic agent JavaScript implementation for the vehicle scenario. We chose JavaScript as the lan- Fig. 1: Empathic intelligent: architecture guage for implementing the scenario to show how to implement basic empathic agents using a popular general-purpose programing language, but concede that a more power- ful implementation in the context of MAS frameworks like Jason is of value. 4 Reasoning-loop Architecture We create a reasoning-loop architecture for the empathic agent and again assume a two- agent scenario to simplify the description. The architecture consists of the following components: 14 T. Kampik et al. -- Empathic agent (EA). The empathic agent is the system's top-level component. It has three generic components (observer, negotiator, and interactor) and five dy- namically generated functions/objects (utility function and acceptability function of both agents, as well as a formalized model of the shared system of values). -- Target agent (TA). In the simplest scenario, the empathic agent interacts with ex- actly one other agent (the target agent), which is modeled as a black box. Pre- existing knowledge about the target agent can be part of the models the empathic agent has of the target agent's utility and acceptability functions. -- Shared system of values. The shared system of values allows comparing the utility functions of the agents and creating their acceptability functions, as well as their actions-to-consequences mappings and utility quantification functions, from which the utility functions are derived. -- Utility function. Based on the actions-to-consequences mappings and utility quan- tification functions, each empathic agent maintains its own utility function, as well as models of the utility function of the agent it is interacting with. -- Acceptability function. Based on the shared system of values, the agent derives the acceptability functions (as described above) to then incorporate them into updated utility functions, which it feeds into the empathic agent algorithm to determine the best possible tuple of actions. -- Observer. The observer component scans the environment, registers other agents, receives their utility functions, and also keeps the agent's own functions updated. To construct and update the utility and acceptability functions without explicitly re- ceiving them, the observer could make use of inverse reinforcement learning meth- ods, as for example described by [10]. -- Negotiator. The negotiator identifies and resolves conflicts of interests using the ac- ceptability function models and instructs the interactor to engage with other agents if necessary, in particular, to propose a solution for a conflict of interest, or to re- solve the conflict immediately (depending on the level of confidence that the solu- tion is indeed acceptable). The negotiator could make use of argument-based nego- tiation (see e.g.: [3]). -- Interactor. The interactor component interacts with the agent's environment and in particular with the target agent to work towards the conflict resolution. The means of communication is domain-specific and not covered by the generic architecture. Fig. 2 presents a simple graphical model of the empathic agent's reasoning loop archi- tecture. 5 Alignment with BDI Architecture and Possible Implementation with Jason Our architecture reflects the common belief-desire-intention (BDI) model as based on [7] to some extent: -- If a priori available to both agents in the forms of rules or norms, beliefs, and belief sets are part of the shared value system. Otherwise, they qualify the agents' utility Empathic Autonomous Agents 15 Fig. 2: Empathic intelligent: architecture and acceptability functions directly. In contrast, desires define the objective(s) to- wards which an agent's utility function is optimized and are -- while depending on beliefs -- not directly mutable through persuasive argumentation between the agents. -- Intentions are the tuples of actions the agents choose to execute. -- As it strives for simplicity, our architecture does for now not distinguish between desires and goals, and intentions and plans, respectively. We expect to improve the alignment of our framework with the BDI architecture to facilitate the integration with existing BDI-based theories and implementation using BDI frameworks. The Jason platform for multi-agent system development [6] can serve as the basis for implementing the empathic agent. While simplified running examples of our architecture can be implemented with Jason, extending the platform to provide an empathic agent-specific abstraction layer would better support complex scenarios. 6 Discussion In this section, we place our empathic agent concepts into the context of existing work, highlight potential applications, analyze limitations, and outline future work. 6.1 Similar Conflict Resolution Approaches Our empathic agent can be considered a generic and basic agent model that can draw upon a large body of existing research on multi-agent learning and negotiation tech- niques for possible extensions. A survey of research on agents that model other agents 16 T. Kampik et al. is provided by Albrecht and Stone [1]. The idea of combining a utility-based approach with acceptability rules to emulate empathic behavior is to our knowledge novel. How- ever, a somewhat similar concept is presented by Black and Atkinson, who propose an argumentation-based approach for an agent that can find agreement with one other agent on acceptable actions and can develop a model of the other agent's preferences over time [5]. While Black's and Atkinson's approach is similar in that it reflects Coplan's definition of empathy (it maintains "a process through which [it] simulates another's situated psychological states, while maintaining clear self -- other differentiation" [12]) to some extent we identify the following key differences: -- The approach is limited to a two-agent scenario. -- The agent model is preference-based and not utility-based. While this has the ad- vantage that it does not require reducing complex preferences to a simple numeric value, it makes it harder to combine with existing learning concepts (see below). -- The agent has the ability to learn another agent's preferences over time. However, the learning concept is -- according to Black and Atkinson -- "not intended to be com- plete" [5]. We suggest that while our empathic agent does not provide learning capabilities by default, it has the advantage that its utility-based concept allows for integration with established inverse reinforcement learning algorithms (see: Sub- section 6.4). -- The agent Black and Atkinson introduce is not empathic in that it tries to compro- mise with the other agent, but rather uses its ability to model the agent's preferences to improve its persuasive capabilities by tailoring the arguments it provides to this agent. 6.2 Potential Real-World Use Cases In this chapter, we exemplified the empathic agent with two simple scenarios, with the primary purpose of better explaining our agent's core concepts. These scenarios do not fully reflect real-world use cases. However, the core concepts of the agent can form the basis of solutions for real-world applications. Below, we provide a non-exhaustive list of use case types empathic agents could potentially address: -- Handling aspects of traffic navigation scenarios that cannot be covered by static rules. Besides adjusting the assertiveness levels to the preferences of their drivers, as suggested by Sikkenk and Terken [23], and Yusof et al. [26], autonomous vehicles could consider the driving style of other human- or agent-controlled ve- hicles to improve traffic flow, for example by adjusting speed or lane-changing behavior according to the (perceived) utility functions of all traffic participants or to resolve unexpected incidents (in particular emergencies). -- Mitigating negative effects of large-scale web applications on their users. Ev- idence exists that suggests the well-being of passive (mainly content-consuming) users of social media is frequently negatively impacted by technology, while the well-being of at least some users, who actively engage with others through the tech- nology, improves [20]. To facilitate social media use that is positive for the users' well-being, an empathic agent could serve as a mediator between user needs (social Empathic Autonomous Agents 17 inclusion) and the business goals of the technology provider (often: maximization of advertisement revenue). -- Decreasing the negotiation overhead for agent-based manufacturing systems. Autonomous agent-based manufacturing systems are an emerging alternative to traditional, hierarchically managed control architectures [16]. While agent-based systems are considered to increase the agility of manufacturing processes, one dis- advantage of agent-based manufacturing systems is the need for negotiation be- tween agents and the resulting overhead (see for example: Bruccoleri et al. [8]). Employing empathic agents in agent-based manufacturing scenarios can possibly help solve conflicts of interests efficiently. -- Improving persuasive healthcare technology. Persuasive technology -- "comput- erized software or information system designed to reinforce, change or shape atti- tudes or behaviours or both without using coercion or deception" [18] -- is frequently applied in healthcare scenarios [11], in particular, to facilitate behavior change. Per- suasive functionality is typically implemented using recommender systems [14], which in general struggle to compromise between system provider and end-user needs [21]. This can be considered as a severe limitation in healthcare scenarios, where trade-offs between serving public health needs (optimizing for a low burden on the healthcare system) and empowering patients (allowing for a subjective as- sessment of health impact, as well as for unhealthy choices to support individual freedom) need to be made. Hence, employing the empathic agent concepts in this context can be considered a promising endeavor. 6.3 Limitations The purpose of this chapter is to introduce empathic agents as a general concept. When working towards a practically applicable empathic agent, the following limitations of our work need to be taken into account: -- The agent is designed to act in a fully observable world, which is an unrealistic assumption for real-world use cases. For better applicability, the agent needs to support probabilistic models of the environment, the other agents, and the shared value system. -- Our formal empathic agent description is logic-based. Integrating it with Markov decision process-based inverse reinforcement learning approaches is a non-trivial endeavor, although certainly possible. -- In the example scenarios we provided, all agents are identically implemented em- pathic agents. An empathic agent that interacts with non-empathic agents will need to take into account further game-theoretic considerations and to have negotiation capabilities. -- The presented empathic agent concepts use a simple numeric value to represent the utility an agent receives as a consequence of the execution of an action tuple. While this approach is commonly employed when designing utility-based autonomous agents, it is an oversimplification that can potentially limit the applicability of the agent. 18 T. Kampik et al. -- Software engineering and technological aspects of empathic agents need to be fur- ther investigated. In particular, the implementation of an empathic agent library using a higher-level framework for multi-agent system development, as we discuss in Section 5 could provide a more powerful engineering framework for empathic agents. 6.4 Future Work We suggest the following research to address the limitations presented in Subsection 6.3: -- So far, we have chosen a logic-based approach to the problem in focus to allow for a minimalistic problem description with low complexity. Alternatively, the prob- lem could be approached from a reinforcement learning perspective (see for an overview of multi-agent reinforcement learning: [9]). Using (partially observable) Markov decision processes, one can introduce a well-established temporal and probabilistic perspective15. A key capability our empathic agent needs to have is the ability to learn the utility function of other agents. A comprehensive body of research on enabling this ability by applying inverse reinforcement learning exists (for example: [10] and [17]). Hence, creating a Markovian perspective on the em- pathic agent to enable the application of reinforcement learning methods for the observational learning of the utility functions of other agents can be considered relevant future work. -- To better assess the applicability of the empathic agent algorithms, it is important to analyze its computational complexity in general, as well as to evaluate it in the context of specific use cases that might allow for performance-improving adjust- ments. -- To enable empathic agents to reach consensus in case of inconsistent beliefs argumentation-based negotiation approaches can be applied that consider uncer- tainty and subjectivity (e.g. [15]) for creating solvers for finding compromises be- tween utility/acceptability functions. Similar approaches can be used to enhance utility quantification capabilities by considering preferences and probabilistic be- liefs. -- The design intention of the architectural framework we present in Section 4 is to form a high-level abstraction of an empathic agent that is to some extent agnos- tic of the concepts the different components implement. We are confident that the framework can be applied in combination with existing technologies to create a real-world applicable empathic agent framework, at least for use cases that allow making some assumptions regarding the interaction context and protocol. -- The ultimate goal of this research is to apply the concept in a real-world scenario and evaluate to what extent the application of empathic agents provides practically relevant benefits. 15 However, the same can be achieved with temporal and probabilistic logic. Empathic Autonomous Agents 19 7 Conclusion In this chapter, we introduced the concept of an empathic agent that proactively iden- tifies potential conflicts of interests in interactions with other agents and uses a mixed utility-based/rule-based approach to find a mutually acceptable solution. The theoretical framework can serve as a general purpose model, from which advanced implementa- tions can be derived to develop socially intelligent systems that consider other agents' (and ultimately humans') welfare when interacting with their environment. The exam- ple implementation, the reasoning-loop architecture we introduced for our empathic agent, and the discussion of how the agent can be implemented with a belief-desire- intention approach provide first insights into how a more generally capable empathic agent can be constructed. As the most important future research steps to advance the empathic agent, we regard the conceptualization and implementation of an empathic agent with learning capabilities, as well as the development of a first simple empathic agent that solves a particular real-world problem. Acknowledgements We thank the anonymous reviewers for their constructive criti- cal feedback. This work was partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation. References 1. Albrecht, S.V., Stone, P.: Autonomous agents modelling other agents: A comprehensive sur- vey and open problems. Artificial Intelligence 258, 66 -- 95 (May 2018) 2. Alshabi, W., Ramaswamy, S., Itmi, M., Abdulrab, H.: Coordination, cooperation and conflict resolution in multi-agent systems. In: Sobh, T. (ed.) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. pp. 495 -- 500. Springer Netherlands, Dordrecht (2007) 3. Amgoud, L., Dimopoulos, Y., Moraitis, P.: A unified and general framework for argumentation-based negotiation. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. pp. 158:1 -- 158:8. AAMAS '07, ACM, New York, NY, USA (2007) 4. Berinsky, A.J.: Rumors and health care reform: experiments in political misinformation. British Journal of Political Science 47(2), 241 -- 262 (2017) 5. Black, E., Atkinson, K.: Choosing persuasive arguments for action. In: The 10th Interna- tional Conference on Autonomous Agents and Multiagent Systems-Volume 3. pp. 905 -- 912. International Foundation for Autonomous Agents and Multiagent Systems (2011) 6. Bordini, R.H., Hubner, J.F.: BDI agent programming in AgentSpeak using Jason. In: Inter- national Workshop on Computational Logic in Multi-Agent Systems. pp. 143 -- 164. Springer (2005) 7. Bratman, M.: Intention, Plans, and Practical Reason. Center for the Study of Language and Information (1987) 8. Bruccoleri, M., Nigro, G.L., Perrone, G., Renna, P., Diega, S.N.L.: Production planning in reconfigurable enterprises and reconfigurable production systems. CIRP Annals 54(1), 433 -- 436 (2005) 20 T. Kampik et al. 9. Busoniu, L., Babuska, R., De Schutter, B.: A comprehensive survey of multiagent reinforce- ment learning. IEEE Trans. Systems, Man, and Cybernetics, Part C 38(2), 156 -- 172 (2008) 10. Chajewska, U., Koller, D., Ormoneit, D.: Learning an agent's utility function by observing behavior. In: ICML. pp. 35 -- 42 (2001) 11. Conroy, D.E., Yang, C.H., Maher, J.P.: Behavior change techniques in top-ranked mobile apps for physical activity. American journal of preventive medicine 46(6), 649 -- 652 (2014) 12. Coplan, A.: Will the real empathy please stand up? a case for a narrow conceptualization. The Southern Journal of Philosophy 49(s1), 40 -- 65 (2011) 13. Dautenhahn, K.: The art of designing socially intelligent agents: Science, fiction, and the human in the loop. Applied artificial intelligence 12(7-8), 573 -- 617 (1998) 14. Hors-Fraile, S., Rivera-Romero, O., Schneider, F., Fernandez-Luque, L., Luna-Perejon, F., Civit-Balcells, A., de Vries, H.: Analyzing recommender systems for health promotion using a multidisciplinary taxonomy: A scoping review. International journal of medical informatics 114, 143 -- 155 (2018) 15. Marey, O., Bentahar, J., Khosrowshahi-Asl, E., Sultan, K., Dssouli, R.: Decision making under subjective uncertainty in argumentation-based agent negotiation. Journal of Ambient Intelligence and Humanized Computing 6(3), 307 -- 323 (Jun 2015) 16. Monostori, L., V´ancza, J., Kumara, S.: Agent-based systems for manufacturing. CIRP An- nals 55(2), 697 -- 720 (2006) 17. Ng, A.Y., Russell, S.J., et al.: Algorithms for inverse reinforcement learning. In: Icml. pp. 663 -- 670 (2000) 18. Oinas-Kukkonen, H., Harjumaa, M.: Towards deeper understanding of persuasion in soft- ware and information systems. In: Advances in computer-human interaction, 2008 first in- ternational conference on. pp. 200 -- 205. Ieee (2008) 19. Osborne, M.J., Rubinstein, A.: A course in game theory. MIT press (1994) 20. Philippe, V., Oscar, Y., Maxime, R., John, J., Ethan, K.: Do social network sites enhance or undermine subjective well-being? a critical review. Social Issues and Policy Review 11(1), 274 -- 302 21. Ricci, F., Rokach, L., Shapira, B.: Recommender systems: introduction and challenges. In: Recommender systems handbook, pp. 1 -- 34. Springer (2015) 22. Russell, S.J., Norvig, P.: Artificial intelligence: a modern approach. Malaysia; Pearson Edu- cation Limited, (2016) 23. Sikkenk, M., Terken, J.: Rules of conduct for autonomous vehicles. In: Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Ap- plications. pp. 19 -- 22. AutomotiveUI '15, ACM, New York, NY, USA (2015) 24. Von Neumann, J., Morgenstern, O.: Theory of games and economic behavior. Bull. Amer. Math. Soc 51(7), 498 -- 504 (1945) 25. Wojdynski, B.W., Bang, H.: Distraction effects of contextual advertising on online news pro- cessing: an eye-tracking study. Behaviour & Information Technology 35(8), 654 -- 664 (2016) 26. Yusof, N.M., Karjanto, J., Terken, J., Delbressine, F., Hassan, M.Z., Rauterberg, M.: The exploration of autonomous vehicle driving styles: Preferred longitudinal, lateral, and vertical accelerations. In: Proceedings of the 8th International Conference on Automotive User Inter- faces and Interactive Vehicular Applications. pp. 245 -- 252. Automotive'UI 16, ACM, New York, NY, USA (2016)
1904.02895
1
1904
2019-04-05T06:59:52
Sensory Regimes of Effective Distributed Searching without Leaders
[ "cs.MA" ]
Collective animal movement fascinates children and scientists alike. One of the most commonly given explanations for collective animal movement is improved foraging. Animals are hypothesized to gain from searching for food in groups. Here, we use a computer simulation to analyze how moving in a group assists searching for food. We use a well-established collective movement model that only assumes local interactions between individuals without any leadership, in order to examine the benefits of group searching. We focus on how the sensory abilities of the simulated individuals, and specifically their ability to detect food and to follow neighbours, influence searching dynamics and searching performance. We show that local interactions between neighbors are sufficient for the formation of groups, which search more efficiently than independently moving individuals. Once a member of a group finds food, this information diffuses through the group and results in a convergence of up to 85\% of group members on the food. Interestingly, this convergence behavior can emerge from the local interactions between group members without a need to explicitly define it. In order to understand the principles underlying the group's performance, we perturb many of the model's basic parameters, including its social, environmental and sensory parameters. We test a wide range of biological-plausible sensory regimes, relevant to different species and different sensory modalities and examine how they effect group-foraging performance. This thorough analysis of model parameters allows for the generalization of our results to a wide range of organisms, which rely on different sensory modalities, explaining why they move and forage in groups.
cs.MA
cs
SENSORY REGIMES OF EFFECTIVE DISTRIBUTED SEARCHING WITHOUT LEADERS A PREPRINT Ravid Cohen School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel Yossi Yovel Sagol School of Neuroscience, Tel Aviv University, Tel Aviv 39040, Israel Dan Halperin School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel April 8, 2019 ABSTRACT Collective animal movement fascinates children and scientists alike. One of the most commonly given explanations for collective animal movement is improved foraging. Animals are hypothesized to gain from searching for food in groups. Here, we use a computer simulation to analyze how moving in a group assists searching for food. We use a well-established collective movement model that only assumes local interactions between individuals without any leadership, in order to examine the benefits of group searching. We focus on how the sensory abilities of the simulated individuals, and specifically their ability to detect food and to follow neighbours, influence searching dynamics and searching performance. We show that local interactions between neighbors are sufficient for the formation of groups, which search more efficiently than independently moving individuals. Once a member of a group finds food, this information diffuses through the group and results in a convergence of up to 85% of group members on the food. Interestingly, this convergence behavior can emerge from the local interactions between group members without a need to explicitly define it. In order to understand the principles underlying the group's performance, we perturb many of the model's basic parameters, including its social, environmental and sensory parameters. We test a wide range of biological-plausible sensory regimes, relevant to different species and different sensory modalities and examine how they effect group-foraging performance. This thorough analysis of model parameters allows for the generalization of our results to a wide range of organisms, which rely on different sensory modalities, explaining why they move and forage in groups. Introduction Why do so many animals move in groups? One of the most accepted benefits of moving in a group is hypothesized to be improved foraging, which is achieved via enhanced sensing. Specifically, searching for food in a group, has been hypothesized to improve searching by allowing individuals to glean information from conspecifics [1, 2, 3, 4, 5]. Group foraging has been suggested to be especially important when searching for an ephemeral resource. This has also been backed by several mathematical frameworks [6, 7, 8]. In parallel to these analytic models of group foraging, many models, mostly numeric (but not exclusively), try to explain how animals maintain a group while moving [9, 10, 11, 12, 13, 14, 15, 16]. Most of these models assume that collective movement emerges from the behavior of individuals and their local interactions with neighbors (sometimes including distant neighbors). The group does not need leaders, and there is no necessity for individual recognition, or signaling to achieve such coordinated behavior. However, only a few attempts have been made to use such collective movement simulations to test the improved searching hypothesis, that is to use a movement model to simulate collective movement and to examine if and how the groups that are formed by this model benefit from enhanced sensing while searching for food. Two examples include A PREPRINT - APRIL 8, 2019 [17, 18]) but they mostly focus on how group foraging improves tracking of the food landscape. Several other models that suggest how group searching may assist sensing (e.g [1, 19]) focus on the situation where the target generates a (noisy) gradient that can be sensed and utilized from a distance. This scenario is relevant for olfactory based searching or for light and shade patterns, but with most sensory modalities (e.g., vision, echolocation, tactile sensing) searching is a binary problem with food being either detectable or not. Some additional attempts to model collective searching have been made in collective robotics (e.g., [19, 20, 21, 22]) but these models often rely on non-biological assumptions, such as active transmission of location-information between individuals (agents) or division of labor (but see [23] for a biological approach). In this work, we use a simple well-studied movement model [24] to examine how moving in a group improves searching. We focus on the sensory aspects of a commonly used agent-based movement model. We test a wide range of biological-plausible sensing regimes, relevant to different species relying on different sensory modalities and we examine how they effect group-foraging performance. We consider a scenario of n agents moving in a two-dimensional region while searching for a sparse resource. To simplify the problem, we simulated a single target (representing food) with an unknown location at each simulation. In the simulations, all agents start moving from the center of the region, each in a random direction. At every time step, each agent adjusts its movement according to its current direction and according to the agents around it (see below). The agents' steps are thus characterized by a constant step-length (i.e., speed is constant) and a continuously changing direction. To simplify the sensory model, we assumed that the agents sense equally in all directions, and can be sensed from all directions. We define two sensing radii: rt is the detection radius of the target, and rs is the detection radius of neighboring individuals. In the case of visual animals, these radii represent the visual range for detecting food and a conspecific respectively, and in the case of echolocating bats or dolphins, where sensing is based on sound, they would represent the echo detection range of a food item, and the eavesdropping range on conspecifics respectively. In reality, the values of these two radii will depend on the sensory modality and the characteristics of the system (e.g., the size of the food and the behavior of the conspecific). We tested several combinations of biologically-reasonable radii and analyzed how they influence group foraging. At each time step an agent advances according to its velocity and direction, where pt agent i at time t. The agent's step magnitude is defined by, i is the location of agent i at time t, x is the agent's step magnitude, and dt pt+1 i = pt i + xdt i, (1) i is the unit direction vector of an x = v cf , (2) where v is the agent's velocity and cf is the sensory direction update rate, i.e., how often is sensory information collected and the movement updated accordingly. This parameter represents an actual biological feature that might be adapted through evolution and we therefore examined how it influences group foraging performance. While searching, the agent's movement direction is determined based on its previous direction and on the location and movement direction of its neighbors. When moving socially, the agent is influenced by neighboring agents as follows: , (3) −→ di , as already mentioned, is the direction of an agent i, −−−→ where social are the individual and social effects on di agent i respectively. The parameter ρ determines the relative weight of the self and the social effects. Note that when ρ is set to zero, the agents are not affected by their neighbors and move independently. When moving as independent individuals, each of our agents applied a correlated walk with Gaussian noise represented −−→ by a distribution of turning angles whose width (σ) we manipulated. The individual movement direction, self, can be di described as follow, −→ di = (cid:13)(cid:13)(cid:13)(1 − ρ) −−−→ −−→ (1 − ρ) di di self + ρ −−−→ −−→ social di di self + ρ social −−→ self and di (cid:13)(cid:13)(cid:13)2 (cid:26)α, di(t) self = t = 0 di(t−1) + β t > 0, α ∼ U[0, 360), β ∼ N (0, σ). −−→ self and di 2 where di and σ represents the width of the distribution of turning angles. At the first step, di self and di are the angles (in degrees) that the vector −→ di form with the positive x-axis respectively, self is drawn from a uniform angle (4) (5) (6) A PREPRINT - APRIL 8, 2019 distribution and afterwards it is determined according to the direction of the agent in the previous step with the addition of Gaussian noise. −−−−→ social, is equal and does not depend on its distance. di −−−→ The social direction of agent i, social, is calculated according to the direction and location of its neighbors. We adopt the di commonly used 3-radii model [24] to govern the interactions between agents. In brief, each agent has three concentric zones in which: repulsion, alignment and attraction govern the interactions respectively (Fig. 1b). The agent will try to avoid collision with neighbors that are located in the repulsion zone by moving away from them. If there are no neighbors in the repulsion zone, the agent will align with neighbors that are located in the alignment zone and it will be attracted to neighbors that are located in the attraction zone. Note that the three interaction zones are limited by the social detection radius rs. That is, only neighbors within a distance rs from the agent are sensed and interacted with. Essentially, the attraction zone was defined by rs while the two internal zones (repulsion and alignment) were smaller than rs and were determined experimentally (Methods). To simplify the model, we assumed that the weight of the contribution of each neighbor to The agents could be in one of three behavioral states: Search, Lock and Find (Fig. 1a). Initially, all the agents start at the Search state. An agent that arrives within the sensing range of the target switches to the Find state and moves directly to the target, while an agent that detects another agent in the Find state switches to the Lock state (we assume that individuals can sense when another individual within rs is feeding). An agent in the Lock state homes in on the location of the agent that found the target. Importantly, agents in the search mode do not lock on agents in the lock mode. In other words, an agent only knows when another agent is feeding but not when another agent detected a feeding agent. All agents that arrive at the target remain there until the end of the simulation (we assume that food patches are very sparse but that they contain plenty of food so that there is no competition).Importantly, we also test the special condition where rs=rt. In this condition, agents can only be in the Search or Find states (but never in the Lock state) and thus, agents only know the positions of their conspecifics, but not their state. This is because an agent will always find the food at the same instance as it finds an individual that found the food. This is a very important condition, because if group foraging is beneficial under this condition, this implies that animals only need to know the positions of their neighbors and not their state in order to gain from group foraging, making it easier to evolve. Figure 1c and 1d and movies S1-2 demonstrate our model's behavior for ρ = 0 and ρ = 0.6 respectively, we highly recommend viewing the movies. Because in nature mostly rt < rs, finding the target by the first agent results in an effective increase of the target- detection radius from rt to rs, as from this point onward, the agents can detect the feeding individuals instead of the food itself (except for the special case described above where rt = rs). Such an increase occurs in nature, for example, when a bird of prey finds a carcass and circles it in the air or when a marine bird detects a school of fish and dives towards it repeatedly. Other birds can now home in on the carcass or the school from much larger distances by detecting the circling or the diving bird [25, 26]. Similarly, when a bat finds a patch of insects, other bats can home in on this patch from larger distances by eavesdropping on the echolocation attack signals emitted by the first bat rather than by finding the insect patch [3]. Interestingly, our model generated a convergence effect on-to the food patch even though we did not explicitly define it. When one individual found the food and was moving towards it, other individuals followed this individuals attracting farther individuals long before they could directly sense the food or the finding individual. Therefore, the information about the location of food diffuses through the group attracting more and more individuals (from farther circles) long before they can sense the food itself or any of the individuals that already found it (Fig. 1e and movie S1). This convergence occurred even in the special case where rt = rs in which individuals never sense that others have found food (they only sense the food directly) proving that it is an emergent property of the movement. We next discuss the effect of different sensory and social model parameters on group searching performance. Importantly, we measured performance from an individual's point of view as the average time to finding food. Results To delineate the sensory regimes where grouping improves searching, we first set out to find the best non-social foraging model, that is, the model that minimizes the time for finding food when the individuals move without interacting. To this end, we set ρ to 0 and we varied σ (the width of turning angle distribution) until we found the value that optimizes searching as individuals (minimized the mean searching time). The best σ was small (in the range 0 < σ ≤ 3 degrees, Fig. S1) meaning that the agents moved almost in straight lines (we only allowed Gaussian noise in the turning angle distribution, so other movement distribution, such as Levy walks were not possible). Note that we only varied σ because in the non-social model, σ is the only meaningful parameter while all other parameters are either irrelevant (because they describe interactions) or were set to be fixed in both the social and the non-social models (see Methods). In the process of finding the best non-social model (and everywhere else, unless stated otherwise), we simulated 50 agents searching 3 A PREPRINT - APRIL 8, 2019 (a) Behavioral state diagram. The distance to the target is less than rt Search Lock F ind The distance to an agent that found the target is less than rs The distance to the target is less than rt (b) (c) (e) (d) Figure 1: The principles of the system. (a) The behavioral state diagram. rt is the target detection radius and rs is the social detection radius. When rs > rt only the first agent will advance from the Search state straight to the Find state while the following agents will detect the first one and thus switch to the Lock state. (b) The social interaction model includes three concentric zones: Attraction, Alignment and Repulsion. The dashed arrows represent the effect of each agent on the social direction of agent i. The black solid arrow is the average direction of arrows 2 and 3. di social is equal to arrow 1 if the repulsion zone is non-empty (i.e. if agent 1 exists) and equal to arrow 4 otherwise. Note that the attraction range is defined by rs. Agents whose distance is larger than rs have no effect on di social (such as agent 4). (c) A snapshot of the simulation where ρ = 0. When ρ was set to 0, and hence individuals were moving independently, the only social interactions occurred when an agent homed in on a neighbor that already found the target (only when rs > rt). The gray lines represent the agents' paths after ∼ 400 steps, the black circles represent the social detection region in which conspecifics can be sensed, the black lines (inside the circles) depict the heading of the agents and the dark-gray disc represents the food detection region. In panels c-e we simulated n = 50 agents. In both (c) and (d) an agent has already detected the food and this is why the target's disc (dark gray) is defined by rs. Note that the agents' circles have a radius of rs 2 (and not rs) because two agents must be at most rs apart in order to sense each other. In these simulations, the size of the search area was set to 4km2 instead of 400km2 for better visualization.(d) A snapshot of the simulation for the case where ρ = 0.25. All symbols are the same as in c. Notice how groups are now formed. (e) A zoom-in on the target's area demonstrates the convergence of the group on-to the target after one of the agents found it, for ρ = 0.6. The white circle in the center depicts the detection range of the food with several individuals who found it. Individuals in the dark grey circle are locked on the individuals that have already found the food. All other individuals (the great majority) are moving in the direction of the food even though they have not detected it and even though they have not detected individual that already found food. 4 A PREPRINT - APRIL 8, 2019 rt = 150m for a single target (food patch) in a 20km · 20km two-dimensional area with a detection ratio of 15 (specifically, we mostly used rs 10m ). This ratio represents a common situation in which an animal can detect its prey from a shorter distance than it can detect its peers. This is, for example, the case for grazing sheep [27] and for scavenging birds of prey [25, 26], and it is also the case for small birds that are searching for seeds on the ground and can see that another bird is pecking from much longer distances than they can detect the seeds themselves. The exact radius values that we started off with (i.e., rt = 10m and rs = 150m) are typical for echolocating bats, which can detect prey from much shorter distance (∼ 10m) than they can detect a neighbor (∼ 150m). Bats can realize when a neighbor found prey based on its echolocation attack signals [3]. Below, we discuss the effect of varying this ratio and varying the specific radii. Note that even in the non-social model, individuals could recognize when an agent within rs from them has found the target and they moved towards it. (a) (b) (c) Figure 2: Social searching improves individual gain. The searching time in all panels was normalized by dividing the results by the searching time of the model where ρ = 0 (each line in the graph was normalized separately) and the results are shown as an average over 1,000 simulations. The searching time was defined as the average time it took an agent to reach the target. In all panels, unless stated otherwise, the number of agents was 50, the target detection radius was set to 10m and the social detection radius to 150m. In all panels, for each ρ we plot the best result depending on σ (deviation in the Gaussian noise of the individual direction). The black line is the same in all panels allowing comparison. (a) The mean searching time as a function of ρ for different numbers of searching agents. The insert shows the results for ρ = 0.6 without normalization. Note the reduction in both the mean searching time and the standard deviation. (b) The mean searching time depending on ρ for different ratio between the social radius and the food detection radius. (c) The mean searching time as a function of ρ for different values of cf (the movement direction update rate). (d) The mean searching time as a function of ρ for different numbers of targets. Insert shows the results for ρ = 0.6 without normalization to allow comparing the actual time to finding a target. (d) After finding the best non-social model, we used the same setup (e.g., same: area, number of agents and sensing radii), while varying the social weight ρ, simulating different degrees of social foraging (we tested the range: 0 ≤ ρ ≤ 0.9). We assumed that finding a social model in which individuals perform better than in the best non-social model would demonstrate that social foraging is beneficial for searching. Indeed, increasing the social weight (ρ), improved searching by a factor of 1.6 in comparison to the best non-social model - the average time to find the food was 1.6 times faster (Fig. 2a-2d, there was a significant Pearson negative correlation between ρ and the mean searching time, P = 0.005. The difference between searching times at ρ = 0.6 and ρ = 0 was significant, P < 10−5, two-sample t-test). The best searching performance was observed when ρ was between 0.6 and 0.9 (the exact value depended on the setup, see below). Social foraging improved searching in all group-sizes we examined (from 10 to 500 individuals), but it improved more in larger groups, reaching an improvement factor of 1.9 in a group of 500 agents (Fig. 2a). Another advantage of searching in a larger group was a reduction in the searching time variability in accordance with the predictions of analytic models [6, 7]. The variance was estimated over multiple simulations and could be thought of as 5 A PREPRINT - APRIL 8, 2019 the variability in searching time over multiple days or nights of foraging. We took the overall variance of all individuals in all simulations with specific parameters (e.g. 50,000 individuals for n = 50 individuals per simulation and 1, 000 simulations). The variability was smaller in larger groups (see insert in Fig. 2a and Fig. S2). Note that the agents did not necessarily form one large searching group that included all individuals, but that they typically split into multiple groups, which were disconnected from each other. In this analysis of group size, and in all further analyses, we always compared our social model to the best non-social model that had the same parameters. For example, if we changed the number of agents in the simulation; we also searched for the σ that optimized the non-social model (ρ = 0) with this new number of agents. To further generalize our findings, we tested the effect of the sensing ratio (rs/rt) on searching in a group. Social searching was always better than the best non-social model, but the best social model (i.e., the best ρ) differed depending on this ratio (best ρ was always between 0.5-0.9 Fig. 2b). The advantage of social foraging decreased as the detection ratio increased, i.e., as the social detection range (of other individuals) increased relative to the target detection range (rs >> rt). The reason for this is that when individuals can detect other individuals from very large distances, they can home in on the food from very large distances once it is found by the first individual, so there is less need for searching in a group. Moreover, when (rs >> rt), moving independently actually has an advantage because the target is usually found faster by the first agent. This is why when the social detection range is very large (e.g., rs = 500m, grey line in Fig. 2b), highly social models (large ρ values) are detrimental; because large groups are formed and the target is found for the first time rather late. Notably, social searching was better than searching independently even in the special case in which the ratio was 1 (rs = rt), when agents never know when a neighbor finds food (because they arrive at the food and at the feeding individuals at the same time). Next, we tested how the optimal social model is influenced by another sensory parameter -- the sensory update rate -- the rate of updating the movement direction based on the positions of the neighbors (cf , see Equation 5). So far, we assumed that agents update their movement direction once a second. Increasing this rate to 10Hz shifted the best ρ from above 0.6 to around 0.3 (Fig. 2c), and improved the performance of social foraging even further in comparison with the non-social model up to factor of 1.9 (so far, the best 50-agent system achieved an improvement of 1.6-fold). The reason for this improvement was that larger and more spread-out groups were formed when a higher update rate was used (Movie S3). The range of the update-rates that we tested (1-10Hz) is typical for biological systems (e.g., [28]). Finally, we tested how the presence of multiple targets affects the results by introducing more targets in the area. We found that the advantage of group searching improved further when more than one target was present, reaching an improvement factor of 4.5 with 100 targets in the area (Fig. 2d). This result proves that our findings hold also in the general case of many food sources. An ideal searching system would be composed of independently moving agents with perfect communication between everyone, such that all individuals are informed when one finds food (assuming that competition over the food is not detrimental). Such a setup is non-realistic for most biological systems, and surely non-realistic for animals that must search large areas for food due to the limited range of social communication and eavesdropping (the range from which an individual can follow another one). In a realistic scenario, such as the one we modeled, two competing goals must be achieved for optimizing group searching. On the one hand, the group should spread as much as possible in order to minimize the searching overlap between its agents. On the other hand, individuals should maintain a connection to other group members so that they converge on-to the target when a member of the group finds it. Being part of a group does not help if the information about finding food by a group member does not reach other individuals. In practice, these two factors typically negatively correlate, meaning that a group that spreads out (i.e., with less searching-overlap) often has poor connection between its members. We found that the number of individuals per group increased rapidly with ρ, reaching a range of 10-16 individuals per group when ρ was set to 0.2 or more (in a system with a total of 50 individuals). Larger groups did not form in our setup probably due to the set of interaction rules that we used. The increase in group size, was accompanied by a decrease in the proportion of converging individuals (Fig. 3a). Convergence is less efficient in larger groups because each individual is influenced by more individuals some of which have not detected the food and have not detected individuals that already found the food. In other words, the movement is more noisy (large groups often split when arriving at the food). The best models showed a convergence proportion of 65-85%, that is, when the target was found by a group member 65-85% of the other members of the same group found it as well (see also Fig. S3). Together, these effects determined the best social model (i.e., the best ρ). The importance of the convergence effect for improved searching can be learned by observing the dynamics of finding food in a single simulation (Fig. 3b). When ρ is set to 0 (blue line) agents find food individually as can be learned from the monotonous increase of the proportion of agents who found the food. In comparison, when ρ is set to 0.6 (red line), every event of finding of the food by an individual, is followed by many others converging on it as can be learned from the staircase shape of the graph. Note that when operating as individuals (blue line), the food is found faster for the first time (because individuals spread over the entire area rapidly), but very few other agents join (See Fig. S4 for averages). 6 A PREPRINT - APRIL 8, 2019 (a) (c) (b) Figure 3: The mechanisms underlying improved social searching. In all panels, the number of agents was 50, the food detection radius was set to 10m and the social detection radius to 150m. Results are an average over 1, 000 simulations. (a) Group size and convergence proportion as a function of ρ. The convergence proportion was defined as the proportion of individuals that converged on-to the target when it was found by a member of the group. Note that the peaks in group size at ρ = 0.25 and ρ = 0.6 are not measurement errors. We ran this analysis with a resolution of 0.02 to confirm this. (b) Searching performance in a single simulation. The number of agents arriving at the target are shown as a function of time for ρ = 0 (blue) and 0.6 (red). When ρ = 0, agents continuously reach the target as individuals. When ρ = 0.6, agents reach the target in groups (as can be learned from the stair case shape of the graph). (c) The normalized cover time of 50% of the area for the average group that is created at each ρ. For example, at ρ = 0.6, the average groups size was 16 agents, so we estimated the time it would take a group of 16 agents to cover 50% of the area. In both the Group Size line of panel a, and in panel c, we exclude the food from the searching area to examine searching dynamics without a reduction in the number of searching agents, which occurs when they reach the target (see Methods for more details). In addition to these two criteria (i.e., good convergence and little overlap), the group must also move efficiently in order to improve searching -- a well spread group that hardly moves will not perform efficient searching. To quantify the overall searching performance of the model we estimated the time it takes groups of different size (equivalent to different values of ρ) to cover 50% of the area (see Methods). This analysis (Fig. 3c) shows that covering is better for social models (ρ > 0). In fact, the best performance reaches a plateau from values of ρ > 0.2 but because groups size is slightly smaller and so is the convergence rate (Fig. 3a) the overall best performance is achieved only at ρ = 0.6 (for a system of 50 agents, see also Fig. S5). Discussion By using a simple collective movement model we show that a group, with no leaders and without any direct commu- nication between its individuals is more efficient in searching for food than individual agents. We tested a realistic biological model using biological plausible sensing ranges. We could have, for example, forced the agents to spread out in an optimally stretched line (with minimal overlap between them) and we could have imposed perfect communication between agents such that even when the most extreme agent in the line found food, all group members converge on it. This would have obviously improved searching, but such a behavior would require defining global rules. Instead, we used a model that only assumes simple local interactions between individuals. Still, even this simple model shows how improved searching can emerge spontaneously when animals move together. Our general finding, that social searching improves searching was robust to various sensing and social model-parameters that we perturbed. We find that better group performance positively correlates with group size, with fast coverage of the areas and with good convergence once food is found (Fig. 3). However, we also show that there is a trade-off between group size and convergence -- as the group increases, less of its members will converge on-to the food when one of the members finds it. The actual improvement achieved by the group and the searching dynamics varied depending on the system's sensory, social and environmental parameters. It is likely that an organism that evolved to perform group searching, has evolved a different set of parameters and rules than those we used; that would further improve searching. For example, such an organism could have evolved a higher sensory update rate, which we find advantageous under certain conditions. Additional sensory abilities that could be tuned by evolution to improve social foraging include an increase in the social detection range (of a conspecific) which could for example be achieved by improved sensing directionality or, in the case of sound emitting animals, by adapting the signal design. Importantly, these adaptations should result in a gain for the individuals in the group as our framework indeed suggests. In reality, the sensing radii and especially the food detection range rt might change seasonally and spatially depending on the available prey. Our prediction would thus be that the degree of social foraging within a species changes seasonally and spatially according to the season and region specific rt . For group searching to improve searching, we only had to make two assumption: (1) Food is distributed in patches, that is, many group members can enjoy a food-patch when it is found (without competition), and (2) A neighbor's location and movement direction can be tracked to some degree. Interestingly, it was not essential to assume that an agent can detect when another agent found the food. We originally assumed this, but found that it is not obligatory. This can 7 A PREPRINT - APRIL 8, 2019 be learned from the results of the model in the special case when rs = rt (purple line in Fig. 2b). When rs = rt an individual must be within the target's detection range to sense that another individual found it, so it will have to reach the food itself and will never detect an individual that has already found the food. Even under this condition, the social model performed better than the non-social model. This condition also clarifies that the detection range of another agent (rs) must not be larger than the target's detection range (rt) for social foraging to be beneficial. Our original intuition was that if the two sensory ranges are the same (as in this case) there is no benefit to the group, but our results show otherwise. The reason that group foraging is beneficial even in this condition, is the convergence effect, which occurs when someone finds the target and occurred even when rs = rt. Namely, even if the target is only sensed when the agent reaches it (i.e., is within rt from it), when a group member reaches the target, its movement will attract others in its direction, leading to a convergence on-to the target. In fact, social searching was more important in the situation when rs = rt than when rs >> rt (compare purple and gray lines in Fig. 2b). In contrast, and slightly counter-intuitive at first, the only situation where the benefit of social foraging was very small, based on our model, was when rs was very large, that is when individuals can sense the location and state of other individuals from a large distance (e.g., grey line in fig. 2b). In this situation, agents can home in on a food item that was found by another individual from a very large distance, so there is less advantage in searching together. This might be the case for vultures that can detect individuals circling a carcass from very large distances. Importantly, the basic interaction model that we used, was sufficient to generate a diffusion of information about the location of the target and a convergence on-to it once it was found by one of the group members. We did not have to explicitly model this behavior, that is, the same interaction rules that were applied during search also resulted in this convergence. This can be learned, once again, from the special case where rs = rt because in this condition individuals never get the chance to know when another individual found food (if they are close enough to a feeding individual, they will already detect the food itself). Moreover, our results suggest that the internal zone of the 3-radii model -- the repulsion zone -- which has been originally designed to prevent collisions between agents, also assists social searching, because it forces the group to spread out and cover more area while searching. As much as we increased ρ, the typical group size did not exceed 17 individuals (larger groups split into several smaller groups). When we tuned other model parameters to force the formation of larger groups, their movement was often not efficient and they tended to get stuck in place. Indeed, in nature, foraging animals are often seen in groups of several individuals to dozens of individuals while swarms of thousands or more (which are often mathematically modeled) are more commonly observed in sleeping sites or in stationary situations when the group remains in place aiming to avoid predation [29]. Mathematical models of group size (e.g., [30]) rarely consider group-movement constraint which seem to play a role based on our model. But, even though the size of a typical group did not grow, when there were more agents in the area, searching became more efficient for the average individual. Food was found faster and the inter-simulation variability decreased dramatically (see insert in Fig. 2a). This was mainly a result of the increase in the target's detection range from rt to rs once it was found by the first agent. This improvement with number of agents was thus not relevant for systems in which rs = rt. All of the system parameters that we tested influenced the performance of the model, but in all cases, there was always a social model that was better than the best comparable individual model. In reality, animals that evolved to rely on social searching might be flexible, adjusting how they weigh personal and social information according to the specific scenario, i.e., the type of food that is available, the sensory modality they are using to search for it and the sensory modality they are using to follow neighbors. Our agent based model thus suggests how we can use simulations to gain intuition about social foraging and more generally, how we can gain insight about the reasons underlying field observations on animal behavior. Methods Experimental setup. The model was defined by a set of environmental parameters and agent parameters. The environmental parameters included: S -- the size of the searching area, n -- the number of agents and t -- the number of targets (whose positions were sampled from a uniform distribution at each simulation). The agent parameters included: v -- the agent's velocity, cf - the movement direction update rate, rt -- the target detection range, rs -- the social detection range, ρ - the weight of the neighbors' influence on the agent's direction, σ - the width of the distribution of turning angles of the Self Direction and r1, r2 - the radii of the concentric (repulsion and alignment) zones (where r3 = rs). We refer to a model with a specific set of parameters as an instance of the model. In our experiments, we fixed some of the parameters based on a simplified but realistic scenario. The fixed parameters were: v = 10m/s and S = 20km · 20km. We simulated a two dimensional world with toroidal boundaries, meaning that when an agent reached a border of the searching area it reappeared on the opposite side. This methodology is commonly used [23] to avoid the edge case when the agents reach the borders. In most simulations we also fixed the following parameters: n = 50, t = 1 ,cf = 1Hz, rt = 10m and rs = 150m, but unlike v and S, these parameters were varied in specific analyses to test 8 A PREPRINT - APRIL 8, 2019 10 rs and r2 was set to 7 their influence on performance . The main aim of this study was to find out whether social behavior improves searching. To that end, we started our experiments by searching for the best instance of the model where the agents search as individuals, i.e. ρ = 0 (see below the definition of searching performance). Note that when ρ = 0 the model depends only on the distribution of turning angles, determined by σ (r1 and r2 are meaningless in this case). We therefore searched over different values of σ = {0 − 10, 15, 20, 30, 50} running 1, 000 simulation for each instance. Then we searched for a social model where ρ > 0 improves searching performance. In order to reduce the number of model parameters we first searched for concentric radii values that showed good performance. We did this by searching over four parameters simultaneously: ρ = {0.1 : 0.1 : 0.9}, σ = {1, 3, 5, 10, 15, 20, 30, 50}, and r1 = {0 : 0.1 ∗ rs : rs} and r2 = {0 : 0.1 ∗ rs : rs} (r1 ≤ r2), total of ∼ 4, 500 instances (4-parameters sets); each instance was tested over 50 simulations. According to the results, we fixed the concentric radii, r1 and r2 that achieved on average the minimal searching time: r1 was set to 3 10 rs. Later, we isolated some of the additional agent parameters and tested their effect on the performance of the model while focusing on changing the social weight ρ = {0 : 0.1 : 0.9} (we always tested different values of σ = {3, 10, 20, 30, 50} for each model instance Fig. S6). In these experiments (after r1 and r2 were fixed) each instance was tested over 1, 000 simulations. We tested the model for different numbers of agents, n = {2, 5, 10, 50, 100, 200, 500}, different ratios between the social detection radius to the target detection rt = {1, 15, 100}, different rates of updating the movement direction, cf = {10Hz, 5Hz, 2Hz, 1Hz} and radius, rs different numbers of targets, t = {1, 2, 5, 10, 30, 50, 100}. Metrics. In order to evaluate the model and explain its behavior we defined the following metrics (see below for formal definitions): Savg - the mean searching time to find a target (Fig. 2a-2d); Cprop - the convergences proportion of a subgroup on-to a target (Fig. 3a); Gsize - the average group size (Fig. 3a); f k ac(x) - the time it takes a subgroup of k agents to cover x percent of the searching area (Fig. 3c). Note that in order to estimate the last three metrics, we excluded all targets from the search area and ran the simulation for a constant time of 500K − 5, 000K time steps (depending on cf ). We used this approach when we did not want to be affected by the convergence of individuals on-to the target, which decreased the number of individuals over time. The metrics were evaluated in each simulation and the reported results are average across all simulations. Next, we formally define the metrics. The mean searching time to find a target, Savg, is defined as follows, where n is the number of agents and si is the time it took agent i to find the target. To define Cprop and f k ac(x) we will first define the average number of connected components, C∗ comp, where n is the number of agents, T is the number of iterations of the simulation, Ccomp(Gt) is the number of connected components in the graph Gt. The Graph Gt, is defined as follows, Gt(V, Et) = (cid:13)(cid:13)2 ≤ rs, (9) i − pt j where n is the number of agents, pt i is the position of an agent i at time t and rs is the social radius. We match a graph for each time step. The vertices of the graph represent the agents, that is vi represent agent i. The edges of the graph represent which agents are in range of detection from each other. That is, we connect two vertices by an edge if the distance between their corresponding agents is less or equal to rs (the social detection radius). For each such graph we calculated the number of connected components and C∗ comp is the average number of connected components over all of the graphs in a single simulation. The convergence proportion of a subgroup to a target, Cprop, is an estimation of the number of agents that will reach the target immediately after it is found by one of the subgroup members (it is possible that some of the agents will miss the target). Cprop is defined as follows, where C∗ directly (i.e., not because an agent followed another agent to the target). As F# is closer to C∗ comp is the average number of connected components and F# is the number of times that the target is found comp the convergence Cprop = , (10) C∗ comp F# 9 n(cid:88) i=1 si, Savg = 1 n Ccomp(Gt), t=0 1 T C∗ comp = T(cid:88) V = {v1, ..., vn} < vi, vj >∈ Et iff(cid:13)(cid:13)pt Et = {< vi, vj >}, (7) (8) A PREPRINT - APRIL 8, 2019 n(cid:88) i=1 effect is larger, i.e. more agents of a subgroup will reach the target when it is found by one of the subgroup's agents. F# is defined as follow, F# = xi (11) where xi indicates (with high probability) if agent i found the target by himself, i.e. not because it followed another agent. xi is defined as follow, (cid:40) 0,∃j (cid:54)= i s.t. 0 < ti − tj ≤ rs∗cf 1, otherwise, v xi = , (12) , which means that it will take an agent rs∗cf where ti is the searching time of agent i, rs is the social detection radius, cf is the movement direction update rate and v is the agent's velocity. Agents can effect each other only if the distance between them is less than rs. At each step an agent advances v time steps to advance a distance of rs. If the cf reaching time between agent i and all the other agents (that reach the target before him) is greater than rs∗cf then we can conclude that agent i found the target by himself. On the other hand, if there is an agent j, that reached the target before agent i and ti − tj ≤ rs∗cf v we can conclude with high probability that agent i followed agent j to the target. We can not be sure that agent i followed agent j because it is possible that they reached the target from different directions. The average group size, Gsize, is defined as follows, v v Gsize = n C∗ comp (13) (14) where n is the number of agents and C∗ To estimate the value of f k ,we first calculated the accumulated cover time of the complete group, f n grid, each cell of size rt stays that way until the end of the simulation. f n ac(x), namely the time it takes a subgroup of k agents to cover x percent of the searching area, ac(x). To do so, we divided S in to an m × m 2 × rt 2 . Each cell that is visited by an agent is considered covered. Once a cell is covered, it comp is the average number of connected components. ac(x) is calculated as follows, }, ac(x) ∼ min{t ≥ 0 : f n mt M ≥ x S where mt is the number of covered cells at time t and M is the total number of cells in the grid. f k follows, ac(x) is calculated as ac(x) ∼ n f k Gsize f n ac(x), (15) ac(x) is the accumulated where n is the number of agents, Gsize is the average number of agents in a subgroup and f n cover time of the complete group. To estimate f k ac(x) we measure the accumulated cover time of the complete group and then we normalized it by the number of agents divided by the average group size. Another approach to measure ac(x) is to run a simulation with k agents, 1 ≤ k ≤ n. In addition to requiring more simulations this latter approach is f k also not accurate. This is because a simulation with a group of k agents will split into subgroups which will reduce the overlap between agents and increase the cover rate efficiency. ACKNOWLEDGMENTS. We thank H. Balaban and N Gov for commenting on the manuscript. This project was partially funded by ONRG grant no. N62909-13-1-N066. Work by D.H. and R.C. has been supported in part by the Israel Science Foundation (grant no. 825/15), by the Blavatnik Computer Science Research Fund, by the Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, and by grants from Yandex and from Facebook. References [1] A Berdahl, C J Torney, C C Ioannou, J Faria, and I D Couzin. Emergent sensing of complex environments by animal groups. Science, 339(6119):574 -- 576, 2013. [2] S Creel, P Schuette, and D Christianson. Effects of predation risk on group size, vigilance, and foraging behavior in an African ungulate community. Behavioral Ecology, 25:773 -- 784, 2014. [3] Noam Cvikel, Katya Egert Berg, Eran Levin, Edward Hurme, Ivailo Borissov, Arjan Boonman, Eran Amichai, and Yossi Yovel. Bats aggregate to improve prey search but might be impaired when their density becomes too high. Current Biology, 25(2):206 -- 211, 2015. 10 A PREPRINT - APRIL 8, 2019 [4] Deborah M. Gordon. The ecology of collective behavior. PLoS Biology, 12(3), 2014. [5] E. Danchin, L.A. Giraldeau, T.J. Valone, and R.H. Wagner. Public information: from nosy neighbours to cultural evolution. American Association for the Advancement of Science, 305(5683):487 -- 491, 2004. [6] Colin W. Clark and Marc Mangel. The evolutionary advantages of group foraging. Theoretical Population Biology, 30(1):45 -- 75, 1986. [7] H. Ronald Pulliam and George C. Millikan. Social organization in the nonreproductive season. Avian Biology, pages 169 -- 197, jan 1982. [8] Ehud D. Karpas, Adi Shklarsh, and Elad Schneidman. Information socialtaxis and efficient collective be- havior emerging in groups of information-seeking agents. Proceedings of the National Academy of Sciences, 114(22):5589 -- 5594, 2017. [9] Alessandro Attanasi, Andrea Cavagna, Lorenzo Del Castello, Irene Giardina, Stefania Melillo, Leonardo Parisi, Oliver Pohl, Bruno Rossaro, Edward Shen, Edmondo Silvestri, and Massimiliano Viale. Collective behaviour without collective order in wild swarms of midges. PLoS Computational Biology, 10(7), 2014. [10] Iain D. Couzin, Jens Krause, Nigel R. Franks, and Simon A. Levin. Effective leadership and decision-making in animal groups on the move. Nature, 433(7025):513 -- 516, 2005. [11] Jacques Gautrais, Francesco Ginelli, Richard Fournier, Stéphane Blanco, Marc Soria, Hugues Chaté, and Guy Theraulaz. Deciphering interactions in moving animal groups. PLoS Computational Biology, 8(9), 2012. [12] Máté Nagy, Zsuzsa Ákos, Dora Biro, and Tamás Vicsek. Hierarchical group dynamics in pigeon flocks. Nature, 464(7290):890 -- 893, 2010. [13] Nicholas T. Ouellette. Empirical questions for collective-behaviour modelling. Pramana - Journal of Physics, 84(3):353 -- 363, 2015. [14] Julia K. Parrish and Leah Edelstein-Keshet. Complexity, pattern, and evolutionary trade-offs in animal aggregation. Science, 284(5411):99 -- 101, 1999. [15] David J T Sumpter, Jens Krause, Richard James, Iain D. Couzin, and Ashley J W Ward. Consensus decision making by fish. Current Biology, 18(22):1773 -- 1777, 2008. [16] W. Bialek, A. Cavagna, I. Giardina, T. Mora, E. Silvestri, M. Viale, and A. M. Walczak. Statistical mechanics for natural flocks of birds. Proceedings of the National Academy of Sciences, 109(13):4786 -- 4791, 2012. [17] Mathieu Lihoreau, Michael A. Charleston, Alistair M. Senior, Fiona J. Clissold, David Raubenheimer, Stephen J. Simpson, and Jerome Buhl. Collective foraging in spatially complex nutritional environments. Philosophical Transactions of the Royal Society B: Biological Sciences, 372(1727), 2017. [18] Colin J. Torney, Andrew Berdahl, and Iain D. Couzin. Signalling and the evolution of cooperative foraging in dynamic environments. PLoS Computational Biology, 7(9), 2011. [19] M. Yamashita and I. Suzuki. Agreement on a common X-Y coordinate system by a group of mobile robots. Intelligent Robots: Sensing, Modeling and Planning [Dagstuhl Workshop, September 1-6, 1996], pages 305 -- 321, 1996. [20] Noa Agmon, Noam Hazon, and Gal A. Kaminka. The giving tree: Constructing trees for efficient offline and online multi-robot coverage. Annals of Mathematics and Artificial Intelligence, 52(2-4):143 -- 168, 2008. [21] Sze Kong Chan, Ai Peng New, and Ioannis Rekleitis. Distributed coverage with multi-robot system. In Proceedings - IEEE International Conference on Robotics and Automation, volume 2006, pages 2423 -- 2429, 2006. [22] Sasanka Nagavalli, Andrew Lybarger, Lingzhi Luo, Nilanjan Chakraborty, and Katia Sycara. Aligning coordinate frames in multi-robot systems with relative sensing information. In IEEE International Conference on Intelligent Robots and Systems, pages 388 -- 395, 2014. [23] Luca Giuggioli, Idan Arye, Alexandro Heiblum Robles, and Gal Kaminka. From Ants to Birds: A Novel Bio-Inspired Approach to Online Area Coverage. Springer Tracts in Advanced Robotics. Springer, 9 2016. [24] Iain D. Couzin, Jens Krause, Richard James, Graeme D. Ruxton, and Nigel R. Franks. Collective memory and spatial sorting in animal groups. Journal of Theoretical Biology, 218(1):1 -- 11, 2002. [25] Roi Harel, Orr Spiegel, Wayne M. Getz, and Ran Nathan. Social foraging and individual consistency in following behaviour: testing the information centre hypothesis in free-ranging vultures. Proceedings of the Royal Society B: Biological Sciences, 284(1852):20162654, 2017. [26] A. L. Jackson, G. D. Ruxton, and D. C. Houston. The effect of social facilitation on foraging success in vultures: a modelling study. Biology Letters, 4(3):311 -- 313, 2008. 11 A PREPRINT - APRIL 8, 2019 [27] Francesco Ginelli, Fernando Peruani, Marie-Helène Pillot, Hugues Chaté, Guy Theraulaz, and Richard Bon. Intermittent collective dynamics emerge from conflicting imperatives in sheep herds. Proceedings of the National Academy of Sciences, 112(41):12729 -- 12734, 2015. [28] Nadav S. Bar, Sigurd Skogestad, Jose M. Marçal, Nachum Ulanovsky, and Yossi Yovel. A sensory-motor control model of animal flight explains why bats fly differently in light versus dark. PLoS Biology, 13(1), 2015. [29] D. J. Hoare, I. D. Couzin, J. G.J. Godin, and J. Krause. Context-dependent group size choice in fish. Animal Behaviour, 67(1):155 -- 164, 2004. [30] H. R. Pulliam and T. Caraco. Living in groups: is there an optimal group size? In Behavioural ecology: an evolutionary approach, pages 122 -- 147. 1984. 12 Supplementary A PREPRINT - APRIL 8, 2019 Figure 1: The mean searching time for the non-social model as a function of the width of the turning angle distribution (σ). 13 A PREPRINT - APRIL 8, 2019 Figure 2: The probability density function of the mean searching time for different values of ρ and n. Note how the mean of the distribution decreases for ρ > 0 and how the width decreases with n. 14 A PREPRINT - APRIL 8, 2019 Figure 3: The number of groups and the number of convergence events as a function of ρ. When the two numbers are the same this implies that all group members converged when one of them found the target. The larger the difference between the two - the poorer the convergence. 15 A PREPRINT - APRIL 8, 2019 Figure 4: Number of agents reaching the target as a function of time for different values of ρ. For each ρ we present the results of the best σ. The social graphs (ρ > 0) do not show steps (like in Fig. 3b) because they are an average of 1, 000 simulations. In these simulation the following parameters were used: n = 50, rs rt = 15, σ = 3, t = 1. 16 A PREPRINT - APRIL 8, 2019 Figure 5: Snapshots of the covered area for different models. We exclude the target from the area. (a) n = 1, rt = 30m, ρ = 0, σ = 3, T = 500, 000 time steps (∼ 140 hours). (b) same as a. but with σ = 30. (c) n = 10, rt = 30m, ρ = 0, σ = 3, T = 50, 000 (∼ 14 hours). (d) same as c. but with ρ = 0.6. 17 A PREPRINT - APRIL 8, 2019 Figure 6: Mean searching time for different combinations of ρ and σ. In these simulation the following parameters were used: n = 50, rs/rt = 15, t = 1. 18 A PREPRINT - APRIL 8, 2019 Movie S1. Demonstration of individual search. Movie S2. Demonstration of social search. Movie S3. Demonstration of group motion for different ρ and σ. 19
1604.04737
1
1604
2016-04-16T12:13:02
Studying the impact of negotiation environments on negotiation teams' performance
[ "cs.MA", "cs.AI" ]
In this article we study the impact of the negotiation environment on the performance of several intra-team strategies (team dynamics) for agent-based negotiation teams that negotiate with an opponent. An agent-based negotiation team is a group of agents that joins together as a party because they share common interests in the negotiation at hand. It is experimentally shown how negotiation environment conditions like the deadline of both parties, the concession speed of the opponent, similarity among team members, and team size affect performance metrics like the minimum utility of team members, the average utility of team members, and the number of negotiation rounds. Our goal is identifying which intra-team strategies work better in different environmental conditions in order to provide useful knowledge for team members to select appropriate intra-team strategies according to environmental conditions.
cs.MA
cs
Studying the Impact of Negotiation Environments on Negotiation Teams' Performance V´ıctor S´anchez-Anguix, Vicente Juli´an, Vicente Botti, Ana Garc´ıa-Fornes Universidad Polit´ecnica de Valencia, Departamento de Sistemas Inform´aticos y Computaci´on, Cam´ı de Vera s/n, 46022, Valencia, Spain, {sanguix,vinglada,vbotti,agarcia}@dsic.upv.es Abstract In this article we study the impact of the negotiation environment on the perfor- mance of several intra-team strategies (team dynamics) for agent-based negoti- ation teams that negotiate with an opponent. An agent-based negotiation team is a group of agents that joins together as a party because they share common interests in the negotiation at hand. It is experimentally shown how negotiation environment conditions like the deadline of both parties, the concession speed of the opponent, similarity among team members, and team size affect perfor- mance metrics like the minimum utility of team members, the average utility of team members, and the number of negotiation rounds. Our goal is identifying which intra-team strategies work better in different environmental conditions in order to provide useful knowledge for team members to select appropriate intra-team strategies according to environmental conditions. Keywords: Negotiation Teams, Agreement Technologies, Automated Negotiation, Collective Decision Making, Multi-agent Systems 1. Introduction Agreement technologies [26, 37] conform an emergent research area among scholars in artificial intelligence and autonomous agent systems. Autonomous software agents act reactively and proactively with the objective of maximizing their human users' goals. Nevertheless, as systems tend to be more complex, so do agents' goals, and agents cannot achieve their goals without the cooperation of other agents. Given the open nature of many multi-agent systems, con- flict may be inherent among agents. Hence, distributed mechanisms that allow agents to solve conflict and cooperate are a necessity. Agreement technologies have been actively researched bearing in mind the aforementioned necessity. Automated negotiation [22, 18, 25] is one of the core topics in agreement technologies. Basically, agents in conflict engage in an automatic offer exchange process which gradually leads towards a final solution, or agreement, that solves conflict and makes cooperation among agents possible. The most common use Preprint submitted to Elsevier October 26, 2018 for automated negotiation has been electronic commerce [24], but it should be highlighted that the applicability of this technology has been demonstrated in other domains like collaborative design [21], labor management disputes [42], and mediation between human negotiation parties [3]. Despite being widely studied by scholars from different disciplines like arti- ficial intelligence, game theory, and social sciences, studies have largely focused on processes whose parties (bilateral, or multiparty) are formed by single indi- viduals [10, 8, 11, 16, 6, 12, 1, 14, 13]. However, some real world scenarios bring about negotiation parties that are formed by more than a single individual. For instance, when an organization negotiates with another organization the selling of a product line, it is usual for organizations to send a group of representatives to negotiate with the other organization. Another example, probably a more quotidian example, involves a married couple that negotiates the purchase of a house with a seller. In this case, the married couple is actually a negotiation party which is formed by two individuals instead than a single individual party. To conclude with the list of real examples, the reader could also think of a group of friends that want to go on a holiday together. This party, conformed by all the friends, has to negotiate a deal with the travel agency if they want to achieve their desired goal. This kind of multi-individual party is known in the social sciences as a ne- gotiation team [43, 2, 1, 14]: a group of interdependent people that join and act together as a single negotiation party because of their shared interests, related to a negotiation. The rationale behind negotiation teams is mainly twofold. First, team members may have different expertise and negotiation skills that are needed to tackle the negotiation problem successfully. Second, the multi- individual entity that negotiates may be formed by multiple stakeholders with different sub-goals and preferences regarding the final negotiation outcome. We can imagine how an IT company may send a negotiation team formed by experts (different knowledge and skills) from the sales department, marketing depart- ment, and R&D department to successfully negotiate a new project with the local administration, how the wife and the husband may have different opinions with respect to house pricing, location, and facilities, and how each friend may have different interests regarding hotel location, number of days to spend, and pricing regarding their travel. Electronic applications, and consequently automated negotiation, are not alien to scenarios that may involve agent-based negotiation teams (ABNT). For instance, group travel e-markets, group buying in e-markets, electronic management of farming cooperatives, negotiation support systems for real hu- man teams, and agent-based simulation may be some of the applications where ABNT may be used. From our point of view, we are interested in ABNT whose members may have different preferences regarding the negotiation issues, and, more specifically, we are interested in models for electronic markets. In this paper, we present four intra-team strategies for an ABNT that ne- gotiates with a single opponent. Intra-team strategies, also known as team dynamics, govern which decisions are taken as a team, and how and when those decisions are taken [34]. The relationship between intra-team strategies and 2 team performance is direct. Hence, it became the focus of our current research. It has been documented that environment conditions such as the deadline, con- cession speed, and reservation utility may affect the impact of single-individual bilateral strategies [10]. However, in the team case, new conditions like the number of team members, team preferences' diversity, and the emergent ef- fect of aggregating team members' behaviors/actions may also end up affecting team performance. Prior to the negotiation process, negotiation teams face the challenge of selecting which intra-team strategy should be employed. If environ- mental conditions have an effect on the performance of the different intra-team strategies, the intra-team strategy for the negotiation at hand should be selected accordingly to the current environmental conditions inferred by team members. Our research goal is identifying which intra-team strategies perform better ac- cording to different negotiation environments under different team performance measures. The long term goal is employing the results of this article for helping team members to select the proper intra-team strategy. Hence, four intra-team strategies that guarantee four minimum levels of unanimity regarding team decisions are presented in this article: representa- tive (no unanimity guaranteed), Similarity Simple Voting (plurality/majority guaranteed), Similarity Borda Voting (semi-unanimity guaranteed), and Full Unanimity Mediated (unanimity guaranteed). Due to the large amount of vari- ables that may affect the negotiation, we employ an empirical approach to study the behavior of the four intra-team strategies. We study and identify which are the most appropriate strategies according to different environmental conditions and team performance measures. This article, is partially based on our previous work regarding intra-team strategies for negotiation teams [35, 33], where we presented initial results and simulations. In this article, we extend our empiri- cal experiments by incorporating new environmental conditions (i.e., team size, different deadlines), carrying out a more fine-grained analysis of previous envi- ronmental conditions (i.e., deadline, concession speeds), and presenting revised versions of the four intra-team strategies. The article is organized as follows. First, we describe the assumptions of our negotiation model (Section 2). After that, the details of the four intra- team strategies are thoroughly described in Section 3. Then, in Section 4 the article depicts which negotiation environments and team performance metrics have been studied, and it presents the results and analysis of our experiments. Afterwards, the present work is related to other works in the area of artificial intelligence and automated negotiation (Section 5). Finally, we briefly state the conclusions of our study and point out some future and interesting lines of work in Section 6. 2. General Model Description In this section, we describe the assumptions of our model. We have divided the assumptions in two different categories: general assumptions and opponent assumptions. The general assumptions directly affect the nature of the negoti- ation at hand and are shared between parties (e.g., protocol, number of parties, 3 attribute types, etc.), whereas opponent assumptions describe the strategy car- ried out by the opponent. 2.1. Negotiation Setting • The team A is formed by M different agents ai, 1 ≤ i ≤ M . It should be stated that team membership is considered static during the negotiation process. Dynamic ABNT are not considered in this work, and they are appointed as future work. • The common goal of the team A is negotiating a successful deal with the opponent op. Thus, in this case we assume an implicit representation of the teams' goal. • It is assumed that information is private, even among team members. Therefore, agents do not know other agents' utility functions, strate- gies, reservation utilities, or deadlines. On top of that, we also assume agents with bounded computational resources. Thus, we take a heuristic approach which seeks near optimal results while being computationally tractable. • It is assumed that the team A and the opponent op communicate following an alternating bilateral protocol [30]. One of the two parties acts as the initiator, and it is entitled to propose the first offer. The other party receives the offer and can respond with two different actions: accept the offer (successful negotiation), or propose a counteroffer. If a counteroffer is proposed, the initiator party receives the offer and it can either accept the counteroffer or propose another offer, starting a new negotiation round. Depending on the intra-team strategy, one of the team members or a team mediator is responsible of the communications with the opponent. In this setting, the fact that one of the parties is a team remains unknown to the other party. • Additionally, it is also assumed that the negotiation is time-bounded, and each party has a private deadline TA (team deadline), Top (opponent dead- line). When its deadline is achieved, the party leaves the negotiation and it is considered a failed negotiation. In the case of TA, it is considered a joint deadline for all of the team members, who have agreed upon this deadline prior to the negotiation at hand. • The mediator, if present, is never a perfect mediator that aggregates the utility functions of all the team members. This assumption is taken due to the fact that, depending on the application, some team members may not be completely trustable and may attempt to exaggerate/change their pref- erences to manipulate the negotiation process. This mischievous behavior is easily carried out when aggregating utility functions. • The negotiation domain is comprised of n real attributes whose domains can be scaled to [0, 1]. Thus, the possible number of offers is [0, 1]n. In this 4 domain, a complete offer is represented as X = {x1, x2, . . . , xn}, where xi is a specific instantiation of attribute i. Additionally, we use the notation X t i→j to denote that offer X was sent at round t from party i to party j. • Every agent i (team member or opponent) has its preferences represented by means of linear additive utility functions in the form: Ui(X) = wi,1 Vi,1(xi,1) + wi,2 Vi,2(x2) + ... + wi,n Vi,n(xn) (1) ized so that(cid:80)n where X is a complete offer, xj, is the value given to the j-th attribute, Vi,j(.) is the valuation function for attribute j used by agent i to normal- ize the attribute value to [0, 1], and wi,j is the weight/importance given by agent i to attribute j in the negotiation process. Several observations should be made regarding these utility functions: (i) weights are normal- j=1 wi,j = 1; (ii) attributes are assumed to be independent from each other. Thus, the valuation of one of the attributes does not alter the others attributes' valuation; (iii) it is assumed that valuation functions are either monotonically increasing or monotonically decreas- ing. Moreover, we assume that team members share the same type of monotonic function (i.e., increasing or decreasing) for each Vi,j(.). As for the opponent, it is assumed that the monotonic function for Vi,j(.) is the opposite type to that of team members. It is reasonable to assume this model for valuation functions in e-commerce scenarios. Buyers usually share the same type of valuation function for attributes such as the price (monotonically decreasing), product quality (monotonically increasing), and the dispatch time (monotonically decreasing), whereas sellers usually use the opposite type of monotonic functions (monotonically increasing for price, monotonically decreasing for product quality, and monotoni- cally increasing for dispatch time); (iv) attribute weights wi,j are different for team members. This way, we are able to represent the fact that some team members may be more interested in some attributes whereas other team members may be more interested in other attributes (e.g., some team members prefer price over quality, while others give a higher priority to the product quality). Obviously, the weights of the opponent's utility function may be different from those of team members; (v) since team members share the same type of monotonic function, if one of the team members increases its utility by increasing/decreasing one of the attribute values, the other team members will stay at the same utility level or they will also increase their utility. Thus, there is potential for cooperation among team members. • The opponent has a reservation utility RUop. Any offer whose utility is lower than RUop will be rejected. Each team member ai has a private reservation utility RUai . This individual reservation utility is not shared among teammates. Therefore, a team member ai will reject any offer whose value is under RUai . In this setting, reservation utilities represent the individual utility of each agent if the negotiation process fails. For the 5 experiments, the reservation utilities are drawn from uniform distributions RUop = U [0, 0.25] and RUai = U [0, 0.25]. 2.2. Opponent Model The opponent op is modeled as a single agent for the sake of simplicity. We acknowledge that the other party may be another team (e.g., organization vs organization), but the focus of our study in this article, and the kind of applications in our mind, involve negotiations between one team and one single agent. For the opponent model we used well-known strategies in the agent negotiation literature: • The opponent uses a time-based tactic during the negotiation process. In multi-attribute, time-bounded negotiations, assuming that agents con- cede gradually to reach an agreement is usual. This is especially important when agents do not know other agents' preferences and strategies, since an exploration of the agreement space is required for discovering possi- ble agreements. A concession strategy typically starts by demanding the maximum aspiration and, as the negotiation process advances, the aspi- ration demanded tends to be lowered. The speed at which the strategy concedes is regulated by the concession speed parameter. In this article, we employed a time-based concession tactic inspired in tactics used by other authors [10, 23]: sop(t) = 1 − (1 − RUop)( t Top 1 βop ) (2) where t is the current negotiation round and βop is a parameter that gov- erns the concession speed. On the one hand, when βop = 1 the concession is linear and each negotiation round the same amount of concession is performed, and when βop < 1 the concession is Boulware and very little is conceded at the start of the negotiation process but the agent concedes faster as the negotiation deadline approaches. On the other hand, when βop > 1 the tactic is conceder and the agents concede fast towards the reservation utility in the first rounds. • The opponent uses an offer acceptance criterion acop(.) during the nego- tiation process. It is formalized as follows: (cid:26) accept reject acop(X t A→op) = if sop(t + 1) ≤ Uop(X t otherwise A→op) (3) where t is the current round, X t A→op is the offer received from the team, Uop(.) is the utility function of the opponent, and sop(.) is the opponent concession strategy. Thus, an offer is accepted by op if it reports a utility that is equal to or greater than the utility of the offer that op would propose in the next round. 6 op→A whose utility is Uop(X t • When the opponent has to propose a counteroffer at negotiation round t, it proposes an offer X t op→A) = sop(t). However, depending on the negotiation domain, there may be an infinite number of offers that comply with the previous condition. Similarity heuristics are a largely used family of heuristics in agent-based negotiation literature [11, 23, 34]. Thus, we assumed that the opponent attempts to propose the offer that is the most similar to the last offer received from the team, and whose utility is Uop(X t op→A) = sop(t). The Euclidean distance was used as similarity function. 3. Intra-Team Strategies An intra-team strategy defines what decisions have to be taken by a negoti- ation team, how those decisions are taken, and when those decisions are taken. In a bilateral negotiation process between a team and an opponent, the deci- sions that must be taken (what) are which offers are sent to the opponent, and whether or not opponent offers are accepted. Given the fact that a negotiation team is formed by more than a single individual, decisions should take into account the interests of the team members. How decisions are taken will deter- mine the satisfaction level of the team with the final decision. In this article, most of the team interactions in intra-team strategies are carried out during the negotiation (when). Next, we describe the four intra-team strategies that we propose: Represen- tative (RE), Similarity Simple Voting (SSV), Similarity Borda Voting (SBV) and Full Unanimity Mediated (FUM). Each strategy is capable of guaranteeing a minimum level of unanimity regarding the offer sent to the opponent, and whether or not to accept the opponent's offer. Another difference between the four strategies is the presence of a mediator and its level of activity (none, coordi- nation tasks, very active participation). Table 1 captures the main qualitative differences between the four intra-team strategies according to the aforemen- tioned criteria. Intra-Team Strategy Unanimity level (How) Pre-negotiation? (When) Mediated? RE SSV SBV FUM Minimum Minimum Minimum Information sharing Unilateral Plurality/Majority Semi-Unanimity Unanimity No Only coordination Only coordination Very Active Table 1: A brief qualitative comparison among the four intra-team strategies presented in this article 3.1. Representative (RE) The Representative strategy (RE) is perhaps the simplest intra-team strat- egy. Basically, one of the team members is selected as representative are for the team during the negotiation. This agent will act on behalf of the team during the negotiation, making it responsible of selecting which offers are sent 7 to the opponent, and whether or not opponent's offers are accepted. The only communications are those carried out between the representative agent are and the opponent aop, and, therefore, this strategy is equivalent to a classic bilateral strategy. The representative agent negotiates according to its own utility function Uare(.) since it does not know the utility function of the other participants. The two decisions that have to be taken during the negotiation are which offers are sent to the opponent, and whether or not the opponent's offer is accepted. 3.1.1. Offer proposal Being a time-bounded negotiation, the representative employs a time-based concession tactic sare(.) to negotiate with the opponent. It is based on a team deadline TA and a concession speed βA, which have been agreed upon prior to the negotiation start: sare(t) = 1 − (1 − RUare)( 1 βA ) t TA (4) The concession strategy defines the aspiration level (utility demanded) by the agent at a specific round t. This utility is demanded from the point of view of the representative, and, so, any offer X t A→op proposed by are at round t will obey the following condition: Uare(X t A→op) = sare(t) (5) Since there is a large number of offers that may obey the equation above, we aimed to satisfy the opponent's preferences as much as possible. As in the case of the opponent strategy, the representative selects the offer that is the most similar to the previous offer received from the opponent using a similarity heuristic based on the Euclidean distance. X t A→op = 3.1.2. Offer acceptance max XUare (X)=sare (t) Sim(X, X t−1 op→A) (6) A common acceptance criterion in time-bounded negotiations is that an opponent's offer is accepted if it reports a utility which is higher than or equal to the utility that is to be demanded in the next negotiation step. In the case of the representative, it will accept the opponent's offer X t op→A at round t if it reports a utility Uare(X t op→A) greater than or equal to sare(t + 1). This can be formalized as follows: if sare(t + 1) ≤ Uare(X t otherwise op→A) (7) 8 (cid:26) accept reject acare(X t op→A) = 3.1.3. Unanimity Level It is clear that since the representative negotiates according to its own util- ity function and reservation utility, it cannot guarantee any kind of unanimity regarding team decisions. Decisions taken by the representative are acceptable to himself (1 agent), but nothing can be assured about the rest of team mem- bers. One could think that if no unanimity can be guaranteed, this strategy is not worth being used. However, when team members tend to be very similar this strategy is expected to yield acceptable results with communication costs equivalent to a bilateral negotiation process. 3.2. Similarity Simple Voting (SSV) The second intra-team strategy relies on a trusted mediator that helps team members to participate in the negotiation process. Its main tasks involve coordi- nation of voting processes and communications with the opponent. It should be highlighted that the mediator communicates team's decisions to the opponent, and broadcasts opponent's decisions among team members. Thus, the fact that every team member participates in the negotiation process remains unknown for the opponent. As for intra-team communications, it should be noted that team members do not communicate among them, but they only communicate anonymously with the mediator. The decision rule used for voting processes is plurality/majority. More specif- ically, a plurality rule is used in the voting process employed to decide which offer is sent to the opponent, and a majority rule is used in the voting pro- cess employed to decide opponent's offer acceptance. A detailed view of the intra-team strategy can be observed in Algorithm 1, which describes the whole process from the point of view of the mediator. 3.2.1. Offer proposal Whenever a new offer has to be proposed to the opponent at round t, the mediator opens a call for proposals among team members. Each team member ai is allowed to communicate anonymously one offer X t ai→A to be proposed to the opponent. Once every proposal has been gathered, the mediator opens a voting process where offers proposed XT t are made public among team members. Then, each agent ai anonymously sends a multi-vote V oteai to the mediator. A multi-vote gathers votes for every offer made public. We use the notation V oteai(j) to denote the vote given by agent ai to the offer j-th from XT t, and XT t(j) as the j-th offer in XT t. The votes can be either positive (1), if the offer j-th is acceptable for ai at round t, or negative (0), if the offer j-th is not acceptable for ai at round t. Once all votes have been gathered, the mediator sums up the number of positive votes and the most supported offer X t A→op is selected, made public among team members, and sent to the opponent. When a tie is produced, the tie-breaker rule consists in randomly selecting one of the most supported offers. The following Equation describes the selection rule of the previous mechanism: (cid:88) ai∈A 9 X t A→op = argmax Xj∈XT t V oteai (j) (8) The paragraph above describes the intra-team protocol followed by team mem- bers and mediator to determine which offer is sent to the opponent at round t. However, team members are faced with two decisions in this intra-team protocol: which offer should be proposed to the mediator during the call for proposals, and the acceptability of each offer proposed during the aforementioned process. We assume that, since the negotiation is time-bounded, team members follow a time-based concession tactic where the concession speed βA is common and agreed by teammates prior to the negotiation process: sai(t) = 1 − (1 − RUai)( 1 βA ) t TA (9) ai→A whose utility is equal to Uai(X t For the first decision, proposing an offer to team members, the agent ai proposes an offer X t ai→A) = sai(t). Since there may be more than a single offer with such utility, the agent has to choose one of ai→A to be accepted it should those offers. maximize the probability of it being the most supported by team members and the probability of it being accepted by the opponent: If the agent ai wants its offer X t X t ai→A = argmax XUai (X)=sai (t) pop(X) × pA(X) (10) where pop(X) is the probability for X to be accepted by the opponent, and pA(X) is the probability for X to be selected by team members. We incorporated agents with a similarity heuristic based on the Euclidean distance over attribute domains scaled to [0,1]. It takes into account the last offer proposed by the opponent X t−1 op→A and the offer sent by team members in the previous negotiation round X t−1 op→A, the more probable it is for the offer to be accepted by the opponent. Analogously, the most similar an offer is to X t−1 A→op, the more probable it is for the offer to be the most supported option in the voting process and, therefore, to be sent to the opponent. Thus, Equation 10 can be approximated by similarity heuristics as follows: A→op. The most similar an offer is to X t−1 X t ai→A = argmax XUai (X)=sai (t) XUai (X)=sai (t) argmax pop(X) × pA(X) ≈ Sim(X, X t−1 op→A) × Sim(X, X t−1 A→op) (11) Finally, for determining the acceptability of offers proposed by team members at round t, we used a rational criterion so that an agent ai emits a positive vote V oteai(j) = 1 for the j-th offer if it reports a utility that is greater or equal than the utility marked by the concession strategy sai(t). Otherwise, the offer is not supported and a negative vote is emitted. This process can be formalized as: (cid:26) 1 0 V oteai(j) = if Uai(XT t(j)) ≥ sai (t) otherwise (12) 3.2.2. Offer acceptance Whenever the mediator receives an offer X t op→A from the opponent at round t, it broadcasts the offer among team members. Then, the mediator opens up a 10 majority voting process where each agent ai states whether or not the opponent's offer is acceptable acai(X t op→A) (1 for accept, 0 for reject). The mediator counts A 2 ) the number of acceptances, and if the offers is supported by the majority (> then it is accepted by the team. Otherwise, the offer is rejected. If the number of team members is even and a tie has been produced, a random decision is taken by the mediator. This mechanism can be described as follows: acA(X t op→A) = accept reject acai(X t op→A) > acai(X t op→A) < A 2 A 2 (13)  if (cid:80) if (cid:80) ai∈A ai∈A random otherwise How team members ai decide the acceptability of the opponent's offer acai(X t follows the rational mechanism that we have employed so far. Basically, the offer is acceptable (1) if it yields a utility which is greater than or equal to the utility demanded by the concession strategy in the next negotiation round sai(t + 1). Otherwise, the offer is not considered acceptable. The following Equation for- malizes the acceptance criterion: op→A) (cid:26) 1 0 acai(X t op→A) = op→A) ≥ sai (t + 1) if Uai (X t otherwise (14) 11 t = 0; while t ≤ TA do Send (Call For Proposals −→ A); XT t = ∅; foreach ai ∈ A do Receive (X t XT t = XT t(cid:83) X t ai→A ←− ai); ai→A; end Send (Open Voting XT t −→ A); foreach ai ∈ A do Receive (V oteai ←− ai); end X t A→op = argmax Xj∈XT t (cid:80) A→op −→ op, A); op→A ←− op); ai∈A Send (X t Receive (X t if X t V oteai (j); op→A = Withdraw then Send (Opponent Withdraw −→ A); Return Failure; end else if X t op→A = Accept then Send (Offer Accepted −→ A); Return Success; end else Send (Open Voting X t foreach ai ∈ A do Receive (acai (X t op→A −→ A); op→A) ←− ai); end if acA(X t op→A)= accept then Send (Accept −→ op, A); Return Success; end else end Send (Opponent Offer Rejected −→ A); end t = t + 1; end Send (Withdraw −→ op, A); Return Failure; Algorithm 1: Pseudo-code algorithm for the mediator in the Similarity Sim- ple Voting intra-team strategy. Messages are represented as (Body direction agents). Therefore, (Accept −→ op) means that the agent sends an accept message to op, whereas (Reject ←− op) describes a message from op with the content "Reject". 3.2.3. Unanimity Level The proposed method is capable of guaranteeing team decisions that are sup- ported by a plurality/majority of the participants. More specifically, plurality is assured in case of the offer proposed to the opponent, and majority is assured when deciding opponent's offer acceptance. Exceptions for this minimum level of team unanimity are ties. For instance, the most extreme case is when team members propose offers to the team, but they only support their own offers. In that case, each proposal sums up exactly 1 positive vote and there is not a clear plurality winner. 12 3.3. Similarity Borda Voting (SBV) SSV is capable of assuring majority and plurality decisions within the team. However, some scenarios may need of intra-team strategies that ensure higher levels of unanimity. SBV and FUM (described later) are designed to solve this problem. The basic structure of SBV remains the same than in SSV, but the voting rules employed are different. More specifically, when each team member votes team proposals, borda count is employed to determine the winner, and a unanimity rule is used to determine opponent's offer acceptance. Next, we briefly describe the aspects which make SBV different to SSV. 3.3.1. Offer proposal As in SSV, when the team has to propose an offer to the opponent, the mediator opens a call for proposals where each team member can propose an offer to the mediator. Then, once every offer has been gathered, the mediator makes public the offers proposed to the team members and a voting process starts. The main difference between both intra-team strategies resides in the fact that team members vote according to a Borda count rule [27]. Basically, each team member ai ranks the proposals XT t in ascending order according to its own utility function Uai(.). We denote as rankai(XT t) the ascending rank according to ai's utility function, and P osition(X, rankai(XT t)) as the position (1 to XT t) that the offer X occupies in a ranked list. The vote emitted by ai for offer j-th in XT t is the position occupied by such offer in the ranked list minus one unit: V oteai(j) = P osition(XT t(j), rankai(XT t)) − 1 (15) Numerical votes for each offer are summed up by the mediator, who finally selects the offer that received the highest sum of scores from the team members (see Equation 8). It should be highlighted that the similarity heuristic employed by team members is the same than the one employed in SSV. 3.3.2. Offer acceptance As for the offer acceptance, the only difference remains in the rule used by the mediator. The opponent's offer is accepted only if it is acceptable for all the team members. The rationale acai(X t op→A) used by team members to determine if an offer is acceptable at round t is equivalent to the one used in SSV. Thus, the offer acceptance mechanism can be formalized as follows: acai(X t op→A) = A (16) (cid:40) accept if (cid:80) ai∈A reject otherwise acA(X t op→A) = 3.3.3. Unanimity Level When describing the minimum unanimity level guaranteed by SBV, we men- tioned the term semi-unanimity. It is clear that if an opponent offer is accepted by the team, it is acceptable for every team member due to the unanimity ruled 13 employed. However, such unanimity is not guaranteed regarding the team deci- sion on which offer is sent to the opponent. Borda count is generally referred as a method that selects broadly accepted options as winners instead of the ma- jority/plurality option (e.g., avoid the tyranny of the majority). In this sense, Borda count entails some degree of unanimity. Nevertheless, the specific de- gree of unanimity that Borda assures is difficult to determine in our negotiation scenario. 3.4. Full Unanimity Mediated (FUM) The last intra-team strategy, Full Unanimity Mediated (FUM), seeks to reach unanimity regarding all team decisions. In fact, every team decision taken (i.e., offer acceptance, offer proposal) following this intra-team strategy entails unanimity at each round t of the negotiation process. However, the type of mediator required for FUM is more sophisticated than in the rest of strate- gies presented in this article. It requires that the mediator participates in a pre-negotiation process where team members hand over decision rights over at- tributes that are not interesting for them. Additionally, the team mediator needs to be able to infer attributes' importance for the opponent. Finally, it also needs to coordinate unanimity voting processes, and an iterated building process that constructs the offers sent to the opponent. A complete view of the pseudo-algorithm carried out by the mediator can be observed in Algorithm 2. 3.4.1. Pre-negotiation: information sharing During the pre-negotiation, team members are allowed to hand over decision rights over some attributes that they do not consider interesting. The iterated offer building process relies on a mechanism which sets attributes' values one- per-one according to team members' will. When an agent hands over decision rights on an attribute, it does not participate in the setting of such attribute. All the communications in the pre-negotiation are private with the mediator, who asks each team member regarding the set of attributes which it is willing to hand over. The rationale behind the idea of handing over decision rights is that conflict may be reduced, and, so, the chances to build a more likeable offer for the opponent are increased while maintaining a good quality for one's own utility function. The fact that some attributes may yield little or no importance at all for some team members is also feasible in a team setting, since some of these attributes may have been introduced to satisfy the interests of a subgroup of team members. The pre-negotiation protocol goes as follows. First, the mediator opens a call for decision rights, where each team member ai is allowed to send (to the mediator) a set of negotiation attributes N Iai, whose decision rights are handed over by ai. Once all the responses have been gathered, the mediator keeps track of those attributes that are not interesting for each agent N Iai, and M(cid:84) i=1 those attributes that are not interesting for all team members N Iai. Once this process has finished, the team and the mediator are ready to start the negotiation process. 14 /*Pre-negotiation: information sharing*/; Send (Ask for N Iai −→ A); foreach ai ∈ A do Receive (N Iai ←− ai); t = 0; while t ≤ TA do /*Offer proposal starts*/; agenda = build agenda(); A(cid:48) = A; X /*Attributes not interesting for every team member are maximized for the opponent*/; (cid:48) t A→op = ∅; foreach j ∈ M(cid:84) N Iai do i=1 xj = maximize f or opponent(j); X (cid:48) t A→op = X (cid:48) t A→op (cid:83){xj}; end /*The offer is built attribute per attribute*/; foreach j ∈ agenda ∧ attribute not set(j) do /*Ask about the value needed of attribute j*/; Send (Needed value j, given X Receive (xai,j ←− aij /∈ N Iai ∧ ai ∈ A(cid:48)); if monotonically increasing(j) then xj = max ai∈A xai,j ; (cid:48) t A→op −→ aij /∈ N Iai ∧ ai ∈ A(cid:48)); else xj = min ai∈A (cid:48) t A→op (cid:48) t A→op = X xai,j ; (cid:83){xj}; X /*Ask about the acceptability of the partial offer*/; Send (Acceptable X foreach ai ∈ A(cid:48) do (X (cid:48) t A→op? −→ aiai ∈ A(cid:48)); (cid:48) t A→op) ←− ai); Receive (ac(cid:48) ai (cid:48)t A→op) = true then A(cid:48) = A(cid:48) − {ai}; if ac(cid:48) ai (X end /*If no more active agents, we do not ask team members anymore*/; if A(cid:48) = ∅ then break; end /*Any attribute not set yet, is maximized for the opponent*/; foreach j ∈ agenda ∧ attribute not set(j) do xj = maximize f or opponent(j); X (cid:48) t A→op = X (cid:48) t A→op (cid:83){xj}; A→op = X (cid:48) t A→op; end X t Send (X t /*Opponent offer acceptance starts*/; Receive (X t if X t A→op −→ op, A); op→A ←− op); op→A = Withdraw then Send (Opponent Withdraw −→ A); Return Failure; Send (Offer Accepted −→ A); Return Success; op→A = Accept then else if X t else op→A −→ A); Send (Open Voting X t foreach ai ∈ A do Receive (acai (X t if acA(X t op→A)= accept then Send (Accept −→ op, A); Return Success; Send (Opponent Offer Rejected −→ A); else end op→A) ←− ai); end t = t + 1; end Send (Withdraw −→ op, A); Return Failure; Algorithm 2: Pseudo-code algorithm for the mediator in the FUM intra-team strategy. 15 Of course, the set of attributes handed over by each team member is not controllable by the mediator. It depends on the behavior of each agent. In our model, the set of attributes handed over by each agent depends on a private parameter ai. The value of such parameter is related to the weight of the different negotiation attributes in one's own utility function. More precisely, if ai = 0, then the agent is only willing to hand over the decision rights over those attributes that are not interesting for himself (i.e., weight equal to zero in the utility function). When ai = 1, the agent is willing to hand over decision rights over every attribute in the negotiation. In general, the agent is willing to hand over decision rights over attributes whose sum of weight in the utility function is equal to or lower than ai: (cid:88) wai,j ≤ ai (17) j∈N Iai Given a certain ai, a reasonable heuristic is to assume that the agent is willing to concede as many decision rights as possible since this will enhance the possibility of finding an agreement with the opponent. Hence, each team member ai chooses the largest possible set N Iai that fulfills Eq. 17. A simple algorithm that solves this problem is ordering the negotiation attributes in as- cending order by weight in the utility function. The set N Iai starts empty, and, then, the array of ordered attributes is followed. If the attribute weight plus the weights of those attributes already in N Iai exceeds ai , then the search stops. Otherwise, the attributes is added to N Iai and the algorithm continues with the next attribute. Our initial experiments with FUM [33] suggested that team members should set its private ai to 0 and hand over decision rights only over those attributes that are not interesting at all. Therefore, in the experimental setting, we use ai = 0. 3.4.2. Negotiation: observing opponent's concessions and building an attribute agenda Once the negotiation starts, the mediator attempts to guess a ranking of attributes according to the opponent's preferences. This ranking is used to build an agenda of attributes, which is used in the iterated offer building process. The idea behind the agenda is attempting to satisfy team members as much as possible with those attributes that are less important for the opponent. This way, team members may reach their desired aspiration level with those attributes less interesting for the opponent, and use the rest of attributes to make the offer as satisfactory as possible for the opponent. The only information available for the mediator regarding the opponent's preferences are the offers received. Thus, the mediator has to infer a ranking of attributes according to that information. A possible heuristic is assuming that agents usually concede less in important attributes and greater concessions are performed in lesser important attributes at the first rounds of the negotiation. Our proposed heuristic assumes that the mediator observes opponent's offers In our experiments, the value of this parameter for the first k interactions. 16 4 (cid:99) [33]. Then, it calculates the concession performed in was set to k = (cid:98) TA each attribute. Since our model assumes that the opponent's utility function employs the opposite type of valuation function than team members for each attribute, it is relatively easy to calculate the amount of concession performed at each attribute. For instance, if the opponent is a seller, it is reasonable to assume that its valuation functions is monotonically increasing (e.g., higher prices report higher utilities) and, thus, any value below the maximum price can be considered a concession with respect to the maximum price. Therefore, the relative concession can be calculated in each attribute. For each attribute j, we calculate the total amount of relative concession Cj in the first k offers: k−1(cid:88) t=0 Cj = op→A − best value(j) X(j)t max value(j) − min value(j) (18) op→A it the value of attribute j in the offer X t where X(j)t op→A, best value(j) is the best possible value for the opponent in attribute j, and max value(j) and min value(j) are the maximum and minimum value of the attribute in the negotiation domain. The inner part of the summatory determines the relative concession on attribute j in the offer received at interaction/round t. So, the summatory counts the total relative concession for attribute j in the first k offers. The heuristic is that attributes that score lower in Equation 18 are usually those more important for the opponent, whilst those attributes scoring higher in Equation 18 are those less important for the opponent. Based on the available information (i.e., number of rounds up to k), the mediator builds an agenda of attributes according to the scores of Cj in descending order. This way, lesser important attributes for the opponent are first in the agenda. 3.4.3. Negotiation: Offer proposal In order to determine which offer is sent to opponent, the mediator governs an iterated building process. The aim of this iterated process is building an of- fer, attribute per attribute, so that the offer sent to the opponent is acceptable for every team member. The order in which the attributes are adjusted is deter- mined by the agenda built by the mediator. The first attribute in the agenda is the one considered less important for the opponent, the second attribute is the next lesser important attribute for the opponent, and so forth. Thus, the first attributes set are those less important for the opponent. The heuristic used by this iterated building process is attempting to satisfy team members' demands with those attributes that are less important for the opponent, and demand as less as possible from those attributes that are the most important for the opponent. Briefly, the iterated building process goes as follows. 1. The agenda of attributes agenda is built by the mediator according to the available information. The first attribute in the agenda is the one guessed as the less important attribute for the opponent. active member (ai ∈ A(cid:48)) in the construction process. 2. When the iterated process starts, every team member is considered an 17 3. The initial partial offer X not been set. (cid:48)t A→op starts as an offer whose attributes have M(cid:84) i=1 4. The mediator checks those attributes that are not interesting for every team member N Iai. These attributes are maximized according to the opponent's preferences (i.e., if the price was one of these attributes, it would be maximized for the opponent, thus, acquiring its minimum value). The partial offer X 5. The next attribute j in the agenda is selected. Those team members active in the construction process (ai ∈ A(cid:48)) and interested in j (j /∈ N Iai) are asked by the mediator to submit the value xai,j needed of attribute j to get as close as possible to their aspiration levels. (cid:48)t A→op is updated with the new attributes' values. 6. The values xai,j gathered from team members are aggregated. If the assumed valuation function is monotonically increasing, then the max op- erator is used to aggregate the values and obtain the final value for the attribute xj. Otherwise, if the assumed valuation function is monoton- ically decreasing, then the min operator is used to aggregate the values and obtain xj. (cid:48)t A→op and the new partial offer is broadcasted among team 7. xj is set in X members. Every team member that is active in the construction phase is asked if the current partial offer satisfies its current demands. 8. Every response is gathered by the mediator. Those agents that answered If there are still positively are removed from the list of active agents. active agents, the mediator goes back to 5. 9. When every team member has been satisfied by the partial offer X (cid:48)t A→op, if there are still attributes that have not been set, those attributes are maximized according to the opponent's preferences. Then, a final offer X t A→op is obtained, made public among team members, and sent to the opponent. In the protocol described above, team members are asked to submit a value for attributes in which they are interested, and to determine whether or not the partial offer satisfies their needs. In both cases, as in previous strategies, we have assumed that team members follow time-based concession tactics similar to the one described in Equation 9, where βA has been agreed upon by team members prior to the negotiation process. However, since team members may have handed over some decision rights, it is not possible for agents to demand the maximum utility. The value ai has to be subtracted from the maximum utility. Therefore, the concession strategy sai(t), which determines the level of demand at each negotiation round, can be formalized as: sai (t) = (1 − ai) − (1 − ai − RUai)( 1 βA ) t TA (19) When team members are asked about a value for j, each team member communicates anonymously the value xai,j. The value communicated is the 18 one that gets as close as possible to its desired aspiration level sai(t) at round t. Taking the linear additive utility function formula, this can be calculated as: xai,j = argmin x∈[0,1] (sai(t) − Uai (X A→op) − wai,jVai,j(x)) (cid:48)t (20) (cid:48)t where sai(t) is the utility demanded by the agent ai at round t, Uai(X A→op) is the utility reported by the current partial offer, and wai,jVai,j(x) is the weighted utility reported by the value demanded by the agent. Since the value demanded looks to be as close as possible to the utility necessary to get to the current aspi- ration, the function is minimized. However, the following constraint is fulfilled by team members in order to avoid surpassing the utility demanded: sai(t) − Uai(X A→op) − wai,jVai,j(xai,j) ≥ 0 (cid:48)t (21) As for determining when a partial offer is acceptable, team members follow a similar criterion to the method proposed in other intra-team strategies. Ba- sically, a partial offer is acceptable for an agent ai if it reports a utility that is greater than or equal to the aspiration level marked by its concession strategy: ac(cid:48) ai (cid:48)t A→op) = (X A→op) ≥ sai(t) (cid:48)t if Uai(X otherwise (22) (cid:26) true f alse where true indicates that the partial offer is acceptable at its current state for agent ai, and f alse indicates the opposite. 3.4.4. Negotiation: Offer acceptance Since this strategy looks for unanimity regarding team decisions, we em- ployed the same mechanism employed in SBV for determining whether or not an opponent offer is acceptable. When the mediator receives the opponent's offer X t op→A, the offer is publicly announced to all of the team members. Then, the mediator opens a private voting process where each team member ai should spec- ify whether or not it supports acceptance of the opponent's offer acai(X t op→A). The mediator counts the number of positive votes. The offer is accepted if the number of positive votes is equal to the number of team members. Otherwise, the offer is rejected. Similarly to SBV, an opponent offer is acceptable for a team member at round t if it reports a utility that is greater than or equal to the aspiration level marked by the concession strategy in the next round: acai(X t op→A) = if sai(t + 1) ≤ Uai (X t otherwise op→A) (23) (cid:26) true f alse where true means that the agent supports the opponent's offer, f alse has the opposite meaning, and sai(.) is the concession strategy employed by agent ai to calculate the aspiration level at each negotiation round t. 19 3.4.5. Unanimity Level As stated in the introduction of this section, this strategy is capable of guar- anteeing unanimity regarding team decisions. How unanimity is guaranteed in the offer acceptance phase is clear, since a voting process with unanimity rule is employed. In [33] we showed how unanimity is also guaranteed in the offer sent to the opponent. More specifically, the strategy is capable of guaranteeing a strict unanimity: for any team member ai, the offer sent to the opponent reports a utility that is greater than or equal to its aspiration level sai (t). This is possible thanks to the iterated building process and the assumptions in team members' utility functions. Since team members share the same type of monotonic valuation functions, the use of the max/min operator (max for monotonically increasing valuation functions, min for monotonically decreasing functions) ensures that for each attribute, each team member either gets exactly the value demanded for the attribute or it gets a value that reports a utility greater than or equal to the utility they demanded for the attribute. Hence, when team members demand the exact value needed to get as close as possible to their desired utility level, they will always get the same or greater utility than the one they actually demanded. Thus, in the end, the offer will yield a utility that is equal to or greater than their aspiration levels at round t. 4. Experimental Analysis In this section we study how the four intra-team strategies presented in this article perform under different environmental conditions. First, we introduce the negotiation case employed for our experiments. Then, the environmental conditions and performance measures studied are introduced and explained to the reader. Finally, we describe the experiments carried out, and we analyze the results provided by each intra-team strategy. 4.1. Negotiation Case: Group Booking The negotiation case employed for our experiments is based on a group book- ing negotiation with a hotel, which also illustrates the types of applications that can be built using the intra-team strategies proposed in this article. In this sce- nario, a group of friends who have decided to spend their holidays together has to book accommodation for their stay. Their destination is Rome, and they want to spend a whole week. Each friend is represented by his/her electronic agent, who acts semi-automatically on behalf of its user. This agent has pre- viously elicited the preferences of its user regarding booking conditions. Each group member has different preferences regarding possible booking conditions. Thus, the final agreement with the hotel should satisfy every friend as much as possible. The group of agents engages in a negotiation with a well-known ho- tel in their city of destination, which is also represented by an electronic agent. During the pre-negotiation, both parties have decided to negotiate the following issues: 20 • Price per person (pp): The price per person is the amount of money that each friend will pay to the hotel for the accommodation service. The issue domain goes from 210$, which is the minimum rate (30$ per night), to 700$, which is the maximum rate (100$ per night). A realistic assump- tion in the group of friends is that friends prefer to pay lower prices to higher prices (i.e., monotonically decreasing valuation function), whereas the seller prefers to charge higher prices to lower prices (i.e., monotonically increasing valuation function). • Cancellation fee per person (cf ): When a booking is cancelled, the hotel charges a fee to compensate for losses. The issue domain goes from 0$ (no cancellation fee) to 150$. A realistic assumption in the group of friends is that friends prefer to pay lower prices to higher prices (i.e., monotonically decreasing valuation function), whereas the seller prefers to charge higher prices to lower prices (i.e., monotonically increasing valuation function). • Full payment deadline (pd): The full payment deadline indicates when the group of friends has to pay the full price booking in order to confirm their reservation. The domain goes from "Today"=0 days (the date time when the final agreement has been signed) to "Departure Date"=30 days, which indicates that the team should only pay when leaving the hotel. A realistic assumption in the group of friends is that friends prefer to pay as late as possible (i.e., monotonically increasing valuation function), whereas the seller prefers to charge as soon as possible (i.e., monotonically decreasing valuation function). • Discount in bar (db): As a token of respect for good clients, the hotel offers nice discounts at the hotel bar. The issue domain goes from 0% (no discount) to 20%. A realistic assumption in the group of friends is that friends prefer higher discounts to lower discounts (i.e., monotonically increasing valuation function), whereas the seller prefers to offer lower dis- counts prices to higher discounts (i.e., monotonically decreasing valuation function). 4.2. Negotiation Environment Conditions & Team Performance We consider that the negotiation environment plays a very important part in team dynamics. It may not be the same using a representative approach in a setting where all of the team members' preferences are very similar than a setting where team members' preferences are exactly the opposite. Since condi- tions of the negotiation environment highly vary depending on the application domain, we decided to focus on those general conditions that are present in almost every negotiation scenario involving negotiation teams: opponent dead- line, team deadline, team members' preference similarity, opponent concession speed, and team size. Regarding team performance, it is also acknowledged that there are several well known social welfare measures to assess the quality of decisions in a society. A negotiation team can be considered a small society, and, thus, social welfare 21 measures can also be considered appropriate measures for measuring negotiation teams' performance. More specifically, we study the impact of the negotiation environment on the minimum utility of team members (i.e., egalitarian social welfare [4]), and the average utility of team members (i.e., a special case of ordered weighted averaging [4]). However, we do not only restrain our analysis to social welfare measures. Computational measures like the number of negotiation rounds are also analyzed for all of the intra-team strategies. 4.2.1. Environment Condition: Opponent Deadline Length One of the issues that can affect the negotiation process is the number of interactions that the opponent has until he decides that negotiating is no longer worthy, namely opponent deadline Top. We partitioned the opponent negoti- ation deadline in three different classes: short deadline Top = U [5, 10] = S1, medium deadline Top = U [11, 29] = M , and long deadline Top = U [30, 60] = L. 4.2.2. Environment Condition: Team Deadline Length Similarly, the maximum number of rounds that the team has to negotiate also may impact the performance of the different intra-team strategies. As in the case of the opponent deadline, we partitioned the team deadline in three different classes: short deadline TA = U [5, 10] = S, medium deadline TA = U [11, 29] = M , and long deadline TA = U [30, 60] = L. 4.2.3. Environment Condition: Team Similarity 25 different linear utility functions were randomly generated. These utility functions represented the preferences of potential team members. 25 linear utility functions were generated to represent the preferences of opponents. These utility functions were generated by taking potential teammates' utility functions and reversing the type of Vi(.). In order to determine the preference diversity in a team, we decided to compare team members' utility functions. We introduce a dissimilarity measure based on the utility difference between offers. The dissimilarity between two teammates can be measured as follows: (cid:80) ∀X∈[0,1]n Uai(X) − Uaj (X) X ∈ [0, 1]n D(Uai(.), Uaj (.)) = (24) If the dissimilarity between two team members is to be measured exactly, it needs to sample all of the possible offers. However, this is not feasible in the current domain where there is an infinite number of offers. Therefore, we limited the number of sampled offers to 1000 per dissimilarity measure. Due to the fact that a team is composed by more than two members, it is necessary to provide a team dissimilarity measure. We define the team dissimilarity measure as the average of the dissimilarity between all of the possible pairs of teammates. 1U[5,10] is a uniform distribution from 5 to 10 22 For all of the teams that had been generated, we measured their dissimilarity and calculated the dissimilarity mean ¯dt and standard deviation σ. We used this information to divide the spectrum of negotiation teams according to their diversity. Our design decision was to consider those teams whose dissimilarity was greater than, or equal to ¯dt+1.5σ as very dissimilar, and those teams whose dissimilarity was lower than, or equal to ¯dt− 1.5σ as very similar. In each case, 100 random negotiation teams were selected for the tests, that is, 100 teams were selected to represent the very similar team case, and 100 teams were selected to represent the very dissimilar team case. These teams participate in the different environmental scenarios, where they are confronted with one random half of all of the possible individual opponents. Therefore, each environmental scenario (complete instantiation of all the environmental conditions) consists of 100×12×4=4800 different negotiations (each negotiation is repeated 4 times to capture stochastic variations in the different intra-team strategies). 4.2.4. Environment Condition: Opponent Concession Speed The concession speed of the opponent during the negotiation process βop may determine the final quality of the agreement for team members. For instance, if the opponent concedes very quickly towards its reservation utility, better agree- ments for the team may come earlier in the negotiation process. In those cases, even intra-team strategies that guarantee less degree of unanimity may achieve good results. We divided the family of concession speeds based on the classic classification of time-tactics: we considered that when βop = U [0.1, 0.49] = V B the concession speed is very boulware, when βop = U [0.5, 0.99] = B the con- cession speed is boulware, when βop = U [1, 10] = C the concession speed is conceder, when βop = U [11, 40] = V C the concession speed is very conceder. Similarly, when we refer to βA (the team concession speed), we will also employ the same partition in boulware (B), very boulware (VB), conceder (C), and very conceder (VC). 4.2.5. Environment Condition: Number of Team Members We think that the number of team members may also influence the perfor- mance of the different intra-team strategies. Some of the strategies may become too demanding when the number of team members increases and it may result in more negotiations ending in failure. Therefore, we decided to study the effect of the team size on the performance of the different intra-team strategies. The number of team members A ranged from 4 to 8. This number of team members is motivated by the negotiation case employed in our experiments. We consider that groups of friends from 4 to 8 persons are reasonable in practice. 4.2.6. Team Performance: Number of Negotiation Rounds The number of negotiation rounds considers the number of interactions be- tween the team and the opponent. It is a measure employed to assess the negotiation time employed by the different negotiation strategies to reach a fi- nal agreement. In our study, every pair offer/counter-offer in the negotiation 23 thread is considered as a negotiation round. In equal conditions of utility per- formance, those intra-team strategies that spend less negotiation rounds are preferred since they employ less negotiation time to reach a final agreement. 4.2.7. Team Performance: Minimum Utility of Team Members The minimum utility of team members (Min.) in a negotiation represents the utility of the final agreement for the less benefited team member. If the final agreement is X and the team is composed of M different team members A = {a1.a2, ..., aM}, the minimum utility of team members can be calculated as: M in.(X) = min 1≤i≤M Uai(X) (25) In applications where there is a strong bond among team members (i.e., the group of travelling friends), team members may attempt to maximize the min- imum utility of team members in order to avoid extremely unsatisfied team members and a degradation of the relationship among team members. Even if a strong bond is not present among team members, an agent may attempt to maximize the minimum utility of team members if it thinks that its own utility is going to be the less favored utility by the final agreement. 4.2.8. Team Performance: Average Utility of Team Members If the final agreement is X and the team is composed of M different team members A = {a1.a2, ..., aM}, the average utility of team members can be cal- culated as: Ave.(X) = Uai(X) (26) (cid:88) 1 M 1≤i≤M A less conservative agent may attempt to maximize the average utility of team members if it thinks that its own utility is not going to be the less favored utility by the final agreement. 4.3. Results 4.3.1. Number of Negotiation Rounds Although we measured the number of negotiation rounds in each experiment, we found that a general pattern was found in almost every experiment. Thus, instead of commenting the results for the number of negotiation rounds in each experimental section, we decided to present the performance of the four intra- team strategies according to the number of negotiation rounds just once. As a sample for this behavior, we can observe the number of negotiation rounds spent by each intra-team strategy when team and opponent have a long deadline (Top = L and TA = L), the number of team A members is set to 4, and the opponent uses different concessions speeds βop in Table 2. As long as the concession speed of the four intra-team strategies can be categorized as the same type, RE is usually the fastest intra-team strategy in number of negotiation rounds, followed by SSV, then SBV, and finally FUM. Since less unanimity is guaranteed among team members, it is logical that there 24 Very Similar, Top = TA = L, M = 4 Very Dissimilar, Top = TA = L, M = 4 βop = V C βop = C βop = B βop = V B Rounds 2.01 RE βA = V C 2.02 SSV βA = V C SBV βA = V C 2.01 FUM βA = V C 2.11 2.39 RE βA = C 2.73 SSV βA = C 3.02 SBV βA = C 4.09 FUM βA = C 9.17 RE βA = B SSV βA = B 15.53 17.96 SBV βA = B 20.31 FUM βA = B 22.50 RE βA = V B 28.62 SSV βA = V B SBV βA = V B 31.50 FUM βA = V B 32.77 Rounds Rounds Rounds 2.28 2.41 2.70 2.63 3.77 5.17 6.18 6.23 13.63 19.99 22.40 23.25 25.47 31.44 33.21 33.67 7.25 8.35 10.48 10.31 11.07 13.17 15.55 14.01 22.48 26.97 28.88 25.59 31.59 35.27 36.24 33.97 19.57 22.08 24.83 24,10 23.47 25.33 27.32 26.45 30.73 32.95 34.21 33.09 35.51 37.22 37.80 37.15 βop = V C βop = C βop = B βop = V B Rounds 2.03 RE βA = V C 2.00 SSV βA = V C SBV βA = V C 2.05 FUM βA = V C 2.90 2.28 RE βA = C 2.45 SSV βA = C 2.99 SBV βA = C 6.54 FUM βA = C 6.57 RE βA = B SSV βA = B 12.09 16.50 SBV βA = B 25.93 FUM βA = B 17.22 RE βA = V B 25.44 SSV βA = V B SBV βA = V B 30.10 FUM βA = V B 35.00 Rounds Rounds Rounds 2.33 2.71 3.44 4.52 3.30 5.17 7.12 10.47 10.02 18.26 22.74 28.53 21.14 30.04 33.29 36.59 7.78 9.97 12.99 16.29 10.98 14.83 18.64 21.13 19.94 26.42 30.54 30.97 28.94 34.59 36.77 36.39 19.71 24.35 27.33 30.70 22.84 27.43 30.08 32.66 29.19 33.52 35.76 36.96 34.50 37.64 38.74 39.01 Table 2: The table depicts the comparison of the intra-team strategies when both parties have a long deadline. Results show the average number of rounds spent in the negotiation. may be less conflict with the opponent and, thus, agreements are found faster with low unanimity strategies like RE and SSV. The main exception for this rule is when team members are very similar and the opponent uses either boulware or very boulware concession speeds. In those cases, FUM is able to finalize negotiations successfully in fewer rounds than SBV (and sometimes SSV). The learning heuristic employed by FUM benefits from the fact that the opponent usually concedes more in those attributes that are less important and, thus, it is able to infer a proper agenda and propose better offers to the opponent (ending the negotiation faster). This pattern did not exist when team members are very dissimilar, since in that case, FUM also has to deal with more intra-team conflict. This results in more demanding offers to guarantee unanimity. Additionally, as expected, as the concession strategy of team members be- comes more conceder, the number of negotiation rounds spent is lower. Thus, RE using βA = V B is slower than RE using βA = B, which is slower than RE using βA = C, which is slower than RE using βA = V C. The number of negotiation rounds spent by each intra-team strategy is es- pecially interesting to select intra-team strategies when they perform equally in utility terms (minimum or average utility). For instance, if SBV and FUM tie in utility terms, a team is suggested to select SBV most of the times due to the fact that it usually requires less negotiation rounds, if SSV and SBV tie in utility terms, the team should select SSV since it usually requires less rounds than SBV, and so forth. 4.3.2. Same Type of Deadlines The next set of experiments that we conducted consisted in assessing which intra-team strategies work better when both parties have the same type of dead- line. More specifically, we chose those scenarios where both parties have short deadlines or long deadlines. Additionally, for each type of deadline, we simulated 25 βop = V C Min. 0.687 RE β = B 0.709 SSV β = B SBV β = B 0.719 FUM β = B 0.691 Ave. 0.794 0.797 0.796 0.772 Ro. 2.94 3.33 3.67 4.26 βop = V C Min. 0.758 RE β = B 0.757 SSV β = B 0.774 SBV β = B FUM β = B 0.752 Ave. 0.853 0.833 0.833 0.816 βop = V C Min. 0.264 RE β = B 0.503 SSV β = B SBV β = B 0.550 FUM β = B 0.554 Ave. 0.621 0.730 0.735 0.709 Ro. 9.18 15.54 17.97 20.32 Ro. 2.551 2.983 3.659 5.103 Very Similar, Top = TA = S, M = 4 βop = C Ave. 0.711 0.706 0.703 0.721 Ro. 3.67 4.35 4.73 4.88 Min. 0.590 0.610 0.620 0.622 βop = B Ave. 0.551 0.561 0.568 0.608 Ro. 5.08 5.66 5.93 5.93 Min. 0.415 0.459 0.477 0.483 Very Similar, Top = TA = L, M = 4 βop = C Ave. 0.779 0.765 0.765 0.770 Min. 0.667 0.671 0.698 0.695 Ro. 13.637 19.995 22.409 23.264 Min. 0.476 0.514 0.541 0.606 βop = B Ave. 0.617 0.629 0.628 0.725 Ro. 22.486 26.981 28.891 25.603 Very Dissimilar, Top = TA = S, M = 4 βop = C Ave. 0.549 0.662 0.653 0.657 Ro. 3.169 4.054 4.900 5.750 Min. 0.198 0.417 0.467 0.468 βop = B Ave. 0.421 0.526 0.526 0.584 Ro. 4.67 5.74 6.229 6.564 Min. 0.115 0.295 0.341 0.348 Very Dissimilar, Top = TA = L, M = 4 βop = V C Min. 0.383 RE β = B 0.571 SSV β = B SBV β = B 0.650 FUM β = B 0.627 Ave. 0.725 0.788 0.797 0.756 Ro. 6.583 12.103 16.508 25.938 Min. 0.270 0.451 0.551 0.564 βop = C Ave. 0.630 0.707 0.713 0.714 Ro. 10.030 18.625 22.746 28.536 Min. 0.118 0.283 0.373 0.489 βop = B Ave. 0.454 0.573 0.562 0.724 Ro. 19.945 26.430 30.552 30.976 βop = V B Ave. 0.408 0.423 0.427 0.475 Ro. 6.31 6.57 6.79 6.78 βop = V B Ave. 0.457 0.484 0.489 0.560 Ro. 30.735 32.960 34.220 33.100 βop = V B Ave. 0.303 0.371 0.368 0.445 Ro. 6.171 6.771 7.050 7.224 βop = V B Ave. 0.319 0.430 0.416 0.543 Ro. 29.198 33.525 35.766 36.968 Min. 0.292 0.335 0.348 0.356 Min. 0.327 0.372 0.402 0.442 Min. 0.072 0.182 0.213 0.236 Min. 0.064 0.180 0.242 0.318 Table 3: The table shows the comparison of the intra-team strategies when both parties have the same type of deadline. Results show the average for the minimum utility of team members (Min.), the average utility of team members (Ave.), and the number of rounds (Ro.). The results in bold font indicate those configurations that are statistically better and different (t-test α = 0.05) to the rest of configurations. scenarios where team members were either very dissimilar, or very similar, and gathered information about the minimum and average utility of team mem- bers regarding each possible strategy configuration (team concession speeds, intra-team strategies, opponent concession speeds, etc.). The number of team members remained static at A = 4. The results for this experiment can be found in Table 3. It shows the average minimum utility of team members (Min.), the average of the average utility of team members (Ave.), and the average number of rounds (Ro.). It only shows the results for intra-team strategies using a Boulware concession speed since we found that this concession speed worked better than the rest of concession speeds. When both parties have a short deadline (first and third sub-table in Table 3), independently of team similarity, SBV β = B and FUM β = B are usually the best options for the minimum utility. The unanimity and semi-unanimity rules employed by this strategy make possible for the worst affected team mem- ber to ensure that its situation is better than with other strategies. As for the average utility of team members, FUM β = B usually is the best option. The only exception for this pattern is when the opponent uses conceder strategies (βop = V C or βop = C). In that case, all of the strategies perform similarly, 26 especially when team members are very similar. For instance, we can observe that RE, SSV, SBV β = B are the best option for the average utility of team members when the deadline is short, team members are very similar, and the opponent uses a very conceder strategy. In the same setting, but with the op- ponent using a conceder strategy, FUM is statistically better but the differences are not very important (less than a 1.8%). However, when both parties have a long deadline to negotiate (subtables 2 and 4 in Table 3), FUM β = B becomes the best choice for the minimum and average utility of team members in almost every scenario. The only exceptions for this superiority are, again, scenarios where the opponent employs conceder strategies. For instance, when the deadline is long, team members are very dissimilar, and the opponent uses a very conceder strategy, SBV β = B is the best intra-team strategy for the minimum and average utility of team members. We can also observe that RE and SSV are specially affected by very dissimilar preferences' scenarios. When team members are very similar, both strategies are capable of being close to SBV and FUM in the minimum and average utility of team members as long as the opponent plays conceder strategies. However, both intra-team strategies' results get further from those of SBV and FUM when team members are very dissimilar. These intra-team strategies are not able to tackle situations where team members have very dissimilar preferences due to the type of decision rule applied, and their use in such situations is discouraged. The reason why several strategies perform similarly in utility terms when the opponent plays conceder strategies is simple: Since the opponent concedes very fast in the first rounds of the negotiation process, as long as the team does not concede very fast (i.e., boulware strategy), all of the strategies are capable of finding a reasonable good agreement in the first rounds by letting the opponent concede and then accepting the opponent's offer. However, there is an additional reading that explains why strategies like FUM, which guarantees unanimity regarding team decisions, does not perform so well when the opponent uses conceder strategies. FUM relies on the assumption that the opponent concedes very little in those attributes that are important for its interests at the first rounds. However, when the concession strategy carried out by the opponent is conceder or very conceder (a more acute effect) big concessions are usually carried out at the first rounds. Thus, FUM is not able to infer an appropriate agenda. In [33], it was shown that as the agenda gets further from the real ranking of opponent preferences, the more demanding becomes the strategy. This may have a negative effect in the negotiation, since more negotiations may end in failure due to the high demands of the team. In fact a slight effect is observed in the results: when the opponent uses a boulware strategy, the percentage of successful negotiations is 94.6% which is greater than the 92.6% obtained when the opponent uses a conceder strategy and the 93.1% obtained when the opponent uses a very conceder strategy. Another issue found in the results is the difference between FUM and other strategies when the deadline is long. FUM tends to obtain better results when the deadline is long for both parties. The differences with the other intra-team strategies become greater when compared with the short deadline scenario. The 27 reason for this phenomenon is similar to the reason mentioned in the paragraph above. FUM is a strategy that relies on the information gathered in the negoti- ation process. Thus, when interactions are lesser, like when deadlines are short, the agenda inferred by the trusted mediator is less close to the ideal agenda. When the agenda deviates from the ideal agenda, offers proposed by the team are more demanding and less probable to be accepted by the opponent. As a matter of fact, the reader can notice that the difference on average between FUM β = B in long deadline scenarios (aggregating all of the scenarios where the deadline is long) and the results obtained by FUM β = B in short deadline (aggregating the scenarios where the deadline is short) scenarios counterpart is 7.9%, whereas it is 5.3% for SBV, 5.4% for SSV and 5.8% for RE. Logically, every intra-team strategy benefits from having a longer deadline, but the results suggest that FUM benefits more than the rest of intra-team strategies due to its learning heuristic, which is based on the amount of information. 4.3.3. Different Types of Deadlines The next experiment consisted in studying the behavior of the different intra- team strategies when both parties have different types of deadline. Thus, in this case, one of the two parties has a deadline which is lower than the deadline of the other party. Clearly, the party with a lower deadline is at disadvantage with respect to the other party since it has fewer offers to send before ending the negotiation, and the pressure to accept the opponent's offers arises earlier. Short Team Deadline and Long Opponent Deadline. First, we start by analyzing the case where the deadline of the team is shorter (short deadline) than the deadline of the opponent party (long deadline). Hence, TA = U [5, 10] and Top = U [30, 60]. The results of this experiment can be found in Table 4. In this case, the team has a shorter deadline and, thus, it should be at disadvantage with respect to the opponent. However, we can observe that when the opponent uses a conceder or very conceder strategy, the results are similar to the analogous case where both parties had a short deadline. These results can be explained due to the fact that since the opponent concedes very quickly, a good deal can be found for the team in the first rounds of the negotiation process and the team is not affected by the fact that its deadline is shorter. Nevertheless, as the opponent moves towards Boulware strategies, there is a clear negative effect on the minimum and average utility of team members: all of the strategies are affected by the fact that the team has a shorter deadline. In the scenario where both parties have a short deadline (see Table 3), the average for the average utility of team members in conceder settings (aggregating those negotiations where βop = C or βop = V C) is 0.67, and the average for the average utility of team members in boulware settings (aggregating those negotiations where βop = B or βop = V B) is 0.45. Thus, the average utility for team members is reduced a 22%. In this experiment (see Table 4), the average of the average utility of team members in conceder settings is 0.63, whereas the average of the average utility of team members in boulware settings is 0.10. Therefore, the 28 average utility of team members is reduced a 53%, approximately doubling the difference found in the case where both parties had a short deadline. When team members are very similar (upper sub-table in Table 4), it can be observed that, as in the scenario where both parties have a short deadline and team members are very similar, several strategies perform very similarly. The main difference resides in the fact that the only strategy capable of reaching similar results to FUM β = B in the minimum and average utility is RE β = B. Differently to the case when team members are very similar and the deadline for both parties is short, the RE βA = B strategy is capable of achieving similar re- sults to the other intra-team strategies even in less conceding settings (βop = C, βop = B, and βop = V B). These results suggest that, despite not assuring any minimum level of unanimity, employing a representative with a reasonably slow concession (boulware) leads to good results compared with those obtained by other intra-team strategies. A closer look at the experiments threw some light over these results. For instance, when βop = B, the number of successful negotiations was 2695 for RE βA = B, 1925 for FUM βA = B, 1855 for UBS βA = B, and 2394 for SSV βA = B. The average utility for successful negotia- tions was 0.32 for RE βA = B, 0.34 for SSV βA = B, 0.39 for SBV βA = B, and 0.42 for FUM βA = B. Hence, despite obtaining less quality results in success- ful negotiations, the representative approach becomes a good option for these scenarios because it leads to a great number of negotiations ending in success where other intra-team strategies fail to succeed (utility=0). SSV, UBS, and FUM need more interactions to find a satisfactory deal, but when they find it, it is better in utility terms. However, in average, a representative approach may be more adequate for settings where the team has a shorter deadline than the opponent. As for the scenario where team members are very dissimilar (lower sub-table in Table 4), we can observe that the negative effect produced by having a shorter deadline is especially acute when the opponent uses boulware or very boulware concessions. The dissimilarities between team members, and the fact that there are very few interactions to find a deal that satisfies both team and opponent, contribute to a strong reduction in the minimum and the average utility of team members. In terms of the minimum utility of team members, F U M and SBV βA = B work better when the opponent uses conceder or very conceder concessions. However, almost every intra-team strategy performs equally bad in terms of the minimum utility of team members when the opponent moves to- wards boulware concessions (especially in the very boulware case). In this case, the representative approach can no longer compete with the rest of strategies in terms of utility in most scenarios. Nevertheless, despite team members being very dissimilar and RE not guaranteeing any unanimity regarding team deci- sions, RE performs slightly better than the rest in terms of the average utility of team members when the opponents concedes using boulware. The explanation to this phenomenon is similar to the case where team members were very simi- lar: a lesser number of negotiations end in failure (26% failures for RE, 33% for SSV, 48% for SBV, and 46% for FUM), which compensates for the dissimilarity between team members' preferences and the unanimity level guaranteed by RE. 29 Very Similar, Top = L, TA = S, M = 4 βop = V C βop = C βop = B βop = V B Min. 0.643 RE β = B 0.648 SSV β = B SBV β = B 0.656 FUM β = B 0.651 Ave. 0.756 0.748 0.743 0.747 Ro. 3.232 3.895 4.370 4.733 Min. 0.483 0.465 0.473 0.494 Ave. 0.242 0.227 0.199 0.222 Very Dissimilar, Top = L, TA = S, M = 4 Ave. 0.609 0.576 0.568 0.612 Ro. 4.542 5.468 5.995 5.931 Min. 0.152 0.145 0.139 0.150 βop = V C βop = C Min. 0.245 RE β = B 0.459 SSV β = B 0.511 SBV β = B FUM β = B 0.520 Ave. 0.596 0.703 0.706 0.704 Ro. 2.771 3.444 4.377 5.825 Min. 0.153 0.280 0.313 0.336 Ave. 0.482 0.540 0.496 0.545 Ro. 3.870 5.553 6.677 7.003 Min. 0.025 0.035 0.028 0.026 βop = B Ave. 0.170 0.156 0.082 0.084 Ro. 7.112 7.544 7.876 7.818 Ro. 7.111 7.919 8.282 8.333 Min. 0.027 0.024 0.019 0.029 Min. 0.002 0.002 0.001 0.001 Ave. 0.048 0.040 0.028 0.046 βop = V B Ave. 0.040 0.017 0.064 0.060 Ro. 8.284 8.396 8.457 8.424 Ro. 8.231 8.526 8.560 8.565 Table 4: Comparison of the intra-team strategies when the team has a short deadline and the opponent party has a long deadline. Results show the average for the minimum utility of team members (Min.), the average utility of team members (Ave.), and the number of rounds (Ro.). The results in bold font indicate those configurations that are statistically better and different (t-test α = 0.05) to the rest of configurations. In any case, the utility obtained for team members is so low in the average and minimum utility of team members that, in some cases, it may even be better not to negotiate with such kind of opponent and spend computational resources in looking for another alternative. Long Team Deadline and Short Opponent Deadline. In this case, the team has an advantage over the opponent since its maximum deadline is longer than the opponent's deadline. The goal of these experiments is to determine the combi- nation of intra-team strategies and negotiation parameters that maximize the different social welfare measures employed. Thus, if the team has a maximum deadline equal to the uniform distribution TA = U [30, 60], the team may decide to play (prior to the negotiation) a different class of deadline like a medium deadline (TA = U [11, 29]) or a short deadline (TA = U [5, 10]) if the results of the simulation suggest that better results are obtained by not playing the max- imum deadline. Thus, we also show the results for teams that play a medium deadline, and teams that play a short deadline. In this experiment, the oppo- nent plays a short deadline Top = U [5, 10]. The results of this experiment for the very similar scenario can be observed in Fig. 1, whereas the results for the very dissimilar scenario can be observed in Fig. 2. We start by analyzing the results for scenarios where team members are very similar (Fig. 1). We can observe that for situations where the opponent is very conceder, the team benefits from playing strategies with the same deadline. Since the opponent concedes very fast in the first negotiation rounds, the best deals for the team may be proposed in the first negotiation rounds. Playing a longer deadline may be risky since the team may have extremely high aspirations during the whole negotiation, which results in most offers being rejected and ending the negotiation in failure. As a matter of fact, the number of successful negotiations for intra-team strategies playing a short deadline and boulware con- cession was 95.1%, 68% for medium deadline and boulware concession, and 45% 30 Figure 1: Results for very similar team members when the team has a long deadline and the opponent has a short deadline. The dots indicate those configurations that perform statistically better than the rest (t-test α = 0.05) for long deadline and boulware concession, 29% for medium deadline and very boulware concession, and 14% for long deadline and very boulware concession. Other configurations may have a higher number of successful negotiations, but they are not able to retain as much utility as the boulware configuration. As the opponent starts to move towards strategies that concede more slowly, the best intra-team strategies for the team are those played with a medium deadline and 31 (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)B Figure 2: Results for very dissimilar team members when the team has a long deadline and the opponent has a short deadline. The dots indicate those configurations that perform statistically better than the rest (t-test α = 0.05) boulware strategy (RE, SBV and SSV β = B). In those cases, the opponent may not propose the best deals for the team until its last negotiation rounds. Thus, playing a slightly longer deadline with a boulware concession comes at an advantage for the team since the team does not fully concede in the whole negotiation and still accepts last opponent's offers. Some strategies played with a medium deadline like FUM β = B are still too demanding, end up in more 32 (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BDBA(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:9)FF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)(cid:6)(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)AB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)CD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:9)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAA(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BAB(cid:8)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)BCD(cid:6)(cid:3)(cid:4)(cid:5)E(cid:3)(cid:7)(cid:5)(cid:8)B(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BAA(cid:8)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BDBA(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BCD(cid:6)(cid:3)(cid:4)(cid:5)A(cid:3)(cid:7)(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)(cid:6)(cid:22)(cid:23)(cid:22)(cid:24)(cid:25)(cid:24)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)BFF(cid:16)(cid:17)F(cid:16)(cid:18)F(cid:16)(cid:19)F(cid:16)(cid:20)(cid:21)%&(cid:31)" '(cid:31)(cid:3)D(cid:26)(cid:22)(cid:27)(cid:22)(cid:26)(cid:28)(cid:3)(cid:29)(cid:30)(cid:3)(cid:4)(cid:31) (cid:24)(cid:3)(cid:6)(cid:31)(cid:24)!(cid:31)"#(cid:4)(cid:29)$(cid:5)A(cid:3)(cid:3)(cid:3)(cid:3)B(cid:29)$(cid:5)(cid:8)B negotiation failures, and have very little information to learn the opponents' preferences. The very dissimilar scenario (Fig. 2) is a little bit different. In this scenario, the team needs to deal with strong divergences in their preferences too. Thus, teams are prone to be more demanding in order to accommodate the preferences of as many team members as possible. We can observe that for cases where the opponent uses conceder strategies, the team should play boulware strategies with the same deadline. Similarly to the very similar scenario, playing a longer deadline is risky since it results in extremely high aspirations and most offers being rejected. However, in the very dissimilar scenario, the transition from selecting short deadline strategies to selecting medium deadline strategies does not appear until the opponent uses boulware strategies. This may be explained precisely due to the dissimilarity among team members, which requires stronger demands that are not met when playing medium deadline. As the opponent starts to concede using boulware strategies, the best intra-team strategies are usually found in the medium deadline, as in the very similar scenario case. In conclusion, in this experiment we have observed that, generally, even though the team is able to play a long deadline and the opponent plays a short deadline, the team would benefit more from playing the same type of deadline than the opponent or a slightly longer deadline. 4.3.4. Team size effect on intra-team strategies We also decided to analyze the effect of the team size on the performance of the different intra-team strategies. Thus, we repeated the conditions in 4.3.2 increasing the number of team members. However, we only analyzed intra- team strategies whose βA = B since they were those one that obtained better results in Table 3. We excluded the RE strategy from the analysis. Since team members do not interact in RE and no unanimity level is guaranteed, the inclusion of additional team members should not affect the way in which the strategy works. The results of this experiment can be found in Figure 3. It shows the average and minimum utility of team members for teams of size A = {4, 5, 6, 7, 8}. Generally, it can be observed in all of the graphics in Figure 3 that, as the number of team members increases, the quality of the results in terms of the minimum and the average utility is reduced. This behavior was expected since as the number of agents increases, the set of possible agreements is reduced and the conflict inside the team and with the opponent is increased. However, the reduction in utility terms can be appreciated more easily in the minimum utility of team members. The average for the average utility of team members when A = 4 is 0.70 (aggregating all other factors) and 0.67 for A = 8 (aggregating all other factors), whereas the average for the minimum utility of team members when A = 4 is 0.48 and 0.41 for A = 8. As the number of team members increases, the contribution of each team member to the average utility is lesser, and that is the reason why the negative effect of team size on utility measures can be observed more easily in the minimum utility of team members than in the average utility of team members. 33 We expected that as the number of team members increased, the perfor- mance of unanimity intra-team strategies like FUM would greatly decrease com- pared to the performance of SSV since more team members would increase the demands of the team and make offers less interesting for the opponent. How- ever, the difference in performance between the three strategies is approximately maintained in almost every graphic as the number of team members increases. Therefore, team size did not have a different effect on the performance of the three intra-team strategies, affecting all of intra-team strategies equally. The decision on which intra-team strategy should be chosen is not affected by team size. The only clear exceptions to this rule are scenarios where the opponent uses conceder strategies (βop = C and βop = V C) and team members' preferences are very dissimilar (first two graphics in rows 3 and 4, Figure 3). In these scenarios, we can observe that there is a special negative effect of team size on the performance (mininum utility and specially in the average utility) of FUM with respect to the other intra-team strategies, which results in FUM being one of the worst choices when the number of team members in large (e.g., second graphics in rows 3 and 4, Figure 3). As a numeric example of the reduction in the performance of FUM , the difference in the average utility between SBV and FUM goes from approximately a 2% (A = 4) to 10% (A = 8) when βop = V C and the deadline is short, from approximately a 0% (A = 4) to 5% (A = 8) when the deadline is short and βop = C, and from 3% (A = 4) to 8% (A = 8) when the deadline is long and βop = V C . This phenomenon has a reasonable explanation. When the opponent uses conceder strategies, FUM has greater difficulties to learn a proper attribute agenda. If the number of team members increases and they are very dissimilar, the demands of team members increase, which summed up to the fact that the agenda does not properly reflect the preferences of the opponent, results in demanding team proposals. 5. Related Work Multi-agent systems have gained a growing interest as the infrastructure necessary for the next generation of distributed systems. Due to the inherent conflict among agents, techniques that allow agents to solve their conflicts and cooperate are needed. This need is what has given birth to a group of tech- nologies which have recently been referred to as agreement technologies [26, 37]. Trust and reputation [31, 40, 41], norms [7, 5], agent organizations [15, 9, 38], argumentation [29, 28] and automated negotiation [18, 36] are part of the core that makes up this new family of technologies. Even though agreement technologies are a novel topic in the community of agent research, some of its core technologies like automated negotiation have been studied by scholars for a few years. In definition, automated negotiation is a process carried out between two or more parties in order to reach an agree- ment by means of exchange of proposals. Two different research trends can be distinguished in automated negotiation models. The first type of model aims to calculate the optimum strategy given certain information about the opponent 34 Figure 3: Size effect when team and opponent have the same type of deadline and the negotiation environment [16, 6, 12]. The second type of model encloses heuristics that do not calculate the optimum strategy but obtain results that aim to be as close to the optimum as possible [10, 19, 11, 23]. These models assume imperfect knowledge about the opponent and the environment, and aim to be computationally tractable while obtaining good results. This present work can be classified into the latter type of models. In multi-agent systems, most of the research has concentrated on bilateral models where each party is a single individual. The present article studies bilateral negotiations where at least one of the parties is a negotiation team, composed by more than a single individual. It should be noted that the problem of finding an agreement for a negotiation team is inherently complex since it 35 (cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)"(cid:8)(cid:9)"(cid:4)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)(cid:8)(cid:9)(cid:7)(cid:4)(cid:8)(cid:9)%ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)ABCDEF(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)((cid:8)(cid:9)((cid:4)(cid:8)(cid:9)"(cid:8)(cid:9)"(cid:4)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)#(cid:8)(cid:9)#(cid:4)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)FE(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)(cid:8)(cid:9)(cid:6)(cid:4)(cid:8)(cid:9)(cid:7)(cid:8)(cid:9)(cid:7)(cid:4)(cid:8)(cid:9)%ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:24)E(cid:23)(cid:21)(cid:22)(cid:2)(cid:24)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)((cid:5)(cid:8)(cid:9)"((cid:8)(cid:9)"(cid:5)(cid:8)(cid:9)#((cid:8)(cid:9)#(cid:5)(cid:8)(cid:9)(cid:3)((cid:8)(cid:9)(cid:3)(cid:5)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:27)(cid:16)(cid:28)(cid:16)(cid:17)(cid:29)(cid:17)E(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D(cid:1)(cid:2)(cid:3)(cid:1)(cid:2)(cid:4)(cid:1)(cid:2)(cid:5)(cid:1)(cid:2)(cid:6)(cid:1)(cid:2)(cid:7)(cid:8)(cid:9)(cid:3)(cid:8)(cid:9)(cid:3)(cid:4)(cid:8)(cid:9)(cid:4)(cid:8)(cid:9)(cid:4)(cid:4)(cid:8)(cid:9)(cid:5)(cid:8)(cid:9)(cid:5)(cid:4)(cid:8)(cid:9)(cid:6)ABCDE&(cid:16)''(cid:16)(cid:17)(cid:16)(cid:18)(cid:19)CE(cid:20)(cid:1)(cid:2)(cid:20)(cid:21)(cid:22)(cid:2)$E(cid:23)(cid:21)(cid:22)(cid:2)(cid:23)E(cid:23)(cid:21)(cid:22)(cid:2)A(cid:23)FFAF(cid:23)A(cid:25)(cid:26)(cid:27)(cid:20)B(cid:19)(cid:17)EF(cid:16)(cid:31)B(cid:1) BC(cid:19)!BE(cid:26)(cid:30)(cid:16)(cid:18)(cid:16)(cid:30)D not only requires finding an agreement with the other party but it also entails reaching some type of unanimity within the team. Even though communications with the opponent party may be similar to classical bilateral models, negotiation teams may require an additional level of negotiation that involves team mem- bers. Thus, classical bilateral models cannot be applied directly if a certain level of unanimity regarding team decisions is necessary . As far as we know, our previous work [34, 35, 33, 32] is the only work that focuses on negotiation teams. In [34] we introduced the topic of negotiation teams in agent research from a descriptive perspective. We analyzed the different phases necessary for an agent- based negotiation team to face such negotiations with success. Apart from the phases that we identified, we also described the current technologies that may be appropriate for the development of such phases. Later, we introduced our first experimental study [35] comparing intra-team strategies in different negotiation environments. That paper should be considered the preliminary basis for our current analysis. We have introduced changes in the intra-team strategies, and our current study applies a more fine-grained analysis of the negotiation envi- ronment and its possible scenarios. Additionally, we also studied the properties of the Full Unanimity Mediated intra-team strategy in [33]. However, a thor- ough analysis of how environmental conditions affect team performance was not carried out. Finally, we should also highlight our work regarding the study of cultural factors in negotiation teams [32]. The setting is different to the current article. We attempted to propose a computational model for explaining how human cultural factors affect team dynamics in negotiation teams composed by humans. In this present article we do not consider humans but automated agents. Therefore, human factors are not relevant to the present study. Apart from agent-based negotiation teams, bilateral negotiation is perhaps the most similar topic to our current research. Hence, we describe some of the most important bilateral models that assume imperfect knowledge. Faratin et al. [10] propose a bilateral negotiation model for service negotiation where agents apply and mix different concession tactics (i.e., time-dependent, imita- tive and resource-dependent). In their work, they analyze the impact of the model's parameters and determine which configurations work better in different scenarios by means of experiments. Our proposed work also assumes the use of time-dependent concession tactics for the calculation of agents' aspirations at each negotiation round. Additionally, we also take an experimental approach to validate the impact of our model's parameters. Later, the authors proposed a bilateral negotiation model [11] whose main novelty was the use of trade-offs to improve agreements between two parties. A trade-off consists of reducing the utility obtained from some negotiation issues with the goal of obtaining the same exact utility from other negotiation issues. The rationale behind trade-offs is to make the offer more likable for the opponent while maintaining the same level of satisfaction for the proposing agent. For that purpose, the authors propose a fuzzy similarity heuristic that proposes the most similar offer to the last offer received from the opponent. Some of our intra-team strategies like Similarity Simple Voting and Similarity Borda Voting also employ similarity heuristics to 36 attempt to satisfy team members' preferences and the opponent's preferences. Jonker and Treur propose the Agent-Based Market Place (ABMP) model [19] where agents, engage in bilateral negotiations. ABMP is a negotiation model where proposed bids are concessions to previous bids. The amount of concession is regulated by the concession factor (i.e., reservation utility), the negotiation speed, the acceptable utility gap (maximal difference between the target utility and the utility of an offer that is acceptable), and the impatience factor (which governs the probability of the agent leaving the negotiation process). Lai et al. [23] propose a decentralized bilateral negotiation model where agents are allowed to propose up to k different offers at each negotiation round. Offers are proposed from the current iso-utility curve according to a similarity mechanism that selects the most similar offer to the last offer received from the opponent. The selected similarity heuristic is the Euclidean distance since it is general and does not require domain-specific knowledge and information regarding the opponent's utility function. Results showed that the strategy is capable of reaching agreements that are very close to the Pareto Frontier. Sanchez-Anguix et al. [36] proposed an enhancement for this strategy in envi- ronments where computational resources are very limited and utility functions are complex. It relies on genetic algorithms to sample offers that are interest- ing for the agent itself and creates new offers during the negotiation process that are interesting for both parties. Results showed that the model is capa- ble of obtaining statistically equivalent results to similar models that had the full iso-utility curve sampled, while being computationally more tractable. As commented above, some of our intra-team strategies use similarity heuristics to satisfy team members' preferences and the opponent's preferences. Another topic that resembles team negotiations are multi-party negotiations. Several works have been proposed in the literature along this line [8, 21, 13]. For instance, Ehtamo et al. [8] propose a mediated multi-party negotiation pro- tocol which looks for joint gains in an iterated way. The algorithm starts from a tentative agreement and moves in a direction according to what the agents prefer regarding some offers' comparison. Results showed that the algorithm converges quickly to Pareto optimal points. Klein et al. [21] propose a medi- ated negotiation model which can be extended to multiple parties. Their main goal is to provide solutions for negotiation processes that use complex utility functions to model agents' preferences. The negotiation attributes are not in- dependent. Therefore, preference spaces cannot be explored as easily as in the linear case. Later, Ito et al. [13] proposed different types of utility functions (cube and cone constraints) and multiparty negotiation models for such utility functions. The main difference between our work and multi-party negotiations lies in the nature of the conflict and how protocols are devised. Even though each team member could be viewed as a participant in a multi-party negotiation with the opponent, it is natural to think that team members' preferences are more similar (e.g., a team of buyers, a group of friends, etc.) and they trust other teammates more than the opponent (i.e., they may share more informa- tion). Furthermore, multi-party negotiation models may be unfair for agents that are alien to the team if the number of team members exceeds the num- 37 ber of other participants. In that case, multi-party models may be inclined to move the negotiation towards agreements that maximize the preferences of most participants (i.e., team members). Multi-agent teamwork is also a close research area. Agent teams have been proposed for a variety of tasks such as Robocup [39], rescue tasks [20], and transportation tasks [17]. However, as far as we know, there is no published work that considers teams of agents negotiating with an opponent. Most works in agent teamwork consider fully cooperative agents that work to maximize shared goals. The team negotiation setting is different since, even though team members share a common interest related to the negotiation, there may be competition among team members to maximize one's own preferences. 6. Conclusions and Future Work An agent-based negotiation team is a group of two or more interdependent agents that join together as a single negotiation party because they share some common interests in the negotiation at hand. Intra-team strategies govern which decisions are taken by the negotiation team, and how and when these decisions are taken. The goal of this article is studying how environmental conditions affect the performance of different intra-team strategies for a team negotiating with an opponent. We studied how the deadline of both parties, the concession speed of the opponent, similarity among team members' preferences and team size affect the performance of Representative (RE) intra-team strategy, Simi- larity Simple Voting (SSV) intra-team strategy, Similarity Borda Voting (SBV) intra-team strategy and Full Unanimity Mediated (FUM) intra-team strategy in terms of the minimum utility of team members, the average utility of team members and the number of negotiation rounds. The results suggest that de- pending on the environmental conditions and the team performance metric, team members should select different intra-team strategies, which confirms our initial hypothesis in this article. Next, we summarize some of the most important results found in this paper: • Generally, when the concession speed is the same for the different intra- team strategies, RE takes less numbers of negotiation rounds than SSV, which takes less number of rounds than SBV, which takes less number of rounds than FUM. The exception for this rule is when team members are very similar and the opponent uses boulware or very boulware strategies, which makes FUM usually faster than SBV. • FUM tends to clearly outperform the rest of intra-team strategies studied in utility terms (minimum and average utility of team members) when the deadline of both parties is long and the opponent uses either boulware of very boulware concession strategies. When the opponent uses conceder or very conceder strategies, different intra-team strategies tie in terms of the minimum and average utility of team members depending on the rest of environmental conditions. 38 • When the team deadline is way shorter than the opponent's deadline, all of the intra-team strategies are negatively affected in the results obtained in the minimum and average utility of team members. Additionally, if team members are very similar, RE becomes one of the best choices for the average utility of team members since it is capable of ending more negotiations successfully where other intra-team strategies fail. If team members are very dissimilar, FUM and SBV tend to work better in terms of utility (minimum and average). However, if the opponent uses boulware or very boulware concession strategies every intra-team strategy performs equally bad and team members are encouraged to look for other negotia- tion alternatives. • In situations where the team's maximum deadline is longer than the op- ponent's deadline, the team should not play intra-team strategies with the maximum deadline but intra-team strategies with the same type of deadline than the opponent or a slightly longer type of deadline. Other- wise, the team performance in utility terms is not maximized due to more negotiations ending in failure. • As the number of team members increases, the performance in utility terms of all of the intra-team strategies is negatively affected. However, in general, all of the intra-team strategies studied are equally affected by the increment in the number of team members. Thus, team size did not have an effect on the intra-team strategy that should be selected by team members to maximize the minimum or the average utility of team members. The field of negotiation teams is novel in the area of multi-agent systems. Therefore, there is much work to be done in order to advance the state-of-the- art. Current works in agent-based negotiation teams [34, 35, 33, 32] have focused on negotiation processes where the team has a strong potential for cooperation since team members share the same type of monotonic valuation function for negotiation issues. However, it is possible to assume that in some negotiation scenarios there is more conflict among team members since valuation functions may be of a different type of monotonic function among team members, or the valuation function itself is not predictable in the negotiation domain (e.g., colors, brands, etc.). Our current future work involves designing intra-team strategies that are able to tackle negotiation domains where attribute's valuation functions may be unpredictable. RE, SSV and SBV are able to handle such types of domains by definition. However, FUM, which is the strategy capable of guaranteeing unanimity regarding team decisions, is not capable of handling domains where attributes are unpredictable (due to the max/min aggregation operator). Hence, our future works consists in proposing an intra-team strategy capable of guaranteeing unanimity for negotiation domains where attributes may not be predictable. On the other hand, since the results of this present article have shown that environmental conditions do affect the performance of intra-team strategies, we 39 plan to propose a mechanism that allows team members to infer the most prob- able state of the negotiation environment, and according to that information, advise the use of an appropriate intra-team strategy. Finally, in our current work we assume that team members have the same knowledge about the negotiation domain and they have the same skills. It may be interesting to study scenarios where team members have different knowledge and skills. Acknowledgements This work is supported by TIN2011-27652-C03-01, TIN2009-13839-C03-01, CSD2007-00022 of the Spanish government, and FPU grant AP2008-00600 awarded to V´ıctor S´anchez-Anguix. We would also like to thank anonymous reviewers and assistants of AAMAS 2011 who helped us to improve our previous work, making this present work possible. References [1] K. Behfar, R.A. Friedman, J.M. Brett, The team negotiation challenge: Defining and managing the internal challenges of negotiating teams, in: Proceedings of the 21st Annual Conference for the International Association for Conflict Management. [2] S. Brodt, L. Thompson, Negotiation within and between groups in organi- zations: Levels of analysis, Group Dynamics (2001) 208 -- 219. [3] M. Chalamish, S. Kraus, Automed: an automated mediator for multi-issue bilateral negotiations, Autonomous Agents and Multi-Agent Systems (In Press) 1 -- 29. [4] Y. Chevaleyre, P.E. Dunne, U. Endriss, J. Lang, M. Lemaıtre, N. Maudet, J. Padget, S. Phelps, J.A. Rodr´ıguez-aguilar, P. Sousa, Issues in multiagent resource allocation, Informatica 30 (2006) 2006. [5] N. Criado, E. Argente, V. Botti, THOMAS: An Agent Platform For Sup- porting Normative Multi-Agent Systems, J. Logic Comput. (2011). [6] F. Di Giunta, N. Gatti, Bargaining over multiple issues in finite horizon alternating-offers protocol, Ann. Math. Artif. Intell. 47 (2006) 251 -- 271. [7] F. Dignum, Autonomous agents with norms, Artificial Intelligence and Law 7 (1999) 69 -- 79. [8] H. Ehtamo, E. Kettunen, R.P. Hamalainen, Searching for joint gains in multi-party negotiations, Eur. J. Oper. Res. 130 (2001) 54 -- 69. [9] S. Esparcia, E. Argente, Formalizing Virtual Organizations, in: 3rd Inter- national Conference on Agents and Artificial Intelligence, volume 2, pp. 84 -- 93. 40 [10] P. Faratin, C. Sierra, N.R. Jennings, Negotiation decision functions for autonomous agents, International Journal of Robotics and Autonomous Systems 24 (1998) 159 -- 182. [11] P. Faratin, C. Sierra, N.R. Jennings, Using similarity criteria to make issue trade-offs in automated negotiations, Artif. Intell. 142 (2002) 205 -- 237. [12] S.S. Fatima, M. Wooldridge, N.R. Jennings, Multi-issue negotiation with deadlines, J. Artif. Intell. Res. 27 (2006) 381 -- 417. [13] K. Fujita, T. Ito, M. Klein, Secure and efficient protocols for multiple interdependent issues negotiation, J. Intell. Fuzzy Syst. 21 (2010) 175 -- 185. [14] N. Halevy, Team negotiation: Social, epistemic, economic, and psycholog- ical consequences of subgroup conflict, Pers. Soc. Psychol. Bull. 34 (2008) 1687 -- 1702. [15] B. Horling, V. Lesser, A survey of multi-agent organizational paradigms, Knowl. Eng. Rev. 19 (2004) 281 -- 316. [16] Y. In, R. Serrano, Agenda restrictions in multi-issue bargaining (ii): unre- stricted agendas, Econ. Lett. 79 (2003) 325 -- 331. [17] N.R. Jennings, Controlling cooperative problem solving in industrial multi- agent systems using joint intentions, Artif. Intell. 75 (1995) 195 -- 240. [18] N.R. Jennings, P. Faratin, A.R. Lomuscio, S. Parsons, M.J. Wooldridge, C. Sierra, Automated negotiation: Prospects, methods and challenges, Group Decis. Negot. 10 (2001) 199 -- 215. [19] C.M. Jonker, J. Treur, An agent architecture for multi-attribute negotia- tion, in: 17th International Joint Conference on Artificial Intelligence, pp. 1195 -- 1201. [20] H. Kitano, S. Tadokoro, Robocup rescue: A grand challenge for multiagent and intelligent systems, AI Magazine 22 (2001) 39 -- 52. [21] M. Klein, P. Faratin, H. Sayama, Y. Bar-Yam, Negotiating complex con- tracts, Group Decis. Negot. 12 (2003) 111 -- 125. [22] S. Kraus, Negotiation and cooperation in multi-agent environments, Arti- ficial Intelligence 94 (1997) 79 -- 97. [23] G. Lai, K. Sycara, C. Li, A decentralized model for automated multi- attribute negotiations with incomplete information and general utility func- tions, Multiagent and Grid Systems 4 (2008) 45 -- 65. [24] A. Lomuscio, M. Wooldridge, N. Jennings, A classification scheme for nego- tiation in electronic commerce, Group Decision and Negotiation 12 (2003) 31 -- 56. 41 [25] F. Lopes, M. Wooldridge, A. Novais, Negotiation among autonomous com- putational agents: principles, analysis and challenges, Artificial Intelligence Review 29 (2008) 1 -- 44. [26] M. Luck, P. McBurney, Computing as Interaction: Agent and Agreement Technologies, in: IEEE Conference on Distributed Human-Machine Sys- tems, pp. 1 -- 6. [27] H. Nurmi, Voting systems for social choice, Handbook of Group Decision and Negotiation (2010) 167 -- 182. [28] P. Pardo, S. Pajares, E. Onaind´ıa, L. Godo, P. Dellunde, Multiagent Argu- mentation for Cooperative Planning in DeLP-POP, in: 10th International Conference on Autonomous Agents and Multiagent Systems, pp. 971 -- 978. [29] I. Rahwan, S. Ramchurn, N. Jennings, P. Mcburney, S. Parsons, L. So- nenberg, Argumentation-based negotiation, Knowl. Eng. Rev. 18 (2003) 343 -- 375. [30] A. Rubinstein, Perfect equilibrium in a bargaining model, Econometrica 50 (1982) 97 -- 109. [31] J. Sabater, C. Sierra, Review on computational trust and reputation mod- els, Artif. Intell. Rev. 24 (2005) 33 -- 60. [32] V. Sanchez-Anguix, T. Dai, Z. Semnani-Azad, K. Sycara, V. Botti, Mod- eling power distance and individualism/collectivism in negotiation team dynamics, Hawaii International Conference on System Sciences (2012) 628 -- 637. [33] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Reaching Unan- imous Agreements within Agent-Based Negotiation Teams with Linear and Monotonic Utility Functions, IEEE Transactions on Systems, Man and Cy- bernetics - Part B (2012). [34] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garc´ıa-Fornes, Towards agent- based negotiation teams, in: Group Decision and Negotiation 2010, pp. 328 -- 331. [35] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garc´ıa-Fornes, Analyzing Intra- Team Strategies for Agent-Based Negotiation Teams, in: 10th Interna- tional Conference on Autonomous Agents and Multiagent Systems, pp. 929 -- 936. [36] V. Sanchez-Anguix, S. Valero, V. Julian, V. Botti, A. Garc´ıa-Fornes, Evolutionary-aided negotiation model for bilateral bargaining in Ambient Intelligence domains with complex utility functions, Inf. Sci. (2011). [37] C. Sierra, V. Botti, S. Ossowski, Agreement computing, KI-Kunstliche In- telligenz (2011) 1 -- 5. 42 [38] D.C. Silva, R.A. Braga, L.P. Reis, E. Oliveira, Designing a meta-model for a generic robotic agent system using gaia methodology, Information Sciences 195 (2012) 190 -- 210. [39] P. Stone, M. Veloso, Task decomposition, dynamic role assignment, and low-bandwidth communication for real-time strategic teamwork, Artif. In- tell. 110 (1999) 241 -- 273. [40] J.M. Such, A. Espinosa, A. Garcia-Fornes, V. Botti, Partial identities as a foundation for trust and reputation, Eng. Appl. Artif. Intell. (2011). [41] J.M. Such, A. Espinosa, A. Garc´ıa-Fornes, C. Sierra, Self-disclosure decision making based on intimacy and privacy, Information Sciences 211 (2012) 93 -- 111. [42] K. Sycara, Machine learning for intelligent support of conflict resolution, Decision Support Systems 10 (1993) 121 -- 136. [43] L. Thompson, E. Peterson, S. Brodt, Team negotiation: An examination of integrative and distributive bargaining, J. Pers. Soc. Psychol. 70 (1996) 66 -- 78. 43
cs/0609041
1
0609
2006-09-08T10:12:35
Primitive operations for the construction and reorganization of minimally persistent formations
[ "cs.MA" ]
In this paper, we study the construction and transformation of two-dimensional persistent graphs. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a directed structure of unilateral distances constraints seeking to preserve a formation shape. Analogously to the powerful results about Henneberg sequences in minimal rigidity theory, we propose different types of directed graph operations allowing one to sequentially build any minimally persistent graph (i.e. persistent graph with a minimal number of edges for a given number of vertices), each intermediate graph being also minimally persistent. We also consider the more generic problem of obtaining one minimally persistent graph from another, which corresponds to the on-line reorganization of an autonomous agent formation. We prove that we can obtain any minimally persistent formation from any other one by a sequence of elementary local operations such that minimal persistence is preserved throughout the reorganization process.
cs.MA
cs
Primitive operations for the construction and reorganization of minimally persistent formations Julien M. Hendrickx∗, Barı¸s Fidan†, Changbin Yu, Brian D.O. Anderson and Vincent D. Blondel June 13, 2021 Abstract In this paper, we study the construction and transformation of two- dimensional persistent graphs. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a directed structure of unilateral distances constraints seeking to preserve a formation shape. Analogously to the powerful results about Henneberg sequences in minimal rigidity theory, we propose different types of di- rected graph operations allowing one to sequentially build any minimally persistent graph (i.e. persistent graph with a minimal number of edges for a given number of vertices), each intermediate graph being also mini- mally persistent. We also consider the more generic problem of obtaining one minimally persistent graph from another, which corresponds to the on-line reorganization of an autonomous agent formation. We prove that we can obtain any minimally persistent formation from any other one by a sequence of elementary local operations such that minimal persistence is preserved throughout the reorganization process. ∗J. M. Hendrickx (corresponding author) and V. Blondel are with Department of Mathe- matical Engineering, Universit´e catholique de Louvain, Avenue Georges Lemaitre 4, B-1348 Louvain-la-Neuve, Belgium; hendrickx,[email protected]. Their work is sup- ported by the Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office, and The Concerted Research Action (ARC) "Large Graphs and Networks" of the French Community of Belgium. The scientific responsibility rests with its authors. Julien Hendrickx holds a FNRS fellowship (Belgian Fund for Scientific Research). This work was supported in part by DoD AFOSR URI for "Architectures for Secure and Robust Distributed Infrastructures," F49620-01-1-0365 (led by Stanford University). †B. Fidan, C. Yu and B. Anderson are with Australian National University and National ICT Australia , 216 Northbourne Ave, Canberra ACT 2601 Australia ; baris.fidan,brad.yu,[email protected]. Their work is supported by an Australian Research Council Discovery Project Grant and by National ICT Australia, which is funded by the Australian Government's Department of Communications, Information Tech- nology and the Arts and the Australian Research Council through the Backing Australia's Ability Initiative. Changbin Yu is an Australia-Asia Scholar supported by the Australian Gov- ernment's Department of Education, Science and Training through Endeavours Programs. 1 1 Introduction The recent progress in the field of autonomous agent systems has led to new problems in control theory [1,2] and graph theory [3,5,9]. By autonomous agent, we mean here any human controlled or unmanned vehicle that can move by it- self and has a local intelligence or computing capacity, such as ground robots, air vehicles or underwater vehicles. The results derived in this paper concern mostly autonomous agents evolving in a two dimensional space. Many applications require some inter-agent distances to be kept constant during a continuous move in order to preserve the shape of a multi-agent for- mation. In other words, some inter-agent distances are explicitly maintained constant so that all the inter-agent distances remain constant. The information structure arising from such a system can be efficiently modelled by a graph, where agents are abstracted by vertices and actively constrained inter-agent distances by edges. We assume here that those constraints are unilateral, i.e., that the responsibility for maintaining a distance is not shared by the two con- cerned agents but relies on only one of them while the other one is unaware of it. This asymmetry is modelled by the use of directed edges in the graph. The characterization of the directed information structures which can efficiently maintain the formation shape has begun to be studied under the name of "di- rected rigidity" [1, 3]. These works included several conjectures about minimal directed rigidity, i.e., directed rigidity with a minimal number of edges for a fixed number of vertices. In [5], Hendrickx et al. proposed a theoretical frame- work to analyze these issues, where the name of "persistence" was advanced in preference to "directed rigidity", since the latter notion does not correspond to the immediate transposition of the undirected notion of rigidity to directed graph. The intuitive definition of persistence is the following: An information structure is persistent if, provided that each agent is trying to satisfy all the dis- tance constraints for which it is responsible, all the inter-agent distances remain constant and as a result the formation shape is preserved. It is shown in [5] that persistence is actually the conjunction of two distinct notions: rigidity of the underlying undirected graph (i.e. the undirected graph obtained by ignor- ing the direction of the edges), and constraint consistence. Intuitively, rigidity means that, provided that all the prescribed distance constraints are satisfied during a continuous displacement, all the inter-agent distances remain constant, as shown in Figure 1. Constraint consistence of an information structure means that, provided that each agent is trying to satisfy all its distances constraints, all the agents actually succeed in doing so. In other words, no agent has an impossible task, as shown in the example in Figure 2. Observe that this last notion depends strongly on the directed structure of the graph, while rigidity only relies on its underlying undirected graph. An example of persistent graph is provided in Figure 3. Note that for agents evolving in a two-dimensional space, a purely combinatorial criterion to decide persistence is provided in [5]. In this paper, we focus on minimally persistent graphs, that are persistent graphs having a minimal number of edges (for a given number of vertices), and 2 (a) (b) Figure 1: Representation of (a) a non-rigid and (b) a rigid graph/formation. The solid structure in (a) can indeed be deformed to the dotted structure without breaking any distance constraint. 3 2 4 (a) 3 ?? 1 1 2 4 (b) Figure 2: Representation of (a) a constraint consistent and (b) a non-constraint consistent (in 2 dimension) graph/formation. One can indeed see in (b) that for almost any uncoordinated continuous displacement of the agents 2 and 4 (which are unconstrained), the agent 3 is unable to move in such a way that it maintains its distances to all of 1,2 and 4 constant. However, such a situation could not happen in graph (a). 3 2 4 1 Figure 3: Representation of a persistent graph, i.e., a rigid constraint consistent graph. 3 their connections with minimally rigid graphs. More particularly we analyze dif- ferent ways to sequentially build minimally persistent graphs, analogously to the Henneberg sequences for the minimally rigid graphs [7, 10]. It has indeed long been known that every minimally rigid graph can be obtained from the com- plete graph on two vertices by a sequence of two basic operations, as detailed in Section 2. The natural extension of these operations to directed graphs [3] does not allow one to build all minimally persistent graphs, as remarked in [5] and reviewed later in Section 2. We consider here different possible additional opera- tions that would help to achieve this purpose. We also consider the more generic problem of obtaining one persistent graph from another. From an autonomous agent point of view, this corresponds to an on-line reorganization of the agent formation. The subsequent analysis leads us then to the definition of different "distances" between persistent graphs (the distance between two graphs being the smallest number of operations needed to obtain one from the other). Note that although the notion of persistence has been also defined in three or higher dimensions [6, 12, 13], the present analysis only concerns two-dimensional per- sistence, i.e., the persistence of graphs representing the information structure of a formation evolving in a two-dimensional space. Extension to the three dimen- sional case may be difficult; even for undirected graphs, Henneberg sequence theory is effectively incomplete. In Section 2, we review the main properties of minimally rigid and minimally persistent graphs. We present the two basic undirected operations - vertex ad- dition and edge splitting - involved in the Henneberg sequences, together with their natural extension to directed graphs. We show that although these di- rected operations preserve minimal persistence, they are not sufficient to build all minimally persistent graphs. This analysis is done by reasoning on reverse construction of persistent graphs using reverse operations. In Section 3, we show how the goal of building all minimally persistent graph can be reached by introducing a third local directed operation - edge reversal. We see that, unlike when building minimally rigid undirected graphs with Henneberg sequences, the required number of operations is not uniquely determined by the size of the graph. We show in Section 4 that this drawback can be avoided by using only directed operations equivalent to the vertex addition and the edge split- tings from an undirected point of view. However, we prove that a set of such operations allowing one to build all minimally persistent graphs always contain at least one non-confined operation, i.e. an operation reversing the directions of (possibly several) edges that are not affected by the corresponding operation for undirected graphs. We provide then such a set of four operations, and analyze the relations between this set and the set of three operations treated in Section 3. Finally, this paper ends with the concluding remarks of Section 5. 4 2 Directed and undirected Henneberg sequences In this section, we recall some results about (minimal) rigidity and (minimal) persistence. We also describe the Henneberg sequences for undirected graphs and show why their obvious adjustment to the directed case is not sufficient to build all minimally persistent graphs. 2.1 Minimally rigid graphs Note that in this section, all graphs are considered as undirected, but in the rest of this paper, they are always assumed to be directed. However, although all the definitions and results of this section are given for undirected graphs, they can also be applied to directed graphs. If G is a directed graph, we call the underlying undirected graph of G the undirected graph obtained by ignoring the directions of the edges of G. The rigidity of a graph has the following intuitive meaning: Suppose that each vertex represents an agent in a formation, and each edge represents an inter-agent distance constraint enforced by an external observer. The graph is rigid if for almost every such structure, the only possible continuous moves are those which preserve every inter-agent distance. Note that this notion also represents the rigidity of a framework where the vertices correspond to joints and the edges to bars. For a more formal definition, the reader is referred to [5, 10]. In ℜ2, there exists a combinatorial criterion to check if a given graph is rigid (Laman's theorem [8,11]). A minimally rigid graph is a rigid graph such that no edge can be removed without losing rigidity. From Laman's Theorem, it is possible to deduce the following criterion: Proposition 1. A graph G = (V, E) (V > 1) is minimally rigid if and only if E = 2 V − 3 and for all E′′ ⊆ E, E′′ 6= ∅, there holds E′′ ≤ 2 V (E′′) − 3. We say that a pair of unconnected vertices defines an implicit edge in a graph G = (V, E) if their connection would create a subgraph G′ = (V ′, E′) with E′ > 2 V ′ − 3. Intuitively, this means that the addition of such an edge would not improve the rigidity of the graph, i.e., the constraint that this edge would enforce is a linear combination of already present constraints. One can easily prove that two unconnected vertices define an implicit edge in a graph if and only if there is a minimally rigid subgraph containing both of them. By extension, we sometimes call an edge of a graph an explicit edge. In a (mini- mally) rigid graph, every pair of vertices is connected by either an explicit or implicit edge. But, if one removes an (explicit) edge in a minimally rigid graph, the corresponding pair of vertices never defines an implicit edge in the graph obtained. Let j, k be two distinct vertices of a minimally rigid graph G = (V, E). A vertex addition operation consists in adding a vertex i, and connecting it to j and k, as shown in Figure 4(a). One can see using Proposition 1 that this 5 k j i l k j i j k l k j (a) (b) Figure 4: Representation of (a) undirected vertex addition operation and (b) edge splitting operation. operation preserves minimal rigidity. Moreover, if a vertex i has degree 2 in a minimally rigid graph, one can always perform the inverse vertex addition op- eration by removing it (and its incident edges) and obtain a smaller minimally rigid graph. Let j, k, l be three vertices of a minimally rigid graph such that there is an edge between j and k. An edge splitting operation consists in removing this edge, adding a vertex i and connecting it to j, k and l, as shown in Figure 4(b). This operation provably preserves minimal rigidity [10]. The reverse operation is less straightforward than the reverse vertex addition operation. Given a vertex i connected to j, k and l, the minimal rigidity of the graph is preserved if one removes i and adds one edge among (j, k), (k, l) and (l, j). However, one cannot always freely choose any one of these edges to add. One has indeed to make sure that the added edge does not already belong to the graph, and also that its addition does not create a subgraph G′ = (V ′, E′) with E′ > 2 V ′ − 3, i.e., that the pair of vertices does not define an implicit edge in the graph obtained after deletion of i. Figure 5 shows an example of such an unfortunate added edge selection. Suppose indeed that the vertex 5 is removed from the minimally rigid graph 5(a). The pair (1, 4) does provably not define an implicit edge, and its addition leads thus to a minimally rigid graph, which is represented in Figure 5(b). However, if (1, 6) is added instead of (1, 4), the graph obtained contains a subgraph G′ = (V ′, E′) with V ′ = {1, 2, 3, 6} such that 6 = E′ > 2 V ′−3 = 5, as shown in Figure 5(c). The pair (1, 6) defines thus an implicit edge. It is pos- sible to prove that at least one among the three possible pairs of vertices does not define an actual nor an implicit edge [8, 10]. One can thus always perform a reverse edge splitting on any vertex with a degree 3. A Henneberg sequence is a sequence of graphs G2, G3, . . . , GV with G2 be- 6 1 1 1 2 3 4 5 2 3 4 2 3 4 6 (a) 6 6 (b) (c) Figure 5: Example of unfortunate added edge selection in reverse edge splitting. After the removal of the vertex 5 from the minimally rigid graph (a), minimal rigidity can be preserved by the addition of the edge (1, 4) but not of (1, 6), as shown respectively on (b) and (c). The pair (1, 6) defines an implicit edge in the minimally rigid subgraph induced by 1, 2, 3 and 6. ing the complete graph on two vertices K2 and each graph Gi (i ≥ 3) can be obtained from Gi−1 by either a vertex addition operation or an edge splitting operation. Since these operations preserve minimal rigidity and since K2 is minimally rigid, every graph in such a sequence is minimally rigid. A simple degree counting argument shows that every minimally rigid graph GV = (V, E) with more than 2 vertices contains at least one vertex with degree 2 or 3. One can thus always perform either a reverse vertex addition or a reverse edge splitting operation and obtain a smaller minimally rigid graph GV −1. Doing this recursively, one eventually obtains a minimally rigid graph on two vertices, which can only be K2. It is straightforward to see that the sequence K2 = G2, G3, . . . GV is then a Henneberg sequence. We have thus proved the following result [10]: Theorem 1. Every minimally rigid graph on more than one vertex can be obtained as the result of a Henneberg sequence. The result of Theorem 1 provides a way to exhaustively enumerate all min- imally rigid graphs. One can thus use it to obtain an upper bound on the number of minimally rigid graph having a certain number of vertices. However, this only provides an upper bound for the Henneberg sequence allowing one to build a certain minimally rigid graph is usually not unique. The graph in Figure 1(b) can for example be obtained from K2 by either two vertex additions or one vertex addition followed by one edge splitting. 2.2 Minimally persistent graphs Consider a group of autonomous agents represented by vertices of a graph. To each of these agents, one assigns a (possibly empty) set of unilateral distance constraints represented by directed edges: the notation (i, j) for a directed edge connotes that the agent i has to maintain its distance to j constant during any 7 continuous move. The persistence of the directed graph means that provided that each agent is trying to satisfy its constraints, the distance between any pair of connected or non-connected agents is maintained constant during any continuous move, and as a consequence the shape of the formation is preserved. A formal definition of persistence is given in [5]. In a two-dimensional space, an agent having only one distance constraint to satisfy can move on a circle centered on its neighbor, and has thus one degree of freedom. Similarly, an agent having no distance constraint to satisfy can move freely in the plane and has thus two degrees of freedom. We call the number of degrees of freedom of a vertex i the (generic) dimension of the set in which the corresponding agent can chose its position (all the other agents being fixed). It represents thus in some sense the decision power of this agent. The number of degrees of freedom of a vertex i is given by max (0, 2 − d+(i)) (where d+(i) and d−(i) represent respectively the in- and out-degree of the vertex i). A graph is minimally persistent if it is persistent and if no edge can be re- moved without losing persistence. The following result provides a swift criterion to decide minimal persistence : Proposition 2. [5] A graph is minimally persistent if and only if it is minimally rigid and no vertex has an out-degree larger than 2. As a consequence of Proposition 2, the number of degrees of freedom of a vertex i in a minimally persistent graph is 2−d+(i). By Proposition 1, it follows after summation on all the vertices that the total number of degrees of freedom present in such a graph is always 3. This result is consistent with the intuition, there are indeed three degree of freedom to chose the position and orientation of a rigid body in a 2-dimensional space. Let j, k be two distinct vertices of a minimally persistent graph G = (V, E). A directed vertex addition [3, 4] consists in adding a vertex i and two directed edges (i, j) and (i, k) as shown in Figure 6(a). Since it is a vertex addition oper- ation, it preserves minimal rigidity. Besides, the added vertex has an out-degree 2 and the out-degree of the already existing vertices are unchanged. By Propo- sition 2, the directed vertex addition thus preserves the minimal persistence. Moreover, if a vertex has an out-degree 2 and an in-degree 0 in a minimally persistent graph, one can always perform a reverse (directed) vertex addition by removing it, and obtain a smaller minimally persistent graph. Let (j, k) be a directed edge in a minimally persistent graph and l a distinct vertex. A directed edge splitting [3, 4] consists in adding a vertex i, an edge (i, l), and replacing the edge (j, k) by (j, i) and (i, k), as shown in Figure 6(b). Again, this operation preserves minimal rigidity since it is an edge splitting operation from an undirected point of view, and since the added vertex has an out-degree 2 and the out-degree of the already existing vertices are unchanged, it also preserves minimal persistence. But, unlike in the case of directed vertex 8 k j i l k j i j k l k j (a) (b) Figure 6: Representation of the directed vertex addition (a) and edge splitting (b). addition, the reverse operation cannot always be performed. Suppose indeed that we have a vertex i with out-degree 2 and in-degree 1, and call its neighbors j, k and l. The reverse operation consists in removing i and its incident edges, and adding either (j, k) or (j, l) (note that k and l are interchangeable). Adding any other edge such as (k, l) or (l, k) would indeed prevent the operation from being out-degree preserving, and one could then not guarantee the minimal persistence of the graph obtained (by Theorem 2). But, it can happen that both pairs (j, l) and (j, k) are already connected by explicit or implicit edges. In such a case, minimal rigidity is only preserved by addition of an edge between k and l, which as explained above may not preserve persistence. We now show that the vertex addition and edge splitting operations do not allow one to grow all minimally persistent graphs from an initial seed. Consider the graph in Figure 7 (for n ≥ 1). One can verify by Theorem 1 that it is mini- mally rigid. Moreover, no vertex has an out-degree larger than 2; by Proposition 2 it is thus minimally persistent. Observe that no vertex has an in-degree 0; it is thus impossible to perform a reverse vertex addition operation. Moreover, only the vertex 2n satisfies the required conditions about the in- and out-degree in order to offer the possibility of removal by a reverse edge splitting operation, and one can verify that this operation cannot be performed due to the presence in the graph of the edges (2n + 1, 2n − 1) and (2n − 2, 2n − 1). Since this is true for any n, we have an infinite class of graphs on which none of the two above defined reverse operations can be performed (Note that there provably exists other such infinite classes in which the graphs have one vertex with two degrees of freedom and one vertex with one degree of freedom instead of three vertices with one degree of freedom). As a consequence, it is not possible to build every minimally persistent graph by performing a sequence of directed vertex addition or edge splitting operations on some seed graph taken in a finite set of graphs. However, we have the following less powerful result (as argued in [5]). 9 2 4 2n−2 2n 1 3 5 2n−1 2n+1 Figure 7: Class of graphs on which no reverse vertex addition or edge splitting can be performed. Proposition 3. It is possible to assign directions to the edges of any minimally rigid graph such that the obtained directed graph is minimally persistent and can be obtained by performing a sequence of vertex additions and edge splittings on an initial graph of two vertices connected by one directed edge (called a "leader- follower seed"). Proof. Let G be a minimally rigid (undirected) graph. By Theorem 1, it can be obtained by performing a sequence of undirected vertex additions and edge splittings on K2. By performing the same sequence of the directed version of these operations on an initial leader-follower seed, one obtains a directed graph having G as underlying undirected graph. Moreover, since this initial seed is trivially minimally persistent (by Proposition 2), and since the directed versions of both vertex addition and edge splitting preserve minimal persistence, the obtained graph is minimally persistent. In the following sections, we examine different possibilities of additional op- erations that allow the construction of all minimally persistent graphs. In order to avoid confusion, we shall sometimes refer to the directed version of vertex addition and edge splitting as standard vertex addition and standard edge split- ting. We denote by S the set consisting of these two operations and S−1 the one consisting of their inverses (the same convention is used in the sequel for all the operations set). Note that it is always possible to perform an operation of S on a minimally persistent graph, but we have seen that this is not true for operations of S−1. 3 A purely directed operation We introduce here a third persistence-preserving operation: the edge reversal. Unlike those of S, does not affect the underlying undirected graph. We then define to macro-operations which help us to prove that the edge reversal is suf- ficient to obtain any minimally persistent graph from any other one having the same underlying undirected graph, and show how this implies that this opera- tion combined with those of S is sufficient to obtain any minimally persistent graph from a unique initial seed. 10 3.1 Edge reversal Let (i, j) be an edge such that j as at least one degree of freedom, i.e., d+(j) = 0 or d+(j) = 1. The edge reversal operation consists in replacing the edge (i, j) by (j, i). As a consequence, one degree of freedom is transferred from j to i. This operation is its auto-inverse and preserves minimal persistence since it does not affect the underlying undirected graph and the only increased out-degree d+(j) remains no greater than 2. From an autonomous agent point of view j transfers its decision power (or a part of it) to i. 3.2 Path reversal Given a directed path P between a vertex i and a vertex j such that j has a positive number of degrees of freedom, a path reversal consists in reversing the directions of all the edges of P . As a result, j loses a degree of freedom, i acquires one, and there is a directed path from j to i. Moreover, the number of degrees of freedom of all the other vertices remain unchanged. Note that i and j can be the same vertex, in which case the path either has a trivial length 0 or is a cycle. In both of these situations, the number of degrees of freedom is preserved for every vertex. The path reversal can easily be implemented with a sequence of edge re- versals: Since j has a degree of freedom, one can reverse the last edge of the path, say (k, j), such that j loses one degree of freedom while k acquires one. One can then iterate this operation along the path until i, as shown in Figure 8. At the end, i has have an additional degree of freedom, j has lost one, and all the edges of the path have have been reversed. Note that the sequence of edge reversals can usually not be performed in another order, for the condition about the availability of a degree of freedom would not be satisfied. The final result would be the same, but all the intermediate graphs would not necessarily be minimally persistent. We now show that this operation allows one to reposition the three degrees of freedom of a minimally persistent graph onto any chosen vertices (with at most two degrees of freedom on a single vertex). For this purpose, we need the following result (which is a particular case of a result available in [6, 13]): Proposition 4. Let G be a minimally persistent graph, i and j two vertices of G with d+(i) ≥ 1 and d+(j) ≤ 1. Then, there is a directed path from i to j. Proof. Suppose (to obtain a contradiction) that we have a minimally persistent (and thus minimally rigid) graph G = (V, E), a vertex i with positive out-degree and a vertex j with a positive number of degrees of freedom such that there is no directed path connecting i to j. Let V ′′ ⊂ V be the set of vertices that can be reached from i, and E′′ the set of edges that leave vertices of V ′′. Obviously, every edge of E′′ is incident to two vertices of V ′′, and because d+(i) > 0, we have V ′′ ≥ 2 and E′′ ≥ 1. Moreover, the sum on the vertices of V ′′ of 11 i i i i * k k * k k j * j j j * Figure 8: Implementation of the path reversal by a sequence of edge reversals. The symbol "*" represents one degree of freedom. the numbers of degrees of freedom (which we denote F (V ′′)) is smaller than 3. There are indeed only three degrees of freedom in a minimally persistent graph as explained in Section 2.2, and the vertex j which has at least one of them does by hypothesis not belong to V ′. Since every vertex has an out-degree smaller no greater than two in a minimally persistent graph (by Proposition 2), we have thus a subgraph G′′ = (V ′′, E′′) such that E′′ = X k∈V ′′ d+(k, G′′) = 2 V ′′ − F (V ′′) > 2 V ′′ − 3, which by Proposition 1 is impossible for a subgraph of a minimally rigid graph. Let us now suppose that one wants to transfer a degree of freedom from some vertex j to some vertex i which has at most one degree of freedom (transferring a degree of freedom to a vertex that has already two degrees of freedom would indeed be impossible as there is no edge inwardly incident). By Proposition 4, there exists a directed path from i to j. The transfer can then be done by reversing this path, which leaves the positions of all the other degrees of freedom unchanged. By doing this at most three times, one can thus reposition the three degrees of freedom onto any chosen vertices. As a consequence, we have the following result. Proposition 5. Let GA and GB be two minimally persistent graphs having the same underlying undirected graph. By applying a sequence of at most three path reversals on GA, it is possible to obtain a minimally persistent graph G′ A in which every vertex has the same number of degrees of freedom as in GB 12 l l l l i * i P m * P' m i * P' m i P m * Figure 9: Implementation of cycle reversal. The "*" represents one degree of freedom. 3.3 Cycle reversal A cycle reversal consists in reversing all the edges of a directed cycle. This operation does not affect the number of degrees of freedom of any vertex nor the underlying undirected graph, and preserves therefore minimal persistence. A cycle reversal on a minimally persistent graph can be implemented by a sequence of edge reversals. Let us indeed first suppose that there is a vertex i in the cycle that has at least one degree of freedom. In that case, the cycle reversal is just a particular case of the path reversal, with i = j. We now assume that no vertex in the cycle has a degree of freedom. Let l be a vertex in the cycle, and m a vertex that does not belong to the cycle but has a degree of freedom. By Proposition 4, it follows that there exists a directed path from l to m. Let i be the last vertex in this path belonging to the cycle. There is trivially a path P from i to m such that every other vertex of this path does not belong to the cycle. The implementation of a cycle reversal by three path reversals is then represented in Figure 9. One begins by reversing the path P into P ′ such that i acquires a degree of freedom. As explained above, the cycle can then be reversed since it is a particular case of path reversal, and finally, one reverses the path P ′ back to P such that the degree of freedom acquired by i is re-transmitted to m. Note that an alternative equivalent approach is to reverse the path from l to m containing i and one part of the cycle, and then to reverse the newly created path from m to l containing i and the other part of the cycle. Remark 1. Both cycle reversal and path reversal are their auto-inverse, as is the case for edge reversal. Moreover, the fact that they can be implemented using only edge reversals is another way to show that they preserve minimal persistence. We now prove that from any minimally persistent graph, one can obtain any other minimally persistent graph having the same underlying undirected graph and allocation of degrees of freedom by a sequence of cycle reversals. For this purpose, we need the following result. Lemma 1. Let GA = (V, EA) and GB = (V, EB) be two graphs having the same underlying undirected graph and such that every vertex has the same out-degree 13 in both graphs. If an edge of GA has the opposite direction to that in GB, it belongs to (at least) one cycle of such edges in GA. Proof. Suppose that (i0, i1) ∈ EA and (i1, i0) ∈ EB (i.e., this edge has opposite directions in GA and GB); then there exists at least one vertex i2 6= i0 such that (i1, i2) ∈ EA and (i2, i1) ∈ EB. For if the contrary holds, we would have d+(i1, GA) = d+(i1, GB) − 1, which contradicts our hypothesis. Repeating this argument recursively, we obtain an (infinite) sequence of vertices i0, i1, i2, . . . such that for each j ≥ 0, (ij, ij+1) ∈ EA and (ij+1, ij) ∈ EB. Since there are only a finite number of vertices in V , at least one of them will appear twice in this sequence. By taking the subsequence of vertices (and induced edges) appearing in the infinite sequence between any two of its occurrences we obtain then a cycle having the required properties. Proposition 6. Let GA = (V, EA) and GB = (V, EB) be two minimally per- sistent graphs having the same underlying undirected graph and such that every vertex has the same number of degrees of freedom in both of them. Then it is possible to obtain GB from GA by a sequence of at most EA /3 = EB /3 cycle reversals. Proof. Suppose that GA 6= GB, and let Eo denote the set of edges of GA that do not have the same direction as in GB. Since both graphs have the same underlying undirected graph and since all the vertices have the same out-degrees in both of them it follows from Lemma 1 that there exists a cycle of edges of Eo. Eo is thus strictly decreased by reversing this cycle. Doing this recursively leads then to Eo = 0, i.e, to a situation where GA = GB. Moreover, since every cycle has at least three edges. The number of cycle reversals is at most E /3 3.4 Obtaining all minimally persistent graphs using three primitive operations Using the results of the two previous subsections, we can now show the following Proposition. Proposition 7. By applying a sequence of edge reversals to a given minimally persistent graph, it is possible to obtain any other minimally persistent graph having the same underlying undirected graph. Moreover, all the intermediate graphs are then minimally persistent. Proof. Since both path reversal and cycle reversal can be implemented by a sequence of edge reversals (which preserves minimal persistence), this result is a direct consequence of Propositions 5 and 6. From an autonomous agent formation perspective, suppose that a reorgani- zation of the distance constraints distribution needs to be performed, and that this reorganization preserves the structure of constraints from an undirected point of view, i.e., the reorganization is solely one involving changes of some 14 directions. Proposition 7 implies that this can be done by a sequence of lo- cal degree of freedom transfers, in such a way that during all the intermediate stages, the formation shape is guaranteed to be maintained as a result of per- sistence being preserved. Let T be the set of operations containing vertex addition, edge splitting, and edge reversal. A leader-follower seed is a minimally persistent graph on two vertices. It contains only one edge, leaving a vertex called "the follower", and arriving at the other one, called "the leader". The next theorem states that one can obtain any minimally persistent graph from an initial leader-follower seed using only operations of T . Theorem 2. Every minimally persistent graph can be obtained by applying a sequence of operations of T to an initial leader-follower seed. Moreover, all the intermediate graphs are minimally persistent. Proof. Consider a minimally persistent graph G. This graph is also minimally rigid. By Proposition 3, there exists thus a (possibly different) minimally persis- tent graph having the same underlying undirected graph that can be obtained by performing a sequence of operations of S ⊂ T on an initial leader follower seed. By Proposition 7, G can then be obtained by applying a sequence of edge reversals on this last graph. Moreover, since all the operations of T preserve minimal persistence, all the intermediate graphs are minimally persistent. As an illustration of Theorem 2, consider the graph G represented in the right hand side of Figure 10(c), which is an instantiation of the graph of Figure 7 with n = 2. As explained in Section 2.2, it cannot be obtained by applying a vertex addition or an edge splitting on a smaller minimally persistent graph. However, by Theorem 2, it can be obtained by applying a sequence of operations of T on an initial leader-follower seed. Let us take 1 and 2 as respectively leader and follower of this initial seed. One can begin by adding 3, 4 and 5 using three vertex additions as shown in Figure 10(a). The graph obtained has the same underlying undirected graph as G, but the degrees of freedom are not allocated to the same vertices. By reversing the path P ({5, 4, 2, 1}) (using a sequence of edge reversals), one can then transfer one degree of freedom from 1 to 5 as shown in Figure 10(b) such that in the obtained graph, all the vertices have the same number of degrees of freedom as in G. As stated in Proposition 6, any edge of this graph that does not have the same direction as in G belongs to a cycle of such edges. The only such cycle here is C. By reversing it (using a sequence of edge reversals), one finally obtains the graph G, as shown in Figure 10(c). Note that consistently with Theorem 2, all the intermediate graphs are minimally persistent. Theorem 2 also proves that it is always possible to obtain a leader-follower pair from any minimally persistent graph by applying an appropriate sequence of operations of T −1. This can be also stated as follows: Theorem 3. Let G be a minimally persistent graph. By applying a (possibly empty) sequence of edge reversals on G, it is always possible to obtain a mini- 15 2 * 4 1 ** 3 (a) 2 * P 4 1 ** 3 5 1 * 2 * 4 (b) C 3 1 * 5 * 1 * (c) 2 * 2 * 5 3 3 4 4 5 * G 5 * Figure 10: Example of obtaining of a minimally persistent graph by applying a sequence of operations of T on a leader-follower seed. The graph G is obtained from the leader-follower seed by (a) three vertex additions, (b) the reversal of the path P and (c) of the cycle C. mally persistent graph on which at least one operation of S−1 (i.e, reverse edge splitting or reverse vertex addition) can be performed. Starting from a minimally persistent graph, one can thus first use operations of T −1 to obtain a leader-follower pair, and then use operations of T to obtain any other minimally persistent graph. This method is generally not optimal in terms of the number of operations. However, the argument proves the following corollary. Corollary 1. Every minimally persistent graph can be transformed into any other minimally persistent graph using only operations of T ∪ T −1. This result allows us to define a distance on the minimally persistent graphs (on more than one vertex) by saying that the distance between two of them is the minimal number of operations of T ∪ T −1 needed to transform one into the other. Propositions 3, 5 and 6 imply that the distance between two graphs is quadratically bounded by their size, the quadratic character coming from the cycle reversing operations (the others requires only a linear number of opera- tions). However, a better bound is likely to exist. Remark 2. Observe that the three operations of T are relatively basic ones and are performed locally. They could thus easily be implemented in a local way on an autonomous agent formation. It might be however possible to improve this 16 l k j l k j i l k j i Figure 11: Implementation of the edge splitting by a vertex addition and an edge reorientation. The vertex i is first added with two out-going edges by vertex addition, and the edge (j, k) is then reoriented and becomes (j, i). basic character using for example an operations such as an edge reorientation, i.e., an operation consisting in changing the arrival vertex of an edge. As shown in Figure 11, a vertex addition operation and an edge reorientation operation can indeed implement an edge splitting operation which could thus be discarded. However, this would require an efficient and simple criterion to determine when such an edge reorientation operation could be performed. 4 An alternative set of four primitive operations As explained in Section 3, every minimally persistent graph can be obtained by applying a sequence of operations belonging to T on an initial leader-follower seed, in such a way that all the intermediate graphs are minimally persistent. However, unlike in the case of an undirected Henneberg sequence (see Section 2), the number of vertices in the final graph does not determine uniquely the required number of intermediate graphs, but only an upper bound on it (see Section 3). In this section, we focus on sets of operations equivalent to those of S from an undirected point of view and that allow one to build all minimally persistent graphs (the number of intermediate graphs being thus uniquely de- termined by the the number of vertices of the final graph since each operation adds one vertex). It is proved that those sets always contain at least one oper- ation involving the reversal of edges that are not affected by the corresponding operation for undirected graphs. We then provide such a set A of four types of operations and show how it allows one to build any minimally persistent graph G = (V, E) by applying V − 2 operations to an initial leader-follower seed. Finally we study the relations between the two sets A and T . 4.1 Necessary involvement of external edges. In the sequel, we adopt the terms generalized vertex addition and generalized edge splitting for any operation which is equivalent to a vertex addition or an edge splitting from an undirected point of view. Such an operation is said to be confined if it only affects edges that are involved in the corresponding undi- rected operation. For example, all the operation of S are confined, while the 17 edge reversal operation defined in Section 3.1 is not. Suppose that one wants to remove a vertex (without losing persistence) from the provably minimally persistent graph represented in Figure 12 using a generalized reverse edge splitting or reverse vertex addition. The only ones that can be removed are those with a label "+", and due to their total degree, this could only be done by a generalized reverse edge splitting operation. Suppose now that one wants to use a confined version of this operation. One would then remove one of the vertices with a label "+" and connect two of its neighbors by a directed edge. Observe that among the three pairs of neighbors of any vertex with a label "+", two are already connected, and the last pair contains two vertices with an out-degree 2. Adding an edge between a pair of neighbors of the removed vertex without reversing the direction of any other edge would thus imply the presence of either a vertex with out-degree 3 (which by Theorem 2 is impossible in a minimally persistent graph) or of a cycle of length 2 (which by Proposition 1 cannot appear in a minimally rigid graph). This removal should therefore be performed by a non-confined reverse generalized edge splitting. The following result is thus proved. Proposition 8. If a set exists of generalized vertex additions and edge splittings allowing one to build all minimally persistent graphs from an initial leader- follower seed, such a set must always contain a non-confined edge splitting. The existence of confined operations that would not be equivalent to vertex addition or edge splitting, but that would however preserve minimal persistence and allow one to build all minimally persistent graphs with V vertices in V −2 operations (starting with a leader-follower seed) remains an open question. Note that such operations would have to be proved to preserve minimal rigidity. 4.2 Description of a set A of four primitive operations We define here a new set A of four operations. The first two are the standard vertex additions and edge splitting as described in Section 2.2, which implies that S ⊂ A. The two others are atypical versions of these. Let j, k be two vertices of a minimally persistent graph such that j has at least one degree of freedom. The atypical vertex addition operation consists in adding the vertex i, the edges (j, i) and (i, k), as shown in Figure 13(a). As a result, j loses a degree of freedom, and i appears with one. The reverse atypical vertex addition operation consists in removing a vertex with in- and out-degree 1. Proposition 9. Atypical vertex addition and reverse atypical vertex addition preserve minimal persistence. Proof. Since these operations are respectively a generalized vertex addition and a reverse generalized vertex addition, they preserve minimal rigidity as explained 18 + + * + + * + * + Figure 12: A minimally persistent graph no vertex of which can be removed (without losing persistence) by a reverse (generalized) vertex addition or a con- fined (generalized) reverse edge splitting. The symbol "*" represents one degree of freedom. Vertices that are candidate to be removed by a reverse generalized edge splitting are labelled "+". in Section 2.1. Moreover, the reverse atypical vertex addition does not increase the out-degree of any vertex, while the atypical vertex addition only increases by one an out-degree that is smaller than 2. In both situations the graph obtained after performing the operation does not contain any vertex with an out-degree larger than 2 and is thus minimally persistent (by Proposition 2). Let j, k and l be three vertices of a minimally persistent graph such that there is a (simple) directed path from j to k and (k, l) ∈ E. The atypical edge splitting operation consists in removing (k, l), adding a vertex i and the edge (j, i), (i, k) and (i, l), and reversing the direction of all the edges belonging to the path from j to k, as represented in Figure 13(b). Proposition 10. Atypical edge splitting preserves minimal persistence. Proof. This operation is a generalized edge splitting and thus preserves minimal rigidity. Since it does not affect the out-degree of any already existing vertex and adds a vertex with out-degree 2, it also preserves minimal persistence (by Proposition 2). Consider a vertex i with out-degree 2 and in-degree 1 in a minimally persis- tent graph, and call its neighbors j, k and l as in Figure 13(b). Suppose that in the graph obtained after deletion of i, there is a path from k (or equivalently l) to j and the pair (k, l) is not connected by an implicit nor an explicit edge. The reverse atypical edge splitting consists then in removing i, reversing all the edges of the path from k to j to obtain a path from j to k, and adding the edge (k, l). Proposition 11. Reverse atypical edge splitting preserves minimal persistence. 19 * j k j k i* l k j i l k j (a) (b) Figure 13: Representation of the atypical (a) vertex addition operation and (b) edge splitting operation, both belonging to A. The symbol "*" represents one degree of freedom. Proof. From an undirected point of view, this operation consists in removing one vertex incident to three edges, and then connecting a pair of unconnected vertices that does not define an implicit edge in the intermediate graph. It thus preserves minimal rigidity. Moreover, it does not affect the out-degree of any remaining vertex. It follows from Proposition 2 that reverse atypical edge splitting preserve minimal persistence. The conditions in which the reverse atypical edge splitting can be performed are not always easy to check. However, the following result holds: Lemma 2. In a minimally persistent graph, a vertex with in-degree 1 and out- degree 2 can always be removed by either a reverse standard edge splitting or a reverse atypical edge splitting. Proof. Consider a minimally persistent graph G = (V, E) and a vertex i ∈ V with d+(i) = 2, d−(i) = 1. We call its neighbors j, k and l such that (j, i), (i, k), (i, l) ∈ E, as in Figure 14(a) Let us assume that i cannot be removed by a reverse standard edge splitting, i.e., that j is connected to both k and l by an explicit or implicit edge in G \ {i}. As already mentioned in Section 2.1, k and l are in such a case never connected by an implicit nor an explicit edge in G \ {i}, and the graph obtained by connecting them after removing i from G is therefore minimally rigid. It remains to prove the existence of a directed path from k or l to j (note that k and l are interchangeable) in order that an edge splitting operation can be applied. For this purpose, we are going to construct a minimally persistent graph G′ close to G and in which j has a degree of freedom. As explained below, Proposition 4 guarantees then the existence of a directed path from either k or l to j. It will be proved that this implies the existence of such a path in G \ {i}. 20 k l k l qQ k l P p * i j P' p j * P'Q P' p Q j * (a) (b) (c) Figure 14: Representation of different paths and graph involved in Lemma 2. (b) shows the minimally persistent graph G′ obtained from the graph G represented in (a) by removing i, adding (k, l) and reversing P . (c) shows then the path Q (in G′) from k to j in a case where it has a non empty intersection with P ′. Consider a vertex p having at least one degree of freedom in G. Since d+(i) = 2 in G, Proposition 4 guarantees the existence (still in G) of a (cycle- free) directed path from i to p. Without loss of generality, let us assume that the second vertex of this path is k (it has indeed to be a neighbor of i, and k and l are interchangeable). There exists thus a directed path P from k to p to which i does not belong. We build G′ by reversing the path P (which becomes P ′), removing i and adding the edge (k, l), as shown in Figure 14(a) and (b). As already mentioned, any graph obtained by removing i and connecting k to l is minimally rigid. Moreover, after the reversal of P and addition of (k, l), p loses one degree of freedom, i.e., its out-degree in G′ is increased by one with respect to its out-degree in G (which is smaller than two). On the other hand, j acquires a degree of freedom. No vertex has thus an out-degree larger than 2 in G′, which is therefore minimally persistent. In G′, k has by construction a positive out-degree, and j has at least one degree of freedom. By Proposition 4, there exists thus a (cycle-free) directed path Q in G′ from k to j. In order to prove the existence of such a path in G \ {i}, we consider three cases. Observe that the only edges of G′ that do not exist in G \ {i} are (k, l) and those of P ′ (which exist but with the opposite direction). • Q and P ′ have no common edge, (k, l) 6∈ Q: In that case, the path Q also exists in G \ {i}. • Q and P ′ have no common edge, (k, l) ∈ Q: Since the (simple) path Q does not contain any cycle, (k, l) must be the first edge of Q. By removing this edge, one obtains a directed path from l to j having no intersection with P ′ and that does not contain (k, l). This path exists thus also in G \ {i}. • Q and P ′ have some common edge(s): Let q be the last vertex of Q that also belongs to P ′. The edges and vertices of Q which are after q constitute a directed path from q to j. By definition, it does not intersect P ′, and 21 it does not contain (k, l) for this would mean that Q contains a cycle. It exists therefore also in G. Moreover, since q belongs to the path P ′ in G′, it belongs to the path P in G \ {i}, and there is thus a directed path from k to q in G \ {i}. By taking the union of the path from k to q and the one from q to j, one obtains then a directed path from k to j in G \ {i}, as shown in Figure 14(c). In any of these three cases, there is thus a directed path from k or l to j in G \ {i}. As explained above, this implies that one can perform the reverse atypical edge splitting on i if one cannot perform the reverse standard one. 4.3 Obtaining all minimally persistent graphs using A Let G = (V, E) be a minimally persistent and therefore minimally rigid graph with more than two vertices. By Proposition 1, there holds 4 V − 6 = E = Pi∈V d−(i) + d+(i). Moreover, it can be shown (using Proposition 1) that such a graph never contains any vertex with a total degree smaller than 2. A counting argument shows then that it always contain at least one vertex with either (d−, d+) = (0, 2), (1, 1) or (1, 2). In the first two cases, one can perform on this vertex a reverse standard or atypical vertex addition, while in the last case, it follows from Lemma 2 that either a reverse standard edge splitting or a reverse atypical one can be performed. It is thus always possible to obtain a minimally persistent graph G′ = (V ′, E′) with V ′ = V − 1 by performing an operation of A−1 on G. Doing this recursively, one can obtains after V − 2 operation a minimally persistent graph on two vertices, i.e., a leader-follower seed. The reverse sequence of operations allows then one to obtain G from this seed. Since the operations of A and A−1 preserve minimal persistence, all the intermediate graph of such a sequence are persistent. We have thus proved the following theorem: Theorem 4. Every minimally persistent graph G = (V, E) (V > 1) can be obtained by performing V −2 operations of A on an initial leader-follower seed. Moreover, all the intermediate graphs are minimally persistent. Using the same argument as for Corollary 1, we obtain the following result. Corollary 2. Every minimally persistent graph can be transformed into any other minimally persistent graph using only operations of A ∪ A−1. As in Section 3.4, one can use the set A ∪ A−1 to define a distance on the minimally persistent graphs (on more than one vertex). But, as a consequence of Theorem 4, the distance between the graph G = (V, E) and G′ = (V ′, E′) is never greater than V + V ′ − 4. Remark 3. The non-confined character of the atypical edge splitting makes it more complicated to implement in an autonomous agent formation. It can in- deed involve the direction reversal of a potentially large number of edges that are 22 not involved in the corresponding operation for undirected graph. Proposition 8 states that there always is such a non-confined operation in a set of generalized vertex addition and edge splitting operations which allows one to build all min- imally persistent graphs. However, the example in Figure 12 only requires one edge to be reversed, and no example was found yet where it was necessary to reverse more than one edge. There might thus exist a set of operations having the same properties as A (with respect to the building of all minimally persistent graphs) but in which the non-confined operation only involves the reversal of a number of edges bounded independently of V . Remark 4. It is possible to show that among the four operations of A (resp. A−1), none can be removed without being replaced by some alternative new operation if the operation set is to produce all minimally persistent graphs (resp. contain for each minimally persistent graph an operation that can be performed on it). For each operation of A−1, one can indeed find a graph where none of the three other operations can be performed. However, the set of generalized vertex additions and edge splittings that we present here is just one among the several sets that we have found allowing one to build all minimally persistent graphs. It offers the advantage that its non-confined operation has a more local character than those contained in the other sets (which are not described here). 4.4 Relations between A and T We examine here the relation between the two sets A and T . Let X and Y be two sets of operations. We say that X ≤ Y if all the operations of X can be implemented by a sequence of operations of Y. If X ≤ Y and X ≥ Y, we say that X = Y. If X ≤ Y and X 6= Y, we say that X < Y. One can see that X −1 ≤ Y −1 if and only if X ≤ Y. Lemma 3. An atypical vertex addition can be implemented using one standard vertex addition and one edge reversal. Proof. Let k and j be two distinct vertices in a minimally persistent graph such that k has at least one degree of freedom. Instead of adding a vertex i and the edge (i, j) and (k, i) (atypical vertex addition), one can equivalently add the vertex i and the edges (i, j) and (i, k) (standard vertex addition), and then reverse the edge (i, k) (edge reversal). Note that this edge reversal can be performed because k has a degree of freedom. Lemma 4. An atypical edge splitting can be implemented using one standard edge splitting and one or more edge reversal(s). Proof. Let j, k and l be three vertices of a minimally persistent graph G satis- fying the conditions required to perform an atypical edge splitting (see Section 4.2), and let G′ be the graph obtained by performing an atypical edge splitting on (k, l) in G as represented in Figure 13(b). By performing a standard edge splitting on (k, l) in G such that the added vertex is also connected to j, one 23 obtains a minimally persistent graph having the same underlying undirected graph as G′. It is then a consequence of Proposition 7 that this last graph can be obtained by a sequence of edge reversals. Proposition 12. A < T , and equivalently A−1 < T −1 Proof. Observe first that all the operations of A increase the number of vertices in the graph, while edge reversal does not. Thus edge reversal cannot be imple- mented by a sequences of operations of A, and A 6≥ T . Since the operations of S (standard vertex additions and edge splitting) be- long to both A and T , and since by Lemmas 3 and 4, the operations of A \ S (atypical vertex addition and atypical edge splitting) can be implemented using operations of T , we have A ≤ T , which together with A 6≥ T implies that A < T . Since the set T of operations is more powerful than A, Theorem 4 is a stronger result than Theorem 2. However, if we look at the sets containing both normal and inverse operations, the results are different. Suppose indeed that a graph G′ is obtained by performing an operation of T ∪ T −1 on a minimally persistent graph G. Since both graphs are minimally persistent, Corollary 2 implies that G′ can also be obtained by applying a sequence of operations of A ∪ A−1 on G. Any operation of T ∪ T −1 can thus be implemented by a sequence of operations of A ∪ A−1. Conversely, any operation of A ∪ A−1 can be implemented by a sequence of operations of T ∪ T −1. We have thus shown the following result: Proposition 13. A ∪ A−1 = T ∪ T −1 Both sets A and T allow one to enumerate exhaustively all minimally persis- tent graphs. However, as explained in Section 2.1, since the sequence that can build a certain minimally persistent graph is not unique, this enumeration can allow one to compute an upper bound on the number of minimally persistent graphs having a certain number of vertices, but not their exact number. 5 Conclusions and future work In this paper, we have extended the Henneberg sequence concept to directed graphs. From an autonomous agent point of view, this provides a systematic approach to sequentially obtain or reorganize a minimally persistent agent for- mation. We also exposed some natural restrictions to these extensions, the main one being the impossibility of building all minimally persistent graphs using only confined generalized vertex additions or edge splittings. We proposed two sets of operations, each of which allows one to obtain any minimally persistent graph from a leader-follower seed. The first one (T in Sec- tion 3) contains the two standard vertex additions and edge splittings already introduced in [3] and a purely directed operation (i.e. a neutral operation from 24 an undirected point of view). The second set (A in Section 4) contains, in ad- dition to the two standard operations, two atypical versions of them, among which one is not a confined operation. It involves indeed the reversal of a path of undetermined length in the graph. However, it is still an open question to know if similar results could be obtained using operations involving a number of reversals fixed or bounded independently of the size of the graph. Note that for the second set, the number of operations required to build a minimally per- sistent graphs is uniquely determined by the size of the graph. From an autonomous agent point of view, it would be useful to study how these various operations could be performed in a decentralized way in order to efficiently construct or reorganize a formation. For this purpose, the operations of T could be preferred for their simplicity and because the successive modifica- tions are only local modifications. This study could also imply the development of an optimal algorithm (using one of the two sets of operations) to reorganize a persistent formation. An improvement could come from the use of an even more simple operation such as edge reorientation, which would consist in changing the arrival point of an edge. However, the conditions under which minimal rigidity is preserved by this operation are not known yet. As a final remark, note that we have only focused on the transformations of minimally persistent graph into other minimally persistent graphs. Several practical issues concerning autonomous agent formations arise relating to the merging of such graphs, or their repair after the loss of some vertices or edges. It would thus be worthwhile to study these particular problems as well. References [1] J. Baillieul and A. Suri. Information patterns and hedging brockett's theo- rem in controlling vehicle formations. In Proc. of the 42nd IEEE Conf. on Decision and Control, volume 1, pages 556 -- 563, Hawaii, December 2003. [2] A. Das, J. Spletzer, V. Kumar, and C. Taylor. Ad hoc networks for lo- calization and control. In Proc. of the 41st IEEE Conf. on Decision and Control, volume 3, pages 2978 -- 2983, Las Vegas, NV, December 2002. [3] T. Eren, B.D.O. Anderson, A.S. Morse, and P.N. Belhumeur. Informa- tion structures to secure control of rigid formations with leader-follower structure. In Proc. of the American Control Conference, pages 2966 -- 2971, Portland, Oregon, June 2005. [4] J.M. Hendrickx, B.D.O. Anderson, and V.D. Blondel. Rigidity and persis- tence of directed graphs. In Proceedings of the 44th IEEE Conference on Decision and Control, Seville, Spain, December 2005. [5] J.M. Hendrickx, B.D.O. Anderson, J.-C. Delvenne, and V.D. Blondel. Di- rected graphs for the analysis of rigidity and persistence in autonomous 25 agents systems. To appear in International Journal of Robust and Nonlin- ear Control's special issue on Communicating-Agent Systems. [6] J.M. Hendrickx, B. Fidan, C. Yu, B.D.O. Anderson, and V.D. Blondel. In Rigidity and persistence of three and higher dimensional formations. Proceedings of the First International Workshop on Multi-Agent Robotic Systems (MARS 2005), pages 39 -- 46, Barcelona, Spain, September 2005. [7] L. Henneberg. Die graphische Statik der starren Systeme. Leipzig, 1911. [8] G. Laman. On graphs and rigidity of plane skeletal structures. J. Engrg. Math., 4:331 -- 340, 1970. [9] R. Olfati-Saber and R.M Murray. Graph rigidity and distributed formation stabilization of multi-vehicle systems. In Proceedings of the 41st Confer- ence on Decision and Control, volume 3, pages 2965 -- 2971, Las Vegas, NV, December 2002. [10] T. Tay and W. Whiteley. Generating isostatic frameworks. Structural Topology, (11):21 -- 69, 1985. [11] W. Whiteley. Some matroids from discrete applied geometry. In Matroid theory (Seattle, WA, 1995), volume 197 of Contemp. Math., pages 171 -- 311. Amer. Math. Soc., Providence, RI, 1996. [12] C. Yu, J.M. Hendrickx, B. Fidan, and B.D.O. Anderson. Structural per- sistence of three dimensional autonomous formations. In Proceedings of the First International Workshop on Multi-Agent Robotic Systems (MARS 2005), pages 47 -- 55, Barcelona, Spain, September 2005. [13] C. Yu, J.M. Hendrickx, B. Fidan, B.D.O. Anderson, and V.D. Blondel. Three and higher dimensional autonomous formations: Rigidity, persis- tence and structural persistence. To appear in Automatica. 26
1611.06858
1
1611
2016-11-21T16:00:59
What Do We Elect Committees For? A Voting Committee Model for Multi-Winner Rules
[ "cs.MA", "cs.GT" ]
We present a new model that describes the process of electing a group of representatives (e.g., a parliament) for a group of voters. In this model, called the voting committee model, the elected group of representatives runs a number of ballots to make final decisions regarding various issues. The satisfaction of voters comes from the final decisions made by the elected committee. Our results suggest that depending on a decision system used by the committee to make these final decisions, different multi-winner election rules are most suitable for electing the committee. Furthermore, we show that if we allow not only a committee, but also an election rule used to make final decisions, to depend on the voters' preferences, we can obtain an even better representation of the voters.
cs.MA
cs
What Do We Elect Committees For? A Voting Committee Model for Multi-Winner Rules∗ Piotr Skowron University of Oxford Oxford, UK [email protected] Abstract We present a new model that describes the process of electing a group of representatives (e.g., a parliament) for a group of voters. In this model, called the voting committee model, the elected group of representatives runs a number of ballots to make final decisions regarding various issues. The satisfaction of voters comes from the final decisions made by the elected committee. Our results suggest that depending on a decision system used by the committee to make these final decisions, different multi-winner election rules are most suitable for electing the committee. Furthermore, we show that if we allow not only a committee, but also an election rule used to make final decisions, to depend on the voters' preferences, we can obtain an even better representation of the voters. 1 Introduction There are various scenarios where a group of representatives is selected to make decisions on behalf of a larger population of voters. The examples of such situations include parliamentary elections, elections for supervisory or faculty board, elections for the trade union, etc. In such scenarios, the elected group of representatives, also referred to as a committee, runs a sequence of ballots making decisions regarding various issues. For instance, these can be decisions made by the elected parliament regarding financial economics, national health-care system, retirement age, or changes in the specific law acts. In such case, it is natural to judge the quality of the elected committee based on the quality of its decisions. In this paper we explore this idea and introduce new approach that allows for a normative comparison of various multiwinner election rules. We introduce and study a new formal model, hereinafter referred to as the voting committee model. In this model we assume that an elected committee runs a sequence of independent bal- lots, in which it makes collective decisions regarding a given set of issues. We assume that the ultimate satisfaction of the voters depends solely on the final decisions made by the committee. ∗The preliminary version of this paper was presented at the 24th International Joint Conference on Artificial Intelli- gence (IJCAI-2015) and on the 13th Meeting of the Society for Social Choice and Welfare in 2016 (SSCW-2016). 1 Consequently, each voter ranks candidates for the committee based on how likely it is that they vote according to his or her preferences. The voting committee model allows to numerically assess qual- ities of committees, depending on what election rule (refered to as a decision rule) these committees use to make the final decisions. Intuitively, the numerical quality of a committee S estimates how likely it is that S makes decisions consistent with voters' preferences. There are many works that study scenarios in which a group of representatives is elected to make certain decisions. To the best of our knowledge, however, starting with the famous Condorcet's Jury Theorem [11] most of these works [47, 18, 19, 32] model scenarios where there exists some ground truth and when the decisions made by the elected committee are either objectively correct or wrong. Thus, these models refer to the process of selecting a group of experts. Our approach is different -- there is no ground truth and the voters can differ with their opinions regarding various issues. Informally speaking, a committee is good if it well represent voters' subjective opinions rather than if it can solve certain specific problems having objectively good or bad solutions. Our Contribution In this work we introduce a new formal probabilistic model that relates voters' satisfactions from a committee to their satisfactions from the committee's decisions. In our model we define the notion of optimality of a multi-winner election rule, given that a certain decision rule is used by the elected committee to make the final decisions. We consider two approaches in our probabilistic voting committee model. In the first approach we consider voters which can be correlated with respect to their preferences regarding various issues. We study two specific cases, namely: (i) when voters can be represented as uniformly distributed points on the interval (in such case points can represent, for instance, positions of the corresponding voters in the left-right political spectrum), and (ii) when preferences of voters are taken from publicly available datasets containing distributions of votes in numerous real-life voting scenarios [27]. In this approach we use the voting committee model, and through computer simulations we obtain several interesting conclusions. In particular, we observe that representation-focused multi- winner election rules, such as the Chamberlin -- Courant rule [9], make better decisions with respect to voters' preferences in comparison to the other committee selection rules that we study. Somehow surprisingly, according to our simulations the Chamberlin -- Courant rule is even superior to Pro- portional Approval Voting, a multiwinner extension of the d'Hondt proportional method of appor- tionment. Further, we observe that in our experiments proportional committees make significantly better decisions than a single representative would make. Last, but not least, we argue that decisions made by the elected committee through majority rule are better than those made by the committee through the random dictatorship rule. We also consider the specific case when each voter has a single, primarily important for him or her, issue. In this case the probabilistic model collapses to the deterministic one. Here, we ob- tain theoretical justification for the following claims. We argue that the top-K rules, i.e., scoring rules [46] that select K candidates with the highest total score assigned by voters, are suitable for electing committees that use the random dictatorship rule to make decisions. It might seem that the significance of this observation is compromised by the low applicability of randomized election rules. Such randomized decision-making processes, however, model situations where decisions are 2 made by individual members of the committee but we are uncertain which issues will be considered by which individuals. We also observe that the median OWA rule [41] is suitable for electing com- mittees that make final decisions by majority voting. Informally speaking, in the median OWA rule a voter is satisfied with a committee S if he or she is satisfied with at least half of the members of S. We recall the formal definition of the class of the OWA rules in Section 4. Further, our analysis sug- gests that representation focused multi-winner election rules are particularly well-suited for electing committees that need to make unanimous decisions. Unanimity is often required in situations where making a wrong decision implies severe consequences, e.g., in case of juries voting on convictions. Indeed, in such cases we are particularly willing to ensure that minorities are represented in the committees to avoid biased decisions. In the second approach in our probabilistic model we consider independent voters. In such case we prove the existence of the optimal voting rule and show how to construct one. Discussion of this approach leads to the new very interesting concept -- to the notion of a full multiwinner rule. Informally speaking, a full multiwinner rule is the concept that allows voters to elect not only committees, but also the rules used by these committees to make decisions. We discuss the existence of optimal full multiwinner rules in Section 6.3. Related Work Our research is most closely related to the work of Koriyama et al. [24], who alike assume that the elected committee makes a number of decisions in a sequence of ballots. In such model, they compute the frequency, with which the will of each individual is implemented. The difference is, however, that Koriyama et al. consider the party list setting and the problem of apportionment, i.e., of allocating seats to the parties according to the numbers of votes the parties receive from voters. The authors show that certain assumptions regarding how the society evaluates the frequencies with which the opinions of multiple individuals is implemented, justify degressive proportionality, an interesting principle of proportional apportionment. Similarly to our work, Casella [7, 8] considers the model where a committee meets regularly over time to make a sequence of binary decisions. She defines Storable Votes, a multiple-issue vot- ing system aimed at promoting rights of minorities. The strategic behavior of committee members voting on various issues is also captured in an innovative model by Colonel Blotto games [26]. Our work extends the literature on properties of multi-winner election rules [39, 2, 14, 1, 21, 13]. This literature includes, e.g., the works of Barber´a and Coelho [2], where the authors define prop- erties that "good" multi-winner rules should satisfy. Elkind et al. [14] argue that the desirability of many natural properties of multi-winner rules must be evaluated in the context of their specific ap- plications. Our paper extends this discussion by showing an intuitive model and concrete examples concerning this model, for which different multi-winner rules are particularly well applicable. Similarly to Fishburn [20], we explore the idea of comparing multi-winner election systems. Further, our perspective is conceptually close to the ones given by Christian et al. [10], who study computational problems related to lobbying in direct democracy, where the decisions are made directly by the voters who express their preferences in open referenda (there are no representatives). Many multi-winner election systems are defined as functions selecting such committees that optimize certain metrics, usually related to voters satisfaction [4, 9, 31, 5, 23, 13]. These different 3 optimization metrics capture certain desired properties of election systems. Our paper complements these works by presenting specific metrics that are motivated by the analysis of decision-making processes of committees. Finally, we note that there exists a broad literature on voting on multi-attribute domains, where agents need to make collective decisions regarding a number of issues [6, 25, 44, 45]. We differ from these works by considering an indirect process of decision-making, through an elected committee. 2 Illustrative Example Consider a multiwinner election with six voters, eight candidates, and where the goal is to select a committee of three representatives. Assume that for each voter there exists a single important issue that he or she cares about; an issue can be, for instance, the decision of decreasing the taxes, of decreasing the retirement age, or the decision of making a specific change in the national health care system. The elected committee will vote on each issue and make decision of either accepting or rejecting it; assume that the elected committee will make such decisions by majority voting. Further, assume that the voters know the views of the candidates on the issues and that a voter i approves of a candidate a if and only if i and a have the same view on the i's important issue. Consider example preferences of voters over candidates illustrated in Table 1a. Observe that committee S = {c1, c2, c3} would make decisions consistent with preferences of voter i1. Indeed, for the i1's important issue, the majority of S, namely candidates c1 and c2, have preferences con- sistent with i1. Similarly, for the issues important for voters i2, i3, i4 and i6, committee S would make decisions consistent with the preferences of these voters. Informally speaking, five out of six voters would be satisfied with the decisions made by committee S. Any other committee would make decisions satisfying less voters. Consequently, in this scenario committee S should win the election. Table 1: Example of preferences of the voters over candidates. Values '0' and '1' in the fields denote that corresponding voters approve of or disapprove of the corresponding candidates, respectively. For instance, voter i1 in Table (a) approves of candidates c1, c2, c5, and c8. The same voter in Table (b) approves of candidates c1 and c8. c1 1 1 1 0 1 0 c2 1 1 0 1 0 1 c3 0 1 1 1 0 1 i1 i2 i3 i4 i5 i6 (a) c4 0 1 1 0 1 0 c5 1 1 0 0 1 0 c6 0 1 0 0 1 1 c7 0 0 1 1 0 0 c8 1 0 0 0 0 1 c1 1 0 1 0 1 0 c2 0 1 0 0 0 1 c3 0 0 0 1 0 0 i1 i2 i3 i4 i5 i6 (b) c4 0 1 0 0 0 0 c5 0 0 0 0 1 0 c6 0 0 0 0 0 0 c7 0 0 0 1 0 0 c8 1 0 0 1 0 1 The above arguments can be used to design a voting rule that would be optimal for dichotomous voters' preferences. In such a rule, a voter i approves of a committee S if majority of the members 4 of S are approved by v; the committee approved by most voters is announced as the winner. We will formalize this argument later in Theorem 1. Now, let us change our initial assumptions and consider the case when the elected committee uses random dictatorship rule to make decisions regarding issues. Let us recall that according to the random dictatorship rule, for each issue a single committee member is selected uniformly at random, and the selected member makes a decision on the issue. Observe that in such case, voter i1 is less satisfied with committee S = {c1, c2, c3} than before. Indeed, on i1's important issue, committee S will make decision consistent with i1's preferences only with probability equal to 2/3. The expected number of voters satisfied with the decisions made by committee S is equal to four, and for any other committee the expected number of satisfied voters is even lower. We conclude that in this case it is socially more beneficial if the elected committee uses majority voting rather than random dictatorship rule. The natural question arises whether this is always the case. To answer this question consider preferences of voters from Table 1b. For these preferences, the decisions made by the optimal committee via majority rule will satisfy only two out of six voters. On the other hand, committee S′ = {c1, c2, c8} using random dictatorship would satisfy, in expectation, 22/3 voters. The above observations suggest that it is justified to consider committee selection rules where not only the winning committee, but also the rule used by the elected committee to make decisions, depends on the voters' preferences. In Section 6.3 we formalize this concept, by introducing full multiwinner rules. A full multiwinner rule is a function that given voters' preferences returns a pair: a given-size committee and a randomized decision rule over the set of two alternatives (accept and reject). In the further part of this paper we will explain how to generalize the above reasoning beyond dichotomous preferences of the voters. Briefly speaking, we will assume that the voters do not know how the candidates are going to vote over the issues. Instead, we will assume that each voter has some intuition about how well he or she can be represented by a given candidate; formally, we will assume that each voter v is able to assess the probability with which a given candidate will vote according to v's preferences. This captures, for instance, a common scenario where the issues are not known in advance, thus the voters must use their beliefs to decide on how well given candidates will represent them. 3 The Voting Committee Model In this section we describe a voting committee model that formalizes intuitions given is Section 2, and that allows for a normative comparison of various multi-winner election rules. For each set X, by 1X we denote the indicator function of X, i.e., 1X(x) = 1 if x ∈ X, and 1X(x) = 0 if x /∈ X. For simplicity, we write 1X instead of 1X(x) whenever x is clear from the context. Let N = {1, 2, . . . , n} be a set of voters, and let C = {c1, c2, . . . , cm} be a set of candidates. We assume there is a set D = {D1, D2, . . . , Dr} of r issues; each issue Dj is a binary set consisting of two alternatives Dj = {A, R}. Intuitively, the issue can be either accepted or rejected; A and R corresponds to accepting and rejecting it, respectively. Voters have strict preferences over the alter- natives within each issue; by dj i we denote the preferred alternative from Dj from the perspective of voter i. The issues might differ in their importance to different voters. We consider two types of 5 attitudes: a voter i can consider an issue Dj either as important or as insignificant. We denote the set of all the issues important for voter i as Dim(i) ⊆ D. In the first stage in our model, a committee S is selected through a multi-winner election rule Rmult; the selected committee consists of K members. In the second stage, the committee S runs r independent ballots, for each ballot using the same (randomized) decision rule Rdec. In the i- th ballot, 1 ≤ i ≤ r, the committee makes a collective decision regarding issue Di -- for Di the committee makes either decision A or decision R. The final outcome of this two-stage process is described by a vector of r decisions. Intuitively, the first stage of elections might correspond to e.g., parliamentary elections, elections for supervisory or faculty board, etc. An election in the second stage might be viewed as e.g., a parliamentary ballot on an issue regarding, e.g., financial and monetary economics, education politics, changes in national health-care system, etc. A multiwinner election rule Rmult takes as input a matrix of scores that voters assign to the candidates and returns a subset of K candidates. The scores might be provided directly by the voters or extracted from their ordinal preferences through a positional scoring function (we will discuss this issue in more detail in the subsequent sections). A (randomized) decision rule Rdec is a function Rdec : N → R, that for each natural number a, corresponding to the number of votes casted on A by the committee members, returns the probability that value A is selected. We require that Rdec is symmetric with respect to decisions A and R, i.e., that for each a, 0 ≤ a ≤ K, it holds that Rdec(a) = 1 − Rdec(K − a). The ultimate satisfaction1 of voter i depends solely on the final outcome of the r ballots. Intu- itively, voter i considers committee S as good, if for i's important issues, i.e., issues from Dim(i), S is likely to make decisions consistent with i's preferences. The ultimate satisfaction of a voter i from committee S is measured by value PS,Rdec(i), the probability that S makes a decision consis- tent with i's preferences assuming that S uses rule Rdec to make final decisions. Throughout the paper we will consider several specific variants of the voting committee model which will differ in a way the value PS,Rdec(i) is defined. Let us now define the central notion of this paper that we will use in further analysis. Definition 1. Let Rdec be a decision rule used by the committee to make final decisions, and let K denote the size of the committee to be elected. A committee S is optimal if: S ∈ argmaxS ′⊆C:S ′=KXi PS ′,Rdec(i). (1) In the above definition we take the utilitarian approach -- the optimal rule aims at maximizing the sum of the ultimate satisfaction of the voters. Analogously, we can define committees optimal in the egalitarian sense, by replacing "sum" with "min" in Definition 1, optimizing the ultimate satisfac- tion of the least satisfied voter. For the sake of concreteness, in this paper we focus on the utilitarian case only. Definition 1 implicitly introduces the way of comparing different committees, explored PS ′,Rdec(i). in this paper. A committee S is preferred over a committee S′ ifPi 1We write "ultimate satisfaction" instead of "satisfaction" to distinguish these values, representing utilities that voters get from decisions of a committee from the scores that voters assign to individual candidates, and which quantify the level of appreciation of voters to individuals. PS,Rdec(i) >Pi 6 4 Overview of Election Rules In this section we recall definitions of several known decision and multi-winner election rules that we use in our further analysis. 4.1 Decision Rules We recall that a (randomized) decision rule Rdec is a function Rdec : N → R, that for each natural number a, corresponding to the number of votes casted on A (accept), returns the probability that the value A will be selected. We recall that we require Rdec to be symmetric, that is for each a, 0 ≤ a ≤ K, it must hold that Rdec(a) = 1 − Rdec(K − a). Below we recall the definition of popular decision rules that we will use in our analysis. The uniformly random dictatorship rule selects an alternative d with probability proportional to the number of committee members who vote for d. The majority rule deterministically selects A if at least half of the committee members vote for A (in order to avoid issues related to tie- breaking, we will always use the majority rule for the odd number of votes). Additionally, we consider one rule which is not symmetric with respect to decisions A and R -- the unanimity rule returns deterministically A if and only if all committee members vote for A. 4.2 Multiwinner Election Rules For the description of multiwinner rules we assume that voters express their preferences over can- didates by providing scores: for a voter i and candidate c, by ui,c we denote the score that i assigns to c. Intuitively, ui,c quantifies the level of appreciation of voter i for candidate c. In the description of our results in the subsequent sections we will discuss where these scores come from, and their specific structure. There are two particularly interesting types of scores: Approval scores. We say that scores are approvals if for each voter i and each candidate c, we have ui,c ∈ {0, 1}. We call the setting with approval scores the approval model. In the approval model, we say that a voter i approves of a candidate c if ui,c = 1. Otherwise we say that i disapproves of c. Borda scores. In the model with Borda scores, for each voter i and each candidate c, we have ui,c ∈ {0, . . . , m − 1}, and ui,c 6= ui,c′ for each c 6= c′. In other words, each voter assigns his or her most preferred candidate score of m − 1, to his or her second most preferred candidate score of m − 2, etc. One way in which the Borda scores can be elicitated, is by asking voters for their rankings of candidates, and by applying Borda positional scoring functions to such ordinal preferences (cf. the work of Young [46]). A score profile is a matrix of the scores of all voters over all candidates. We denote the set of all score profiles as U . For each j ∈ N, by Pj(S) we denote the set of all subsets of S of size j. We refer to the elements of PK (C) as to committees. A multi-winner election rule is a function Rmult : U → PK(C) that for a given score profile of voters returns a committee of size K. A significant part of results provided in this paper concerns OWA rules (OWA stands for an ordered weighted average operator). OWA rules in the context of approval model were first 7 mentioned in the 19th century in the early works of Danish astronomer and mathematician Thor- vald N. Thiele [43] and than generalized to arbitrary score profiles by Skowron et al. [41]. Below, we recall the definition of this remarkably general class of rules and describe several concrete examples of OWA rules. For each voter i, each committee S, and each number j, 1 ≤ j ≤ K, let ui,S(j) de- note the score of the j-th most preferred candidate from S, according to i. In other words: {ui,S(1), . . . , ui,S(K)} = {ui,c : c ∈ S}, and ui,S(1) ≥ · · · ≥ ui,S(K). For instance, ui,S(1) is the score that i assigns to his or her most preferred candidate in S, ui,S(2) is the score that i assigns to his or her second most preferred candidate in S, etc. For each voter i, each committee S, and each K-element vector α = hα1, . . . , αK i, we define the α-satisfaction of i from S as the ordered weighted average (OWA) of the scores of the members of S: α(i, S) = αjui,S(j). K Xj=1 The α-rule selects a committee S that maximizes total α-satisfaction of the votersPi α(i, S). Intuitively, the α vector provides a way of aggregating scores of the individual members of the committee to obtain the score of the committee as the whole. Indeed, many known multiwinner rules are in fact OWA rules: Top-K rule and K-Borda rule. If αTopK = h1, 1, . . . , 1i we get a top-K rule that selects K can- didates with the highest total scores. Such rules are referred to as the weakly separable rules [14]. For Borda scores, the top-K rule collapses to the well known K-Borda rule [13]. Chamberlin -- Courant rule. Chamberlin -- Courant rule [9] is an OWA rule defined by the weight vector αCC = h1, 0, . . . , 0i. Informally speaking, according to Chamberlin and Courant a voter cares only about his or her most preferred candidate in the committee; such a most preferred candidate is a representative of the voter in the elected committee. Initially, Cham- berlin and Courant defined their rule for Borda scores. Using Chamberlin -- Courant rule in the approval model was first suggested by Thiele [43]. Elkind et al. [14] considered the Chamberlin -- Courant rule for different types of score profiles, and refer to these types of rules as representation focussed rules [14]. Proportional Approval Voting (PAV). PAV is defined as an OWA rule with the weight vector αPAV = h1, 1/2, . . . , 1/Ki. This rule, developed by Thiele, has been used for a short pe- riod in Sweden during early 1900's. This specific sequence of harmonic weights ensures a certain level of proportionality of the rule [23, 1]; as a matter of fact, PAV is often considered as an extension of the d'Hondt method of apportionment [35] to the case when voters can vote for individual candidates rather than for political parties. k-median rule. The k-median rule is the OWA rule defined by the vector α which has 1 on the k-th positions and 0 on the others. In other words, according to the k-median rule, the satisfaction of a voter from a committee S is his or her satisfaction from the k-th most preferred member of S. 8 The class of OWA-based rules captures many other interesting election systems such as top-K- counting rules [17], separable rules [14] etc. For more discussion on OWA based rules and their applications beyond voting systems we refer the reader to the work of Skowron et al. [41]. Sequential OWA Rules. Unfortunately, for many OWA-based rules, finding the winners is a com- putationally hard problem2. Sequential OWA rules form an appealing, computationally easy, alter- native for OWA rules. Let α denote the vector of K weights. The sequential α-rule proceeds as follows. It starts with an empty solution S = ∅, and in each of the K consecutive steps it adds to S the candidate that increases the α-satisfaction of the voters most. Usually, sequential OWA rules provide a good way of approximating their optimal counterparts [41], sometimes exhibiting even more interesting properties than the original OWA rules [14]. 5 Correlated Voters in the Voting Committee Model In this section we consider voters which are not independent with respect to their preferences over the set of issues. We start our analysis by considering voters and candidates which can be rep- resented as points on the line of preferences. The concept of representing voters and candidates as points in the Euclidean space dates back to 1966 [12, 33], and since than, due to its many natural interpretations, it received a considerable amount of attention in the social choice litera- ture [15, 16, 29, 30, 38]. Let us consider the following illustrative example. Consider the population where one third of voters are left-wing and these voters are represented on the line by point 0, one third are right-wing and represented by point 1, and one third are centrists and represented by point 1/2. There are three issues L, C, and R: the left-wing voters would like L accepted, R rejected, and they do not care about C; the right-wing voters would like R accepted, L rejected, and they consider issue C insignificant; the centrists voters only care about C being accepted. A left-wing candidate will vote for accepting L, C and R with probabilities 1, 1/2, and 0, respectively. A right-wing candidate will vote for accepting these issues with probabilities 0, 1/2, and 1, respectively. A centrist candidate will vote for accepting them with probabilities 1/2, 1, and 1/2, respectively. In particular, left-wing voters are perfectly represented by left-wing candidates and perfectly misrepresented by right-wing candidates. Consider the two committees: S which consists of a left-wing, a centrist, and a right- wing candidate, and Q that consists of three centrist candidates. Proportional committee S Centrist committee Q The probability that committee S makes decision consistent with preferences of left-wing voters is equal to 1/2. The same probability for right-wing voters is also equal to 1/2, and for the centrists voters to 3/4 (the probability that at least one of the two committee members, the left-wing or the 2Computational hardness of the Chamberlin -- Courant rule was first proved by Procaccia et al. [34]. Betzler et al. [3] showed that this problem is also hard from the perspective of parameterized complexity theory. For arguments referring to other weight vectors we refer the reader to to the work of Skowron et al. [41] 9 right-wing, will vote for accepting issue C). The ultimate satisfaction of the voters from committee S is thus equal to n/3 · (1/2 + 1/2 + 3/4). The centrist committee Q, however, will make decision consistent with left-wing, centrist and right-wing voters with probabilities equal to 1/2, 1, and 1/2, respectively. Thus, committee Q results in a higher ultimate satisfaction of the voters. The surpris- ing conclusion of the above example is that the centrist committee, in some situations, can represent the voters better than the proportional one. In particular, this example shows that it is not clear how the best decision-making committee should be aligned on the preference line. Below, we will explore this idea further, we will argue that the described phenomenon is specific to our example, and that in the considered cases the proportional committee is usually, in some sense, superior. 5.1 Uniform Distribution on the Euclidean Line Let us first consider the case where voters and candidates are uniformly distributed on the [0, 1] interval. For this distribution with n = 500 voters and m = 500 candidates, we run the following computer simulations: 1. For each voter v we assumed that there exists one issue which can be represented on the line by the same point as the corresponding voter. 2. For each issue i we uniformly at random selected a value p ∈ [3/2, 5/2]. Intuitively, values of p closer to 3/2 make the issue more likely to be preferred by a majority of voters, thus such an issue can be considered as objectively desired. Values of p closer to 5/2 suggest that the issue is likely to be preferred only by a minority of voters. Specifically, for each voter and for each candidate we randomly selected their preference over the issue. For an issue i and a voter (or a candidate) x we took 1 − p · i − x as the probability of x accepting i, where i − x is the distance between points corresponding to i and x on the line. In particular, each voter always accepts his or her corresponding issue; further, for p = 2 and a centrist issue i, in expectation half of the voters (and half of the candidates) accept i. 3. For each issue we computed decisions made by different committees with respect to such issues, and we assigned to each voter v the satisfaction equal to the fraction of issues for each a given committee made decisions consistent with v's preferences. 4. We repeated such experiment 500 times and for each voter we computed the average ultimate satisfaction. In these simulations we considered five different committees. Three of the considered committees consisted of 51 candidates and were selected by the top-K rule, and by the sequential variants of PAV, and Chamberlin -- Courant rules. To compute committees according to these rules, we assumed that the scores that voters assign to candidates are proportional to one minus the distance between the respective points. For a better intuition, below we depict example committees returned by the three considered multiwinner election rules (for the sake of readability of the diagram, below we depict the case of 10 rather than 51 committee members). Further, we considered one committee that consisted of a single centrist candidate, and one com- mittee that consisted of all voters, i.e., the committee which represents the direct democracy -- the 10 Chamberlin -- Courant PAV Top-K case where all decisions are made in referenda. Finally, we considered two different decision rules that the elected committees used to make final decisions with respect to issues (cf. point 3 above), namely the majority rule and the random dictatorship rule. 0.8 0.6 0.4 0.2 n o i t c a f s i t a s e t a m i t l u 0 0 0.8 0.6 0.4 0.2 n o i t c a f s i t a s e t a m i t l u 0 0 Referendum CC PAV Top-k Single Winner 0.2 0.4 0.6 0.8 1 voters (a) majority Single Winner Top-k PAV CC Referendum 0.2 0.4 0.6 0.8 1 voters (b) random dictatorship Figure 1: The results of the simulations for voters and candidates uniformly distributed on the Euclidean interval [0, 1]. All issues are important. Points on the x-axis correspond to voters. The results of our simulations are depicted in Figure 1. Our conclusions are the following: 1. For the case of majority rule, the committee elected by PAV strictly dominates the single- winner committee. This justifies the decision of selecting a collective body rather than en- trusting the whole power to a single representative. Further, this observation suggest a conjec- ture that an analogous variant of Condorcet's jury theorem can be formulated for the voting committee model. We recall that the main difference is that in our model there is no absolute criterion suggesting that some voter is right or wrong with respect to a given issue. Even for a high value of parameter p (cf. point 2 in the description of simulations), where the issue is relatively unpopular, a voter who is close to such issue will still prefer it to be accepted. 2. The areas below the plots for all four multiwinner committees are almost the same. Yet, the committee selected by the Chamberlin -- Courant rule ensures more fairness to the voters; the two remaining multiwinner rules tend to favor centrist voters. This observation suggests the conjecture that the distribution of the members of the elected committee in a spatial model should resemble the distribution of the voters. 3. Decisions made by the majority rule are in expectation better than decisions made by the random dictatorship rule. Next, we wanted to check how the intensities of voters' preferences are reflected in the voting committee model. Intuitively, a voter has stronger feelings about issues which are either very close 11 to him or her, or which are far away on the line of preferences. A voter cares more about decisions made with respect to such issues in comparison to issues for which he or she is relatively indifferent. We modeled intensities of voters' preferences by introducing insignificant issues to our simulations. For an issue i and voter v we assumed that i is insignificant for v if p·i− x ∈ [2/5, 3/5] -- intuitively, in such case i is insignificant because the probabilities of v willing to accept and reject the issue are relatively similar. The results of simulations with this modification showed almost the same shapes as in Figure 1. These results confirm our previous conclusions. Even more, in this case the area below the plot for the Chamberlin -- Courant committee was by 4% larger than for the top- K committee. This suggests that the Chamberlin -- Courant committee is not only more fair to the voters, but it is also superior to the centrist committee with respect to the total satisfaction of voters. 5.2 Simulations With Datasets Describing Real-Life Preferences As the next step we run simulations for numerous datasets describing people's preferences. To this end we used PrefLib [27], a reference library of preference data. PrefLib contains over 300 datasets describing different scenarios where voters have (weak) preferences over candidates. We filtered out datasets with less than 15 voters and with less than 20 candidates. For each of the remaining datasets we run the following procedure: 1. For each voter v we introduced one issue iv. 2. For an issue iv and each voter v′ we computed the Kendal-Tau distance [22] between rankings v′ and v. We scaled these distances so that the average distance between iv and all voters was equal to 1/2. For each candidate c we defined the distance between iv and c as the position of c in v's preference ranking. We also scaled these distances so that the average distance between iv and all candidates was equal to 1/2. 3. We selected a value p, uniformly at random from the interval [0, 3]. For each issue i and for each voter (respectively, each candidate) x we randomly selected their preference over the issue. We took 1 − p · i − x as the probability of x accepting i, where i − x denotes the scaled distance between the voter (the candidate) and the issue, defined in the previous point. 4. Similarly as in Section 5.1, we computed decisions made by different committees with respect to different issues, and for each voter v we computed the average fraction of issues for each a given committee made decisions consistent with v's preferences. 5. We repeated such experiment 10 times and for each voter we computed the average ultimate satisfaction. To compute the five winning committees, we took scores that voters assign to candidates, which were extracted from their ordinal preferences by using the Borda positional scoring function. The results of these experiments are depicted in Figure 2. Since in this case the voters are not represented by points on the line, in Figure 2 we sorted the voters according to the their ultimate satisfactions. For instance a point on the blue line with x- and y- coordinates equal to 0.8 and 12 0.8 0.6 0.4 0.2 n o i t c a f s i t a s e t a m i t l u 0 0 0.8 0.6 0.4 0.2 n o i t c a f s i t a s e t a m i t l u 0 0 Referendum CC PAV Top-k Single Winner 0.2 0.4 0.6 0.8 1 voters (a) majority Referendum CC Top-k PAV Single Winner 0.2 0.4 0.6 0.8 1 voters (b) random dictatorship Figure 2: The results of the simulations for PrefLib [27]. 0.7 respectively, denotes that 80% of voters had ultimate satisfaction below 0.7, and 20% of voters above 0.7. The results of these simulations confirm our conclusions from Section 5.1. One significant difference is that now, we can objectively claim the Chamberlin -- Courant rule to be superior, not only with respect to the fairness, but also with respect to the total ultimate satisfaction of the voters. 5.3 Single Issue & Deterministic Case: Theoretical Results In this subsection we consider scenarios where each voter has a single important issue that is known in advance, and where voters know preferences of the candidates over the issues. Thus, when electing a committee, it is most natural to consider approval scores of the voters over candidates -- a voter i approves of a candidate c only if the preference of c over the i's important issue is consistent with the preference of the voter. We recall that if a voter i approves of a candidate c, we say that it assigns to c score equal to 1, and denote it by ui,c = 1. Otherwise, we say that he or she assigns to c score of 0, and denote it by ui,c = 0. These scores form an input for the multiwinner election rule Rmult, and thus they can be viewed as the only information that rule Rmult can use to select a committee of K representatives. We recall that for each committee S, and for each voter i, by PS,Rdec(i) we denote the prob- ability that S makes a decision consistent with i's preferences, and that we consider PS,Rdec(i) the ultimate satisfaction of voter i from committee S. Since we consider the model with approval scores, it holds that: PS,Rdec(i) = Rdec(cid:16)Pc∈S ui,c(cid:17). In our subsequent discussion we will show that several known multi-winner election rules can be viewed as optimal in the deterministic variant of our voting committee model. Each such a rule is optimal for different decision system Rdec, used by the selected committee to make final decisions. Thus, our results give intuition regarding the applicability of different multi-winner election rules, depending on for what kind of decision making the committee is elected for. 13 Definition 2. Let Rdec be a decision rule used in the second stage of the election model. A multi- winner election rule Rmult is optimal for Rdec if for each preferences of voters it elects an optimal committee. Below, we explain which multiwinner rules are optimal for majority, random dictatorship, and unanimity decision systems. Theorem 1. Assume K is odd. In the deterministic model: (i) the K+1 optimal for the majority rule, and (ii) the top-K rule is optimal for the random dictatorship rule. 2 -median election system is Proof. We start by considering the case when Rdec is the majority rule. We calculate PS,Rdec(i), the ultimate satisfaction of a voter i from a committee S, assuming S uses majority rule to make final decisions. A committee member c ∈ C votes according to i's preferences if and only if c is approved by i. Thus, a committee S makes decisions consistent with i's preferences, if it contains at least K+1 2 members approved by i. The satisfaction PS,Rdec(i) of i from S is equal to 1 if S contains at least K+1 2 members approved by i, otherwise it is equal to 0. The same formula defines satisfaction of i from S in the K+1 2 -median election system. Fi- 2 -median election system, the committee that maximizes voters' total nally, we note that in the K+1 satisfaction is selected. Let us now move to the case when Rdec is the random dictatorship rule. For a committee S, let apprvi(S) denote the number of candidates from S that are approved of by i. For each committee S, and each member c ∈ S the probability that during the uniformly random dictatorship ballot regarding the issue, the final decision will be made by the committee member c is equal to 1/K. The probability that S will make decision according to i's preferences is, thus, equal to: PS,Rdec(i) =Xc∈S 1 K · 1i approves of c = apprvi(S) K . Consequently, a committee S is optimal if it maximizes the value of the formula Pi apprvi(S). Exactly such committee is elected by the top-K rule. Theorem 1 is quite powerful in a sense that it claims the optimality of the K+1 2 -median and top-K multi-winner rules, for the corresponding decision rules, irrespectively of the preferences of the voters over the issues. Unfortunately, this is not always the case, which is illustrated in the following example. Example 1. Consider an election with two voters, three candidates, and where the goal is to select a committee with two candidates (K = 2). Assume the elected committee will use the unanimity rule to make decisions on issues. Further, assume the deterministic model with two issues, D1 and D2; issue D1 is important only for voter i1 and issue D2 only for voter i2. Consider preferences of the voters and of the candidates over issues given in the left table below. i1 D1 R D2 i2 c2 c1 c3 R R A R A A R i1 D1 A D2 14 i2 c2 c1 c3 A A R A R R A Observe that voter i1 approves of candidates c1 and c2 and that voter i2 approves of candidate c3. In this case the optimal committee would be {c1, c3} or {c2, c3}. Both committees will reject both issues, and so they will satisfy both voters. Now, consider the preferences from the right table. Similarly as before, in this case voter i1 approves of candidates c1 and c2 and voter i2 approves of candidate c3. However, in this case the optimal committee is {c1, c2}. This committee will accept issue D1, hence satisfy one voter. Any other committee will reject both issues satisfying no voter. Example 1 suggests that for the unanimity rule there exists no optimal multiwinner election method. This is an artifact of the fact that unanimity is not symmetric with respect to decisions A and R. For the unanimity rule we can obtain a much weaker claim, yet our claim will also have an interesting interpretation. Before we proceed further, we introduce two new definitions that describe two extreme classes of voters' preferences over the issues. We say that voters are rejection-oriented if for each voter i, di = R, meaning that each voter gets satisfaction only from rejecting issues. Analogously, we say that the voters are acceptance-oriented if for each voter i, di = A. Proposition 1. For the unanimity system in the deterministic model: (i) the Chamberlin -- Courant system with approval votes is optimal for rejection-oriented voters, and (ii) the K-median system with approval votes is optimal for acceptance-oriented voters. Proof. We provide the proof for rejection-oriented voters. The proof for acceptance-oriented voters is analogous. Our reasoning is very similar to the proof of Theorem 1. The ultimate satisfaction of a voter i from a committee S, PS,Rdec(i), is equal to 1 if S contains at least one candidate approved by i, and is equal to 0 otherwise. This is equivalent to the definition of voters' satisfaction in the Chamberlin -- Courant election rule, which completes the proof. Proposition 1 suggest that Chamberlin -- Courant rule and K-median rule are suitable for electing committees that have veto rights. One should choose one of them depending on the voters' satis- faction model. For instance, if passing a wrong decision has much more severe consequences than rejecting a good one (which is captured by modeling the voters as rejection-oriented), a committee should be selected with Chamberlin -- Courant rule, and it should use unanimity rule to make final decisions. This is very often the case when there exists a well established status quo which should be changed only in indisputable cases. On the other hand, if passing a wrong decision has relatively low cost compared to rejecting a good one, the committee should be selected with K-median rule. 6 Independent Voters: Theoretical Analysis In this section we consider voters whose preferences over issues can be viewed as independent random variables. We will show that if the voters are independent, there exist optimal rules, also in the nondeterministic case. In what it follows, we relax two assumptions from Section 5.3. First, we assume that each voter can consider multiple issues as important. Second, we assume that the voters do not know how the candidates are going to vote. Nevertheless, they are provided with some form of intuition which allows them to recognize that some candidates would better represent them in the elected committee than others. To capture this intuition, for each voter i and each candidate c we define the probability of representation of i by c, denoted by pi,c. This is the probability that c will 15 vote according to i's preferences on an i's important issue. We write qi,c = (1 − pi,c). Clearly, value pi,c measures how well i feels represented by c, thus we say that voter i assigns score ui,c = pi,c to candidate c. These scores are given as an input to the multiwinner election rule Rmult. Further, for each voter i, each important for i issue Dj ∈ Dim(i), each committee S, and each committee vote v ∈ DK j , let PS(v) denote the probability that members of S cast vote v: PS(v) = Yc∈S(cid:16)1 v[j]=dj i pi,c + 1 v[j]6=dj i qi,c(cid:17) . Recall that Rdec : N → R is a randomized decision rule used by the committee to make decisions over issues. By PRdec(iv) we denote the probability that the rule Rdec, given vote v, makes decision di j, i.e., decision consistent with i's preferences: PRdec(iv) = 1 = 1 dj dj 1d=A(cid:17) + 1 i =ARdec(cid:16)Xd∈v i =ARdec(cid:16)Xd∈v 1d=A(cid:17) + 1 i(cid:17). d=dj 1 = Rdec(cid:16)Xd∈v dj dj 1d=A(cid:17)(cid:17) i =R(cid:16)1 − Rdec(cid:16)Xd∈v i =R(cid:16)Rdec(cid:16)Xd∈v 1d=R(cid:17)(cid:17) We recall that for each committee S, each voter i, and each important issue Dj ∈ Dim(i), by PS,Rdec(i) we denote the probability that S makes decision consistent with i's preferences. Thus: PS,Rdec(i) = Xv∈DK j PS(v)PRdec(iv). PS,Rdec(i) can be also viewed as the expected fraction of issues important for i, for which the committee C would make decisions consistent with i's preferences. Similarly as in the deterministic model, we will call PS,Rdec(i) the ultimate satisfaction of a voter i from the committee S. Example 2. Consider the illustrative example from Section 5 where one third of voters are left-wing, one third are right-wing, and one third are centrists. Recall that left-wing, right-wing, and centrists candidates can be represented by points 0, 1/2, and 1 on the line, respectively. For this example the probability of representation pi,c is equal to pi,c = 1 − d(i, c), where d(i, c) is the distance between the points corresponding to voter i and candidate c. The approval model is a special case of the probabilistic model where there are only two "al- lowed" values of scores. Thus, in the approval model we assume that there exists two values p, q ∈ [0, 1] with q = p−1, such that for each voter i and each candidate c we have pi,c, qi,c ∈ {p, q}. This model captures scenarios when each voter can view each candidate as belonging to one of the two extreme categories: each candidate can be either "good" or "bad" from i's point of view. This model is appealing because in many real-life scenarios the voters express their preferences by as- signing candidates to one of the two groups: either by approving or by disapproving them. 16 In contrast to the previous section, here we assume that the scores that the voters assign to candidates are scaled: we assume that a voter i assigns score 1 to candidate c if pi,c = p and score 0 if pi,c = q. These scores will be given as an input to the multiwinner election rule Rmult. The fact that we use rescaled scores will not affect our further results, but will enable us to use a more readable notation. 6.1 Optimality of Known Decision Rules under Approval Voting We start our analysis with the approval model, i.e., from the case when the voters have two types of scores only. We start by observing that the characterization of the optimal rule for the random dictatorship method from Theorem 1 can be generalized to the approval model. Proposition 2. The top-K rule is optimal for the random dictatorship rule in the approval model. Proof. Similarly as in the proof of Theorem 1, for a committee S we define apprvi(S) as the number of candidates from S that are approved by i. Let p and q denote the probabilities of repre- sentation of i by candidates approved of and disapproved of by i, respectively. Naturally, p > q. For each committee S, and each member c ∈ S the probability that during the uniformly random dictatorship ballot regarding an issue, the final decision will be made by the committee member c, is equal to 1/K. The probability that S will make decision according to i's preferences is equal to: PS,Rdec(i) =Xc∈S 1 K · (p1i approves of c + q1i disapproves of c) = apprvi(S) · = apprvi(S) · + (K − apprvi(S)) · q K p K p − q K + q. Consequently, a committee S is optimal if it maximizesPi apprvi(S). Exactly such committee is elected by the top-K rule. Below, we show a more general result that characterizes a class of optimal election systems. Theorem 2. For each decision rule Rdec, there exists a K-element vector α, such that α-rule is optimal for Rdec in the approval model. Proof. Let Sℓ,i denote a committee that has exactly ℓ members approved by i, and let P(i, s, ℓ) be the probability that exactly s members of Sℓ,i will vote accordingly to i's preferences. We have: P(i, s, ℓ) = K Xx=1 1x≤ℓ1x≤s1s−x≤K−ℓ ·(cid:18)ℓ x(cid:19)pxqℓ−x(cid:18)K − ℓ s − x(cid:19)qs−xpK−ℓ−s+x. We can see that P(i, s, ℓ) does not depend on i. Further, let PRdec(is) be the probability that the rule Rdec makes decision consistent with i's preferences on issue Dj, assuming s members of Sℓ,i vote accordingly to i's preferences. PRdec(is) = Rdec(s)1 i =A + (1 − Rdec(K − s))1 dj i =R. dj 17 i = A or dj Since either dj i = R and since Rdec(s) = (1 − Rdec(K − s)), we get that PRdec(is) = Rdec(s), and thus PRdec(is) does not depend on i. Consequently, we can calculate the ultimate satisfaction PSℓ,i,Rdec(i) of a voter i from a committee Sℓ,i, so that this value does not depend on i: PSℓ,i,Rdec(i) = K Xs=1 P(i, s, ℓ)PRdec(is). Because PSℓ,i,Rdec(i) does not depend on i, we will denote it as PSℓ,Rdec. Naturally, since p ≥ q, we have PSℓ+1,Rdec ≥ PSℓ,Rdec, for each ℓ. Now, we can see that the following vector: α =DPS1,Rdec, (PS2, Rdec − PS1,Rdec), (PS3,Rdec − PS2,Rdec), . . . , (PSK ,Rdec − PSK−1,Rdec)i satisfies the requirement from the thesis. Indeed, in the α-rule the satisfaction of a voter from a committee with ℓ approved members is the sum of first ℓ coefficients of α, which is PCℓ,Rdec. This completes the proof. The above theorem can be viewed as an evidence of the expressiveness and power of OWA election rules. Unfortunately, OWA election rules are not sufficiently expressive to describe the non-approval model, which we address in the next subsection. 6.2 Optimality of Known Decision Rules under Probabilistic Model Let us move to the probabilistic model in its full generality. To get characterization similar to the one given in Theorem 2, but for arbitrary scores, we would need to consider a more general class of election rules, that is rules in which the satisfaction of a single voter i from a committee C is expressed as a linear combination of products of i' scores as- signed to individuals, i.e., as a linear combination of the values from the set(cid:8)Qc∈C ′ ui,c : C ′ ⊆ C(cid:9) (in contrast to a linear combination of scores only). Such rules that consider inseparable committees were considered e.g., by Ratliff [37, 36]. We formalize this observation in the following theorem. Theorem 3. Let Rdec : N → R be the rule that the elected committee S uses to make final decisions. Let us consider the function v : PK(C) × Πn(C) → R defined in the following way: S v(S, huiii∈N ) =Xi∈N Xj=1 Rdec(j) XSap⊆Pj (S) Yc∈Sap ui,c Yc /∈Sap(cid:0)1 − ui,c(cid:1)!, (2) The rule that for each score profile huiii∈N selects the committee C that maximizes v(C, huiii∈N ) is optimal for Rdec. Proof. The thesis follows from the fact that v(C, huiii∈N ) is the sum of ultimate expected satis- factions over all voters. Indeed, for each possible value of j representing the number of committee 18 members voting according to i's preferences, the expression: XSap⊆Pj (S) Yc∈Sap ui,c Yc /∈Sap(cid:0)1 − ui,c(cid:1)! gives the probability that exactly j committee members will vote according to i's preferences. In the above formula Sap represents the set of j committee members who vote according to i's preferences. Nevertheless, for the case of the uniformly random dictatorship rule used to make final deci- sions, we can get a result similar to the one given in Proposition 2 even for the case of arbitrary scores. Proposition 3. Top-K rule is optimal for the random dictatorship rule in the probabilistic model. Proof. The reasoning is similar to the proof of Proposition 2. The probability that a committee S will vote according to i's preferences is equal to: PS,Rdec(i) = pi,c. 1 K Xc∈S The rule that maximizes the total score of selected candidates, also maximizes their total expected ultimate satisfaction. This completes the proof. Theorem 3 gives us a constructive way of defining an optimal rule in the most general case. Unfortunately, such rule is often hard to compute. We briefly discuss computational issues in Ap- pendix A. 6.3 Optimality of Full Multiwinner Rules In the previous subsection we studied the optimality of multi-winner election rules, given infor- mation on what decision system the committee will use to make final decisions. In this section we show that in our probabilistic model we can compare qualities of the pairs of multi-winner and decision systems. Thus, our results not only suggest which multi-winner election rule is suitable for electing a committee, but also indicates which decision rule should be used by the committee to make final decisions. We start with introducing the definition of the full multiwinner rule. This definition introduces a novel concept to the literature on social choice: it allows the voters to elect not only committees, but also decision rules that these committees use to make final decisions. Definition 3. Let SW be the set of all symmetric randomized decision rules. A full multiwinner rule is a function F : Π → P(A) × SW that for each score profile π ∈ Π returns a pair F(π) = (S, Rdec), where S ∈ P(C) is the elected committee, and Rdec ∈ SW is the decision rule that S will use when making final decisions. We use the notation F(π)[1] = S and F(π)[2] = Rdec. 19 Below we define a partial order on full multiwinner rules. This definition provides a way to compare full multiwinner rules, in particular it allows us to extend the concept of optimality to full multiwinner rules. Definition 4. A full multiwinner rule F weakly dominates a full multiwinner rule G, if for each score profile π ∈ Π(N ), F returns a committee and a decision rule that gives the total expected ultimate satisfaction of the voters at least as high as the one given by a committee and a decision rule returned by G: Xi PF (π)[1],F (π)[2](i) ≥Xi PG(π)[1],G(π)[2](i). (3) F strongly dominates G for P if it weakly dominates G and if there exists profile π ∈ Π for which Inequality (3) is strict. A full multiwinner rule F is optimal if it weakly dominates every other full multiwinner rule. In the previous sections we assumed that the decision rule used by the committee is fixed, and that we use voters' preferences only to determine the winning committee of K candidates. This traditional definition can be mapped to the new model. Definition 5. For a multi-winner rule Rmult and a decision rule Rdec, by Rmult followed by Rdec we call the full multiwinner rule that selects committee using Rmult and, independently of voters' preferences, always uses Rdec to make final decisions. Now, we show how to apply Definition 4 in perhaps the simplest variant, that is in the deter- 2 -median rule ministic model. First, we define a new election rule COMB as a combination of K+1 followed by majority rule with the K-approval rule followed by the random dictatorship rule. Definition 6. The rule COMB is defined as follows. Let S and S′ be committees elected by K- approval rule and by K+1 2 -median rule, respectively. Let apprv be the total approval score of S and let owa be the total OWA score of S′. If apprv K > owa, then COMB returns the pair (C, random dictatorship). Otherwise, COMB returns the pair (C ′, majority). It is remarkable that with this simple idea we obtained the new rule, COMB, that strongly dom- inates both rules that it is derived from. Proposition 4. In the deterministic model, COMB strongly dominates K+1 majority, and K-approval followed by random dictatorship. 2 -median followed by Proof. Let apprv and owa be defined as in Definition 6. Repeating the analysis from the proofs of Theorems 1 and Proposition 2, we get that the total ultimate satisfaction of voters under K+1 2 - median followed by majority is equal to owa, and that the total ultimate satisfaction of voters under K-approval followed by random dictatorship is equal to apprv K . The total ultimate satisfaction of voters and under COMB is equal to max( apprv K , owa). It is easy to see that there exist profiles where apprv K is strictly greater than owa and vice versa. This completes the proof. 20 The natural question is whether we can find an optimal rule in our general probabilistic model. Interestingly, for the deterministic model the answer is positive. The question whether this result can be extended to the general probabilistic model is still open. Theorem 4. In the deterministic model there exists an optimal full multiwinner rule. Proof. The proof is constructive. We recall that a single-winner rule Rdec can be described by K values Rdec(1), . . . , Rdec(K). We use notation from the proof of Theorem 2; let Sℓ,i denote a committee that has exactly ℓ members approved by i, and let P(i, s, ℓ) denote the probability that exactly s members of Sℓ,i will vote accordingly to i's preferences. In the deterministic model P(i, s, ℓ) = 1s=ℓ. Consequently, for a committee Sℓ,i with ℓ ap- proved members, we have PSℓ,i,Rdec = Rdec(ℓ). Let 1ℓ,i denote a function such that 1ℓ,i(S) = 1 if S contains ℓ elements approved by i, and 1ℓ,i(S) = 0 otherwise. For a given committee S we can find an optimal decision rule Rdec by solving the following linear program: maximize Xi∈N PS,Rdec(i) =Xi∈N Rdec(ℓ)1i approves ℓ elements of S subject to: (a) : Rdec(ℓ + 1) ≥ Rdec(ℓ), (b) : 0 ≤ Rdec(ℓ) ≤ 1, (c) : Rdec(ℓ) = 1 − Rdec(K − ℓ), 1 ≤ ℓ ≤ K − 1 1 ≤ ℓ ≤ K 1 ≤ ℓ ≤ K (c) : K Xℓ=1 Rdec(ℓ) = 1. The optimal full multiwinner rule tries all committees and selects such that gives the best so- lution to the integer program. From the solution of the integer program we can extract values Rdec(1), . . . , Rdec(K) that describe the optimal decision rule that should be used to make final decisions. 7 Discusion & Conclusion We defined a new model, called the voting committee model, which explores scenarios where a group of representatives is elected to make decisions on behalf of the voters. This model links utilities of the voters from the elected committee to their utilities from the committee's decisions regarding various matters. Intuitively, a satisfaction of voter i from a committee S is proportional to the probability that for the issues important for i, S's decisions are consistent with i's preferences. Our results give positive support for employing representation-focused multiwinner election rules -- indeed under several assumptions, the decisions made by such committees reflect the pref- erences of the population best. Most importantly, however, our model introduces a new framework for normative comparison of multiwinner voting rules. Indeed, the analysis presented in this paper can be repeated for more specific scenarios, where the relation between voters' preferences over candidates and respective probabilities of representation exhibits some specific structure. 21 We introduced the notion of a full multiwinner rule, in which voters elect a decisive committee along with the decision rule to be used. Under some assumptions, we showed that there exists an optimal full multiwinner rule and we described the way how it can be constructed. We believe that this is an interesting concept that deserves further attention. Among many natural open questions, there is one we consider particularly appealing: is it possible to provide theoretical analysis suggesting which committee is the best for the case of spatial model, such as the one considered in Section 5? Acknowledgements. The author thanks Jean Franc¸ois Laslier, Marcin Dziubi´nski and Piotr Fal- iszewski for their comments and for the fruitful discussion. The author was supported by the European Research Council grant ERC-StG 639945. References [1] H. Aziz, M. Brill, V. Conitzer, E. Elkind, R. Freeman, , and T. Walsh. Justified representa- tion in approval-based committee voting. In Proceedings of the 28th Conference on Artificial Intelligence (AAAI-2015), 2015. [2] S. Barber´a and D. Coelho. How to choose a non-controversial list with k names. Social Choice and Welfare, 31(1):79 -- 96, 2008. [3] N. Betzler, A. Slinko, and J. Uhlmann. On the computation of fully proportional representa- tion. Journal of Artificial Intelligence Research, 47:475 -- 519, 2013. [4] H. Bock, W. H. E. Day, and F. R. McMorris. Consensus rules for committee elections. Math- ematical Social Sciences, 35(3):219 -- 232, 1998. [5] S. J. Brams, D. M. Kilgour, and M. R. Sanver. A minimax procedure for electing committees. Public Choice, 132(3 -- 4):401 -- 420, 2007. [6] S. J. Brams, D. M. Kilgour, and W. S. Zwicker. The paradox of multiple elections. Social Choice and Welfare, 15(2):211 -- 236, 1998. [7] A. Casella. Storable votes. Games and Economic Behavior, 51(2):391 -- 419, 2005. [8] A. Casella. Storable Votes: Protecting the Minority Voice. Oxford University Press, Oxford, UK, 2011. [9] B. Chamberlin and P. Courant. Representative deliberations and representative decisions: Pro- portional representation and the Borda rule. American Political Science Review, 77(3):718 -- 733, 1983. [10] R. Christian, M. Fellows, F. Rosamond, and A. Slinko. On complexity of lobbying in multiple referenda. Review of Economic Design, 11(3):217 -- 224, 2007. [11] Condorcet. Essai sur l'application de l'analyse `a la probabilit´e des d´ecisions rendues `a la pluralit´e des voix. Imprimerie Royale, Paris, 1785. 22 [12] O. A. Davis and M. J. Hinich. A mathematical model of preference formation in a democratic society. In J. Bernd, editor, Mathematical Applications in Political Science II, pages 175 -- 208. Southern Methodist University Press, 1966. [13] B. Debord. An axiomatic characterization of Borda's k-choice function. Social Choice and Welfare, 9(4):337 -- 343, 1992. [14] E. Elkind, P. Faliszewski, P. Skowron, and A. Slinko. Properties of multiwinner voting rules. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2014), May 2014. Also presented in FIT-2013. [15] J. M. Enelow and M. J. Hinich. The spatial theory of voting: An introduction. CUP Archive, 1984. [16] J. M. Enelow and M. J. Hinich. Advances in the spatial theory of voting. Cambridge University Press, 1990. [17] P. Faliszewski, P. Skowron, A. Slinko, and N. Talmon. Multiwinner analogues of the plurality rule: Axiomatic and algorithmic views. In Proceedings of the 29th Conference on Artificial Intelligence (AAAI-2016), 2016. [18] T. Feddersen and W. Pesendorfer. Voting behavior and information aggregation in elections with private information. 65:1029 -- 1058, 1997. [19] T. Feddersen and W. Pesendorfer. Convicting the Innocent: The Inferiority of Unanimous Jury Verdicts under Strategic Voting. The American Political Science Review, 92(1):23 -- 35, 1998. [20] P. C. Fishburn. An analysis of simple voting systems for electing committees. SIAM Journal on Applied Mathematics, 41(3):499 -- 502, 1981. [21] W. Gehrlein. The Condorcet criterion and committee selection. Mathematical Social Sciences, 10(3):199 -- 209, 1985. [22] M. G. Kendall. A new measure of rank correlation. Biometrika, 30(1/2):81 -- 93, 1938. [23] D. Kilgour. Approval balloting for multi-winner elections. In J. Laslier and R. Sanver, editors, Handbook on Approval Voting, pages 105 -- 124. Springer, 2010. [24] Y. Koriyama, J. F. Laslier, A. Mac´e, and R. Treibich. Optimal Apportionment. Journal of Political Economy, 121(3):584 -- 608, 2013. [25] D. Lacy and E. M. S. Niou. A problem with referendums. 12(1):5 -- 31, 2000. [26] J. Laslier and N. Picard. Distributive politics and electoral competition. Journal of Economic Theory, 103(1):106 -- 130, 2002. [27] N. Mattei and T. Walsh. Preflib: A library for preferences http: //www.preflib.org. In Proceed- ings of the 3rd International Conference on Algorithmic Decision Theory (ADT-2013), pages 259 -- 270, 2013. 23 [28] N. Mattei and T. Walsh. PrefLib: A library of preference data. In Proceedings of the 3rd International Conference on Algorithmic Decision Theory (ADT-2013), pages 259 -- 270, 2013. [29] R. D. McKelvey, P. C. Ordeshook, et al. A decade of experimental research on spatial models of elections and committees. Advances in the spatial theory of voting, pages 99 -- 144, 1990. [30] S. Merrill and B. Grofman. A unified theory of voting: Directional and proximity spatial models. Cambridge University Press, 1999. [31] B. Monroe. Fully proportional representation. American Political Science Review, 89(4):925 -- 940, 1995. [32] R. B. Myerson. Extended Poisson games and the Condorcet jury theorem. Games and Eco- nomic Behavior, 25:111 -- 131, 1997. [33] C. R. Plott. A notion of equilibrium and its possibility under majority rule. The American Economic Review, 57(4):787 -- 806, 1967. [34] A. Procaccia, J. Rosenschein, and A. Zohar. On the complexity of achieving proportional representation. Social Choice and Welfare, 30(3):353 -- 362, April 2008. [35] F. Pukelsheim. Proportional Representation: Apportionment Methods and Their Applications. Springer, 2014. [36] T. C. Ratliff. Some startling inconsistencies when electing committees. Social Choice and Welfare, 21(3):433 -- 454, 2003. [37] T. C. Ratliff. Selecting committees. Public Choice, 126(3-4):343 -- 355, 2006. [38] N. Schofield. The spatial model of politics. Routledge, 2007. [39] B. Simeone and F. Pukelsheim. Mathematics and Democracy: Recent Advances in Voting Systems and Collective Choice. Studies in Choice and Welfare. Springer Berlin Heidelberg, 2006. [40] P. Skowron and P. Faliszewski. Fully proportional representation with approval ballots: Ap- proximating the maxcover problem with bounded frequencies in FPT time. In Proceedings of the 28th Conference on Artificial Intelligence (AAAI-2015), pages 2124 -- 2130, 2015. [41] P. Skowron, P. Faliszewski, and J. Lang. Finding a collective set of items: From proportional In Proceedings of the 28th Conference on multirepresentation to group recommendation. Artificial Intelligence (AAAI-2015), 2015. [42] P. Skowron, P. Faliszewski, and A. Slinko. Achieving fully proportional representation: Ap- proximability result. Artificial Intelligence, 222:67 -- 103, 2015. [43] T. N. Thiele. Om flerfoldsvalg. Oversigt over det Kongelige Danske Videnskabernes Selskabs Forhandlinger, pages 415 -- 441, 1895. 24 [44] L. Xia, V. Conitzer, and J. Lang. Voting on multiattribute domains with cyclic preferential In Proceedings of the 23rd National Conference on Artificial Intelligence - dependencies. Volume 1, Proceedings of the 23rd National Conference on Artificial Intelligence (AAAI- 2008), pages 202 -- 207, 2008. [45] L. Xia, V. Conitzer, and J. Lang. Aggregating preferences in multi-issue domains by using maximum likelihood estimators. In Proceedings of the 9th International Conference on Au- tonomous Agents and Multiagent Systems (AAMAS-2010), pages 399 -- 406, 2010. [46] H. P. Young. Social choice scoring functions. SIAM Journal on Applied Mathematics, 28(4):824 -- 838, 1975. [47] H. P. Young. Optimal voting rules. The Journal of Economic Perspectives, 9(1):51 -- 64, 1995. A Computational Aspects of Comparing Committees Unfortunately, finding optimal committees is often computationally hard. For example, the problem of finding winners under Chamberlin -- Courant rule is known to be NP-hard [34] and hard from the point of view of parameterized complexity theory [3]. On the positive side, this problem can be effectively solved in practice by using high-quality polynomial-time [42] and fixed-parameter- tractable-time [40] approximation algorithms. Regrettably, not all variants of the problem of finding optimal committees can be well-approximated. For instance, Skowron el al. [41] showed that there exists no polynomial-time constant-approximation algorithm for the problem of finding winners under the K+1 2 -median rule. Even though the problem of finding optimal committees is computationally intractable, we can use our findings to compare committees, even in the case of arbitrary utilities. Indeed, Proposition 5 below shows that deciding which one of the given two committees is better according to our model is solvable in polynomial time. This observation can be used to make decisions about which from the several shortlisted committees should be selected in a particular instance of elections, or to derive more general conclusions about applicability of different multi-winner rules by comparing their qualities on real data describing voters' preferences [28]. Proposition 5. For a decision rule Rdec : N → R, a committee S, and a utility profile huiii∈N , the value of the function v defined in Equation (2) can be computed in polynomial time. Proof. For each voter i ∈ N and each committee S, the expected ultimate satisfaction of i from S can be computed by dynamic programming. Let us sort the members of S in some arbitrary order, so that S = {c1, c2, . . . , cK }. For each j, 0 ≤ j ≤ K and for each ℓ, 0 ≤ ℓ ≤ K, we define the value A[j][ℓ] as the probability that exactly ℓ members from the set {c1, . . . , cj} will vote according to i's preferences. Naturally, A[0][0] = 1, and for ℓ > 0, A[0][ℓ] = 0. To compute the remaining values of the table A we can use the following relation: A[j][ℓ] = ui,cj · A[j − 1][ℓ − 1] + (1 − ui,cj ) · A[j − 1][ℓ]. 25 The value of the expected ultimate satisfaction of i can be obtained by computing a linear com- ℓ=1 Rdec(ℓ) · A[K][ℓ]. This completes the bination of the values A[K][ℓ], i.e., by computing PA proof. 26
1311.6229
1
1311
2013-11-25T08:35:17
Intelligent Agent for Prediction in E- Negotiation: An Approach
[ "cs.MA" ]
With the proliferation of web technologies it becomes more and more important to make the traditional negotiation pricing mechanism automated and intelligent. The behaviour of software agents which negotiate on behalf of humans is determined by their tactics in the form of decision functions. Prediction of partners behaviour in negotiation has been an active research direction in recent years as it will improve the utility gain for the adaptive negotiation agent and also achieve the agreement much quicker or look after much higher benefits. In this paper we review the various negotiation methods and the existing architecture. Although negotiation is practically very complex activity to automate without human intervention we have proposed architecture for predicting the opponents behaviour which will take into consideration various factors which affect the process of negotiation. The basic concept is that the information about negotiators, their individual actions and dynamics can be used by software agents equipped with adaptive capabilities to learn from past negotiations and assist in selecting appropriate negotiation tactics.
cs.MA
cs
Intelligent Agent for Prediction in E- Negotiation: An Approach Mohammad Irfan Bala, Sheetal Vij Department of Computer Engineering Maharashtra Institute of Technoology Pune, India {mirfan508,sheetal.sh}@gmail.com Debajyoti Mukhopadhyay Department of Information Technology Maharashtra Institute of Technology Pune, India [email protected] Abstract— With the proliferation of web technologies it becomes more and more important to make the traditional negotiation pricing mechanism automated and intelligent. The behavior of software agents which negotiate on behalf of humans is determined by their tactics in the form of decision functions. Prediction of partner’s behavior in negotiation has been an active research direction in recent years as it will improve the utility gain for the adaptive negotiation agent and also achieve the agreement much quicker or look after much higher benefits. In this paper we review the various negotiation methods and the existing architecture. Although negotiation is practically very complex activity to automate without human intervention we have proposed architecture for predicting the opponents behavior which will take into consideration various factors which affect the process of negotiation. The basic concept is that the information about negotiators, their individual actions and dynamics can be used by software agents equipped with adaptive capabilities to learn from past negotiations and assist in selecting appropriate negotiation tactics. Keywords— Electronic negotiation, decision functions, agent negotiation, neural networks I. INTRODUCTION Negotiation is a form of interaction in which a group of agents, with conflicting interests and a desire to cooperate try to come to a mutually acceptable agreement on the division of scarce resources. These resources do not only refer to money but also include other parameters like product quality features, guaranty features, way of payment, etc. Electronic negotiations have gained heightened importance due to the advance of the web and e‐commerce. The tremendous successes of online auctions show that the dynamic trade based on e-negotiation will gradually become the core of e-commerce. Whether it is a case of B to B purchase or a case of online shopping [11], it is important to make the traditional negotiation pricing mechanism automated and intelligent. The automation saves human negotiation time and computational agents are sometimes better at finding deals in combinatorally and strategically complex settings. Traditionally e-negotiation processes have been carried out by humans registering at certain web pages, placing bids, making offers and receiving counter offers from other participants. One major disadvantage with this way of e- negotiation is that the knowledge and experience is kept within the human minds [11]. So humans were replaced by negotiation agents in the process of negotiation. However various problems are faced by the negotiation agents such as limited and uncertain knowledge and conflicting preferences. Also agents may have inconsistent deadline and partial overlaps of zones of acceptance [13]. Moreover, multilateral negotiations are more complicated and time consuming than bilateral negotiations. These factors make it difficult to reach consensus. So decision making mechanism is required to overcome this problem. In Figure 1 we show various modes of interactions in a typical market negotiation framework. Fig. 1. Market negotiation framework The need is that the agents should be equipped with a decision making mechanism which allows them to adapt to the behavior of the negotiation partner [3]. Intelligent systems for negotiation aim at increasing the negotiators abilities to understand the opponent‟s needs and limitations. This ability helps to predict the opponent‟s moves which can be a valuable tool in negotiation tasks. Various negotiation strategies have been proposed which are capable of predicting the opponent‟s behavior. The research presented here focuses on the online prediction of the other agent‟s tactic in order to reach better deals in negotiation. While the extensive coverage of all the prediction methods employed in negotiation is beyond the scope of the current work, it is useful to mention several key studies. In this paper we are also proposing a new architecture for prediction of opponent‟s behavior. II. RELATED WORK Predicting the agent‟s behavior and using those prediction results to maximize agent‟s own benefits is one of the crucial issues in the negotiation process. It is necessary for an agent to produce offers based on his own criteria because an agent has limited computational power and incomplete knowledge about opponents. Various approaches [1,2,10,15,16,18] have been proposed for predicting the opponent‟s negotiation behavior. We reviewed some of the approaches to come up with certain conclusions regarding the efficiency of each approach and their short comings. Initially game theory was used in the negotiation process. It treats negotiation as a game and the negotiation agents are treated as players of the game. Zeng and Sycara [9] used game‐theoretic approach with Bayesian belief revision to model a negotiation counterpart. However game theory has two main drawbacks [1] which make it unsuitable for use in the negotiation process. First is that it assumes the agent has infinite computational power and secondly it assumes all the agents have common knowledge. These limitations of the game theory were overcome by the decision functions. The decision functions produce offers based on the amount of time remaining, resource remaining or the opponent‟s behavior. Faratin [18] proposed a bilateral negotiation model in which the two parties negotiate on an issue like price, delivery time, quality etc. The two parties adopt opposite roles (buyer and seller) and use one of the three families of negotiation tactics namely: Time dependant tactics, Resource dependant tactics and behavior dependant tactics. The offers exchanged between the agents are represented as . This is the offer generated by agent „a‟ for agent „b‟ at time „t‟. All the offers are restricted in between mina and maxa which specifies the range of all possible offers of „a‟. Each agent has a scoring function Va which assigns a score to each offer produced. An agent may respond to the offer by any of the three ways: withdraw, accept or offer is the counter offer generated by agent „a‟ in response to the offer is the deadline for of agent „b‟. agent „a‟ by which the negotiation should be complete. Offers generated use one of the three families of tactics [18]. In time dependant tactics time is the predominant factor and each offer generated depends on the amount of time remaining. In resource dependant family of tactics offers depend on how a resource is being consumed. Offers become more and more cooperative as the quantity of the resource diminishes. In behavior dependant family of tactics agent imitates the behavior of the opponent. These tactics differ depending on the behavior of the opponent they imitate and to what degree. Chongming Hou [1] proposed to use non linear regression approach for the prediction of the opponent‟s tactics. It could predict the approximate value of opponent‟s deadline and reservation values. The performance of the agent improved by using this approach as it reduced the number of negotiation breakdowns and caused early termination of unprofitable negotiations. But this approach is restricted for bilateral negotiations only and can be used only when the agent is sure that the opponent is using one of the above mentioned families of tactics for negotiation. E-negotiation can be classified into three types: one-to-one negotiation, one-to-many negotiation and many-to-many negotiation. Hsin Rau, Chao-Wen Chen, Wei-Jung Shiang and Chiuhsiang Joe Lin [6] focused on one-to-many negotiation architecture and integrated two commonly used coordination strategies i.e. Desperate Strategy and Patient Strategy, to develop a new coordination strategy. Fig. 2. One-to-many negotiation In one-to-many negotiation (Figure 2), buyer is represented by a combination of one coordinating agent and multiple sub- buyer agents while each supplier is represented by supplier agent. They may use one of the coordination strategies: Desperate strategy and patient strategy. In desperate strategy agents want to complete negotiation process as early as possible. The negotiation process is terminated as soon as any of the sub-buyer agents is successful in negotiation. In case several proposals are found at the same time, the proposal with highest utility gain is accepted. However in patient strategy all the sub-buyer agents are allowed to complete their negotiation process. The sub-buyer agents finishing early are made to wait for other sub-buyer agents till all complete their negotiation. After all the sub-buyer agents finish negotiation, coordination agent selects the best proposal to make the contract. Hsin Rau, Chao-Wen Chen, Wei-Jung Shiang and Chiuhsiang Joe Lin proposed a new strategy called “adapted coordination strategy” [6] which integrates the advantages of above two strategies. Many other prediction approaches have been proposed which are based on machine learning mechanism. Most of the work devoted to the learning approach is focused on learning from previous offers i.e. offline learning. It includes: Bayesian learning, Q-learning, case-based reasoning and evolutionary computation. They require training data and such agents need to be trained in advance. However this approach may not always work well for the agents whose behavior has been excluded from the training data. Also such data may not be always available. This issue was overcome by Fenghui Ren and Minjie Zhang [5] who proposed three regression functions namely linear, power and quadratic to predict agent‟s behavior. These regression functions use only data about historical offers in the current negotiation thread instead of the using training data which may not always be available. These three regression function are given below and cover most of the negotiation behaviors of the general agents. Linear Regression Function u = b * t + a Power Regression Function U = a * tb Quadratic Regression Function U = a * t2 + b * t + c where u denotes the estimated value for an agent‟s utility, denotes the negotiation time and a, b and c are the parameters which need to be calculated. Parameters a, b and c are independent of t. Brzostowski and Kowalczyk [10] presented a way to estimate partners‟ behaviors by employing a classification method. They used a decision making mechanism which allows agents to mix time-dependant tactics with behavior dependant tactics using weights which can result in quite complex negotiation behavior. However this approach only works for the time dependent agent and the behavior-dependent agent, which limits its application domains. Gal and Pfeffer presented a machine learning approach based on a statistical method [14,17]. The limitation of this approach is the difficulty of training the system perfectly. Therefore, for some unknown kind of agents whose behaviors are excluded in the training data, the prediction result may not reach the acceptable accuracy requirements. I. Roussaki, I. Papaioannou, M. Anagnostou [13] proposed an approach based on learning technique which has been employed by Client Agents and uses a feed-forward back- propagation neural network with a single output linear neuron and three hidden layer‟s neurons. These neural networks require minimal computational and storage resources making it ideal for mobile agents. Also the system does not require information about the previous records. Only information about the current negotiation process is taken into consideration. The agents use a fair relative tit-for-tat negotiation strategy and the results obtained were evaluated via numerous experiments under various conditions. The experiments indicated an average increase of 34% in reaching agreements [13]. This approach has excellent performance when the acceptable interval of the negotiation issue overlaps irrespective of the concession rate. On the other hand if the acceptable intervals‟ overlap is limited and the deadline is quite high, this approach is likely to fail. Also this work was restricted to single issue and bilateral negotiations only. III. PROPOSED ARCHITECTURE We are proposing the architecture of behavior prediction module in the form of web services as depicted in Figure 3. It has already been established in [4] that providing negotiation as a service (NaaS) is a completely innovative application model of software which provides services through internet. Its benefits are , we can obtain stable visiting quantity, user need not concern about maintenance and upgrade of system as it is done on the server independently, saving human and material resources, automated negotiation system can make use of the existing basic facilities provided by e-commerce platform i.e. security, authentication, transaction management etc. ,saving costs of development. Working: The seller will advertise itself through a well known service registration center which will make it visible to all the interested buyers. All the available services at any point of time are stored in the service registration center. A buyer looking for some product will query the service registration center to discover the product of his interest. Once the preferences are matched, buyer and seller will directly communicate with each other and start negotiation. Each buyer and seller has its own module for behavior prediction. Complexity of the behavior prediction module may vary depending on the number of issues taken into consideration. Also the negotiations may be bilateral or multi lateral which will make the prediction process more complicated. Here we have taken seven issues into consideration during prediction: Original price, age, culture, time, quantity, quality and feedback although the number of issues may increase or decrease with corresponding increase or decrease in the complexity of the behavior prediction module. Fig. 3. Proposed Architecture for behavior prediction The behavior prediction logic will use artificial neural networks which have been proved to be universal approximators when provided with sufficient hidden layer neurons and assuming that the activation function is bounded and non-constant. Neural networks also possess the abilities of being self adaptive and self learning. During the first few iterations of negotiation, behavior prediction module will not be used and all the offers and counter offers will be stored in the database and an attempt will be made to try to find the decision function used by the opponent. Later the data stored in the database is used to train the negotiating agent which can predict the opponent‟s offers. Fig. 4. Structure of the artificial neural network The structure of the artificial neural network used in the proposed system is given. All the issues included in the behavior prediction logic are given as input to the system and each issue is assigned some weight depending on its importance. The input for each neuron is not the input variable or the signal coming from previous neuron but it is the signal multiplied by the weight assigned to that issue. Issues with continuous values should be provided discrete values first to make the process of behavior prediction easy. Example: Instead of using the continuous values for „age‟, it should be grouped as youth, middle-aged and old for age group of [10- 25], [25-50], [50+] correspondingly.re you begin to format your paper, first write and save the content as a separate text file. Keep your text and graphic files separate until after the text has been formatted and styled. Do not use hard tabs, and limit use of hard returns to only one return at the end of a paragraph. Do not add any kind of pagination anywhere in the paper. Do not number text heads-the template will do that for you. is for bilateral negotiations. The architecture shown However it can be extended to support multi lateral negotiations where each pair of agents has similar architecture in between them. A. Sample Negotiation Scenario Consider a sample negotiation scenario where the two companies are trying to secure a contrac t between them. Suppose company A wants to sell aircrafts and which company B is considering to purchase. The company A will register itself with the well known registration center and advertise itself making it visible to all buyers. Company B will use the registration center to find the company A which can satisfy its requirements. Once the companies meet they will start communication and will first decide the issues of conflict. Here we consider only three issues: Price, quantity and warranty. Both the companies will be using some strategy for negotiation which is private and is not disclosed during the negotiation process. Each company will assign some weight to these issues such that total of all the weights is 100. Negotiation issue Price Quantity Warranty Company A weights 50 20 30 Company B weights 60 15 25 Table 1. Relative ratings of the two companies Each issue has one or more options, for example, price has three options: $1 million, $1.1 million and $1.2 million. Each option should also be rated like the negotiation issues were rated. Total rating of the options should preferable add up to 100 although not necessary. Similarly quantity may have two options: 3 and 5, and warranty may have 4 options: no warranty, 6 months, 1year and 2 years. Each option of each issue should be rated before starting the negotiation process. Also the rating of the least desired option of each issue should have zero rating making it a threshold value beyond which negotiation will terminate. The agent will generate all possible permutations of the offers and calculate the total profit of each offer in advance. None of the given two companies knows about the preference structure of the other company and at no point are these preferences revealed. Once the assignment of ratings is complete, any of the two companies may start the negotiation process. Whenever a counter offer is received, utility function is used to calculate the concession offered over the previous offer. The utility function is given as: Where n is the number of issues, „rating of offered option of ith issue‟ is the rating of the i th issue in the proposed offer with maximum rating of each issue given on the denominator. The negotiation process continues with several offers and counter offers. Each offer should provide increased profit than the previous offer. Increase in profit after each negotiation round indicates that the negotiation process is converging and the possibility of negotiation process resulting in agreement increases. In case multiple offers are received with decreasing utility function, the agent may decide to end the negotiation process early to reduce the cost of unsuccessful negotiations. Negotiation can also terminate if the opponent crosses the threshold values for any of the issues. IV. CONCLUSION AND FUTURE WORK This work reviews the various methods used for predicting the opponent‟s behavior and then proposes architecture for behavior prediction using artificial neural networks. It proposes the use of database for storing the results and suggests various issues that can be taken into consideration while predicting the opponent‟s behavior. The proposed intelligent agent based architecture is for bilateral negotiations and may be extended in future to multi lateral negotiations. The given architecture is for general use and may not produce optimal results in all situations. So a situation specific architecture is required in every case of negotiation, where the negotiation issues are selected accordingly. In future we would be making the system to simulate above architecture with the application of agent‟s behavior prediction in web based negotiation. We plan to test it vigorously and do the necessary comparative study and analysis with above mentioned related systems. We can also extend our research in behavior prediction of the agents in the direction of multilateral negotiations after successful completion of bilateral system. [13] Roussaki, I.; Papaioannou, I.; Anagnostou, M.,”Employing neural networks to assist negotiating intelligent agents”, 2nd IET International Conference on Intelligent Environments, Volume:1 pp101 -110,2006 [14] Sanghyun Park; Sung-Bong Yang,” An automated system based on Incremental learning with applicability toward multilateral negotiations “SICE-ICASE International Joint Conference, pp: 6001-6006, 2006 [15] Ning Liu; DongXia Zheng; YaoHua Xiong,” Multi-agent negotiation model based on RBF neural network learning mechanism ”, International Symposium on Intelligent Information Technology Application Workshops, pp 133-136, 2008 [16] Hamid Jazayeriy, Masrah Azmi-Murad, Md. Nasir Sulaiman and Nur Izura Udzir,” A review on soft computing techniques in automated negotiation”, Academic journals for Scientific research and essays, Volme 6(24), pp 5100-5106, 2011 [17] Bangqing Li; Yulan Ma,” An auction-based negotiation model in intelligent multi-agent system ”, International Conference on Neural Networks and Brain, volume 1, pp 178-182, 2005 [18] Faratin P,”Automated service negotiation between autonomous compositional agents”, PhD thesis, Queen Mary & Westfield college, University of London,UK, 2000 Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529 - 551, April 1955. (references) REFERENCES [1] C. Hou, “Predicting agents‟ tactics in automated negotiation,” Proc. IEEE/WIC/ACM Int‟l Conf. Intelligent Agent Technology (IAT ‟04), pp. 127-133, 2004. [2] Beheshti, R.; Mozayani, N. “Predicting opponents offers in multi-agent negotiations using ARTMAP neural network” , Second International Conference on Future Information Technology and Management Engineering, 2009. FITME '09. Pp 600-603, 2009 [3] Réal Carbonneau , Gregory E. Kersten & Rustam Vahidov,” Predicting opponent‟s moves in electronic negotiations using neural networks”, Expert Systems with Applications: An International Journal , Volume 34 Issue 2 ,2008 [4] Debajyoti Mukhopadhyay, Sheetal Vij, Suyog Tasare, "NAAS: Negotiation automation architecture with buyers behavior pattern prediction component", Advances in Intelligent Systems and Computing Volume 176, pp 425-434,2012 [5] Fenghui Ren and Minjie Zhang,"Prediction of partners behaviors in agent negotiation under open and dynamic environments", proceedings of International Conferences on Web Intelligence and Intelligent Agent Technology, pp 379-382, 2007 [6] Hsin Rau, Chao-Wen Chen, Wei-Jung Shiang, Chiuhsiang Joe Lin, “Develop an adapted coordination strategy for negotiation in a buyer - driven E-marketplace”, Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, pp 3224 -3229, 2008 [7] Farhana H. Zulkernine and Patrick Martin,"An adaptive and intelligent SLA negotiation system for web services",IEEE Transactions on service computing, VOL. 4,pp 31-43, 2011 [8] Galit Haim, Sarit Kraus and Yael Blumberg,"Learning human negotiation behavior across cultures",Second International Working Conference on Human Factors and Computational Models in Negotiation, 2010 [9] Zeng, D., & Sycara, K. “Bayesian learning in negotiation”. International Journal of Human‐Computer Studies 48, 125‐141.1998 [10] J. Brzostowski and R. Kowalczyk, “Predicting partner‟s behaviour in agent negotiation,” Proc. Int‟l Joint Conf. Autonomous Agents and Multiagent Systems , pp. 355-361, 2006. [11] Cao Mukun,” Multi-agent automated negotiation as a service”, 7th International Conference on Service Systems and Service Management (ICSSSM), pp 1-6,2010 [12] Raz Lin and Sarit Kraus,"Magazine communications of ACM",Volume 53 Issue 1, January 2010 the
1803.03654
1
1803
2018-03-09T19:00:15
Directing Chemotaxis-Based Spatial Self-Organization via Biased, Random Initial Conditions
[ "cs.MA" ]
Inspired by the chemotaxis interaction of living cells, we have developed an agent-based approach for self-organizing shape formation. Since all our simulations begin with a different uniform random configuration and our agents move stochastically, it has been observed that the self-organization process may form two or more stable final configurations. These differing configurations may be characterized via statistical moments of the agents' locations. In order to direct the agents to robustly form one specific configuration, we generate biased initial conditions whose statistical moments are related to moments of the desired configuration. With this approach, we are able to successfully direct the aggregating swarms to produced a desired macroscopic shape, starting from randomized initial conditions with controlled statistical properties.
cs.MA
cs
March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Directing Chemotaxis-Based Spatial Self-Organization via Biased, Random Initial Conditions 1 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen∗ {spg63,lb353,awm32,david}@cs.drexel.edu +1 215-895-2669 Department of Computer Science Drexel University 3141 Chestnut Street Philadelphia, PA 19104 USA This research was funded by National Science Foundation grants CCF-0636323 and IIS-0845415. 8 1 0 2 r a M 9 ] A M . s c [ 1 v 4 5 6 3 0 . 3 0 8 1 : v i X r a * Corresponding author. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems The International Journal of Parallel, Emergent and Distributed Systems Vol. 00, No. 00, Month 2011, 2–31 RESEARCH ARTICLE Directing Chemotaxis-Based Spatial Self-Organization via Biased, Random Initial Conditions Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen∗ Department of Computer Science, Drexel University Philadelphia, PA 19104 USA (Received 00 Month 200x; in final form 00 Month 200x) Inspired by the chemotaxis interaction of living cells, we have developed an agent-based ap- proach for self-organizing shape formation. Since all our simulations begin with a different uniform random configuration and our agents move stochastically, it has been observed that the self-organization process may form two or more stable final configurations. These differing configurations may be characterized via statistical moments of the agents' locations. In order to direct the agents to robustly form one specific configuration, we generate biased initial conditions whose statistical moments are related to moments of the desired configuration. With this approach, we are able to successfully direct the aggregating swarms to produced a desired macroscopic shape, starting from randomized initial conditions with controlled sta- tistical properties. Keywords: spatial self-organization, directed emergence, genetic programming, agent-based system, statistical moments 1. Introduction Motivated by the ability of cells to form into specific shapes and structures, in pre- vious work we developed chemotaxis-inspired software agents for self-organizing shape formation [1, 2]. The actions of the agents, which we call Morphogenetic Primitives (MPs), are based on the behaviors exhibited by living cells. Cells emit chemicals into the environment. Neighboring cells detect the overall chemical con- centration at their surfaces and respond to the chemical stimulus by moving along the chemical field's gradients [3]. Similarly, in our system the agents emit a virtual chemical, with its concentration defined by an explicit mathematical expression. A set of agents start with an initial random configuration and stochastically follow the gradient of the cumulative concentration field. These chemotaxis-based local interactions direct the agents to self-organize into user-specified shapes (Figure 1). Since the behaviors of MPs are based on local information and interactions, they could provide a distributed, scalable approach for controlling the movements of a robotic swarm. ∗Corresponding author. Email: [email protected], +1 (215) 895-1626 March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 3 In some cases, we have observed though that the agents do not spatially self- organize into a unique shape, but instead form two or more stable final configu- rations. If MPs are used to control the motions of individual robots, it would be extremely useful to direct the outcome of these bifurcating spatial self-organization processes towards a consistent outcome. This would allow us to guarantee that all of our MP aggregations produce a single, desired shape. This is a property that is essential for robust and predictable swarm control algorithms, one that would make the algorithm reliable for engineering applications. Towards this end, we have analyzed whole swarm populations at a global level in search of macroscopic, distin- guishing attributes. This analysis identified features, based on statistical moments of the agents' positions, that have significantly different values for different out- comes of a swarm aggregation. In earlier work we discovered that these statistical moments can be used to accurately predict the outcome of the self-organization process at an early stage of the shape aggregation [4]. Given these differentiating moments, the work described here investigated techniques for directing the out- come of our self-organizing system via biased, random initial conditions in order to consistently produce a desired final configuration. Through our study of the dynamics of a swarm's statistical moments during the aggregation process we noted the connection between initial conditions and the final shape configuration of the swarm. We discovered that biased, random initial conditions that meet specified constraints, i.e. have well-defined statistical properties, robustly yield simulations with a unique final outcome. For those agent interactions that ultimately produce bifurcating/multiple shapes, we have identi- fied for each shape, the most distinguishing macroscopic statistical moment of the evolving swarm. It is possible to generate random distributions of MPs that have specific statistical moments. Our work empirically shows that for bifurcating self- organizing, non-linear, dynamical systems (e.g. a swarm of Morphogenetic Prim- itives) one final outcome can be consistently generated by enforcing a constraint on the value of a single moment when generating the swarm's initial conditions. Given this feature of our system, we are able to control the final outcome of the simulation by simply thresholding the value of a statistical moment for a partic- ular starting distribution, i.e., we constrain the random initial conditions to have specific statistical properties. 2. Related Work Research on distributed agent-based systems that can form spatial patterns and shapes, as well as swarm behaviors, has been conducted for several decades. Reynolds [5] proposed the seminal model for simulating flocking and schooling behaviors based on the local interactions of "boids". Fleischer and Barr [6, 7] ex- plored a cell-based developmental model for self-organizing geometric structures. Theraulaz and Bonabeau [8, 9] presented a modeling approach based on the swarm- ing behavior of social insects. They combined swarm techniques with 3D cellular automata to create autonomous agents that indirectly interact in order to create complex 3D structures. Viscek et al. [10] investigated a particle-based model re- lated to the Reynolds model and found that macroscopic phase changes occurred March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 4 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen in the particle system when introducing noise in the local interactions. Jadbabaie et al. [11] further explored the Vicsek model and provided a theoretical explana- tion for the model's observed behavior, as well as convergence results for classes of switching signals and arbitrary initial heading vectors. The initial work in this area of research created distributed, locally-interacting agent-based systems, then observed and characterized their behaviors. Later work explored techniques for directing these distributed, self-organizing systems. Eggen- berger Hotz [12, 13] proposed the use of genetic regulatory networks coupled with developmental processes for use in artificial evolution and was able to evolve simple shapes. Bonabeau et al. [14] applied genetic algorithms to the stigmergic swarm- based 3D construction method of Theraulaz and Bonabeau in order to evolve interactions that produce user-acceptable structures. Nagpal et al. [15, 16] pre- sented techniques to achieve programmable self-assembly. Cells are identically- programmed units which are randomly distributed and communicate with each other within a local area. In this approach, global-to-local compilation is used to generate the program executed by each cell, which has specialized initial parame- ters. Stoy and Nagpal [17] presented an approach to self-reconfiguration based on directed growth, where the desired configuration (which is stored in each module) is grown from an initial seed module. Spare modules move along recruitment gradi- ents emanating from attached modules to create the final shape. Gradients derived from global potential fields have also been investigated for directing robot swarms. Both Rimon and Koditschek [18] and Hsieh and Kumar [19] demonstrated that robot paths and controls can be computed from these fields, which lead the robots to form a pre-defined shape. Shen et al. [20] proposed a Digital Hormone Model for directing robot swarms to perform such tasks as surrounding a target, covering an area and bypassing barri- ers. The model relies on local communications between identical agents, but it also has each agent move towards a single global target. Swarm chemistry, proposed by Sayama [21, 22] and based on Reynolds' model, is an approach for designing spatio- temporal patterns for kinetically interacting, heterogeneous agents. An interactive evolutionary method, similar to Sims' [23], has been used to define system param- eters that lead to agent segregation and structure formation. Mamei et al. [24] proposed a distributed algorithm for robots that are attracted to and aggregate around targets sensed over short distances. By electing leader(s) as barycenter(s), propagating gradients of varying structure and using these gradients as instruction conditionals, a swarm of simulated robots are able to self-organize into a number of simple shapes such as a circle, ring, and lobes. Von Mammen and Christian [25] de- scribed swarm grammars, an agent-based extension of Lindenmayer systems, that are capable of adapting to their environment and evolve agent parameters in order to create structures that incorporate aspects of developmental design and morpho- genesis. The field of Guided Self-Organization (GSO) [26] has developed techniques for steering self-organizing systems towards desired outcomes, while still attempt- ing to not constrain the system's configuration space during its evolution. Doursat [27, 28] proposed a model for artificial development which combines proliferation, differentiation, self-assembly, pattern formation and genetic regula- tion. Via genetic-like regulation at the agent level, the agents can self-organize into a number of patterned shapes and structures. Werfel et al. [29] proposed a de- March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 5 centralized multi-agent system approach, inspired by mound-building termites, for building user-defined structures. A user specifies a desired structure, and the sys- tem automatically generates low-level rules for independent climbing robots that guarantee production of the structure. A single "seed" brick is used as a land- mark to identify where the structure is going to be built, and defines the origin of a shared coordinate system for the robots. Gerling and Von Mammen [30] pro- vided a context for this type of work in a summary of self-organized approaches to construction. Our previous and latest work on agent-based shape formation stands apart from related work in that it utilizes a chemotaxis-based interaction paradigm inspired by the behaviors of living cells which leads to the formation of tissues. Given the goal of recreating the properties of cells, MPs were designed with principles that should make them scalable and robust [2]. These design principles define MPs as identical, distributed agents that are not directed by a 'master designer', exchange information locally, carry no representation of the shape to be formed, and have no information about their global location. The macroscopic shape of the swarm emerges from the aggregation of local interactions and behaviors. Our approach is therefore novel compared to previous work in that it contains all of the following features. 1) All morphogenetic primitives are randomly placed in the environment, are identical, and perform the same simple actions, unlike Nagpal et al. [15, 16]), Mamei et al. [24], and Doursat [27, 28]. They require no differentiated behaviors or customized initialized states. 2) No initialization of spatial information is needed in the computational environment, unlike Stoy and Nagpal [17], Shen et al. [20], and Werfel et al. [29]. 3) Individual MPs do not know their location in any external/global coordinate system, unlike Stoy and Nagpal [17], and [29]. 4) MPs do not contain or utilize a representation of the predefined global shape that is being composed, unlike Stoy and Nagpal [17], Rimon and Koditschek [18], and Hsieh and Kumar [19]. 5) We utilize genetic programming to discover the MP concentration field functions that lead to the formation of a user-specified shape. Chemotaxis then provides a straightforward mechanism for determining the motion of MPs, in contrast to the difficult-to-program approaches of Shen et al. [20] and Sayama [21, 22]. Note that our new work described here enhances our previously developed system [2] to make MPs more robust, consistent and reliable. 3. Background Material 3.1 Agent-based Shape Formation Like Pfeifer et al. [31] we turn to biology and self-organization for insights into the design of autonomous robots, robotic swarms in our case. Our previous work in self-organizing shape formation [2, 32] is inspired by developmental biology [33] and morphogenesis [34], and builds upon a chemotaxis-based cell aggregation simulation system [35]. Morphogenesis is the process that forms the shape or structure of an organism through cell shape change, movement, attachment, growth and death. We have explored chemotaxis as a paradigm for agent system control because the motions induced by chemotaxis (one of the mechanisms of morphogenesis) may produce patterns, structures or sorting of cells [36]. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 6 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen 3.1.1 Morphogenetic Primitives Morphogenetic Primitives are initially placed inside a 2D environment with a random uniform distribution. Each MP is represented by a small disc and emits a 'chemical' into the environment within a fixed distance relative to its own local coordinate system. Every MP emits the identical local chemical field. An MP de- tects the cumulative chemical field at eight receptors on its surface, and calculates the field gradient from this input. MPs move in the direction of the field gradient with a speed proportional to the magnitude of the gradient. By employing these relatively simple chemotaxis-inspired behaviors MPs are able to self-organize into user-specified macroscopic shapes. This process is schematically presented in the bottom 2/3 of Figure 2. In the middle left of the figure, a close-up of an MP is provided showing its eight chemical sensors and the range of the finite chemical field that it emits. Numerous MPs are randomly placed in the computational arena, and are provided as initial conditions to a chemotaxis-based cell aggregation simulator. The simulator then computes an aggregation simulation based on the one chemical field that is associated with all MPs. The self-organization of the agent swarm is shown in the middle right of the figure. The bottom flowchart of the figure outlines the steps taken by the cell simulator for each cell. The bottom left image shows a representative MP chemical field, with the chemical concentration visualized with gray-scale colors. Isolines are added to highlight the structure of the chemical field. The image to its right shows a cumulative chemical field given the contributions of all of the MPs in the arena. The top part of the figure will be explained later in the paper. 3.1.2 Genetic Programming for Discovering Local Interactions fundamental While MPs' interactions are based on a chemotaxis-inspired paradigm, we do not limit their behaviors/properties to be physically realistic or completely consistent with biology. Instead, developmental biology provides a mo- tivating starting point for MPs. As a way to customize chemotaxis-inspired agents for shape formation, we alter the chemical concentration fields around individual cells. Instead of the chemical concentration dropping off only as an inverse func- tion of distance d from the cell's surface (e.g. 1/d), in our system we define the concentration field with an explicit function of d and θ, the angular location in the cell's local coordinate system. Currently, there is no prescriptive way to specify a particular local field function that will direct MPs to form a specific macroscopic shape, we therefore employ genetic programming [37] to produce the mathematical expression that explicitly specifies the field function. In order to meet the substantial computational re- quirement imposed by our evolutionary computing approach, we have implemented a master-slave form of the distributed genetic programming process [1]. The fit- ness measure associated with each individual field function is based on the shape that emerges from the chemical-field-driven aggregation simulation, and determines which functions will be passed along to later generations. The genetic process stops once an individual (i.e., a mathematical expression) in the population produces the desired shape via a chemotaxis simulation, or after a certain number of generations have been produced and evaluated. Figure 3 illustrates this approach. See [1], [2] and [38] for more details on MPs and the software system that implements them. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 7 With this algorithm, we have successfully evolved local MP chemical field func- tions for a number of simple shapes [2]. These results support the proposition that biological phenomena offer paradigms for designing cellular primitives for self-organizing shape formation. While the resulting explicit chemical fields are not biologically/chemically plausible, they do provide an approach for controlling robot swarms that communicate wirelessly over short distances and share minimal infor- mation with each other. Thus the agents in the swarm do not require significant compute power to self-organize. Additionally, evolutionary computing techniques, specifically genetic programming, have been crucial for discovering the detailed local interactions that lead to the emergence of the swarm's macroscopic structure. However, given the MPs' initial random configurations and the stochastic nature of the self-organization process, the outcomes of the simulations with a specific field function are not always the same. We have found that the shape formation simulations, which include random displacements of the MPs and noise in their movements, can generate bifurcating results. For some field functions, if we run numerous simulations each starting with a different random uniform distribution of MPs, two sets of final configurations will be formed. In most cases an equal num- ber of each configuration are produced, but in a few cases the ratio of the numbers is not one. Since it would be useful to control the outcomes of the self-organization process, we have developed methods for directing the final configuration of a bi- furcating simulation by starting the simulation with biased initial conditions [39]. 3.2 Outcome Prediction The first step towards developing methods that direct the outcome of a swarm simulation involved identifying spatial features that are correlated with and can differentiate the final, different swarm configurations. Our initial effort towards achieving this goal investigated methods for predicting the final configuration of a bifurcating simulation at an early stage of the aggregation process. Our rea- soning was that if certain spatial features can be used to predict the outcome of an aggregation, then they represent unique attributes of the swarm that could be manipulated to direct the swarm. In order to predict the final outcome of a self- organizing shape formation simulation, we first extracted features that capture the spatial distribution of the MPs. Moments provide a quantitative way to describe a distribution. Since MPs are defined as small discs, we use the center of each disc to represent each MP's location. We therefore can simplify the collection of MP locations as a set of 2D points, and apply moment analysis to this set over the duration of the MP simulation. We calculated the mean (first moment), variance (second central moment), skew- ness (third central moment) and kurtosis (fourth central moment) from the x and y coordinates of the MP centers. We analyzed the locations Xi of all points (MPs) as a whole, rather than tracking the location and movement of each individual point. The population size of the agents is denoted as n, (n = 500), and the formulas of March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 8 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen the four moments M1 to M4 are given in Equations 1 to 4, i=1 n(cid:88) n(cid:88) n(cid:88) n(cid:88) i=1 i=1 i=1 M1 = M2 = 1 n 1 n M3 = [ M4 = [ 1 n 1 n Xi, (Xi − M1)2, (Xi − M1)3]/(M2)3/2, (Xi − M1)4]/(M2)2. (1) (2) (3) (4) These statistical moments provide quantitative information about the shape of histograms/distributions. When computed for the x and y coordinates of the MPs, these moments capture the asymmetry and shape of the spatial distribution of the whole population. We have not found it necessary to compute cross moments, with the first four moments providing sufficient information for our analysis. Since the x and y coordinates of the points change over time, so do the four moments of the distribution of the x and y values. The change of the moments as a function of simulation time also provides insight into the dynamic nature of a particular MP simulation. At each simulation time t, the four moments Mi(t) (i = 1 to 4) of the overall distribution are calculated. We then approximate the time derivative of the mo- ments as the slope of a linear interpolating function of consecutive moment values. By calculating the moments and their time derivatives for both the x and y coor- dinates of the point set, at a given time t, we obtain a 16-dimensional vector to represent the distribution, Mx1(t), My1(t), Mx2(t), My2(t), Mx3(t), My3(t), Mx4(t), My4(t), kx1(t), ky1(t), kx2(t), ky2(t), kx3(t), ky3(t), kx4(t), ky4(t). Given the sensitivity of non-linear dynamical systems to initial conditions [40], it makes it extremely difficult, if not impossible, to predict the outcome of our complex, self-organizing system from its initial, random spatial configuration. We therefore attempted to predict the final spatial configuration at an early stage of the aggregation, usually before it is visually evident what shape will emerge from the process. We considered prediction of the bifurcating outcomes as a classification problem and utilized support vector machines (SVMs) [41] to solve it. We have found that applying SVMs to the distribution feature vector at a simulation time that is a small percentage of the total time needed for the final aggregated shape to form produced acceptable results. Given 200 MP simulations for a variety of bifurcating self-organizing shapes we found that we could predict the outcome of the aggregation at a time point 5% to 10% into the simulation with an accuracy of 81% to 91%. We view these results as satisfactory because they demonstrate that a strong correlation between a swarm's moments and its final formed shape does March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 9 exist. More details about this study may be found in [39] and [4]. 4. Directing Spatial Self-Organization Since the outcome of an MP simulation can be predicted at an early stage of aggregation using the moments of the agents' positions, we then explored methods for controlling the swarm via manipulating the moments of the swarm's initial configuration. The general strategy is to create random initial configurations for the MP simulations, but with constrained, biased moments. We have observed that this strategy can consistently direct the swarm to aggregate into specific final configurations. The first step of the strategy analyzes the bifurcating simulations to determine which of the moments diverge the most for the two different outcomes. This is the moment that will be biased in the swarm's initial, random configuration. 4.1 Moment Analysis One of our aggregations, which produces what we call the quarter-moon shape, provides an example of the moment analysis. Of the 200 simulations starting with a uniform random, unbiased initial condition, 100 produce left-pointing structures and 100 produce right-pointing structures. Figure 5 shows a typical swarm aggre- gation for this shape. The four moments of both x and y coordinates are calculated over all 35,000 simulation steps. Additionally the mean and standard deviation of each statistical moment are calculated for the two categories, i.e. left-pointing and right-pointing, over the simulation time steps. Plotting the mean and the mean ± standard deviation of the moments over time immediately highlights the moments which are the most differentiating and may be used to identify specific shapes. For the quarter-moon example the third x moment (skewness) is the one with the greatest separation of values for the two possible outcomes, as seen in Figure 6. The solid and dashed lines are the mean of the skewness of the x coordinate for the two outcomes. The dotted and dot-dashed lines are mean ± standard deviation. The dashed curve is produced from structures that are right-pointing and follow the path in the top of Figure 5. The solid curve is produced from the left-pointing structures, with a typical aggregation presented at the bottom of Figure 5. By analyzing the time series in Figure 6, we see that the skewness of the x co- ordinates of the two classes starts at about the same value, approximately −0.05 to 0.05, at time step 0. The values should be near zero, since all simulations begin with uniform random configurations. The skewness of the two classes first separates by increasing or decreasing, followed by a zero crossing and then a reversed trend appears until they reach their final states at step 35,000. Observing the values for the solid and dashed curves over all simulation time steps, we can identify three regions in the plot: a region occupied by solid/dotted curves only, a region occu- pied by dashed/dot-dashed curves only and an overlapping region. To be specific, considering the values of x skewness in Figure 6 (by projecting the curves into the y axis), the range of [−0.195,−0.150] is covered by solid/dotted curves only; [0.150, 0.190] is covered by dashed/dot-dashed curves only and [−0.150, 0.150] is covered by both outcomes. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 10 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen When determining the appropriate threshold value for a constrained moment, we start with the mean value of the non-overlapping moment range for a particular shape, and then adjust if needed. For the region covered only by the quarter-moon's dashed/dot-dashed curves (for right-pointing shapes) the mean value of skewness is 0.170. While using this value for the moment constraint produced reasonable results (94% of the biased initial conditions produced the desired shape), we found, via multiple experimental runs, that the threshold value on the skewness had to be increased to produce a consistent result. In general this was the process employed for determining the moment constraint thresholds needed to generate the desired outcomes. 4.2 Generating Constrained Biased Distributions Once the most significant distinguishing moment (the one with the greatest value difference in the final configuration) for a shape is identified, the information is utilized to direct the shape aggregation by imposing constraints on this moment in the initial conditions. We assume that the MPs' x and y coordinates are indepen- dent, and therefore create two probability density functions, each representing the x and y coordinate. One probability density function is created for the constrained coordinate and the other coordinate is considered to be uniformly random. Sam- ples are drawn independently from the two distributions to produce a single (x, y) location. This approach generates random distributions, i.e. 2D random initial configura- tions for the shape simulation, that meet a constraint on a particular moment in the x or y coordinate. We have found that constraining one of the eight moments (mean, variance, skewness and kurtosis for x and y) is sufficient for producing satisfactory results. Constraining multiple moments does not significantly improve the outcomes, and would further complicate the process of generating initial con- ditions. Once one significant moment of a distribution and its threshold value have been identified, the remaining three moments for that spatial coordinate (x or y) may be set to values observed in uniform random distributions. These values are mean = 500 (the center of our computational arena), variance = 15, 000, skewness = 0 (to make the distribution symmetric), and kurtosis = 2. Once the four moments for one of the coordinates have been specified, a probability density function (PDF) with those moments is defined. The values for the other coordinate are generated from a uniform random distribution. For the constrained dimension we create a Gram-Charlier expansion of the nor- mal distribution (chosen for its convergence properties) with specified moments [42]. This Gaussian-expanded probability density function is then discretized with 100,000 samples with values falling within the range of 0 to 1000 (the range of the computational arena). Slice sampling [43], a Markov chain sampling method chosen for its efficiency, is then utilized to draw 500 samples from this discretized distribution. Theoretically, the specified PDF can be sampled to produce a distri- bution that has the same moments as the PDF. Our experience has shown that the sample size needs to be quite large (on the order of 1 million) for this to be true. For our sample size of 500 (the number of MPs in an aggregation simulation) and heavily biased PDFs, the resulting moments of the finite sample set do not March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 11 necessarily match the ones desired for a particular shape. As the distribution generation process cannot guarantee that a sampled distribu- tion will meet the required moment constraints, the four moments of the generated distributions for the constrained coordinate are computed to determine if the con- straint is actually met. If the value of the significant moment is not above or below (depending on the constraint to be enforced) the specified threshold, the sampled distribution is rejected. If the constraint is met, the distribution is accepted as the initial conditions for a simulation computation. Since our agents are not points, but in fact are discs with a fixed radius, we maintain a distance of 2R (where R is the radius of a disc) between sample points, to ensure that the MPs do not overlap. Therefore, if an (x, y) pair is generated that is less than 2R distance to a previously generated location, it is rejected and another (x, y) pair is calculated. This process continues until a sufficient number of MP locations are generated for the initial conditions. We have found that it is more computationally efficient to generate numerous smaller sample sets and then merge them into a single point set, rather than at- tempt to compute a single, large point sample, when composing biased initial con- ditions for our aggregation simulations. We apply this approach by drawing 50 subsets, Tk=1,...,50 of 10 samples, rather than 1 set of 500 samples. Each sample drawn is checked for overlap with existing samples, discarded if overlap exists, and otherwise added to the current Tk. Once each Tk has 10 samples, it is checked for conformance to the moment restrictions prior to insertion into the final set, S, of 500 samples. If a given Tk fails, a new Tk is drawn. An acceptable Tk is merged with S, which is then checked for conformance to the moment restrictions. If the updated S does not pass, it is reverted to its prior state, S − Tk, and a new Tk is drawn. This process continues until S = 500. The algorithm for generating biased initial condition, once the initial sampling does not meet the moment requirements, is diagrammed in the flowchart at the top of Figure 2. Via this approach, we are able to generate initial conditions for our computational experiments in a few sec- onds, as opposed to several hours, when attempting to generate all 500 points of S at once for certain "extreme" biased conditions, e.g. low kurtosis. 5. Results We have applied our method for directing spatial self-organizations, which gener- ates biased initial configurations, to a number of bifurcating shape aggregations. We refer to the resulting shapes as the quarter-moon, ellipse, discs, and two parallel line segments. These shapes (and their associated chemical fields) were utilized in an earlier study [4], and had shown not to produce a single final, aggregated result. In our initial MP work it was not uncommon for the output of the evolution pro- cess to generate chemical fields that led to the formation of different shapes from a single field. These four were chosen because they generated two different shapes in equal proportions (except for the parallel lines shape) from uniformly random initial conditions. The chemical field functions that direct MPs to form into these shapes are detailed in Table 1. Given biased initial conditions the aggregation simu- lations produce one final outcome in almost all of cases. Moreover, by thresholding March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 12 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen Shape Field Function quarter-moon 1.0/(ln(ln(ln(exp(sin(ln(cos(θ) ∗ (((d + 0.761214) ∗ ln(d)) + ln(d − θ)))) ∗ (θ − eθ))) − ((θ − d) ∗ (d/θ))) − ((θ − eθ) ∗ ln(ln(exp(sin(ln(cos(θ) ∗ (((d + 0.761214) ∗ ln(d)) + ln(d − θ)))) ∗ (((θ − eθ) − ((θ − eθ) ∗ (d/θ))) + 0.432846))) − ((θ − d) ∗ (d/θ)))))) ellipse 1.0/ cos(θ) + ln(d) discs 1.0/(cos(sin(θ) − (cos(θ) − (ln(−0.367378)/(θ + d)))) + ln(d)) lines 1.0/(ln(ln(ln((cos(cos(d)) + (d ∗ (3d + ln(θ) + ln(ln(θ)))))+ (((ln(θ)/(0.285192)) ∗ ((1.0/θ) + 0.423969))/d)) + d) + d)) Table 1. The field functions for the MPs utilized in this study. Note that exp(x) signifies ex. the moment constraints on the biased initial conditions it is possible to control which shape is produced by a simulation. Figure 4 (top row) shows biased initial conditions for a number of shape aggregations created with this method. The bot- tom row illustrates the final outcome of each MP simulation that is produced from the associated biased starting configuration. In order to identify the significant, distinguishing moments for each shape, ag- gregation simulations (usually several hundred) with unbiased initial conditions are first performed. The shapes of the final outcomes are visually inspected and placed into categories. For each final shape, the mean and standard deviation of the four statistical moments of the evolving system are computed over the entire shape aggregation process. For simulations starting with uniform random, unbiased initial conditions, the final outcomes of the quarter-moon, ellipse and discs shapes evenly split into two categories, with roughly 50% of the final outcomes belonging to each class. The outcomes of the parallel line shapes are unbalanced, with 84.1% belonging to the majority class (two lines) and 15.9% belonging to the minority class (one line). These results, as well as the details that follow in the remainder of the section, are summarized in Table 2. A typical unbiased aggregation for the quarter-moon shape is shown in Figure 5. The simulation reaches a stable state by 35,000 simulation steps. We identified skewness in the x coordinate to be the significant macroscopic feature for this shape. See Figure 6 for the evolution of this feature over the course of the aggregation given uniform random initial conditions. Two sets of biased initial conditions (each with 100 examples) were generated with constrained skewness values in the x coordinate, March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 13 Quarter-moon Shapes Unbiased Percentage left-pointing right-pointing 50% 50% Thresholded Moment Skewnessx ≥ 0.315 Skewnessx ≤ −0.315 Ellipse Shapes Unbiased Percentage single ellipse non-single ellipse two ellipses 50% 50% − Thresholded Moment Kurtosisy ≥ 2.18 Kurtosisy ≤ 1.85 Multiple Discs Shapes three discs no three discs Shapes three discs four discs five or more discs Unbiased Percentage 0% 100% Unbiased Percentage 0% 50% 50% Thresholded Moment V ariancex ≤ 10, 270 V ariancex ≥ 15, 500 Thresholded Moment 1.99 ≤ Kurtosisx ≤ 2.09 Parallel Line Segments Shapes two lines one line Unbiased Percentage 84.1% 15.9% Thresholded Moment Kurtosisx ≤ 1.90 Kurtosisx ≥ 2.29 Biased Percentage 100% 100% Biased Percentage 100% 0% 100% Biased Percentage 100% 100% Biased Percentage 4% 75% 21% Biased Percentage 100% 100% Table 2. Table summarizing results generated with unbiased and biased initial conditions. with the thresholds set as greater than 0.315 (2 standard deviations from the mean) and less than −0.315. Since the distributions are generated stochastically, they do not have the exact targeted skewness value. So our acceptance test is based on a threshold. We performed simulations with the quarter-moon interaction function for these 200 biased initial conditions. Of the 100 initial conditions with a thresholded third x moment below −0.315, 100% of the final outcomes are right- pointing structures. Of the 100 initial conditions with a thresholded third x moment above 0.315, 100% are left-pointing structures. Figure 7 presents the evolution of this feature over the course of the aggregation given the biased initial conditions. A typical unbiased aggregation for the ellipse shape is shown in Figure 8, with half of the unbiased initial conditions producing a single "perfect" ellipse, with the other half producing either two ellipses or a deformed "blob". The unbiased simulation is computed for 10,000 steps. If the simulations are run for 50,000 steps they all will March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 14 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen produce a single ellipse. Kurtosis in the y direction was found to be the significant macroscopic feature for this shape. See Figure 9 for the evolution of this feature over the course of the aggregation given uniform random initial conditions. 100 simulations were performed with initial conditions that had their y coordinates' kurtosis thresholded to be above 2.18. Given these biased initial conditions all simulation (100%) produced a perfect single ellipse by step 7,500. 100 additional simulation were performed with initial conditions that had their y kurtosis set below 1.85. All 100 simulations produced two ellipses by step 7,500. Figure 10 presents the evolution of this feature over the course of the aggregation given the biased initial conditions. These results show that not only can biased initial conditions direct the outcomes of the simulations, but they can also significantly speed up the formation of the desired result, with the single ellipse being guaranteed to form by 50,000 steps in the unbiased case and by 7,500 steps given biased initial conditions. The discs dataset, when run with 200 unbiased initial conditions, produces 100 four discs structures and 100 structures of five or more discs, with a typical shape aggregation shown in Figure 11. The simulation reaches a stable state by 15,000 steps. We identified variance in the x direction to be the significant macroscopic feature for this shape. See Figure 12. In our experiments as the variance of the initial conditions was lowered, we found that we could generate a new shape (one that did not appear with unbiased initial conditions), that contained only three discs. Thresholding the x variance of the initial conditions to be less than 10,270 would always (100%) produce a 3-disc result. A typical 3-disc shape is presented in Figure 4(c). We were unable to consistently generate a 4-disc result for most simulations by thresholding the variance. Thresholding the x kurtosis to be greater than 1.90 and less than 2.09 did lead to an increased number of 4-disc results (75%), which we deemed as less than consistent or robust. Figure 13 presents the evolution of x variance over the course of the 3-disc aggregation given the biased initial conditions. Note that no 3-disc results were produced when keeping the x variance above 15,500 in the biased initial conditions. The parallel line dataset, when run with unbiased initial conditions, contains 526 instances of two vertical parallel line segments (84.1%) and 100 instances of one vertical line (15.9%), as seen in Figure 14. The simulation reaches a stable state by 50,000 steps. We identified kurtosis in the x coordinate to be the significant macroscopic feature for the shape. See Figure 15. 100 simulations were performed with initial conditions that had their x coordinates' kurtosis thresholded to be below 1.90. Given these biased initial conditions all simulation (100%) produced the two line structure. 100 simulations were then performed with initial conditions that had their x coordinates' kurtosis thresholded to be above 2.29. These biased conditions produced results that consistently (100%) created the minority class structure of a single line by 10,000 steps. Figure 16 presents the evolution of x kurtosis over the course of the aggregation given the biased initial conditions. 6. Discussion Our experiments show that our agents (MPs) can be reliably directed to form into large-scale, macroscopic structures using local-only behaviors, based on chem- March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems Parallel, Emergent and Distributed Systems 15 ical diffusion fields and biased initial conditions; thus producing a stigmergic phe- nomenon [44]. This type of global outcome is of particular interest to those looking for a robust, adaptable, and independent self-organizing system. A review con- ducted by the European Space Agency has shown that for their harsh working environment (space, Mars, etc...) the robustness of a local-only system is a key consideration and would allow for relatively simple (and easy to transport) satel- lites/equipment to form into a larger and more complex system that would be impossible to transport as a monolithic structure [45]. Systems using global infor- mation, with centralized communication between primitives, or a command-and- control structure, can form more complex shapes more quickly than local-only approaches. However these systems can fail if this communication is interrupted or the command-and-control structure breaks down [46]. The reasons that certain biased initial conditions may be used to direct the outcome of an aggregation process are frequently visually obvious. For example, the biased initial conditions seen in Figure 4(a) are clearly skewed to the right side of the arena. So it is clear that the majority of the agents are already amassed around the center of the object to be formed. This can also be seen in Figure 4(c), where lowering the variance of the X component makes the initial distribution of the MPs cluster around the central axis which the three discs will form along. The visual evidence that biasing initial conditions effectively pre-starts the aggregation process towards a desired shape is not as evident in the examples that constrain kurtosis ((b) and (d)). A higher Y kurtosis value in example (b) means that there should be a higher concentration of agents along the Y = 500 axis. In (d), a lower X kurtosis value means that there should be more agents distributed away from the center of the arena. But in both of these cases, while statistically this is true, it is not visually evident. It should be noted that not all shapes are stable throughout the simulation. The vertical lines being a good example; up to approximately 5,000 steps the 1-line and 2-lines shapes look very similar and have similar statistical moments, however between 10,000 and 45,000 steps 15.9% of the simulations will converge into a single line. This shows that some shapes may appear to be stable at one point during a simulation, when actually they have not yet stabilized. Or in other words, our agents may produce more than one type of distinct shape during their evolution. Thus, our experiments show that we are able to consistently produce certain self- organized swarms at a specific point in time during their aggregation. For these types of self-organizing systems, it is clearly desired to have a com- pletely local solution. Given that the methods described here require the compu- tation of global system-level quantities (moments of the entire distribution) and the manipulation of the locations of the agents in order to meet some global con- straint, we have not achieved this goal. In the future, we intend to explore if our genetic programming approach to local chemical field evolution, that leads to the formation of macroscopic shapes, can also be used to find chemical fields (i.e. local interactions) that direct a swarm that is uniformly randomly distributed into one that has specific statistical properties. This would lead to a two-step approach that is truly based on local-only interactions. In this case, the agents, which have been uniformly randomly placed in an environment, would follow chemical fields that move them into a biased initial condition. Then they would switch to a field that March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 16 Sean Grimes, Linge Bai, Andrew W.E. McDonald, and David E. Breen robustly directs them to form in a specific macroscopic shape. Additional future work with this system will involve robustness testing of the parameters of the initial conditions. Previous work in this area has defined a lower- bound for the number of primitives required to successfully create a single ellipse (400), but has not defined an upper-bound [47]. An upper and lower bound on the number of primitives (which of course is related to MP density) in the simula- tion is important as more complex shapes are created. Additionally future work will involve further analysis of the aggregation processes that cannot be completely con- trolled. These investigations should reveal new features that differentiate swarms that can be controlled via the reported method and those that cannot. We imagine that manipulation of other features will further enhance our ability to direct our self-organizing system. Ultimately we would like to implement our spatial self-organization approach in a swarm robotics system. We believe that this would be feasible with robots that communicate locally via Bluetooth. Given that all robots emit the same field, a single robot can compute the cumulative chemical field and its gradient at its location simply by knowing the distances and angular relationships of neighboring robots from itself. If each robot has a unique broadcasted ID, we imagine that distance could be derived from signal strength and angular information could be computed from inputs from multiple antennae. We have had discussions with a local roboticist about the possibility of using her swarm robotics platform to investigate our methods for distributed control. 7. Conclusions We have previously developed an agent-based self-organizing shape formation sys- tem. The agents perform identical behaviors based on sensing local information emitted into the environment by the agents. Genetic programming may be used to discover local interaction rules that lead the agents to self-organize into a number of user-specified shapes. However, since the agents are initially uniformly randomly placed in the environment and they stochastically follow prescribed rules, the aggre- gation simulations do not always produce the same final results. In order to develop methods that could be used to direct the agents to robustly form one specific con- figuration, we explored the relationships between an agent swarm's moments and its final configuration. After having shown that these moments could be used to predict the outcome of an MP aggregation in previous work, we demonstrate in this work that biasing the swarm's initial conditions based on these moments can be used to consistently direct the swarm to produce a desired macroscopic shape. By analyzing the statistical moments of the agents' positions over the entire shape aggregation process, we have identified significant, distinguishing moment features, and utilize them as constraints on simulation initial conditions for a number of bifurcating shapes. Biased initial conditions may be generated that meet these moment constraints, which then affect the resulting shape outcomes. In almost all of our examples we can completely control the result of the self-organization process. In some other cases we can significantly increase the likelihood of producing a desired configuration. In a more general sense, our work also indicates that complex, March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 17 non-linear dynamical self-organizing systems may be controlled by manipulating their initial conditions. Disclosure/Conflict-of-Interest Statement The authors declare that the research was conducted in the absence of any com- mercial or financial relationships that could be construed as a potential conflict of interest. Acknowledgments The authors would like to thank Robert Gilmore, Christian Kuehn and Santiago Ontan´on for many helpful discussions and suggestions. This research was funded by National Science Foundation grants CCF-0636323 and IIS-0845415. References [1] L. Bai, M. Eyiyurekli, and D. Breen, Automated Shape Composition Based on Cell Biology and Distributed Genetic Programming, in Proc. Genetic and Evolutionary Computation Conference, 2008, pp. 1179–1186. [2] L. Bai and D. Breen, Chemotaxis-inspired cellular primitives for self- in Morphogenetic Engineering: Toward Pro- organizing shape formation, grammable Complex Systems, chap. 9, Springer, 2012, pp. 209–237. [3] E. Eisenbach, et al., Chemotaxis, Imperial College Press, London, 2004. [4] L. Bai, R. Gilmore, and D. Breen, Predicting Spatial Self-Organization with Statistical Moments, in Proc. Spatial Computing Workshop of the AAMAS Conference, 2014, p. Article 2. [5] C. Reynolds, Flocks, herds and schools: A distributed behavioral model, in Proc. SIGGRAPH '87, 1987, pp. 25–34. [6] K. Fleischer and A. Barr, A Simulation Testbed for the Study of Multicellular Development: The Multiple Mechanisms of Morphogenesis, in Proc. Artificial Life III, 1994, pp. 389–408. [7] K. Fleischer, Investigations with a Multicellular Developmental Model, in Proc. Artificial Life V, 1996, pp. 389–408. [8] G. Theraulaz and E. Bonabeau, Coordination in distributed building, Nature 269 (1995), pp. 686–688. [9] G. Theraulaz and E. Bonabeau, Modeling the collective building of complex ar- chitectures in social insects with lattice swarms, Journal of Theoretical Biology 177 (1995), pp. 381–400. [10] T. Vicsek, A.C. E. Ben-Jacobabd , I. Cohen, and O. Shochet, Novel type of phase transition in a system of self-driven particles, Physical Review Letters 75 (1995), pp. 1226–1229. [11] A. Jadbabaie, J. Lin, and A. Morse, Coordination of groups of mobile au- tonomous agents using nearest neighbor rules, IEEE Trans. on Automatic Control 48 (2003), pp. 988–1001. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 18 REFERENCES [12] P. Eggenberger, Evolving Morphologies of Simulated 3D Organisms Based on Differential Gene Expression, in Proc. 4th European Conference on Artificial Life, 1997, pp. 205–213. [13] P. Hotz, Combining developmental processes and their physics in an artificial evolutionary system to evolve shapes, in On Growth, Form and Computers, K. S. and P. Bentley, eds., Academic Press, 2003, pp. 302–318. [14] E. Bonabeau, S. Guerin, D. Snyers, P. Kuntz, and G. Theraulaz, Three- dimensional architectures grown by simple 'stigmergic' agents, BioSystems 56 (2000), pp. 13–32. [15] R. Nagpal, Programmable self-assembly using biologically-inspired multiagent control, in Proc. 1st International Joint Conference on Autonomous Agents and Multiagent Systems: part 1, 2002, pp. 418–425. [16] R. Nagpal, A. Kondacs, and C. Chang, Programming Methodology for Biologically-Inspired Self-Assembling Systems, in Proc. AAAI Spring Sympo- sium on Computational Synthesis, 2003, pp. 173–180. [17] K. Stoy and R. Nagpal, Self-reconfiguration using directed growth, in Proc. Internatioanl Symposium on Distributed Autonomous Robotic Systems, 2004, pp. 3–12. [18] E. Rimon and D. Koditschek, Exact robot navigation using artificial potential functions, IEEE Trans. on Robotics and Automation 8 (1992), pp. 501–518. [19] M. Hsieh and V. Kumar, Pattern generation with multiple robots, in Proc. IEEE International Conference on Robotics and Automation, Orlando, Florida, 2006, pp. 2442–2447. [20] W.M. Shen, P. Will, A. Galstyan, and C.M. Chuong, Hormone-inspired self- organization and distributed control of robotic swarms, Autonomous Robots 17 (2004), pp. 93–105. [21] H. Sayama, Swarm chemistry, Artificial Life 15 (2009), pp. 105–114. [22] H. Sayama, Robust morphogenesis of robotic swarms, IEEE Computational Intelligence 5 (2010), pp. 43–49. [23] K. Sims, Interactive Evolution of Dynamical Systems, in Proc. 1st European Conference on Artificial Life, 1992, pp. 171–178. [24] M. Mamei, M. Vasirani, and F. Zambonelli, Experiments of morphogenesis in swarms of simple mobile robots, Applied Artificial Intelligence 18 (2004), pp. 903–919. [25] S. Von Mammen and C. Jacob, The evolution of swarm grammars-growing trees, crafting art, and bottom-up design, IEEE Computational Intelligence Magazine 4 (2009), pp. 10–19. [26] M. Prokopenko (ed.), Guided Self-Organization: Inception, Springer, Berlin, 2014. [27] R. Doursat, The growing canvas of biological development: Multiscale pattern generation on an expanding lattice of gene regulatory nets, in Unifying Themes in Complex Systems, Springer Verlag, 2008, pp. 205–210. [28] R. Doursat, Organically grown architectures: Creating decentralized, au- tonomous systems by embryomorphic engineering, in Organic Computing, R. Wurtz, ed., chap. 8, Springer Verlag, 2008, pp. 167–200. [29] J. Werfel, K. Petersen, and R. Nagpal, Designing collective behavior in a termite-inspired robot construction team, Science 343 (2014), pp. 754–758. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 19 [30] V. Gerling and S. Von Mammen, Robotics for Self-Organised Construction, in Foundations and Applications of Self* Systems, IEEE International Workshop on, 2016, pp. 162–167. [31] R. Pfeifer, M. Lungarella, and F. Iida, Self-organization, embodiment, and biologically inspired robotics, Science 318 (2007), pp. 1088–1093. [32] L. Bai, M. Eyiyurekli, P. Lelkes, and D. Breen, Self-organized sorting of het- erotypic agents via a chemotaxis paradigm, Science of Computer Programming 78 (2013), pp. 594–611. [33] S. Gilbert, Developmental Biology, 10th ed., Sinauer Associates, Inc., Sunder- land, MA, 2013. [34] J. Davies, Mechanisms of Morphogenesis: The Creation of Biological Form, Elsevier, Amsterdam, 2005. [35] M. Eyiyurekli, P. Manley, P. Lelkes, and D. Breen, A computational model of chemotaxis-based cell aggregation, BioSystems 93 (2008), pp. 226–239. [36] T. Sekimura, S. Noji, N. Ueno, and P. Maini (eds.), Morphogenesis and Pattern Formation in Biological Systems, Springer, Tokyo, 2003. [37] J. Koza, Genetic Programming: On the Programming of Computers by Means of Natural Selection, MIT Press, Cambridge, MA, 1992. [38] L. Bai, Self-Organizing Primitives for Automated 2D Shape Composition, , Master's thesis, Drexel University, Philadelphia, PA (2008). [39] L. Bai, Chemotaxis-based Spatial Self-Organization Algorithms, Ph.D. thesis, Drexel University, Philadelphia, PA, 2014. [40] S. Wiggins (ed.), Introduction to Applied Nonlinear Dynamical Systems and Chaos, 2nd Edition, Springer, New York, 2003. [41] N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Ma- chines and Other Kernel-Based Learning Methods, Cambridge University Press, 2000. [42] S. Seabold and J. Perktold, Statsmodels: econometric and statistical modeling with python, in Proc. 9th Python in Science Conference, 2010, pp. 57–61. [43] R.M. Neal, Slice sampling, Annals of Statistics (2003), pp. 705–741. [44] G. Theraulaz and E. Bonabeau, A brief history of stigmergy, Artificial Life 5 (1999), pp. 97–116. [45] Swarm intelligence (2017), Retrieved October 23, 2017, http://www.esa.int/gsp/ACT/ai/projects/swarm.html. [46] L. Pettazzi, D. Izzo, and S. Theil, Swarm navigation and reconfiguration using electrostatic forces, in Proc. 7th International Conference On Dynamics and Control of Systems and Structures in Space, 2006, pp. 257–268. [47] L. Bai, M. Eyiyurekli, and D. Breen, An Emergent System for Self-Aligning and Self-Organizing Shape Primitives, in Proc. IEEE International Conference on Self-Adaptive and Self-Organizing Systems Conference, 2008, pp. 445–454. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 20 Figures REFERENCES Figure 1. Morphogenetic Primitives self-organizing into a star shape. Initially published in [2]. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 21 Figure 2. Schematic diagram of the directed self-organization process based on specifying biased initial conditions for Morphogenetic Primitives. r2r3r4r6r5r8r7RMaxrcr1Emit ChemicalSense Cumulative Chemical FieldCalculate Gradient and Step Move (Take Step)Collision?Take Random StepYesNo CellSimulatorStep 0Step 1,000Step 5,000Step 10,000Select ShapeGenerate biasedPDFGenerate 10pointsPointsokay?Add toexistingAllpointsokay?Removelatest 10500points?DoneYesNoYesYesNoNo March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 22 REFERENCES Figure 3. The genetic programming process that produces the local chemical field functions of the shape primitives. Initially published in [1]. March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 23 (a) (b) (c) (d) Figure 4. (top row) Biased initial conditions ((a) x skewness = -0.315, (b) y kurtosis = 2.150, (c) x variance = 9,596, (d) x kurtosis = 1.88) that robustly evolve (bottom row) into (a) a right-pointing quarter-moon, (b) a single ellipse, (c) three discs and (d) two line segments. BaiandBreenDirectingChemotaxis-BasedSelf-Organization(a)(b)(c)(d)Figure11.(toprow)Biasedinitialconditions((a)xskewness=-0.268,(b)ykurtosis=2.150,(c)xvariance=9,596,(d)xkurtosis=1.88)thatrobustlyevolve(bottomrow)into(a)aright-facingquarter-moon,(b)asingleellipse,(c)threediscsand(d)twolinesegments.Thisisaprovisionalfile,notthefinaltypesetarticle20 March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 24 REFERENCES Figure 5. Shape aggregation of the quarter-moon MPs starting from random initial conditions. Step 0Step 5,000Step 2,500Step 10,000Step 35,00050%50% March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 25 Figure 6. Skewness of the x coordinate of the unbiased quarter-moon shape aggregations over time. Figure 7. Skewness of the x coordinate of the biased quarter-moon shape aggregations over time. 0500010000150002000025000300003500040000Simulation Time0.200.150.100.050.000.050.100.150.20Moment Rangesolid = left, dashed = right skewness0500010000150002000025000300003500040000Simulation Time0.40.20.00.20.4Moment Rangesolid = left, dashed = right skewness March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 26 REFERENCES Figure 8. Shape aggregation of the ellipse MPs starting from random initial conditions. Step 0Step 1,250Step 250Step 2,500Step 10,00050%50% March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 27 Figure 9. Kurtosis of the y coordinate of the unbiased ellipse shape aggregations over time. Figure 10. Kurtosis of the y coordinate of the biased ellipse shape aggregations over time. 0200040006000800010000Simulation Time1.41.61.82.02.2Moment Rangesolid = one ellipse, dashed = two ellipses kurtosis010002000300040005000600070008000Simulation Time1.52.02.53.0Moment Rangesolid = one ellipse, dashed = two ellipses kurtosis March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 28 REFERENCES Figure 11. Shape aggregation of the discs MPs starting with random initial conditions. Step 0Step 1,500Step 500Step 6,000Step 15,00050%50% March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 29 Figure 12. Variance of the x coordinate of the unbiased discs shape aggregations over time. Figure 13. Variance of the x coordinate of the biased discs shape aggregations over time. 02000400060008000100001200014000Simulation Time90001000011000120001300014000150001600017000Moment Rangesolid = four discs, dashed = not four variance02000400060008000100001200014000Simulation Time200040006000800010000120001400016000Moment Rangesolid = three, dashed = not three variance March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems 30 REFERENCES Figure 14. Shape aggregation of the line segment MPs starting from random initial conditions. Step 0Step 25,000Step 1,000Step 40,000Step 50,00084.1%15.9% March 13, 2018 IJPEDS17arXiv 0:48 The International Journal of Parallel, Emergent and Distributed Systems REFERENCES 31 Figure 15. Kurtosis of the x coordinate of the unbiased line segment shape aggregations over time. Figure 16. Kurtosis of the x coordinate of the biased line segment shape aggregations over time. 01000020000300004000050000Simulation Time1.001.251.501.752.002.252.502.75Moment Rangesolid = one, dashed = two kurtosis0200040006000800010000Simulation Time20246810Moment Rangesolid = one, dashed = two kurtosis
1907.11852
1
1907
2019-07-27T04:50:45
G-flocking: Flocking Model Optimization based on Genetic Framework
[ "cs.MA", "cs.RO" ]
Flocking model has been widely used to control robotic swarm. However, with the increasing scalability, there exist complex conflicts for robotic swarm in autonomous navigation, brought by internal pattern maintenance, external environment changes, and target area orientation, which results in poor stability and adaptability. Hence, optimizing the flocking model for robotic swarm in autonomous navigation is an important and meaningful research domain.
cs.MA
cs
XXXX, VOL. XX, NO. XX, XXXX 2019 1 G-flocking: Flocking Model Optimization based on Genetic Framework Li Ma, Weidong Bao, Xiaomin Zhu, Member, IEEE, Meng Wu, Yuan Wang, Yunxiang Ling, and Wen Zhou an obstacle populated planar workspace under a single leader- multiple followers architecture. Abstract -- Flocking model has been widely used to con- trol robotic swarm. However, with the increasing scala- bility, there exist complex conflicts for robotic swarm in autonomous navigation, brought by internal pattern main- tenance, external environment changes, and target area orientation, which results in poor stability and adaptability. Hence, optimizing the flocking model for robotic swarm in autonomous navigation is an important and meaningful research domain. Index Terms -- Robotic swarms, flocking model, multia- gent systems (MASs). I. INTRODUCTION R OBOTIC swarms pose an attractive and scalable solution to accomplish complicated missions such as search-and- rescue [1], mapping [2], target tracking [3], and full coverage attacking, which can prevent human beings from boring, harsh and dangerous environment. One main advantage of a robotic swarm solution is the simple local interactions between individuals within a complex system that could generate some new properties and phenomena observed at the system level, such as a set of collective behaviors [4]. Much like their biological counterparts such as fish schools [5], bird flocks [6], ant colonies [7], and cell populations [8], the resulting collective patterns are robust and flexible to agents joining in and dropping out, especially when accidents like obstacles, dangers, and new missions emerge. While robotic swarm en- joys numerous advantages, the large-scale autonomous robotic swarm incurs a high robot-failure probability due to real- life conditions when delays, uncetainties, and kinematic con- straints are present. This phenomenon is even more noticeable in military projects like Gremlins [9] and LOCUST [10], since they are built on small, low-cost and semi-autonomous UAVs whose failure probability is expected to be much higher. Among researches of flocking models with obstacle avoid- ance, Wang et al. [11] proposed an improved fast flocking algorithm with obstacle avoidance for multi-agent dynamic systems based on Olfati-Sabers algorithm. Li et al. [12] studied the flocking problem of multi-agent systems with obstacle avoidance, in the situation when only a fraction of the agents have information on the obstacles. Vrohidis et al. [13] considered a networked multi-robot system operating in This work was supported in part by the National Natural Science Foundation of China under Grants 61872378, 91648204, 71702186, in part by Postgraduate Research Innovation Project in Hunan Province under grant CX2018B021, in part by the Scientific Research Project of National University of Defense Technology under Grants ZK17-03-48 Fig. 1. Genetic flocking optimizing framework To the best of our knowledge, few previous literatures studied the model that satisfies both stability and adaptivity of the autonomous robotic swarm. Thus, we design a novel genetic flocking optimizing framework that can achieve both stability and adaptivity of the robotic swarms. As shown in Fig. 1, a robot is seperated into three layers, including sensing layer, decision layer, and action layer, which supports the basic navigation function. Besides, we generalize velocity updating formula by rules described with weight parameters, which evolves through interaction with the environment. The environment is divided into two layers: the evaluation layer and the evolutionary layer, where the former provides fitness function for the latter. II. GENERALIZED FLOCKING MODEL As shown in Fig. 2, a robot agent i has four detection areas: repulsion area, alignment area, attraction area, and obstacle avoidance area. The velocity updating fomula is described as follows: the weight parameters a, b, c, d, e ∈ (0, 1), which is used to flexibly handle the generalization formula. In equation (1), we define Sensing layerDecision layerAction layerTarget orientationObstacle avoidanceRepulsionAlignmentAttractionGeneralized velocity update formulaEvaluation layerEvolution layerAverage timeDeath rateAnisotropy Aggregation UniformityInitial populationFitness testSelect best parentsChildrenBREEDMUTATEUltrasonicLaser radarCameraCommunicationOne GenerationRules Rules Robot(Agent)Environment 2 XXXX, VOL. XX, NO. XX, XXXX 2019 whole navigation process, while N is the agent number of the agents that arriving at target area. We define the stability of the robotic swarm as the variance of the γt sequence, which describes whether the flock structure of this swarm is stable. (cid:80)T t=0 (γt − ¯γ)2 (cid:113)(cid:0)px (cid:1)2 +(cid:0)py T s2 γ = (cid:80) t j − rx N j γt = , j − ry t (cid:1)2 . (3) (4) Fig. 2. avoidance area (Zobs). Pattern-formation areas (Zrep, Zali, Zatt) and obstacle- (cid:88) ∆vi = a (R0 − rij) (cid:88) vjvj + c j∈Zali (R3 − rik) pi − pj rij (cid:88) j∈Zatt pi − pk rik j∈Zrep 1 Nali (cid:88) j∈Zobs + b + d (R2 − rij) ptar − pi + e ritar pj − pi rij + v(t). Tunning the model above means that we propose four rules referring to classic reynolds' boids model and we optimize the parameters there. Note that the parameter space is 20- dimensional; tuning, global optimization methods, or parameter sweeping would be generally much time-consuming. therefore, manual III. ORDER PARAMETERS AND FITNESS FUNCTION In order to select the set of parameters that perform the best in the simulation process, we propose a fitness function com- posed by several order parameters, which helps us to abstract the mathematical model of single objective optimization. The fitness function is described as flollows: − T start ) × Ndeath Ntotal j − ry t )2 t )2 + (py j j (cid:80) (cid:113) j (T arrive (cid:80) (cid:80) N j − rx (cid:80) (px N T t (γt − ¯γ) (cid:80) (cid:80) j − δt)2 j t t T j (θt T F = × × × × α, j where T start is the time when the navigation is triggered, j and T arrive is the time when robotic agent j reaches the target area. Ndeath represents the number of the dead agent, and Ntotal represents the number of the total agents in the robotic swarm. rx t are the abscissa and ordinate of the position of the swarm's centroid at time t. T is the total time of the t and ry We define anisotropic index to describe the variation of population velocity direction. Specifically, it needs to calculate the average angle of each individual velocity direction and flock velocity direction at a certain time, and then calculate the average value of the whole process, which is the index of anisotropic index. The variance of the average angle of the whole process represents the variation range of anisotropic index, and the formula of anisotropy is as follows: (cid:80) θj δt = j N . (5) (1) With this method, we created a single-objective optimization scenario, which can be solved using genetic algorithm. IV. THE G-FLOCKING ALGORITHM This research adopts Parameter Tuning of Flocking Model based on classical genetic algorithm (GA) framework. The main algorithm is described as follows: Algorithm 1 The G-flocking algorithm Require: Rexp: a set of traditional expert's rules; P (0): randomly generate an initial population of rules; M: max- imum number of iterations; Np: number of the population; LR: length of the rules; Ns: number of seed used to produce the next generation; r: member mutation rate; Evaluate fitness of P (t) for i = 1 → M do Ensure: Ropt: an set of optimal rules; 1: t = 0 2: while t <= T do 3: 4: 5: 6: 7: 8: 9: 10: end for for i = 1 → M/2 do end for for i = 1 → M do Select operation to P (t) Crossover operation (2) to P (t) = Mutation operation to P (t) = M utation(P (t), r) Crossover(Ns, Np) end for for i = 1 → M do 11: 12: 13: 14: 15: 16: 17: 18: 19: end while end for t = t + 1 end for for i = 1 → M do P (t + 1) = P (t) R0zrepR2R3zalizattR1zobs LI MA et al.: PREPARATION OF PAPERS FOR XXXX (2019) 3 In the algorithm, the random rules Rexp are represented (cid:9) , i = 0, ei 0 0, ci 0, di (cid:9), and Ri the optimal rules for the 0, R2 0, R3 0, R4 0 1, 2, 3, 4. as: (cid:8)R1 rules: Ropt = (cid:8)R1 (cid:8)ai (cid:9), and Ri 0 = (cid:8)ai (cid:9) , i = 1, 2, 3, 4. opt, bi Once optimized, we can get opt, R2 opt opt, di opt, ei opt, ci 0, bi flocking which composing the BRIAN model. The outputs of G-flocking are also a set of optimized opt = opt, R4 opt, R3 opt V. EXPERIMENT ANALYSIS To reveal the performance improvements of BRIAN, we compare it with basic rule-based model (BREAM). BREAM derives from the classical Reynolds' flocking model that has been widely used. To apply Reynolds' flocking model to more complex environment, the comprehensive obstacle avoidance strategies are integrated into BREAM. (a) BREAM (20 robots) (b) BRIAN (20 robots) (c) BREAM (60 robots) (d) BRIAN (60 robots) (e) BREAM (100 robots) (f) BRIAN (100 robots) Fig. 3. BREAM and BRIAN traces of the robotic swarm in autonomous navigation in test scenery ( We tested 3 groups of experiments using 20, 60 and 100 robotic agents for simulation.) In order to clearly observe the impacts of different parame- ters of the formula for velcocity updating, we compare the performance of basic rule-based model (BREAM) and our optimized flocking model for robotic swarm in navigation (BRIAN) in scenary with three basic environmental elements including tunnel obstacle, non-convex obstacle and convex obstacle. Fig. 3 shows directly that BRIAN performs better than BREAM in uniformity and stability. Fig. 3(a) and Fig. 3(b) represent the performance of these two models with 20 robotic agents, Fig. 3(c) and Fig. 3(d) with 60 robots, Fig. 3(e) and Fig. 3(f) with 100 robots. Specific performance indicators are shown in Table I. We record the values of each evaluation index of the two models in three situations of the number and scale of robots. Generally, all the indicators of BRIAN model perform better (the smaller, the better). Specifically, aggregation of BRIAN is 56% lower than that of BREAM while the reduction of other indicators (anisotropy, average- time, uniformity, deathrate, and fitness function) are 88.61%, 32.55%, 89.69%, 100%, and 99.92%, respectively. Fig. 4. changes through time. The uniformity of the robotic swarm with each experiment Fig. 4 shows the change of uniformity in the whole time step. The total time step of each group of experiments is not the same, but it can be seen from the figure that the data of each group of BRIAN are stable between 0 and 1, which means that the stability and tightness of the cluster are very good during the whole cruise. When BREAM passes through obstacles, it can be seen that there will be large fluctuations near step 31 and step 71. Such fluctuations represent the situation of low cluster tightness and stability when cluster passes through narrow and non-convex obstacles, and the formation is not well maintained. At the same time, it can be seen that BRIAN has completed the whole task in about 84 seconds, while BREAM has completed the whole task. VI. CONCLUSIONS AND FUTURE WORK We presented in this paper an optimized flocking model for robotic swarm in autonomous navigation. This model is obtained through G-flocking algorithm proposed by us, which is extended from the classical genetic algorithm and rule-based flocking model in most relative researches. This is the first of its kind reported in the literatures; it comprehensively ad- dresses the reliability, adaptivity and scalability of the robotic swarm during completing the navigation tasks. The following issue will be addressed in our future work: First, we will extend our experiment to the real-world sys- tems such as unmanned aerial systems and unmanned ground systems. Second, we will take more uncertainties of scenaries into the model to verify the correctness of our model, such as adding the moving obstacle, the irregular barriers, and even fluid barriers. 051015202505101520250510152025051015202505101520250510152025051015202505101520250510152025051015202505101520250510152025010203040506070809010011002468BREAM20BRIAN20BREAM60BRIAN60BREAM100BRIAN100 4 XXXX, VOL. XX, NO. XX, XXXX 2019 COMPARISONS BETWEEN BREAM & BRIAN WITH 20, 60 AND 100 ROBOTS TABLE I Aggregation Evaluation Algorithm BREAM BRIAN BREAM BRIAN BREAM BRIAN BREAM BRIAN BREAM BRIAN BREAM BRIAN 0.0079 Num-20 0.0371 Num-60 Num-100 0.0317 130.0500 128.7667 115.8000 38.6869 42.8201 50.1455 84.5000 83.9167 84.2500 6.1110 7.6107 92.8195 0.0000 0.0000 0.0000 0.8481 0.8639 1.1681 0.4666 0.4326 0.4557 5.3094 4.6934 4.9927 0.2864 0.3195 0.2100 0.0076 0.0435 0.0330 0.3500 0.3333 2.7367 Fitness Function Averagetime Uniformity Anisotropy Deathrate REFERENCES [1] Murphy, R. R., Tadokoro, S., Nardi, D., Jacoff, A., Fiorini, P., & Choset, H., et al. (2008). Search and rescue robotics. Springer Handbook of Robotics, 1151 -- 1173. [2] Dirafzoon, A. , & Lobaton, E. . (2014). Topological Mapping of Un- known Environments using an Unlocalized Robotic Swarm. IEEE/RSJ International Conference on Intelligent Robots & Systems. IEEE. [3] Parker, L. E., Rus, D., & Sukhatme, G. S. (2008). Multiple Mobile Robot Systems. springer Handbook of Robotics, 921 -- 941. [4] Brown, D. S. , Kerman, S. C. , & Goodrich, M. A. . (2014). [acm press the 2014 acm/ieee international conference - bielefeld, germany (2014.03.03-2014.03.06)] In Proceedings of the 2014 acm/ieee interna- tional conference on human-robot interaction - hri 14 - human-swarm interactions based on managing attractors. 90-97. [5] Krause, J., Hoare, D., Krause, S., Hemelrijk, C. K., & Rubenstein, D. I. (2015). Leadership in fish shoals. Fish & Fisheries, 1(1), 82-89. [6] Nagy, Mt, kos, Zsuzsa, Biro, D. , & Vicsek, Tams. (2010). Hierarchical group dynamics in pigeon flocks. Nature, 464(7290), 890-893. [7] Feinerman, O. , Pinkoviezky, I. , Gelblum, A. , Fonio, E. , & Gov, N. S. . (2018). The physics of cooperative transport in groups of ants. Nature Physics. [8] Cheung, K. J., Gabrielson, E., & Werb, Z., et al.(2013). Collective invasion in breast cancer requires a conserved basal epithelial program, Cell, 155(7). [9] Talal Husseini.(2018). Gremlins are enters Phase technology.com/features/gremlins-darpa-uav-programme/. its UAV programme. III of coming: DARPA https://www.army- [10] (2018). Raytheon gets $29m for work on US Navy LOCUST UAV https://navaltoday.com/2018/06/28/raytheon-wins-contract- prototype. for-locus-inp/. [11] Wang, J., & Xin, M. (2013). Flocking of multi-agent system using a unified optimal control approach. Journal of Dynamic Systems Mea- surement & Control, 135(6), 061005. [12] Li, J. , Zhang, W. , Su, H. , & Yang, Y. . (2015). Flocking of partially- informed multi-agent systems avoiding obstacles with arbitrary shape. Autonomous Agents and Multi-Agent Systems, 29(5), 943-972. [13] Vrohidis, C. , Vlantis, P. , Bechlioulis, C. P. , & Kyriakopoulos, K. J. . (2018). Reconfigurable multi-robot coordination with guaranteed con- vergence in obstacle cluttered environments under local communication. Autonomous Robots, 42(4), 853-873. Li Ma is currently working toward his Ph.D. de- gree in the College of Systems Engineering, Na- tional University of Defense Technology. Contact him at [email protected]. Xiaomin Zhu is currently an Associate Profes- sor in the College of Systems Engineering at Na- tional University of Defense Technology, Chang- sha, China. Contact him at [email protected]. Meng Wu is currently pursuing the M.S. degree in the College of Systems Engineering, National University of Defense Technology, China. Con- tact her at [email protected]. College Yuan Wang is currently a Ph.D Candidate of Engineering, National University of Defense Technology, Changsha, at [email protected]. Systems Contact China. him of Yunxiang Ling is currently a professor in Offi- cers college of PAP, Chengdu, China. Contact him at [email protected]. Weidong Bao is currently a professor in the Col- lege of Systems Engineering at National Univer- sity of Defense Technology, Changsha, China. Contact him at [email protected]. Wen Zhou is currently an Assistant Professor in the College of System Engineering at National University of Defense Technology, Changsha, China. Contact him at [email protected].
cs/0512003
1
0512
2005-12-01T04:09:22
Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms
[ "cs.MA", "cs.AI" ]
In order to overcome difficult dynamic optimization and environment extrema tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
cs.MA
cs
Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 1 Societal Implicit Memory and his Speed on Tracking Extrema in Dynamic Environments using Self-Regulatory Swarms Vitorino Ramos1, Carlos Fernandes2,3, Agostinho C. Rosa2 1 CVRM-IST, Technical Univ. of Lisbon (IST), Av. Rovisco Pais, 1, 1049-001, Lisbon, PORTUGAL [email protected] 2 LaSEEB-ISR-IST, Technical Univ. of Lisbon (IST), Av. Rovisco Pais, 1, TN 6.21, 1049-001, Lisbon, PORTUGAL {cfernandes,acrosa}@laseeb.org 3 EST-IPS, Setúbal Polytechnic Institute (IPS), R. Vale de Chaves - Estefanilha, 2810, Setúbal, PORTUGAL Abstract— In order to overcome difficult dynamic optimization and environment extrema tracking problems, we propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of the search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control (DOC) problems. Measures were made for different dynamic settings and parameters such as, environmental upgrade frequencies, landscape changing speed severity, type of dynamic (linear or circular), and to dramatic changes on the algorithmic search purpose over each test environment (e.g. shifting the extrema). Finally, comparisons were made with traditional Genetic Algorithms (GA) as well as with more recently proposed Co-Evolutionary approaches. SRS, were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found: SRS was able not only to achieve quick adaptive responses, as to maintaining a number of different solutions, while adapting to new unforeseen extrema; the possibility to spontaneously create and maintain different subpopulations on different peaks, emerging different exploratory corridors with intelligent path planning capabilities; the ability to request for new agents over dramatic changing periods, and economizing those foraging resources over periods of stabilization. Finally, results prove that the present SRS collective swarm of bio-inspired agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single ant composing that precise swarm tracking system. This emerged behavior is probably one of the most interesting ones achieved by the present work. ORIGINAL PAPER WITH FULL PICTURES AVAILABLE IN: http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-NIAS06.pdf I. INTRODUCTION M (EC) and swarm OST research in evolutionary intelligence (SI) computation focuses on optimization of static, non-changing problems. Many real-world optimization problems, however, are dynamic, and optimization is needed that are capable of continuously adapting the solution to a changing environment. In fact, many real-world problems are actually dynamic: new jobs have to be added to the schedule, machines may break down or wear down slowly, raw material is of changing quality, etc [8]. If the optimization problem is dynamic, the goal is no longer to find the extrema, but to track their progression through the space as closely as possible. One method for achieving this is to evolve a function off-line that models the dynamics of the environment directly [58] while another is to use the dynamics of the evolutionary -or Swarm Intelligent- process itself on-line to track the progression of the extrema. As described by Angeline [1] evolving a function that describes extrema dynamics is preferable when the dynamics can be modeled accurately off-line. When a single function cannot describe the dynamic accurately enough, an on-line approach using the implicit dynamics of the self- adaptive method is preferable. However, while evolutionary computation methods that evolve mutation variances perform well in static environments, it is not clear that these methods are beneficial when the gradient at each point is constantly in flux as in most dynamic environments [1], apart from significant, well-know and promising attempts. For these reasons, it seems appropriate to keep the suggestion of on-line it with different simultaneously attempting methods, Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 2 computational paradigms such as those derived from Swarm Intelligence which allows for distributed real-time self- organization of solutions while maintaining strong adaptive capabilities. Following this new research path, we propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map [50,49] via collective pheromone laying in the landscape (balancing the exploration/exploitation nature of the search strategy), with a simple evolutionary mechanism that trough a direct reproduction procedure linked to local environment features is able to self-regulate the above exploratory swarm population, speeding it up globally [17]. Our present proposal is fully discussed in section II. A. Approaches Dynamic Optimization (DO) problems, on a more abstract level can be characterized by several situations; this might mean that the optimization function, the problem instance, or some restrictions may change, and thus the optimum to that problem might change as well. If any of these events are to be taken into account in the optimization process, we call the problem dynamic or changing terms are used (both synonymously and often in the literature, also the term non- stationary is used). Since many approaches are possible, Branke and Schmek [8] suggested in 2002, a classification of DO problems, surveying it, while classifying a number of the most widespread techniques that have been published in the literature so far to make evolutionary algorithms (EAs) suitable for changing optimization problems. As pointed by them, one standard approach to deal with these dynamics is to regard each change as the arrival of a new optimization problem that has to be solved from scratch [48]. However, this simple approach is often impractical: solving a problem from scratch without reusing information from the past might be too time consuming, a change might not be identifiable directly, or the solution to the new problem should not differ too much from the solution of the old problem. Thus, as in the on-line tracking process suggested by Angeline [1], Branke [8,9,10] recommended that would be nice to have an optimization algorithm that is capable of continuously adapting the solution to a changing environment, reusing the information gained in the past. Since in nature adaptation is a continuous and continuing process, and EAs have much in common with natural evolution, they seem to be a suitable candidate. However, these type of evolutionary approaches typically converge to an optimum and thereby lose their diversity necessary for efficiently exploring the search space and consequently also their ability to adapt to a change in the environment when such a change occurs [8,10]. The problem here can be stated as seeking an appropriate and difficult balance between two contradictory characters of the search procedure; those between the exploring (ideal for gathering new solutions) and exploiting (making the best use of past solutions) nature of the algorithm. Over the past few years, a number of authors have addressed loss of the problem of convergence and subsequent adaptability in many different ways. According to Branke and Schmeck [8], most of these approaches could be grouped into one of the following three categories established by them: I - React on Changes: The EA is run in standard fashion, but as soon as a change in the environment has been detected, explicit actions are taken to increase diversity and thus facilitating the shift to the new optimum. II - Maintaining Diversity throughout the run: Convergence is avoided all the time and it is hoped that a spread-out population can adapt to changes more easily. III – Memory-based Approaches: The EA is supplied with a memory to recall useful information from past generations, which seems especially useful when the optimum repeatedly returns to previous locations. Techniques such as Hypermutation (Cobb, [13]) or Variable Local Search (VLS) (Vavak, [66,67]) pursue category I, keeping the whole population after a change but increasing population diversity by drastically increasing the mutation rate for some number of generations. VLS on the other hand, increases mutation gradually after a change has been detected [66], where the mutation range itself can be adapted [67]. Another variant with significant improvements in convergence speed and solution quality have been found if the altered (old) individuals are reused (see Bierwirth [5,6], Lin [39], Mattfeld [41], or Reeves et al. [55]). Artificial Neoteny techniques proposed for EAs by Ramos [52] can also be considered among this approach. Neoteny, also know as Paedomorphosis, can be defined in biological terms as the retention by an organism of juvenile or even larval traits into later life. In some species, all morphological development is retarded; the organism is juvenilized but sexually mature. Such shifts of reproductive capability would appear to have adaptive significance to organisms that exhibit it, and the technique is used within EAs by simple re-injecting old artificial DNA which was randomly captured on the first generations. Finally, the A approach ends up with a number of authors suggesting to leave the response to a change in the environment up to the strategy itself, by relying on his self- adaptiveness. This is the case in works by Angeline [1], Bäck [4], Grefenstette [20] and Stephens [60]. Maintaining diversity is another possible approach (II). Grefenstette [21] introduced the method Random Immigrants where in every generation, the population is partly replaced by randomly generated individuals, while Andersen [2] uses genotypic and phenotypic sharing to increase the Genetic track optima Algorithm ability to in slowly changing environments. A very interesting sharing scheme was introduced by Liles and DeJong [38], based on Tag bits. There, tag bits are appended to each genotype, and only individuals with equal tag bits are allowed to mate, which somehow can be regarded as introducing subpopulations of varying size [59]. The neighborhood used for sharing is then the number of individuals with the same tag bit, i.e. individuals with rare tag bits are favored. The approach is able to maintain different subpopulations on different peaks, Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 3 however for a simple environment with two peaks of changing weights. Other techniques include a crowding-like replacement scheme entitled “Worst among Most Similar” by Cedeno [11], by taking in account each individual’s age, modifying the fitness function fmod = g (fold, age) as proposed by Ghosh [18] or finally by using the Thermodynamical Genetic Algorithm (TDGA) proposed by Mori [45] addressing the diversity in the population explicitly controlling a measure entitled “free energy” F. For a minimization problem this term is calculated as F = <E>-TH, where <E> stands for the average population fitness and H is a measure for the diversity in the population. The temperature T is a parameter of the algorithm and reflects the emphasis of diversity (adjusting T is discussed in [46], a problem similar in many respects in what we found to control scheduling temperatures in Simulated Annealing, e.g. [52]). Finally, a very interesting and recent approach was implemented by Huang and Rocha [30,56] outperforming traditional Genetic Algorithms via obtaining greater phenotypic plasticity. They proposed a co- evolutionary agent based model of genotype editing (ABMGE), constructed using several genetic editing characteristics that are gleaned from the RNA editing system as observed in several organisms. The incorporation of editing mechanisms provides a means for artificial agents with genetic descriptions to gain greater phenotypic plasticity. By allowing the family of editors and the genotypes of agents to co-evolve using the re-generation of editors as a control switch for environmental changes, the artificial agents in ABMGE can discover proper editors to facilitate the tracking of the extrema in dynamic environments. Other approaches on this line are fully discussed in [8,9,10] by Branke and Schmeck. Another kind of approach is to supply the algorithm with some sort of memory (approach III) storing good partial solutions in order to reuse them later. This can be advantageous in cases where the environment is changing periodically, and repeated situations occur. However they also could be counterproductive if the environment changes dramatically with open-ended novelty. Memory may be provided in two general ways: implicitly by using redundant representations, or explicitly by introducing an extra memory and formulating strategies to deposit and retrieve solutions later. Generally, the most prominent approach to implicit memory and redundant representation is multiploidy [19] (e.g., Ryan [57], Lewis [37] and Dasgupta [16]). On the other hand, while redundant representations allow the EA to implicitly store some useful information during the run, it is not clear that the algorithm actually uses this memory in an efficient way. As an alternative, the following approaches use an explicit memory in which specific information is stored and reintroduced into the population at later generations. The memory can be used to transfer individuals from one EA run to seed the initial population on another EA after a single change in the environment, as suggested by Louis and Xu [40], or trough the use of a knowledge base to memorize successful individuals in a permanent memory, assuming that the system can measure the environmental conditions (Ramsey and Grefenstette [54]). Other examples include a procedure by Trojanowski [64] where each individual is extended with additional memory for a number of its ancestors, or via a variation of evolutionary elitism within Thermodynamical Genetic Algorithms [44,45,46] – i.e., in every generation the best individual is stored in the memory, and another individual is deleted from the memory depending on its age and contribution to this memory population’s diversity (measured as variance over bit positions). Finally, Branke [9] compared a number of replacement strategies for inserting new individuals into a memory stressing the importance of diversity for memory-based approaches. As an example, Branke found out that a simple replacement of the most similar individual performed almost equivalently to a strategy that replaces the worse of the two individuals in the memory closest to each other. Although the memory/search population approach was quite successful, it soon became obvious that a strategy based on memorization would be too restricted to adapt successfully to a wide range of dynamic environments. As an alternative, Branke and Schmek [8] developed an approach with multiple populations acting as Self-Organizing Scouts (SOS), watching over the changing landscape. The basic idea of SOS is that once a peak has been found (i.e. the population converged to a high-performance region), the population should split, while the “child population” should “watch” over that peak, the remainder should spread out searching for new peaks. Since our current approach is also based in Self-Organization [50,53], trough the use of stigmergic mechanisms as well as Swarm Intelligence [7], there are in fact some similarities as well differences between the Self-Regulated Swarms SRS approach and SOS that will be interesting to discuss later (see section V-B). Finally some recent proposals have been made using a Swarm Intelligent (SI) [7, 33] approach to attempt to solve these dynamic problems. Generally, Swarm Intelligence can be regarded as the property of a system whereby the collective behaviors of (unsophisticated) entities interacting locally with their environment cause coherent functional global patterns to emerge. SI provides a basis with which it is possible to explore collective (or distributed) problem solving without centralized control or the provision of a global model (Stan Franklin, Coordination without Communication, talk at Memphis Univ., USA, 1996) [49]. These entities can be either regarded as bio-inspired ant-like agents in which self- organization occurs trough trail formation via pheromone deposition and evaporation [7,50,17,49,23,53,51] giving rise to the well know Ant Colony Systems (ACS) and Ant Colony Optimization (ACO) algorithms by Dorigo et al. [7], or as physical particles embodied with direction, velocity and intrinsic memory for best global and local position [33,2,3,15,32] know as Particle Swarm Optimization (PSO) algorithms developed by Kennedy, Eberhart et al. [33]. Apart from the SI research branch taken (ACS or PSO), only very recently there are being made efforts for dynamic optimization problems using Swarm Intelligence. Via ACS, Guntsch and Middendorf [23], applied population based ACO algorithms for tracking extrema in dynamic environments, while others like Ramos, Fernandes and Rosa [50,17,49] developed distributed pheromone laying over the dynamic environment itself, in order to track different peaks. They show that the self-organized algorithm is able to cope and Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 4 quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes (different extrema), comparing their results with those from Passino et al. [47] which developed a Bacterial Foraging Optimization Algorithm (BFOA) for distributed optimization and control. Finally also via ACS, Guntsch, Middendorf and Schmeck [22] developed an ACO introducing local variance where needed, and a heuristic repair of solutions. They applied successfully the novel algorithm for the combinatorial dynamic TSP (Travelling Salesman Problem). Meanwhile via the PSO [33] approach, Carlisle and Dozier [2,3], adapted it for dynamic environments. The process consists of causing each particle in the swarm to reset its record of its best position as the environment changes, to avoid making direction and velocity decisions on the basis of outdated information. Thus, the authors explicitly discard memory from the standard PSO, and call it Adaptive PSO. On the other hand, Parrott and Li [15] developed a PSO model for tracking a three-peak multimodal environment. To achieve this, a form of speciation allowing development of parallel subpopulations is used. The model employs a mechanism to encourage simultaneous tracking of multiple peaks by preventing overcrowding at peaks. Others like Janson and Middendorf [32], followed an hierarchical strategy adjusting the PSO accordingly and developing the first hierarchical PSO for dynamic problems. Other authors like Altshuler and Wagner [69], presented a multi-agent system for a dynamic cleaning problem on the area of Swarm Cooperative Robotics. In order to find the minimal cleaning time possible for a given “contaminated” shape, they have designed the system in such a way that all the cleaning agents are controlled by a central unit (referred to as the queen). Upon initialization, the queen is given the complete information regarding the contaminated shape to be cleaned. While the agents are traveling along the grid, the queen is immediately aware of any new information discovered by the agents. The queens orders as to the next desired movements of the agents are also immediately transferred to the agents, which carry them our automatically. B. Dynamism Characterization and Benchmarks Branke and Schmeck [8,10] suggested a number of criteria along which dynamic environments could be categorized as well as tested. Since many other authors on dynamic optimization and control are following them, we will adopt them as well, having in mind different comparison purposes. Four main aspects should be considered. The first two are usually adopted: I – Frequency of change: This criterion establishes how often the environment changes (starting from very rare changes up to continuous change). A parameter uf (update frequency) is introduced. If for instance uf = C, then at every C iterations (or generations, in case of EA’s) the landscape will suffer changes. II – Severity of change: This criterion establishes how strongly the system is changing. From slight changes to completely new situations. The severity parameter S will be defined later. III – Predictability of change: The present aspect gives a notion if there is a pattern or trend in the changes. That is, depending on the problem at hands, it is somehow possible to predict direction, time or, the severity of the next change given the changes encountered so far? IV – Cycle length: This criterion measures how often the optimum returns to previous locations or at least gets close to them. Since these to measure some of it seems difficult characteristics, comparisons between different optimization problems may still be out of reach, but at least the above characteristics can be varied on a single problem such that their qualitative influence on a specific approach can be examined [8]. In our different experiments (section III) we will use criterions of type IV (section III.A), type I (section III.B) and of type II (section III.C), or with combinations with the formers. Moreover, in order to compare the relative abilities of different algorithmic approaches for on-line tracking of dynamic extrema, Angeline [1] suggested a number of dynamical environments created from a single multi-dimensional function, referred to as the base function below. Dynamic environments were then obtained by translating the base function along a number of distinct temporal trajectories (fig. 1). This setup allows complete control of the dynamics and generates simple yet non-trivial dynamic functions with know properties. Tests under this specific benchmark were performed in section III.A. Angeline [1] has made use of a simple convex parabolic function in three dimensions, while we tested our algorithm over two complex multimodal functions, well know in evolutionary computation performance evaluation: the Ackley (fig. 3) and Schaffer F7 functions. The Ackley function was used as our base function for section III.A tests. b) c) Fig. 1. Example dynamics used for the trajectory of the base function over time in this study along with their projection onto the (x,y)-plane (grey); pictures and proposal from Angeline [1]. a) Linear dynamic given by Eq. 1; b) Circular dynamic given by Eq. 2; In c) an example of random dynamic using Gaussian noise given by Eq.3. As described by Angeline, the temporal dynamics applied to the base function involve three distinct parameters: dynamic type, step size and update frequency. Dynamic type identifies one of three distinct parameterized methods for translating the base function. Severity is a parameter used as input to each of the dynamics to determine the amount the base function is displaced from its current position. Finally, update frequency determines the number of iterations (or generations) between Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 5 each movement of the base function. Angeline [1] tested three different dynamic types in his experiments: linear, circular and random. Given a severity of S, the linear dynamic updates the current offset for dimension k, denoted as Δ´ k, as follows (Eq.1): +Δ=Δ´ k k S which simply adds a constant displacement to the offset in each dimension equivalent to the severity parameter’s setting. On the other hand, the circular dynamic is computed as follows (Eq.2): ´ +Δ=Δ k k sin. 3,1 = S k ⎛ ⎜ ⎝ ⎛ cos ⎜ ⎝ t 2 π C t 2 π C ⎞ , ⎟ ⎠ ⎞ , ⎟ ⎠ ´ +Δ=Δ k k S . k = 2 (1) (2) (3) where t is the number of applications of the dynamic thus far. Equation 2 describes a trajectory that translates the base function in a circular path through all three dimensions. The equation is designed to cycle the values of the offset every C applications with the severity parameter determining the radius of the circular path. Finally, for the random dynamic, random noise is added to the offset as follows (Eq. 3): ( )1,0 ´ +Δ=Δ k k NS . where N(0,1) is a Gaussian random variable with mean 0 and variance 1. Here, the severity parameter determines the variance of the noise added to the base function offset. Figure 1 (from [1]) shows an example of a random trajectory generated by this dynamic. In our tests (section III) we have made use of linear and circular dynamics (Eq.1,2) using the Ackley multimodal complex function (fig.3) as our base function. C. Our Proposal Many structures built by social insects are the outcome of a process of self-organization [50,49,51], in which the repeated actions of the insects in the colony interact over time with the changing physical environment to produce a characteristic end state [25]. A major mediating factor is stigmergy [63], the elicitation of specific environment-changing behaviors by the sensory effects of local environment changes produced by previous and past behavior of the whole community. Stigmergy is a class of mechanisms that mediate animal- animal interactions through artifacts or via indirect communication, providing a kind of environmental synergy, information gathered from work in progress, a distributed incremental learning and memory among the society. In fact, the work surface is not only where the constituent units meet each other and interact, as it is precisely where a dynamical cognitive map could be formed, allowing for the embodiment of emergent adaptive memory, cooperative learning and perception [50,49]. Constituent units not only learn from the environment as they can change it over time. Its introduction in 1959 by Pierre-Paul Grassé1 made it possible to explain what had been until then considered paradoxical observations: In an insect society individuals work as if they were alone while their collective activities appear to be coordinated. The stimulation of the workers by the very performances they have achieved is a significant one inducing accurate and adaptable response (check applications in [53,51]). Keeping in mind these characteristics we will present a stigmergic self- regulated model to tackle the collective adaptation of a social swarm for dynamic tracking, based on real ant colony behaviors. II. SELF-REGULATED SWARMS; THE SRS ALGORITHM As mentioned above, the distribution of the pheromone represents the memory of the recent history of the swarm (his social cognitive map), and in a sense it contains information which the individual ants are unable to hold or transmit [50]. There is no direct communication between the organisms but a type of indirect communication through the pheromonal field. In fact, ants are not allowed to have any local memory and the individual’s spatial knowledge is restricted to local information about the whole colony pheromone density. In order to design this behaviour, one simple model was adopted [12], and extended due to specific constraints of the present proposal, in order to deal with 3D dynamic environments. As described by Chialvo and Millonas, the state of an individual ant can be expressed by its position r, and orientation θ. Since the response at a given time is assumed to be independent of the previous history of the individual, it is sufficient to specify a transition probability from one place and orientation (r,θ) to the next (r*,θ*) an instant later. In a previous works by Millonas [42,43], transition rules were derived and generalized from noisy response functions, which in turn were found to reproduce a number of experimental results with real ants. The response function can effectively be translated into a two-parameter transition rule between the cells by use of a pheromone weighting function (Eq.4): W ( ) σ = ⎛ ⎜⎜ ⎝ 1 + 1 β ⎞ σ ⎟⎟ γσ + ⎠ (4) This equation measures the relative probabilities of moving to a cite r (in our context, to a cell in the grid habitat) with pheromone density σ(r). The parameter β is associated with the osmotropotaxic sensitivity, recognised by Wilson [68] as one of two fundamental different types of ant’s sense-data 1 Grassé, P.P.: La reconstruction du nid et les coordinations inter-individuelles chez Bellicositermes natalensis et Cubitermes sp. La théorie de la stigmergie : Essai d’interpretation des termites constructeurs. Insect Sociaux (1959), 6, 41- 83. The phrasing of his introduction to the term stigmergy is worth noting (translated to English in [OK30]): The coordination of tasks and the regulation of constructions do not depend directly on the workers, but on the constructions themselves. The worker does not direct his work, but is guided by it. It is to this special form of stimulation that we give the name Stigmergy (stigma - wound from a pointed object, and ergon - work, product of labor = stimulating product of labor). Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 6 TABLE I HIGH-LEVEL DESCRIPTION OF THE SELF-REGULATED SWARM (SRS) ALGORITHM PROPOSED /* Initialization */ For all ants do Place ant at randomly selected site r e[ant]=1.0 End For /* Main loop */ For t = 1 to tmax do For all ants do /* According to Eqs. 4 and 5 (section II) */ Compute W(σ) and Pik Move to a selected neighboring site not occupied by other ant /* According to Eq. 6 (section II) */ Increase pheromone Pr at site r: Pr= Pr+[η+p(Δ[r]/Δmax)] /* Reproduction procedure (section II - A) */ Compute n, the number of occupied surrounding cells If ant meets ant (i.e., n ≥ 1) then Determine P**(n) Compute reproduction probability P* = P**(n) [Δ(r)/Δmax] If real random [0, 1] < P* then Create one ant with e[ant]=1.0 and place it randomly on one of the free cells surrounding the main parent at site r End If End If End For Evaporate pheromone by K, at all grid sites For all ants do Decrease ant energy: e[ant]=e[ant]- Δe If e[ant] ≤ 0.0 then Kill that ant End If End For Print location of all agents Print pheromone distribution at all sites End For /* Values of parameters used in experiments */ k = 1.3, η = 0.07, β=3.5, γ=0.2, Δe=0.1, p = 1.9, tmax = 100 or 400 time steps. /* Constant values */ P**(0) = P**(8) =0, P**(4) = 1, P**(5) = P**(3) =0.75, P**(6) = P**(2) =0.5, P**(7) = P**(1) = 0.25 /* Useful references */ Check [50], [17], [49], [53] and [12]. processing. Osmotropotaxis, to a kind of related is instantaneous pheromonal gradient following, while the other, klinotaxis, to a sequential method (though only the former will be considered in the present work as in [12]). Also it can be seen as a physiological inverse-noise parameter or gain. In practical terms, this parameter controls the degree of randomness with which each ant follows the gradient of pheromone. On the other hand, 1/γ is the sensory capacity, which describes the fact that each ant’s ability to sense pheromone decreases somewhat at high concentrations. In addition to the former equation, there is a weighting factor w(Δθ), where Δθ is the change in direction at each time step, i.e. measures the magnitude of the difference in orientation. As an additional condition, each individual leaves a constant amount η of pheromone at the cell in which it is located at every time step t. This pheromone decays at each time step at a rate k. Then, the normalised transition probabilities on the lattice to go from P ik = ( ) ( ) W w Δ σ i i ) ( ( ∑ W w / σ Δ j kj ) j (5) (6) cell k to cell i are given by Pik (Eq. 5, [12]), where the notation j/k indicates the sum over all the surrounding cells j which are in the local neighbourhood of k. Δi measures the magnitude of the difference in orientation for the previous direction at time t-1. Since we use a neighbourhood composed of the cell and its eight neighbours, Δi can take the discrete values 0 through 4, and it is sufficient to assign a value wi for each of these changes of direction. Chialvo et al, used the weights of w0 =1 (same direction), w1 =1/2, w2 =1/4, w3 =1/12 and w4 =1/20 (U-turn). In addition coherent results were found for η=0.07 (pheromone deposition rate), k=0.015 (pheromone evaporation rate), β=3.5 (osmotropotaxic sensitivity) and γ=0.2 (inverse of sensory capacity), where the emergence of well defined networks of trails were possible. Except when indicated, these values will remain in the following test framework. As an additional condition, each individual leaves a constant amount T η += p [ ] i Δ maxΔ η of pheromone at the cell in which it is located at every time step t. Simultaneously, the pheromone evaporates at rate k, i.e., the pheromonal field will contain information about past movements of the organisms, but not arbitrarily in the past, since the field forgets its distant history due to evaporation in a time τ ≅ 1/k. As in past works, toroidal boundary conditions are imposed on the lattice to remove, as far as possible any boundary effects (e.g. one ant going out of the grid at the south-west corner, will probably come in at the north-east corner). In order to achieve emergent and autocatalytic mass behaviours around specific extrema locations (e.g., peaks or valleys) on the habitat, instead of a constant pheromone deposition rate η used in [12], a term not constant is included. This upgrade can significantly change the expected ant colony cognitive map (pheromonal field). The strategy follows an idea implemented earlier by Ramos [53], while extending the Chialvo model into digital image habitats, aiming to achieve a collective perception of those images by the end product of swarm interactions. The main differences to the Chialvo work is that ants, now move on a 3D discrete grid, representing the functions which we aim to study (figs. 3,4, section III) instead of a 2D habitat, and the pheromone update takes in account not only the local pheromone distribution as well as some features of the cells around one ant. In here, this additional term should naturally be related with specific characteristics of cells around one ant, like their altitude (z value or function value at coordinates x,y), having in mind our present aim. So, our pheromone deposition rate T, for a specific ant, at one specific cell i (at time t), should change to a dynamic value (p is a constant = 1.93) expressed by equation 6. In this equation, Δmax = zmax – zmin , being zmax the maximum altitude found by Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 7 the colony so far on the function habitat, and zmin the lowest altitude. The other term Δ[i] is equivalent to (if our aim is to minimize any given landscape): Δ[i] = zi – zmax , being zi the current altitude of one ant at cell i. If on the contrary, our aim is to maximize any given dynamic landscape, then we should instead use Δ[i] = zi – zmin . Finally, notice that if our landscape is completely flat, results expected by this extended model will be equal to those found by Chialvo and Millonas in [7], since Δ[i]/Δmax equals to zero. In this case, this is equivalent to say that only the swarm pheromonal field is affecting each ant choices, and not the environment - i.e. the expected network of trails depends largely on the initial random position of the colony, and in trail clusters formed in the initial configurations of pheromone. On the other hand, if this environmental term is added a stable and emergent configuration will appear which is largely independent on the initial conditions of the colony and becomes more and more dependent on the nature of the current studied dynamic landscape itself. As specified earlier, the environment plays an active role, in conjunction with continuous positive and negative feedbacks provided by the colony and their pheromone, in order to achieve a stable emergent pattern, societal memory and distributed learning by the community [50,53]. A. Reproduction procedure In addition to the above advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map [50,49] via collective pheromone laying in the dynamic landscape, we hybridized it with a simple evolutionary mechanism that trough a direct reproduction procedure linked to some local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. The full SRS strategy adapted for dynamic extrema tracking then finally consists of using Swarms with Varying Population Size (SVPS) proposed and analyzed earlier by Fernandes, Ramos and Rosa [17]. This characteristic is achieved by allowing ants to reproduce and die through their evolution in the landscapes. To be effective, the process of variation must incorporate some kind of environmental pressure towards successful behavior, that is, ants that reach peaks/valleys must have some kind of reward, by staying alive for more generations – generating more offspring - or by simply having a higher probability of generating offspring at each time step. In addition, the population density in the area surrounding the parents must be taken into account during a reproduction event. When one ant is created (during initialization or by the reproduction process) a fixed energy value is assigned to it (e[ant] = 1). Every time step, the ant’s energy is decreased by a constant amount of Δe (usually 0.1). The ant’s probability of survival after a time step is proportional to its energy during that same iteration, which means that after ten generations (with Δe = 0.1), this and other ants will inevitably die (e[ant] = 0). Within these settings one ant that is, for instance, 7 iterations old, has a probability of 0.3 to survive through the current time step. Meanwhile, for the reproduction process, we assume the following heuristic: an ant triggers a (main parent) reproduction procedure if it finds at least another ant (Moore occupying one of its 8 surrounding cells neighborhood is adopted). The probability P* (Eq.7) of generating offspring – one child for each reproduction event – is computed in two steps (see table I). * P = ⎡ ( ) nP . ** ⎢ ⎣ Δ Δ ( ) r max ⎤ ⎥ ⎦ (7) First, the surrounding area is inspected in order to see if it is too crowded. Being n the number of occupied cells around this ant, the probability to reproduce P** is set to the values shown in table II. Notice that: 1) an ant completely surrounded by other ants, or isolated (n=8, n=0) do not reproduce; 2) the maximum probability is achieved when the area that ant is half occupied (n=4). After the probability P** TABLE II REPRODUCTION PROBABILITY P** ACCORDING TO N MOORE NEIGHBORS n Moore neighbors Reproduction probability P**(n) n = 0 or n = 8 0.00 n = 4 1.00 n = 5 or n = 3 0.75 n = 6 or n = 2 0.50 n = 7 or n = 1 0.25 is set to one of the previous values, the final probability is computed according to Eq.7, with the help of Δ(r) and Δmax (similarly as in Eq. 6). This operation guarantees that any ant reaching the higher/lower peaks/valleys has more chance to produce offspring (notice that one ant in the higher/lower site has P**=1 if n=4 and will reproduce for certain). If this ant passes the reproduction test (table I), then a new agent is created occupying one of his vacant cells around the main parent. None infant ants are allowed to be allocated in places where other ants are. Finally notice that when n=0 or n=8 no reproduction takes place and that higher/lower (maximization/ minimization) ants have more chance to reproduce. B. Shifting the Extrema - Past work results One of the features of Swarms with Varying Population Size SVPS discussed in [17] was the ability to adapt to sudden changes in the roughness of the landscape. These changes were simulated by abruptly replacing one test function by another after the swarm reached the desired regions of the landscape. Another way of simulating changes in the environment consists on changing the task from minimization to maximization (or vice-versa). The swarm performance was convincing and reinforced the idea that the system is highly adaptable and flexible. Further tests using SVPS concluded that varying population size increases the capability of the swarm to react to changing landscapes [17]. Figure 2 shows SVPS trying to find the lower values of Passino F1 [47] until t=250, and then searching for the higher values. Comparisons with fixed sized swarms and Bacterial Foraging Optimization Algorithms (BFOA, [47]) were made in [49,50]. a) 3D view b) 2D view Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 8 t = 280 t = 260 t = 250 t = 10 t = 500 t = 320 t = 300 Fig. 2. SVPS evolving on a complex multimodal function seen in a-b) [17,47,49]: the self-organized swarm emerges a characteristic flocking migration behavior between one deep valley (south region) and one peak (north region), surpassing in intermediate steps (Mickey Mouse shape at t = 300) some local optima. Over each foraging step, the population self- regulates. From t=0 to t=250 the swarm is induced to search the lowest valleys of the landscape. After t=250 the task changes (target peak moves to the north of the territory) and the swarm must find the higher values of the function. Check for detailed results and extended analysis in [17]. III. DYNAMIC ENVIRONMENT TESTBED AND RESULTS In order to compare the relative behavior of our present Self-Regulated Swarms (SRS) approach for on-line tracking of dynamic extrema, we followed diverse kind of test beds, reflecting different dynamism characterization and benchmarks described earlier in section I.B, namely according to: dynamic type (section III.A), severity and speed tests (section III.B), as well as the application of the current self- organized algorithm to dynamic optimal control problems (section IV). A. Dynamic Type Tests Over this specific test bed, dynamic environments were obtained by translating the Ackley complex multimodal base function (fig.3) along a number of distinct linear and circular temporal trajectories (fig.1). This setup allows complete control of the dynamics and generates simple yet non-trivial dynamic functions with know properties. The Ackley function [14,28] (Eq.8) is considered as a minimization problem. Originally this problem was defined for two dimensions, but the problem has been generalized to N dimensions [62]. Formally, this problem can be described as finding a string xi={x1, x2, …,xN}, under the domain xi → (-32.768, 32.768), that minimizes equation 8. In order to define an instance of this function we need to provide the dimension of the problem (in here, n=2). The optimum solution of the problem is the vector u = (0,...,0) with F(u)=0. We will apply it to several swarm dynamic tests extending past analysis [50,17]. ⎛ ⎞ .12.0 n ⎛ ⎞ → ) ( ∑ ⎜ ⎟ 2 xF −=⎟ −⎟ ⎜ ⎜ n ⎝ ⎠ ⎝ ⎠ i 1 = 1 ( ( .2 π n (8) exp.20 exp cos 20 a i + e x i x i − a i ⎛ ⎜ ⎝ n ∑ i 1 = − ⎞ ) ) +⎟ ⎠ For our specific tests we have made use of the domain x,y → [-2.0,2.0],[-2.0,2.0], containing 16 valleys. In order to change it over time, we have defined a target path line over our domain, from northwest (-2,2) to southeast (2,-2). Figure 3, shows three typical minimal target points along this line, A, B and C: A(-1.5;1.0), B(0.0;0.0) and C(1.0;-1.5). To introduce the dynamics into the problem, the base function minimal target point starts to move from B, moving continuously to southeast (passing C). Arriving at the southeast corner, the target point then moves to the northwest corner (since our habitat is toroidal), then passing A, and B again, over and over − again has times passes, for several specific test speeds. Note that in equation 8, ai defines the point coordinates where the Ackley function has his minimal target point, thus introducing a more severe change than translation itself, since around that minimal point all the function changes differently depending on where this minimal point precisely is. This collection of dynamics when used with the complex multimodal Ackley base zmin=0 at (x,y)=-1.5,1 (normal view) zmin=0 at (x,y)=0,0 (normal view) zmin=0 at (x,y)= 1,-1.5 (normal view) zmin=0 at (x,y)=-1.5,1 (from above) zmin=0 at (x,y)=0,0 (from above) zmin=0 at (x,y)=1,-1.5 (from above) Fig. 3. The Ackley complex multimodal function seen from different perspectives and with respective global minimum zmin=0 at A(-1.5;1.0), B(0.0;0.0) and C(1.0;-1.5), over the domain x,y → [-2.0,2.0],[-2.0,2.0] containing 16 valleys. function has a number of nice features for testing the performance of self-adaptive algorithmic optimization. The linear dynamic will always move away from the position that the population is converging towards with the speed parameter determining how quickly it moves away. The SRS algorithm was then tested for different test speeds: v=0 (static environment), v=0.5, v=1, v=1.5, v=2, v=3, v=5 and v=10. In order to have an idea of the severity of this parameter, for instance at v=2, the target valley is traveling to southeast 2 habitat cells at each t time step starting in the B(0.0;0.0) mid- point, while each SRS ant can only move one cell for each time step t. SRS parameter values were the usual ones as indicated in table 1, section II. Figure 4 shows SRS agents space-time distribution (a-c) and their pheromone distribution (b-d) for v=0 (a-b) (the target valley is constantly at B=(0;0)) and for v=0.5 (c-d) (the valley is traveling to southeast one cell at each two time steps the B mid-point), for several starting at time steps t=1,5,10,15,20, 30,50,70 and 100. In (b-d) black pixels show where each ant agent is placed in the environment at a precise time step, starting initially by a random distribution at t=0. On the other hand, pheromone distribution represents the societal memory and the recent history of the swarm (considered as his emergent social cognitive map [12,49,50]), and in a sense it contains distributed information embedded within the dynamic environment itself. This pheromone distribution is represented in grey levels, i.e., points in space with higher levels of pheromone are represented by darker pixels. The mapping from the amount of pheromone at each cell and its correspondent gray level is linear and coded in 8 bit images (i.e., 256 gray levels). Figures 5, 6 and 7 shows SRS results for speeds v=1, v=1.5, v=2, v=3, v=5 and v=10. These tests and respective figures show that for low values of dynamic environment speed (v=0, v=0.5, v=1 and v=2), the swarm can consistently track the target extrema while he moves through the entire space. This is perfectly visible for speeds v=0 and v=0.5 (fig.4) where the target remains moving to the southeast Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 9 corner over his 100 time steps run. As the target moves the swarm as a whole keeps following and converging to it, simultaneously self-regulating his population, i.e., downsizing it. At the same time, the whole swarm emerges a strong pheromone concentration at the right location of the target, increasing this concentration as times passes. For v=1 and v=1.5 however, due to speed, the target passes once at the southeast corner and reappears at t=50, 40 respectively for v=1, 1.5, at the northwest corner. In here, the swarm as a whole evolves a different global behavior. For v=1 and t=50 (fig.5), the swarm quickly adopts a short path (moving northeast) instead of moving ahead to northwest (where the target is), taking profit of the toroidal habitat. The same is true for v=1.5 and for t=40, whereas in here the swarm splits into two different clouds or clusters, one with the above short path strategy, while the other moving directly to it, following backwards the linear path (NW → SE) of the target dynamic. b) v=0 c) v=0.5 d) v=0.5 a) v=0 Fig. 4. SRS agents space-time distribution (a-c) and pheromone distribution (b-d) for v=0 (a-b) (the valley is constantly at B=[0.0;0.0]) and for v=0.5 (c- d) (the valley is traveling to southeast one cell for each two t time step starting at the B mid-point), for several time steps t = 1,5,10,15,20,30,50,70 and 100. When after some time steps the target is captured again the 2 clouds of agents congregate in one big cluster, and the chase continues with good tracking results. Somehow this emergent short path strategy is followed by the swarm, splitting in different clouds when needed for test speeds equal to v=2 or above that value (figs. 6,7). For dramatic values of speed however (v=5), the swarm is constantly and properly following the target but due to the value of severe speed, he is loosing the run. In order to overcame this lack of control the swarm itself self-regulates its population, and for dramatic speed tests of v=10 (fig.7c) or above, he explodes its population, trying to collect much spatial information as possible. Figure 8 can help us understand more profoundly the swarm behavior facing these different speeds. Fig. 8 (1st row) shows the population size as time passes. d) v=1.5 a) v=1 b) v=1 Fig. 5. SRS agents space-time distribution (a-c) and pheromone distribution (b-d) for v=1 (a-b) and for v=1.5 (c-d) for several time steps. In (a-b) t = 1, 5, 10, 15, 20, 30, 50, 70 and 100. In (c-d) t = 1, 5, 10, 15, 20, 30, 40, 50, 60, 70, 80, 90 and 100. Every test started with a number of ant-like agents equal to ⅓ of the habitat size (100 x 100 cells) as in [12,53]. We see that generally for speed tests up to v=5, the population more or less c) v=1.5 a) v=2 d) v=3 c) v=3 b) v=2 Fig. 6. SRS agents space-time distribution (a-c) and pheromone distribution (b-d) for v=2 (a-b) and for v=3 (c-d), for several time steps t = 1,5,10,15, 20,30,40,50,60,70,80,90 and 100. Note for e.g. v=2, that since the habitat is toroidal, after leaving the southeast corner at t=20 (columns a-b, 5th row) and at t=70 (columns a-b, 10th row) the target valley reappears at the northwest corner at t=30 (a-b, 6th row) and at t=80 (a-b, 8th row). a) v=5 d) v=10 c) v=10 b) v=5 Fig. 7. SRS agents space-time distribution (a-c) and pheromone distribution (b-d) for v=5 (a-b) and for v=10 (c-d), for several time steps t = 1,5,10,15, 20,30,40,50,60,70,80,90 and 100. For dramatic speed tests of v=10 (fig.7c) or above, the swarm looses control and explodes its population, trying to collect much spatial information as possible. Fig. 8. Population size versus time (1st row) and mean altitude (averaged fitness) versus time (2nd row), for several runs under different environmental speeds: v=0, 0.5, 1, 1.5, 2, 3, 5 and v=10. Check the space-time distribution of these ant agents and their pheromone allocation (social cognitive map or societal memory [12,49,50]) in figs. 4-5-6-7. Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 10 Fig. 9. Mean Altitude (averaged fitness) versus time for several runs. For comparison purposes, we plotted bold curves for static Ackley functions with respective global minimum at A(-1.5;1.0), B(0.0;0.0) and C(1.0;-1.5). The other curves are for different landscape change updated frequencies: uf=50, 25, 10 and 5. self-regulates under a common value, indicating a possible good tracking behavior accompanied by agent’s specialization (exploitation nature). On the other hand, figure 8 (2nd row) shows what happens to mean agent’s altitude over the Ackley landscape (F value on Eq. 8) as time go by. For speed tests up to v=2, the swarm can without difficulty track the extrema. For speed tests above that value, the behavior is more oscillatory, since at the toroidal borders the function assumes - due to simple and normal constraints in our representation - abrupt values from one border cell to their neighbors on “the other side”. While the extrema is reasonably well tracked, ant- like agents very near the minimal extrema (near borders) could easily have high altitude “on the other side”. Thus, even if the extrema is well tracked, mean altitude values achieve a visible increment. In addition, the swarm reaction speeds are undeniably very fast and the mean altitude quickly decreases often to values equal of those obtained with test speeds less or equal than v=2. This is particularly evident if we conduct a different and more dramatic test. In figure 9 we have updated the changes in the environment for different updated frequencies uf. For uf=5 (worst case) the base function minimal target point changes abruptly from B to C, from C to A, and from A to B, etc, at every 5 time steps. We see that even for this dramatic uf values, the swarm as a whole can still obtain performances, which in some cases outperform those obtained for static environments (bold curves). Reactions speeds are also quite high, generally in the range order of four to nine time steps. The SRS performance can also be measured and analyzed taking in account the best minimum value found among all agents at each time step (zero is equivalent to full performance or the perfect capture of the right extrema). In figure 10 we have plotted these values for different test speeds. As expected, as speed increases the swarm passes more time away from the right extrema or close to it. The swarm however is able to capture the right extrema in perfection, for the most part of the run-time (the oscillatory behavior is again mainly due to our toroidal borders). From these results we can obtain the SRS success rate (fig. 11), defined as the number of times the colony as a whole was able not only to track, but to capture the right target over a run of 100 time steps, for each test speed. Remarkably the swarm is generally able to capture the right perfect extrema around 65% of the time, up to environmental speeds of 10 times the speed of a single ant- like agent or even for speeds greater than those values. Finally, very similar results were found for circular dynamics as introduced on section I.B. Random dynamics were not tested. B. Speed Tests and Severity As discussed earlier in section I.B, Angeline [1] as well as Bäck [61,62], Branke, Schmeck [8] and others, studied not only how adaptive algorithms behave in drastic changing environments (as in the preceding subsection), but also on how the degree of these changes affect different approaches. v = 0.0 v = 0.5 v = 1.0 v = 1.5 v = 2.0 v = 3.0 v = 5.0 v = 10.0 Fig. 10. Best minimum value found by SRS among all agents at each time step (zero is equivalent to full performance or the perfect capture of the right extrema). Plots are for different test speeds. Fig.11. Averaged success rate (10 runs for each test speed). The success rate indicates the number of times the colony as a whole was able to track the right target over a run of 100 time steps, at each speed. δ=0 (e.g. s=0.1,T=0 or s=1,T=0) δ=0.1 (e.g. s=0.1,T=1) δ=0.3 (e.g. s=0.1,T=3) δ=0.5 (e.g. s=0.1,T=5) δ=0.6 (e.g. s=0.1,T=6) δ=0.7 (e.g. s=0.1,T=7) Fig. 12. Sketches from the Schaffer F7 complex multimodal function seen for different values of T related to the severity tests (here, s=0.1). The question is important, since can help us understand on how strongly the system changes are and how severe this change is going to constrain the search nature of an algorithm. For these types of tests as well as for comparison purposes we have decided to implement a test function used recently by Huang and Rocha [56,30,29] with a Co-Evolutionary agent- based model of Genotype Editing (ABMGE). This testbed is a dynamic version of the modified Schaffer’s F7 function studied in [29]. Several sketches of this multimodal function for different parametric values (different time) are illustrated in fig. 12. Being s instances in representing a parameter to set the severity and Xi = xi + δ(t), with -1 ≤ xi ≤ 1 for i = 1,2, a possible test problem [30] can be described by Equation 9: ⎛ → Xf ⎜ ⎝ ⎞ =⎟ ⎠ 5.2 − ( XX 2 + 1 ) 25.02 2 2 sin ⎡ ⎢⎣ ⎛ ⎜ ⎝ ( .50 XX 2 + 1 ) 1.02 2 ⎞ +⎟ ⎠ ⎤ 1 ⎥⎦ (9) In here, X and Y axis represent the index of the sample points in parameters x1 and x2 that are used to compute f(x), which is then represented on z axis, being our aim to maximize it. The example uses linear dynamics with severity s: Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 11 ( ) 0 δ ( ) T δ = = ,0 ( T δ ) 1 +− s (10) Fig. 13. Best-so-far performance of a standard GA and the co-evolutionary ABMGE proposed by Rocha and Huang [56] on the linear dynamic Schaffer F7 function with s=0.1 and uf=50, achieved by Huang and Rocha in [30]. Fig. 14. Best-so-far performance (best maximum found among all agents at each iteration) of the self-regulated swarm SRS approach against different severity values s=0.1, s=0.2, s=0.3, s=0.5, s=1.0, and s=1.5 (uf=50). Fig. 15. SRS swarm population size at each iteration, for tests in figure 14. As explained in [30], note that T is used as index for the environmental state; whenever the environment changes (e.g., every 50 generations in [30]), T is increased by 1. With these settings, f(x) has an optimal value of 2.5 among all ranges of s, here tested (this happens for s=0.1). This equation (10) will be used for the dynamic test function studied in the next section (IV), as well. In here we tested the SRS algorithm against severity values of s=0.1, s=0.2, s=0.3, s=0.5, s=1.0, and s=1.5 (for a constant updated frequency, uf = 50), as well as for different updated frequency’s uf = 50, 25, 10 and 5 (worst dramatic case), for a constant severity of s=1. SRS parameter values were the usual ones as indicated in table 1, section II. Figure 13 displays the results achieved by Huang [30]; averaged best-so-far performance for the Schaffer’s F7 (Eq. 9) dynamic problem, with traditional genetic algorithms as well as with the co-evolutionary RNA editing model (ABMGE) [56], for a single test with s=0.1 and uf=50. As outlined by the authors, these results are encouraging since the co- evolutionary ABMGE model consistently outperforms the traditional GA in tracking the extrema. Meanwhile, figure 14 displays the results achieved by SRS against not only s=0.1 as well as for other values of severity s (all with uf=50). We see that the self-regulated swarm is not only able to track perfectly the correct extrema, nearly at all iterations for s=0.1, as achieves similar results for increasing values of severity. Please note that when s increases, equation 10 returns a different domain for our test dynamic function (different sample points for different T), thus the right respective extrema have optimal values less and obviously different than those present for s=0.1 (z=2.5). Meanwhile, figure 15 displays the SRS population size over the same tests. Since generally, the optimal peak form is the same (due to translation), for different severities (which did not happen in section III.A tests), we now see SRS self-regulating its population size similarly for different test runs (SRS tend to converge his population to values equal of those optimal and near optimal areas; circular concentric regions in fig. 12). As usual, SRS tends also to use more exploratory resources as severity increases. Finally, we tested SRS against different updated frequencies. Respective results of performance and population size can be seen in figures 16 and 17. We see that even for the worst case scenario (uf=5 and s=1), SRS swarms are able to track the correct extrema in the majority of the test run-time. Naturally, there are oscillatory behaviors when the frequency updates, but again the swarm reaction speed is quite fast: in the order of ten to fifteen time-steps. As usual, at these kind of critical periods (environmental phase transitions) the swarm explodes his population (fig. 17), in order to overcome the abrupt changes in the landscape, using intelligently more resources to explore the novel sudden habitat. When again the extrema is correctly tracked after ten to fifteen time-steps, SRS self- regulates the number of their agents, downsizing it. Indeed, after the initial shock the resource economy is now so dominant and wise, that for certain cases the population decreases about nine times their earlier maximum size, settling down only at the correct peak. Fig. 16. Best-so-far performance (best maximum found among all agents at each iteration) of the self-regulated swarm SRS approach against different updated frequencies uf=50, 25, 10 and 5 (s=1). Fig. 17. SRS swarm population size at each iteration, for tests in figure 16. IV. DYNAMIC OPTIMAL CONTROL AND PROBLEM SOLVING BY EMERGENCE Optimal Control Theory [34,70] aims to determine the control signals that will cause a process to satisfy the physical constraints and at the same time minimize (or maximize) some performance criterion. Practically, this kind of nonlinear and multiple local optimal problems (generally) appear in all engineering and science fields, and have been well studied from both theoretical and computational perspectives [30]. Once more, for comparison purposes we adopt an earlier artificial optimal control problem designed in [29], further studied and reported in [30]. The constraints of the artificial optimal control problem are: ( ( ) tzd 2 dt 2 sin = ( ) tz sin + ( ) ut . 2 + 1 ( tz ,2 ′ = + ( ) tdz ( ) ) tz . dt ( ) ut cos . sin 2 + 2 [ ]1,0 ) t ,2 = ∈ 0 o cos ( ) t . sin ( ) uut . . 1 , 2 ( ( ) ) ( ) 3 tz tz . = (11) δ=4 (e.g. s=1,T=4) → region E in δ=0 (e.g. s=1,T=0 or s=0.1,T=0) → region A in fig.12. fig.12. δ=6 (e.g. s=1,T=6) → region G in δ=2 (e.g. s=1,T=2) → region C in fig.12. fig.12. δ=7 (e.g. s=1,T=7) → region H in δ=3 (e.g. s=1,T=3) → region D in fig.12. fig.12. Fig. 18. Sketch of the dynamic optimal control problem. Please note that the vertical z(tf)2 scale has changed for sketches T=6,7 since the highest peak for T=6 has now values slightly above 300, and slightly above 650 for T=7. An animated GIF can be found in [26]. where Ui = ui + δ(t), with -5 ≤ ui ≤ 5 for i = 1,2. As in [30], two examples are studied in this subsection that use linear dynamics with severity s=0.1 and s=1, according to equation 10 in the previous subsection, respectively. The goal is to Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 12 maximize z(tf)2 by searching for two control variables, u1 and u2 (-5 ≤ u1, u2 ≤ 5). Sketches of this dynamic functions for δ=0, 2, 3, 4, 6 and 7 are respectively illustrated in figure 18. X and Y represent the index of sample points in parameters u1 and u2, that are used to compute z(tf)2 , which is then plotted on the Z-axis. In order to compute z(tf)2 , the 2nd order differential equation (DE) in (11) must be converted into an equivalent system of two 1st order ordinary differential equations. The standard optimal control problem should now be represented by max J(u1, u2) = z(tf)2 , with tf = 1, z(t0)=2, y(t0)=2, dz(t)/dt = y(t), and dy(t)/dt given by Eq. 11. In order to numerically solve it for the different range values of δ (see Eq. 10), we have made use of a MATLAB version, working in reverse communication, of the Ordinary Differential Equation (ODE) solver DOPRI853 developed and coded in FORTRAN by Hairer et al. [24]. As in [30] we have completed tests for 400 iterations, with s=0.1 and s=1. Every 50 generations (uf=50), T (Eq. 10) is increased by 1. c) s=1.0 d) s=1.0 a) s=0.1 b) s=0.1 Fig. 19. SRS agents space-time distribution (a-c) and pheromone distribution (b-d), with uf=50, for s = 0.1 (a-b) and for s = 1 (c-d). Maximal regions travel in waves from southeast to northwest. Figures are for several time steps t = 1, 25, 75, 100, 125, 150, 200, 250, 300, 350,375,400. An animated GIF can be found in [27]. The SRS self-regulated swarm space-time agent distribution and respective pheromone distribution are displayed in figure 19. We have used SRS values of Δe=0.01 (remaining parameter values were the usual ones as indicated in table 1, section II). Figures 20 and 22, respectively show traditional GA and ABMGE results for s=0.1 and 1, achieved by Huang and Rocha [30,56]. They show that RNA editors [56], provide adaptive advantage for the ABMGE approach in tracking the extrema, while comparing it with traditional GAs. Fig. 20. Best-so-far performance of a standard GA and the co-evolutionary ABMGE proposed by Rocha and Huang [56] on the dynamic optimal control function (11) with s=0.1 and uf=50, achieved by Huang and Rocha in [30]. Fig. 21. Best-so-far performance (best maximum found among all agents for each iteration) of the self-regulated swarm SRS approach on the dynamic optimal control function (11) with s=0.1 and uf=50. On the other hand, figures 21 and 23, respectively show SRS results for s=0.1 and 1, achieved by our self-regulated swarm, clearly outperforming not only traditional GAs as the ABMGE model when facing dynamic environments. An exception however, should be made for t → [160,200] over the s=0.1 severity test, were SRS population exploded, due to sudden upcoming novel peak values over the domain. Figure 24 shows SRS population size as time passes, for the s=0.1 and s=1 tests. Generally, the standard GA and ABMGE does not have time, within 50 generations to exploit better peaks. As we can see Fig. 22. Best-so-far performance of a standard GA and the co-evolutionary ABMGE proposed by Rocha and Huang [56] on the dynamic optimal control function (11) with s=1 and uf=50, achieved by Huang and Rocha in [30]. Fig. 23. Best-so-far performance (best maximum found among all agents for each iteration) of the self-regulated swarm SRS approach on the dynamic optimal control function (11) with s=1 and uf=50. Regions A,B, …, H correspond to regions in figure 18. Fig. 24. Population size as time passes, of the self-regulated swarm SRS approach on the dynamic optimal control function (11) with s=0.1 and s=1 (uf=50). from these pictures see the SRS reaction speed is generally higher, maintaining good results for different time-steps. V. DISCUSSION A. Emergence of a Societal Memory and Intelligent Path Planning via Stigmergy As used in our Self-Regulated Swarms algorithm (SRS), stigmergy as a coordination mechanism is characterised by a lack of planning using implicit undirected communication between entities, a fact that makes it extremely flexible and robust for the exploration of large medium. The main idea relies on a form of asynchronous interaction and information interchange between entities mediated by an “active” environment. What characterizes stigmergy from other means of communication is, (1) the physical nature of the information released by the communicating insects, which corresponds to a modification of physical environmental states visited by the insects, and (2) the local nature of the released information, which can only be accessed by insects that visit the state in which it was released (or some neighbourhood of that state). Agents engage on what is known as a perception-action loop [36]. Actions in the environment can influence agent’s sensors, creating a loop. Relevant information flows from the environment via sensors to actuators, thus connecting them. The perception-action loop is important for understanding of adapted agents and to capture certain phenomena, like imprinting information onto the environment, offloading and later reacquisition of information. If we view sensors as capturing information and agent actuators as being capable of imprinting information on the dynamic environment, we can Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 13 then treat agents as creating, maintaining and using various information flows, both internal and external. The view may be quite useful since there are strong indications that biological agents are partly driven by the necessity of acquiring, exchanging and also concealing information [36]. One of the possibilities is uncovering hidden information, which was demonstrated by Kirsh and Maglio [35] using the perception-action loop. In this work [35], advanced Tetris game players are shown to quickly rotate a falling block while it still is not visible completely. This active modification of the environment allows the players to discover the shape of the block before it actually becomes completely visible on the screen. Other possibility is offloading of information into the environment. This can be illustrated by the fact that we often write notes or reminders, which we then later look at to reacquire some information. A good account of such information flow between several people is given in the analysis of how members of an airliner crew indirectly communicate using cockpit controls as a medium [31]. For example, long before landing one of the pilots calculates proper flap settings for various speeds and then based on the results sets special markers on the airspeed indicator. Later, during the landing phase, the markers allow the crew to quickly and reliably find out what flap settings to use for the momentary speed. In a wider context, indirect communication via the environment is of high importance in distributed Fig. 25. The curve shows the averaged agent’s y spatial coordinate as time passes, for the test realized in figure 2 (section II B) [17]. After t=250, the swarm keeps moving north, emerging an intelligent path planning and showing a strong behavioral phase transition. Grey curves show upper and lower bounds for the entire population, at each time step. is possible, since environmental systems. Flexibility perturbations are directly connected to ant’s behaviour: when the environment changes because of an external perturbation, the insects respond appropriately to that perturbation, as if it were a modification of the environment caused by the colonies activities. In other words, the colony can collectively respond to the perturbation with individuals exhibiting the same behaviour. When it comes to artificial agents, this type of flexibility is priceless: it means that agents can respond to a perturbation without being reprogrammed to deal with that particular instability. Over our dynamic tracking context, this means the possibility of achieving highly adaptive responses. Ants change the perceived environment of other ants (their cognitive map, according to Chialvo and Millonas [12,42,43]), and in every example, the environment serves as medium of communication. The problem in itself (dynamic environments) is implicitly used as a form of communication between agents trying to solve the problem. The environment is thus used as a global meta external memory, which is changing over time. This implicit use of the environment as memory allows ants to produce certain behaviour as a consequence of the effects produced in the local environment by previous behaviour. This meta global memory can be useful in cases where, for instance, a extrema reappears at a previous location or near from it, or when there is a necessity to maintain diversity. In the former case this environmental distributed implicit memory could recall that location and instantaneously move the population to the new optimum. As was pointed by Branke and Schmeck [8], it might also guide system’s evolution to promising areas after a re-initialization (if adopted). But while the memory might allow exploitation of knowledge gained in the past, it might as well mislead evolution and prevent it from exploring new regions and discovering of new extrema [8]. Nevertheless, we believe that the positive feedback (allocation of pheromone) / negative feedback (evaporation) based stigmergic-reproductive highly adaptive approach implement on our proposal helps reducing that risk. For instance, an incoming new and bigger peak to the environment, even if initially yet not recognized, may contribute to higher altitude on agents near by that region peak, thus triggering a major evaporation rate on other regions, and pressuring those agents to leave that old region or to die from it. On the other hand, SRS does not use explicit representation of goals, and the dynamics of group behaviour are emergent and self-organizing, allowing for the appearance of strong phase transitions in behaviour (fig. 25). Distributed cognition and intelligent path planning is one of these interesting behaviours. A good illustration of this behaviour (among others available from different tests in sections III and IV) can be accessed from a previous test [17] (section II-B). In here, swarms with varying population size were submitted to a the function. Simulating changes test particular in environment consisted on changing the task from minimization (t<250) to maximization (t>250). We see that swarm performance was convincing and reinforced the idea that the system is highly adaptable and flexible. Moreover we see the appearance of an emergent intelligent path planning. After minimization is completed (t<250), for t>250 swarms move from local optima to local optima peaks, avoiding completely valleys on their path. First the swarm divides into two exploratory clusters of agents, one taking a northeast direction and then dying out due to inappropriate local conditions, while the other moves first to northwest, taking advantage of some local peaks and then moving to northeast, from an intermediate phase to the last final optimum peak. B. Self-Regulated Swarms (SRS) and SOS As we have seen on the introductory sessions, many authors have tried to implement algorithmic solutions via the introduction of memory. Memory may be provided in two general ways: implicitly by using redundant or emergent representations (as in our SRS case), or explicitly by introducing an extra memory and formulating strategies to deposit and retrieve solutions later. In [9], Branke have compared a number of ways to organize an explicit memory (over a search population approach), and examined the usefulness of memory in different environments. As a result, he concluded that explicit memory is only useful when the environment repeatedly returns to a small set of previously Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 14 experienced solutions. As they advance in [8], although the memory / search population approach was quite successful, it soon became obvious that a strategy based on (explicit) memorization would be too restricted to adapt successfully to a wide range of experiments. As an alternative, Branke and Schmeck [8] developed more recently an approach with multiple populations acting as Self- Organizing Scouts (SOS), watching over the changing landscape. The novel idea is not only interesting as there are (SRS) to our Self-Regulated-Swarm similarities some interesting to point out, and from which future Self- Organizing approaches could ideally be designed. The basic idea of SOS is that once a peak has been found (i.e. the population converged to a high-performance region), the population should split: a small fraction, called the “child population” should “watch” over that peak, while the remainder of the population (“base population”) should spread out and continue searching for new peaks. When a watched peak moves, the child population may follow it through space, and even request reinforcement. Since the population size is limited, unpromising peaks may be abandoned. To answer questions like, how to determine peaks that justify a population split-off, when should sub-populations ask for request, how many individuals should stay at each peak, or when should a peak be abandoned, Branke and Schmeck borrowed some ideas from the Forking Genetic Algorithm (fGA) as proposed by Tsutui et al. [65]. From these global SOS features, we can already detect some prominent similarities with SRS, at the level of our main objectives (reinforcement, division of labor, the number of individuals at each prominent peak, removal of individual with low fitness, etc). However, there are many differences on how these goals are achieved. Even if both algorithms rely on principles of Self-Organization, Self-Regulated Swarms (SRS) achieve these goals mainly by emergence, and several decisions, like reinforcement of a particular region, the number of individuals at each peak, division of labor (population split –off) and individual removal from the global system, are completely done via implicit mechanisms, through pheromone local allocation and global evaporation (distributed cognitive map [12,50,49]), as well as on the reproductive capabilities of each foraging agent. VI. CONCLUSIONS In order to overcome difficult dynamic environment extrema tracking, we have proposed a Self-Regulated Swarm (SRS) advantageous the algorithm which hybridizes characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (balancing the exploration/exploitation nature of the search strategy), with a simple evolutionary mechanism that trough a direct reproduction procedure linked to local environment features is able to self-regulate the above exploratory swarm population, speeding it up globally. The different experiments carry out on sections III and IV, demonstrate that SRS is able for quick adaptive response, outperforming results not only with standard Genetic Algorithms, as well as comparing it with very recently successful approaches based on Co-Evolution. From the different SRS features, we highlight some successful behaviors found: (1) SRS is able to maintain a number of different solutions while adapting to new peaks appearing in the landscape. (2) The experiments show that the SRS approach is able to spontaneously create and maintain (for certain instable changing conditions), different subpopulations on different peaks, emerging different exploratory corridors with intelligent path planning capabilities. In addition, these population split-offs only occurs when needed. For instance, in between static conditions temporal windows (when the upgrade frequency determines that the changes will only occur after some T time steps), the population quickly converges to a single exploratory cluster. When however, the changes arrive, and for certain environmental conditions, the swarm may split again in two or more subpopulations. (3) For dramatic conditions, the swarm is able to request more exploratory agents, reproducing more and scaling up its population. After this is not necessary and redundant (a highly-performing peak is found) however, the swarm can self-regulate down their number, scaling it down, thus economizing its search resources. (4) The approach allows self-organized injection of larger diversity when needed, as we can perceive from grey curves in fig. 25. (5) For certain environmental conditions, the swarm not only is able to smoothly track the dynamic extrema, as for many time-steps over some different temporal windows, is able to capture it in perfection. (6) Last but not least, we prove that our SRS collective swarm of ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single ant composing that precise swarm tracking system. This emerged behavior is probably one of the most interesting ones achieved by the present work. We expect the framework proposed in this work to advance the current state of research on Swarm Intelligence and Evolutionary Computation in dynamic Environments. ACKNOWLEDGMENT The authors would like to thank to Professor Fernando Durão (CVRM-IST, Technical Univ. of Lisbon, Portugal) for providing the MATLAB version, working in reverse communication, of the Ordinary Differential Equation (ODE) solver DOPRI853 developed and coded in FORTRAN by E. Hairer, S.P.Norset and G.Wanner [24]. The second author wishes to thank FCT, Ministério da Ciência e Tecnologia - Portugal, for his research fellowship SFRH/BD/18868/2004. Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 15 REFERENCES [1] Angeline, P.J., “Tracking Extrema in Dynamic Environments”, in Angeline, Reynolds, McDonnell and Eberhart (Eds.), Proc. of the 6th Int. Conf. on Evolutionary Programming, pp. 335-345, LNCS, Vol. 1213 , Springer, 1997. [2] Anthony Carlisle, Gerry Dozier, “Adapting Particle Swarm Optimization to Dynamic Environments”, in ICAI´00, International Conference on Artificial Intelligence, Las Vegas, Nevada, USA, 2000. [3] Anthony Carlisle, Gerry Dozier, “Tracking Changing Extrema with Adaptive Particle Swarm Optimizer”, in ISSCI, World Automation Congress, Orlando, Florida, USA, June, 2002. [4] Bäck, T., “On the Behavior of Evolutionary Algorithms in Dynamic Environments”, in IEEE Int. Conf. on Evolutionary Conference, pp. 446- 451, 1998. [5] Bierwirth C., Kopfer, H., “Dynamic task scheduling with Genetic Algorithms in Manufacturing Systems”, Technical Report, Departmen of Economics, University of Bremen, 1994. [6] Bierwirth C., Mattfeld, D.C., “Production scheduling and rescheduling with Genetic Algorithms”, Evolutionary Computation Journal, 7(1), pp. 1-18, 1999. [7] Bonabeau, E., Dorigo, M., Theraulaz, G., Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute series in the Sciences of Complexity, Oxford Univ. Press, New York, Oxford, 1999. [8] Branke J., Schmeck, H., “Designing Evolutionary Algorithms for Dynamic Optimization problems”, In S. Tsutsui and A. Ghosh (Eds.), Theory and Application of Evolutionary Computation: Recent Trends, pp. 239-262. Springer, 2002. [9] Branke, J, “Memory enhanced Evolutionary Algorithms for Changing Optimization Problems”, in Congress of Evolutionary Computation, CEC’99, vol. 3, pp. 1875-1882, IEEE Press, 1999. [10] Branke, J, Evolutionary Optimization in Dynamic Environments, Kluwer, 2002. [11] Cedeno, W., Vemuri, V.R., “On the use of Niching for Dynamic Landscapes”, in Int. Conf. on Evolutionary Conference, pp. 361-366, IEEE, 1997. [12] Chialvo, D.R., Millonas, M.M., “How Swarms build Cognitive Maps”, In Steels, L. (Ed.): The Biology and Technology of Intelligent Autonomous Agents, 144, NATO ASI Series, 439-450, 1995. [13] Cobb, H.G., “An investigation into the use of hypermutation as an adaptive operator in Genetic Algorithms having continuous, time- dependent nonstationary environments”, Technical Report AIC-90-001, Naval Research Laboratory, Washington DC, 1990. [14] D. H. Ackley. “A Connectionist Machine for Genetic Hillclimbing”. Boston: Kluwer Academic Publishers, 1987. [15] Daniel Parrott, Xiaodong Li, “A Particle Swarm Model for Tracking Multiple Peaks in a Dynamic Environment using Speciation”, in CEC´04, Proc. of the 2004 Congress on Evolutionary Computation, p.98 - 103, IEEE Piscataway, 2005. [16] Dasgupta D., McGregor D.R., “Nonstationary function optimization using the structured Genetic Algorithm”, in Manner R., Manderick B. (Eds.), Parallel Problem Solving from Nature, pp. 145-154, Elsevier Science, 1992. [17] Fernandes, C., Ramos, V., Rosa, A.C., “Varying the Population Size of Artificial Foraging Swarms on Time Varying Landscapes”, in W. Duch, J. Kacprzyk, E. Oja, S. Zadrozny (Eds.), Artificial Neural Networks: Biological Inspirations, LNCS series, Vol. 3696, Part I, pp. 311-316, Springer-Verlag, Sept. 2005. [18] Ghosh A., Tstutsui S., Tanaka H., “Function Optimization in Nonstationary Environment using steady state Genetic Algorithms with aging of Individuals”, in IEEE Int. Conf. on Evolutionary Computation, pp. 666-671, 1998. [19] Goldberg, D.E., Smith R.E., “Nonstationary function optimization using Genetic Algorithms with dominance and diploidy”, in Grefenstette J.J. (Eds.), 2nd Int. Conf. on Genetic Algorithms, pp. 59-68, Lawrence Erlbaum Associates, 1987. [20] Grefenstette J.J., “Evolvability in Dynamic Fitness Landscapes”: A in Congress on Evolutionary Genetic Algorithm approach”, Computation, CEC 99, vol. 3, pp. 2031-2038. IEEE, 1999. [21] Grefenstette, J.J., “Genetic Algorithms for Changing Environments”, in Maener R. and Manderick B. (Eds.), Parallel Problem Solving from Nature 2, pp. 137-144, North-Holland, 1992. [22] Guntsch, M., Middendorf M., Schmeck H.: “An Ant Colony Optimization Approach to Dynamic TSP”, in L. Spector et al. (eds.) Genetic and Evolutionary Computation Conference, San Francisco, CA: Morgan Kaufmann pages 860-867, 2001. [23] Guntsch, M., Middendorf, M., “Applying Population Based ACO to Dynamic Optimization Problems”, in Ant Algorithms, Proc. of Third International Workshop ANTS 2002, Brussels, Belgium, Springer Verlag, LNCS 2463, pp. 111-122, 2002. [24] Hairer E. Norset S.P., Wanner G., “Solving Ordinary Differential Equations: I. Nonstiff Problems”, 2nd Edition, Springer-Verlag, Springer Series in Computational Mathematics vol. 8, 1993. [25] Holland, O., Melhuish, C.: Stigmergy, “Self-Organization and Sorting in Collective Robotics”, Artificial Life, Vol. 5, n. 2, MIT Press, 173, 1999. [26] http://alfa.ist.utl.pt/~cvrm/staff/vramos/DOCs=1land.gif. [27] http://alfa.ist.utl.pt/~cvrm/staff/vramos/DOCs=1P.gif. [28] http://tracer.lcc.uma.es/problems/ackley/ackley.html. [29] Huang, C.-F., A study of Mate Selection in Genetic Algorithms, Doctoral dissertation. Ann Arbor, MI: University of Michigan, Electrical Eng. And Computer Science, 2002. [30] Huang, C.-F., Rocha, Luis M., “Tracking Extrema in Dynamic Environments using a Co-Evolutionary Agent-based Model of Genotype Edition”, in Hans-Georg Beyer et al. (Eds.), GECCO’05 - Genetic and Evolutionary Computation Conference, pp. 545-552. ACM, 2005. [31] Hutchins, E., “How a cockpit remembers its speeds. Cognitive Science”, 19(3):265.288, 1995. [32] Janson, S., Middendorf, M., “A Hierarchical Particle Swarm Optimizer for Dynamic Optimization Problems”, in 1st European Workshop on Evolutionary Algorithms in Stochastic and Dynamic Environments, Coimbra, Portugal, 2004. [33] Kennedy, J. Eberhart, Russel C. and Shi, Y., Swarm Intelligence, Academic Press, Morgan Kaufmann Publ., San Diego, London, 2001. [34] Kirk, Donald E., Optimal Control Theory: An Introduction, Prentice Hall Publ., USA, 1970. [35] Kirsh D., Maglio P., “On distinguishing Epistemic from Pragmatic Action”. Cognitive Science, 18(4):513.549, 1994. [36] Klyubin, A.S, Polani, D., Nehaniv, C.L., “Tracking Information Flow through the Environment: Simple Cases of Stigmergy”, in Pollack J., Bedau M., Husbands P. and Ikegami T. (Eds.), ALIFE IX, Proc. of the 9th Int. Conf. on the Simulation and Synthesis of Living Systems, pp. 563-568, MIT Press, 2004. [37] Lewis J., Hart E., Ritchie G., “A Comparison of dominance mechanisms and simple mutation on non-stationary problems”, in Eiben, Bäck et al (eds.), Parallel Problem Solving from Nature, LNCS, Vol. 1498, pp. 139-148, Springer, 1998. [38] Liles W., DeJong K., “The usefulness of tag bits in Changing Environments”, in Congress on Evolutionary Computation, CEC 99, vol. 3, pp. 2054-2060. IEEE, 1999. [39] Lin, S.-C., Goodman E.D., Punch W.F., “A Genetic Algorithm approach to Dynamic job shop scheduling problems”, in Bäck, T. (Eds.), 7th Int. Conf. on Evolutionary Computation, Morgan Kaufmann, pp. 481-488, 1997. [40] Louis S.J., Xu Z., “Genetic Algorithms for open shop scheduling and rescheduling”, in Cohen M.E., Hudson D.L. (eds.), ISCA 11th Int. Conf. on Computers and their Applications, pp. 99-102, 1996. [41] Mattfeld D.C, Bierwirth C., “Minimizing job tardiness: Priority rules vs. adaptive scheduling”, In Parmee, I.C. (Ed.), Proc. of ACDM, pp. 59-67, Springer, 1998. [42] Millonas, M.M., “A Connectionist-type model of Self-Organized Foraging and Emergent Behavior in Ant Swarms”, J. Theor. Biol., nº 159, 529, 1992. [43] Millonas, M.M., “Swarms, Phase Transitions and Collective Intelligence”, In Langton, C.G. (Ed.): Artificial Life III, Santa Fe Institute, Studies in the Sciences of Complexity, Vol. XVII, Addison- Wesley, Reading, Massachusetts, 417-445, 1994. [44] Mori, N., Imanishi S., Kita H., “Adaptation to Changing Environments by means of the Memory based thermodynamical Genetic Algorithm”, in Bäck, T. (Ed.), 7th Int. Conf. on Evolutionary Computation, Morgan Kaufmann, pp. 299-306, 1997. [45] Mori, N., Kita H., Nishikawa Y., “Adaptation to a changing environment by means of the thermodynamical Genetic Algorithm”, in Voigt H.-M. (Eds.), Parallel Problem Solving from Nature, Vol. 1141, LNCS, pp. 513-522, Springer, 1996. Ramos, V., Fernandes, C., Rosa, A.C., Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms. 16 [69] Yaniv Altshuler, Israel A. Wagner, Alfred M. Bruckstein, “On Swarm Optimality In Dynamic And Symmetric Environments”, in ICINCO´05, 2nd International Conference on Informatics in Control, Automation and Robotics, 2005. [70] Zhou K., Doyle J.C., Glover K., “Robust and Optimal Control”, in Automatica Journal, Elsevier Science, Vol. 33, Number 11, pp. 2095- 2095(1), Nov. 1997. ORIGINAL PAPER WITH FULL PICTURES AVAILABLE IN: http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-NIAS06.pdf [46] Mori, N., Kita H., Nishikawa Y., “Adaptation to a changing environment by means of the feedback thermodynamical Genetic Algorithm”, in Eiben, Bäck et al (eds.), Parallel Problem Solving from Nature, LNCS, Vol. 1498, pp. 149-158, Springer, 1998. [47] Passino, K.M., “Biomimicry of Bacterial Foraging for Distributed Optimization and Control”, IEEE Control Systems Magazine, pp. 52-67, June 2002. [48] Raman, N, Talbot, F.B, “The Job Shop tardiness Problem: a Decomposition approach”, European Journal of Operation Research, vol. 69, pp. 187-199, 1993. [49] Ramos V., Fernandes C., Rosa A.C., “On Ants, Bacteria and Dynamic Environments”, in NCA-05, Natural Computing and Applications Workshop, IEEE Computer Press, Timisoara, Romania, Sep. 2005. [50] Ramos V., Fernandes C., Rosa A.C., Social Cognitive Maps, Swarm Collective Perception and Distributed Search on Dynamic Landscapes, to appear in Brains, Minds & Media – Journal of New Media in Neural and Cognitive Science, NRW, Germany, 2006. [51] Ramos V., Muge F., Pina P., “Self-Organized Data and Image Retrieval as a Consequence of Inter-Dynamic Synergistic Relationships in Artificial Ant Colonies”, in Javier Ruiz-del-Solar, Ajith Abraham and Mario Köppen (Eds.), Soft Computing Systems - Design, Management and Applications, Frontiers in Artificial Intelligence and Applications series, vol. 87, pp. 500-509, IOS Press, Netherlands, 2002. [52] Ramos, V., “The Biological Concept of Neoteny in Evolutionary Colour Image Segmentation - Simple Experiments in Simple Non-Memetic Genetic Algorithms”, in Applications of Evolutionary Computation, (Eds.), EuroGP´01 – European Conf. on Genetic Progr., LNCS, Vol. 2037, pp. 364-378, Springer-Verlag, Berlin-Heidelberg, 2001. [53] Ramos, V., Almeida, F., “Artificial Ant Colonies in Digital Image Habitats: A Mass Behavior Effect Study on Pattern Recognition”, In Dorigo, M., Middendorf, M., Stuzle, T. (Eds.): From Ant Colonies to Artificial Ants - 2nd Int. Wkshp on Ant Algorithms, 113-116, 2000. [54] Ramsey, C.L., Grefenstette, “Case-based Initialization of Genetic Algorithms”, in Forrest S. (Ed.), 5th Int. Conf. on Genetic Algorithms, pp. 84-91, Morgan Kaufmann, 1993. [55] Reeves C., Karatza H., “Dynamic sequencing of a multi-processor system: A Genetic Algorithm approach”, in Albrecht R.F:, Reeves C., Steele N.C. (Eds.), Artificial Neural Networks and Genetic Algorithms, pp. 491-495, Springer, 1993. [56] Rocha, Luis M., Huang, C.-F., “The Role of RNA Editing in Dynamic Environments”, in ALIFE9, 9th Int. Conf. on the Simulation and Synthesis of Living Systems, Boston, Massachusetts, Sep. 12-15th 2004. [57] Ryan C., “Diploidy without Dominance”, in Alander J.T. (Ed.), 3rd Nordic Workshop on Genetic Algorithms, pp. 63-70, 1997. [58] Schwefel, H.-P., Evolution and Optimum Seeking, John Wiley & Sons, New York, 1995. [59] Spears, W., “Simple subpopulation schemes”, in Evolutionary Programming Conference, pp. 296-307, World Scientific, 1994. [60] Stephens C.R., Olmedo I.G., Vargas J.M., Waelbroeck H., “Self- Adaptation in Evolving Systems”, Artificial Life, 4(2), 1998. [61] T. Bäck., “On the Behavior of Evolutionary Algorithms in Dynamic Environments”, in IEEE Int. Conf. on Evolutionary Computation, pp. 446-451, 1998. [62] T. Bäck., Evolutionary Algorithms in Theory and Practice, Oxford University Press, 1996. [63] Theraulaz, G., Bonabeau, E., “A Brief History of Stigmergy”, Artificial Life, Vol. 5, n. 2, MIT Press, 97-116, 1999. [64] Trojanowski K., Michalewicz Z., Xiao, J., “Adding Memory to the Evolutionary Planner/Navigator”, in IEEE Int. Conf. on Evolutionary Computation, pp. 483-487, 1997. [65] Tstutsui S., Fujimoto Y., Ghosh A., “Forking Genetic Algorithms: GAs with search space division schemes”, Evolutionary Computation, 5(1), pp. 61-80, 1997. [66] Vavak, F., Jukes K., Fogarty, T.C., “Adaptive Combustion Balancing in Multiple Burner Boiler using a Genetic Algorithm with variable range of local search”, in Bäck, T. (Eds.), 7th Int. Conf. on Evolutionary Computation, Morgan Kaufmann, pp. 719-726 1997. [67] Vavak, F., Jukes K., Fogarty, T.C., “Learning the local search range for Genetic Optimization in Nonstationary Environments”, in IEEE Int. Conf. on Evolutionary Conference, ICEC’ 97, pp. 355-360, IEEE, 1997. [68] Wilson, E.O., The Insect Societies, Cambridge, MA., Belknap Press, 1971.
1204.6089
1
1204
2012-04-27T00:34:00
Multi-model-based Access Control in Construction Projects
[ "cs.MA", "cs.CE", "cs.CY", "cs.SE" ]
During the execution of large scale construction projects performed by Virtual Organizations (VO), relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.
cs.MA
cs
Multi-model-based Access Control in Construction Projects Frank Hilbert TU Dresden Raimar J. Scherer TU Dresden Larissa Araujo USP Institute of Construction Informatics Dresden University of Technology Dresden, Germany Institute of Construction Informatics Dresden University of Technology Dresden, Germany Engineering School of Sao Carlos University of Sao Paulo Sao Paulo, Brazil [email protected] [email protected] [email protected] During the execution of large scale construction projects performed by Virtual Organizations (VO), relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks. 1 Introduction For the processing of large and complex construction projects, single independent organizations work together as Virtual Organizations (VO) [1], combining their core competencies [2, 3]. To manage the complexity in construction in which the costs incurred within a project vary, both physical and functional information split into various domain-specific application models (e.g. building model, cost model, time model, etc.) on the basis of which the work is running, typically discipline-specific [4]. The use of Building Information Modelling (BIM) is becoming increasingly important for collaborative processing [5]. The elements of the various specialized models are implicitly linked together (e.g. the component inside wall xy from the model building with the process concrete first floor from the process model). To transfer application models together with their links, in the German Project MEFISTO 1 and in the international Project HESMOS 2 , a multi-model container format (MMC) was developed which sum- marizes application models with their dependencies [6]. When using this MMC approach, however, the following aspects must be considered: • (A1) The MMC, based on the number and granularity of the application models, becomes relatively large. Because of distributed processing in Virtual Organizations, these multi-models are shared very often and the size of the model can lead to the obstruction of communication (e.g. the size of the IFC building model of a simple high-rise building is about 40 MB). • (A2) For the processing of individual project tasks only a relatively small part of the subject model is usually interesting. According to their current project responsibilities the agents are only in- terested, in most cases, in the specific aspects (e.g. building services, building spatial structures, structural analysis, etc.). 1http://www.mefisto-bau.de 2http://hesmos.eu Jeremy Bryans and John Fitzgerald (Eds.): Formal Aspects of Virtual Organisations 2011 (FAVO 2011) EPTCS 83, 2012, pp. 1 -- 9, doi:10.4204/EPTCS.83.1 c(cid:13) F. Hilbert, R. J. Scherer, L. Araujo This work is licensed under the Creative Commons Attribution License. 2 Multi-model-basedAccessControlinConstructionProjects • (A3) It is not necessary, and for reasons of data protection, may also not be desirable that all partners involved must know all the technical details of the project model. From these considerations, it is useful to facilitate the working with multi-models, the transmitting of model cut-outs or the generating of model views. For this purpose, a central filter and mapping service are currently being developed at the TU Dresden, which generate partial application models while maintaining the link structure between the application models [7]. This filtering service is used within this approach to enforce the definition of model views and covers the aspect of access and privacy when accessing multi models within virtual organizations. In this manner, an initiated approach, as to the integration of these filter services in a context-sensitive fine-grained access control, is described. The next section briefly describes the structure of the multi-model used. On this basis, in Chapter 3, different multi-model filter designs are considered; first the uses of multi-model templates for the generation of model views, and second, the filtering of elementary models for creating cut-outs. Then, in chapter 4, the idea of an extended context-sensitive role model for virtual organizations is pursued, and in chapter 5, a proposed methodology for using this model for the filtered access to multi-models follows. The last chapter outlines practical scenarios and gives an outlook into further development. 2 Basic Concepts 2.1 The multi-model container format In order to distribute project information together from the various semantically and structurally inho- mogeneous domain expert models and, on the other side, externalize the implicit relationship between the model elements, a generic link model was developed, which will be shown together with the asso- ciated application models within a multi-model. Then the link model in the form of an XML document is stored, the format of the application models is not specified. The multi-model was changed in a so- called multi-model container (MMC) which is within the multi-model container and separated in each model, described by metadata (see Figure 1). These multi-model containers are read into the specialized applications of the VO partners, modified and shared with other partners. More information about the structure and the use of MMC is given by Fuchs in [6]. MMC MulƟ- model container Building Model BIM OperaƟon Model COM Costs Model SPM Project Schedule TSM LM Container metadata Figure 1: Example Structure of the Multi-Model-Container F.Hilbert,R.J.Scherer,L.Araujo 3 2.2 Filter Concepts for Multi-Models In the filtering of multi-models it is necessary to distinguish between the pure selection of application models as they are defined for model-views (domain-views) with any setting of the desired granularity (see Figure 2) and of the filter model to generate model cut-outs (see Figure 3). MMC MulƟ-model container MMC MulƟ-model container Building Model BIM Building Model BIM OperaƟon Model COM OperaƟon Model COM Costs Model SPM Costs Model SPM Project Schedule TSM Project Schedule TSM LM LM Container metadata Container metadata Figure 2: Example of a Multi-Model-View Figure 3: Example of a Multi-Model-Cutout For handling different tasks, it is often not necessary for all application models to be available. The use of model views serves not only for the simplified representation of complex issues but also to increase the security against unauthorized data access and is achieved by the simplest form of filtering through the use of multi-model templates. Figure 4: filtering with multi-model templates In the MEFISTO Project seven exemplary different multi-model templates have been defined which are based on the phases of the project and selected in the first step of each different subset of application models (Building, Operation, Performance, Costs and Construction Site Model). In a second step, the associated link model can be reduced to the remaining links of the tray model elements. Then, the tem- plates demand not only the existence of application models in the multi-model, but claim additionally the compliance model-dependent levels of detail and processing status. It is conceivable that in a production model, the application building model (BM) and operation model (OM) are structured much more com- prehensively than within the model range. In a third step, these additional conditions are checked using the metadata within the container. In Table 1, examples of granularities are outlined (e.g. in the appli- cation model the process model-column templates of the frame schedule (0.1), coarse schedule (0.2)) to detail schedule (1)). Other various project plans are discussed in more detail in [4]. 4 Multi-model-basedAccessControlinConstructionProjects Project Phase Offer phase Offer phase Contract phase Contract phase Execution phase Task Offer request Offer delivery Negotiation Commissioning Scheduling MM-Template Tender Model Offer Model Negotiation Model Contract Model Tender Model BM OM PM CM CSM 0,5 0,5 0,5 1 1 0,1 0,2 0,2 1 1 0 0 0 0 0,7 0,1 1 1 1 1 0 0,5 0,7 1 1 Table 1: LOD of Application Models in Multi-model templates For the selection of individual object fields for further processing or to facilitate semantic multi- model filter, the use of specialized model cut-outs is desirable. Then these excerpts can turn into various, in part dynamic, criteria to be defined, for example as geometric part-models, time periods or (external) object properties of the model elements. The generation of task-specific ad-hoc multi-model views, which are combined to link models of BIM data with information from other application models is relatively complex and is a topic of current research. Katranuschkov describes in [7] an approach for the generation of BIM-based multi-model views, and a reference implementation, based on the use of open IFC toolset from the University of Weimar and HOCHTIEF that, with the use of the generic Model Subset Definition Schema (GMSD), focuses on these goals. Another challenge is the generation of partial geometric models, here under certain circumstances broken up into objects, because it must be generated at different levels of the objects detail. This aspect is the subject of current research within the project HESMOS and is not described in this work. 3 Context-dependent Access Control Camarinha-Matos differentiated in [8], exogenous and endogenous VO roles, with the former relation- ships reflecting outwards, such as interaction with the environment, customers, competitors and potential partners, and on the other side endogenous roles which are represented by the relationships within the VO. These endogenous roles handle the VO participants during the exercising of their cooperation and are defined in the VO-initiation, as well as other descriptive attributes, in the Organization Model. The classic role-based access control (RBAC) [9] defines the relationship in a simple way: WHO (project role) may WHAT (authorizations)? Hence, VO participants may bring different talents or skills into a VO, so that the VO actors are assigned with so-called potential roles. Both in [10] and in [11], it was found that the role assignment of the VO members is not rigidly fixed in practice, but contextual and dynamic role assignments are subject to restrictions and must therefore be context-dependently modelled and dynamically evaluated. Only with this combination, the observance of the principle of Separation of Duty [9] and the Principle of Least Privilege [12] can be ensured. We use an expanded role model for which the access control including the access context offers and determines illustrated in simplified form: WHO (current role) may WHAT (authorizations) with WHOM (object) in which SITUATION (context)? F.Hilbert,R.J.Scherer,L.Araujo 5 An example scenario: A player is entrusted with the tasks within the VO plan creation and plan evaluation. To ensure the Separation of Duty, this actor should not be allowed to control himself, so both roles can only be selected when accessing different objects. 3.1 The use of context information To add context-sensitive abilities to security mechanisms, context attributes must be described in a for- mal context model. The context attributes are not individually described within this context model, but they are assigned real world objects. This so-called deputy approach describes a basic concept for the representation of contextual information [13] and link distributed context attributes of the subject and the object model together with the environment context attributes. Using a context model now we can com- bine previously individually held context information so that situations can be precisely described. The relevant relationships for access decisions can be complex and involve various types and combinations of context information. For the modelling of the knowledge about their relationships, the impact of this information has to be formally described. For the definition of the access control policies, we use the Web Rule Language (SWRL) (Horrocks et al., 2003) to achieve flexibility and interoperability as well as easy administration. Some examples of SWRL rules: • Role assignment: (Actor(?a), Role(?e), Resource(?r), hasTarget(?a,?r), hasRole(?a,?e), hasOwner(?r,?a)) ->PermittedRole(?e) • Ownership: (Action(?a), Resource(?r), hasTarget(?a,?r), hasActor(?a,?x), hasOwner(?r,?x)) ->PermittedAction(?a) • Sstate dependence: (Action(?a), Resource(?r), hasTarget(?a,?r), hasObjectRestriction(?a,?x), has- PassRestriction(?r,?x)) ->PermittedAction(?a) 3.2 Structure of the VO model We have modelled the RBAC-Model in our VO-Ontology model with the classes Actor, Role, Permission and Restriction. Objects of the Class Restriction define the context sensitive Assignment-Restriction in the form of SWRL-rules. The Relation sr is modelled by the bijective mapping of the ObjectPropertys hasActorRoleAssignment and hasRoleActorAssignment, which connect the classes Actor and Role. Both, the ObjectPropertys hasPermissionRoleAssignment and hasRolePermissionAssignment con- nect the classes Role and Permission and reflect the Relation sr. The SubPropertys hasRoleRestriction and hasPermissionRestriction link the Class Restriction to the ObjectPropertys hasActorRoleAssignment and hasPermissionRoleAssignment and realize the functions fc(sr) and gc(pr) (in Figure 3 dotted). The Restriction-Objects contain the restrictions to be evaluated, where the Open World Assumption is valid, i.e. the modelled Relations sr and pr are true, if there are no Restrictions or the Restrictions can be evaluated to be true. 3.3 Dynamic Authorization Decisions Scholz describes in [15] mutual trust as the basis for VOs and the transparent handling of explicit rules and standards as the basis for this confidence. For the rules of a context-based access control for multi-models, we use the Fine Grain Access Control (FGAC) rules described by Franzoni in [16] 6 Multi-model-basedAccessControlinConstructionProjects Figure 5: VO Model with a context-sensitive expansion, which additionally accesses the context in which access decisions are integrated. The actual access role when accessing an object instance from a dynamic access control according to the access context, consists of various determined static (potential roles with permissions) and dynamic conditions (object status and subject status, subject-object relationships and project status). This consists mainly of an empty MMC with pre-populated metadata descriptions. Using these templates it is easy to determine whether a padded MMC corresponds to a template. In MEFISTO a VO-based ser- vice platform is used which registers all created MMC templates and the metadata of all transmitted application models. MMT Filter MMC MMC* Figure 6: Access Control with Multi-Model-Filterl We propose a context-sensitive access control in 5 steps: 1. The role of a requesting actor is determined by evaluating its potential VO roles and the access context. F.Hilbert,R.J.Scherer,L.Araujo 7 2. The User ID is checked in the VO registry and connected access rules are evaluated. 3. With the Task description in the core ontology, the necessary permissions are evaluated 4. The task-dependent Template is searched on the VO-platform. If there is no template, then it will return an unfiltered Multi-Model, according to the preferences, or the access will not be permitted. If there is a template, it is created on the basis of a container template a Multi-Model-Container through the base service. Then, the registered trade models use the service from the platform and search in the model registry for an application model in the desired resolution. 5. If an application model does not exist in the required granularity, the subject-specific model type of filter methods and services are requested and an application model with higher granularity and the desired level of detail are given as an argument. The application model produced is inserted into the Multi-Model-Container. 6. This Multi-Model-Container is transferred to the actor. 4 Related work The common standardised access model role-based access control model (RBAC) [9] is based on the con- cept of the user role as an intermediary between subjects and permissions and is purely subject-based. The properties of the objects have no effect on the access decision. Therefore, role assignments may be wrong after a state change of the entities (objects as well as subjects). Various proposals have extended the RBAC model with attribute-based access control capabilities [17] which also consider environment attributes (e.g. system status, time, date), subject attributes (e.g. age, location, proofs of identity) as well as object attributes (e.g. size, value, location, state of objects). Priebe et al. [18] proposes an attribute-based access control approach, but roles are subject- dependently modelled. Kumar et al. use in [19] context filters for role assignment, based on hash tables describing user context and object context- attributes. Franzoni et al. presents in [16] a fine-grained access control model, with focus on Semantic Databases, using ontologies to describe the subject-object relationships. Last but not least, Goslar de- scribes a context model with dynamic real-world object linking in an economic focus [13]. Common to all these approaches is an attribute based assignment of subjects to roles while the roles-permissions assignment remains static. 5 Outlook It has outlined an approach which covers the aspects mentioned in chapter 1: (A1) Due to one filter of the Multi-Model-Container, the communication between the partners was simplified and accelerated. Example, it is now possible to use Multi-Model-Container also on mobile devices. (A2) Only those application models necessary for the current processing situation were transferred to the Multi-Model- Container. (A3) The transferred application models have the exact resolution (size) needed for further processing. Both the major components of the filtering services as well as most of the required multi-model templates are still under development, making the approach only roughly sketched. Currently in the focus of the research at the TU Dresden are the methods for the generation of geometric partial models and scheduling time spans. 8 Multi-model-basedAccessControlinConstructionProjects Another development is focused on the filtering of MMC for transitive object properties of model elements. An example scenario for this comes from subsequent processing. Here, the complete reduction of MMC to a supplementary multi-model is desired which contains only subsequent positions in the application model specifications, corresponding to a reduced geometry and link model. Such application model sections, due to the dynamic component, cannot be generated with template models. References [1] MOESLEIN K., (2001): Die virtuelle Organisation: Von der Idee zur Wettbewerbsstrategie, In: Rohde, Markus , Rittenbruch, Markus , AufdemWegzurvirtuellenOrganisation, Physica-Verlag Heidelberg. [2] FISCHER K., (2007): Intelligente Agenten fur das Management virtueller Unternehmen, In: Information Management 1/96, Computerwoche Verlag GmbH, Muenchen. [3] KELLER M., (2007)): IT supported co-operation in construction projects, PhD thesis BerichtedesInstituts fuerBauinformatik, Heft6,978-3-86780-004-4 [4] KOECHENDOERFER B., LIEBCHEN J.H., VIERING M.G., (2006): Projektorganisation - Bau-Projekt- Management, Teubner,978-3-8351-9075-7 [5] EASTMAN C. M., (1999): Building Product Models: Computer Environments, Supporting Design and Construction, CrcPrInc.,0849302595 [6] FUCHS S., KATRANUSCHKOV P. and SCHERER R. J., (2010): A framework for multi-model collabora- tion and visualization, In Proc. ECPPM 2010, Cork, Rep. of Ireland, TaylorandFrancis,UK [7] KATRANUSCHKOV P., WEISE M., WINDISCH R., FUCHS S. und SCHERER R. J. , (2010): Bim-based generation of multi-model views, In Proc. CIB W78 2010. [8] CAMARINHA-MATOS L.M., AFSARMANESH H., (2008): On reference models for collaborative net- worked organizations, In InternationalJournalProduction,Vol.46,No9 [9] FERRAIOLO D. F., J. A. C., KUHN D. R., (1995): Role-based access control (rbac): Features and motiva- tions, In Proceedingsof11thAnnualComputerSecurityApplication. [10] SOHR K., DROUINEAUD M., AHN G.-J., (2005): Formal Specification of Role-based Security Poli- In Proceedings of the 2005 ACM symposium on Applied, cies for Clinical Information Systems, doi:10.1145/1066677.1066756. [11] HILBERT F., KATRANUSCHKOV P. and SCHERER R. J., (2010): Formal Fine-Grained Information Ac- In Proc. eChallenges e-2010 Conference, 27-29 October, Warsaw, Poland, cess in Virtual Organisations, IIMCInternationalInformationManagementCorp.Ltd.,Dublin,Ireland. [12] SALTZER J. H., SCHROEDER M.D., (1975): Protection of Information in Computer Systems, In Pro- ceedingsoftheIeee,doi:10.1109/PROC.1975.9939. [13] GOSLAR, K., (2006): Ein Integrations- und Darstellungsmodell fur verteilte und heterogene kontextbezo- gene Informationen, PhDTheses. [14] HORROCKS I., PATEL-SCHNEIDER P.F., BOLEY H., TABET S., GROSOF B. and DEAN M.., (2004): SWRL: A Semantic Web Rule Language Combining OWL and RuleML, In W3CMemberSubmission,. [15] SCHOLZ C., (1994): Die virtuelle Organisation als Strukturkonzept der Zukunft?, in DiskussionsbeitragNr. 30desLehrstuhlsfrBetriebswirtschaftslehre,UniversitaetdesSaarlandesSaarbrcken. [16] FRANZONI S., MAZZOLENI P., VALTOLINA S., BERTINO E., (2007): Towards a Fine-Grained Access Control Model and Mechanisms for Semantic Databases, In WebServices,2007.ICWS2007.IEEEInter- nationalConference,pp.993-1000,doi:10.1109/ICWS.2007.176. F.Hilbert,R.J.Scherer,L.Araujo 9 [17] YUAN E. and TONG J., (2005): Attributed based access control (ABAC) for web services, In IEEE International Conference on Web Services, Vols 1 and 2, Proceedings, 2005, pp. 561-569, doi:10.1109/ICWS.2005.25. [18] PRIEBE T., DOBMEIER W. and KAMPRATH N., (2006): Supporting attribute-based access control In Proc. 1st Int. Conf. on Availability, Reliability and Security, 2006, pp. 465472, with ontologies, doi:10.1109/ARES.2006.127. [19] KUMAR. A, KARNIK N. and CHAFLE G., (2002): Context Sensitivity in Role Based Access Control, In ACMSIGOPSOperatingSystemReview36(3),vol.36,2001,pp.53 -- 66,doi:10.1145/567331.567336.
1802.10446
2
1802
2018-11-12T18:13:01
Identifying Sources and Sinks in the Presence of Multiple Agents with Gaussian Process Vector Calculus
[ "cs.MA", "cs.AI" ]
In systems of multiple agents, identifying the cause of observed agent dynamics is challenging. Often, these agents operate in diverse, non-stationary environments, where models rely on hand-crafted environment-specific features to infer influential regions in the system's surroundings. To overcome the limitations of these inflexible models, we present GP-LAPLACE, a technique for locating sources and sinks from trajectories in time-varying fields. Using Gaussian processes, we jointly infer a spatio-temporal vector field, as well as canonical vector calculus operations on that field. Notably, we do this from only agent trajectories without requiring knowledge of the environment, and also obtain a metric for denoting the significance of inferred causal features in the environment by exploiting our probabilistic method. To evaluate our approach, we apply it to both synthetic and real-world GPS data, demonstrating the applicability of our technique in the presence of multiple agents, as well as its superiority over existing methods.
cs.MA
cs
Identifying Sources and Sinks in the Presence of Multiple Agents with Gaussian Process Vector Calculus Adam D. Cobb Richard Everett Department of Engineering Science Department of Engineering Science University of Oxford Oxford, United Kingdom [email protected] Andrew Markham Department of Computer Science University of Oxford Oxford, United Kingdom [email protected] University of Oxford Oxford, United Kingdom [email protected] Stephen J. Roberts University of Oxford Oxford, United Kingdom [email protected] Department of Engineering Science ABSTRACT In systems of multiple agents, identifying the cause of observed agent dynamics is challenging. Often, these agents operate in di- verse, non-stationary environments, where models rely on hand- crafted environment-specific features to infer influential regions in the system's surroundings. To overcome the limitations of these inflexible models, we present GP-LAPLACE, a technique for locating sources and sinks from trajectories in time-varying fields. Using Gaussian processes, we jointly infer a spatio-temporal vector field, as well as canonical vector calculus operations on that field. Notably, we do this from only agent trajectories without requiring knowl- edge of the environment, and also obtain a metric for denoting the significance of inferred causal features in the environment by exploiting our probabilistic method. To evaluate our approach, we apply it to both synthetic and real-world GPS data, demonstrating the applicability of our technique in the presence of multiple agents, as well as its superiority over existing methods. CCS CONCEPTS • Computing methodologies → Gaussian processes; Unsuper- vised learning; Multi-agent systems; • Mathematics of computing → Bayesian nonparametric models; • Applied computing; KEYWORDS Gaussian processes; potential fields; multi-agent systems; GPS data; animal tracking 1 INTRODUCTION Inferring the possible cause of an agent's behaviour from observing their dynamics is an important area of research across multiple Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD '18, August 19 -- 23, 2018, London, United Kingdom © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5552-0/18/08...$15.00 https://doi.org/10.1145/3219819.3220065 domains [2]. For example, in ecology, the increasing availability of improved sensor technology and GPS data enables us to learn the motivations behind animal movement [9, 31], assisting with animal conservation and environmental efforts. Other domains, such as robotics, use apprenticeship learning to construct reward functions to allow them to mimic their observations [1]. Typical solutions for inferring the cause of an agent's behaviour tend to exploit Inverse Reinforcement Learning (IRL) [25] and in- clude learning preference value functions [7] as well as utility, value, or policy surfaces from observed actions in a space. Unfortunately, these solutions often rely on the problem being easily framed as a Markov decision process [21] which is not always appropriate. In- stead, one may be interested in identifying an interpretable potential function, defined in continuous space, that can explain trajectories made by agents in a multi-agent system (MAS). This approach can be seen in previous work where agents are modelled as particles with their dynamics determined by a potential field [4, 5, 20]. In this paper, we consider observed trajectories influenced by a time- and space-varying potential function, and infer the spatio- temporal potential function from observed movement alone. To accomplish this, we present GP-LAPLACE: Gaussian Processes for Locating Attractive PLACEs1. By constructing Gaussian processes (GPs) [23], our method jointly infers a spatio-temporal vector field as well as canonical vector calculus operations on that field, al- lowing us to estimate a time-varying map of sources and sinks of potential influence on agents. There are three notable advantages to our approach. First, it is able to reason about the interaction between agents and the envi- ronment from only agent trajectories, without requiring knowledge of the environment. Second, it allows the potential field to be non- stationary, which more accurately reflects the real-world. Finally, by exploiting a probabilistic method, we obtain a metric for denoting the significance of inferred causal features in the environment. To demonstrate the generality of our method as a tool for ex- plaining agent and animal behaviour, we apply it to two distinct data sets. As an illustrative example, we evaluate our approach on a synthetic data set which we can compare to the true potential function (which isn't accessible in the real-world). Next, motivated by the existence of long-term GPS data, we apply our method to 1Code and data: https://github.com/AdamCobb/GP-LAPLACE We define Equation (4) as the predictive mean of the nth derivative with respect to any test points x∗ and Equation (5) as its correspond- ing variance. The choice of covariance selected throughout this paper is the squared exponential kernel, kSE(x∗, xi) = l2 exp (cid:18) (x∗ − xi)⊤Λ−1(x∗ − xi) −1 2 , (6) (cid:19) with x∗ and xi corresponding to a test point and training point respectively. The hyperparameter Λ, is a diagonal matrix of input scale lengths, where each element determines the relevance of its corresponding dimension. The output scale, denoted by l2, controls the magnitude of the output [24]. The choice of kernel is motivated by the desire to obtain smooth measures over arbitrary derivative functions and the ease by which the kernel can be differentiated and used in combination with Equations (4) and (5). The following formulae define the squared exponential kernel for the first and second order derivatives [17]: ∂kSE(x∗, xi) ∂x∗ = −Λ−1(x∗ − xi)kSE(x∗, xi) = Λ−1(cid:16)(x∗ − xi)(x∗ − xi)⊤Λ−1 − I (cid:17) ∂2kSE(x∗, xi) ∂x2∗ kSE(x∗, xi). (8) We note at this point that estimating derivatives using a joint GP model over the function and derivatives [6, 10] offers a benign noise escalation in comparison to numerical differentiation. (7) 2.1 Vector calculus with GPs We define a scalar potential function ϕ(x, t) of space x and time t. Furthermore, we define the time-dependent gradient of ϕ(x, t) according to (9) t for x ∈ R2. We can model this time-varying vector value function by a multi-input, multi- output GP with a three-dimensional input tuple consisting of X = (x, t). This GP is constructed by introducing a separable kernel [3], with respect to x, where Vt =(cid:2)Vx Vy such that(cid:20) Vx (cid:3)⊤ (cid:20) kx(X,X′) ∇x ϕ(x, t) = Vt (cid:18)(cid:20) µx (cid:21)(cid:19) (cid:21) (cid:21) ∼ GP Vy , µy 0 0 ky(X,X′) contains an independently learned kernel for each output dimen- sion. Applying Equation (4) to this GP model, by jointly inferring the derivatives in the x and y directions, gives the time dependent posterior for each random variable in the following tuple: (cid:18) Vx , Vy , ∂Vx ∂x , ∂Vy ∂y , ∂Vx ∂y , ∂Vy ∂x (cid:19) . t We combine these predictive derivatives using Equations (10) and (11) to infer probability distributions over the divergence and curl of the vector field2 V: ∇ · V = ∂Vx ∂x + ∂Vy ∂y , (10) 2Vectors i, j, k denote unit vectors of a 3-D Cartesian coordinate system. Figure 1: GP-LAPLACE tracking a time-varying attractor from observing four agent trajectories. The black and white marker indicates the true location of an attractor that is in- creasing in strength. a real-world GPS data set of pelagic seabirds [19], discovering a number of attractors which influence their behaviour. The rest of our paper is organised as follows: Section 2 intro- duces the GP and its derivative manipulations for vector calculus, followed by Section 3 where we present our model. In Section 4 we evaluate our method on a synthetic data set where we know the true potential function. We then demonstrate how our approach can interpret real-world data by applying it to the Scolopi's shear- water GPS data set in Section 5. Finally, we highlight the novelty of our work compared to the existing literature in Section 6 before concluding with future work in Section 7. 2 PRELIMINARIES As a requirement for our model, we introduce the Gaussian process, defined by its mean function µ(x) and covariance function K(x, x′) [23]. The mean and covariance functions are parameterised by their hyperparameters and encode prior information into the model, such as smoothness, periodicity and any known underlying behaviour. In our work, µ(x) is set to zero as our data is preprocessed to have a zero mean. We define a function, distributed via a GP, as follows: (1) Manipulating Gaussian identities using Bayes' rule gives formulae for the GP's posterior mean, f(x) ∼ GP(cid:0)µ(x), K(x, x′)(cid:1) . E[f (x∗)] = k⊤ xx∗(Kxx + σ 2I)−1y, (2) and posterior covariance, V[f (x∗)] = kx∗x∗ − k⊤ (3) where x∗ is a test point under question and σ 2 is the noise variance hyperparameter. xx∗(Kxx + σ 2I)−1kxx∗ , Any affine transformation of Gaussian distributed variables re- main jointly Gaussian distributed. As differentiation is an affine operation, applying this property to any collection of random vari- ables distributed by a GP, gives jointly Gaussian distributed deriva- tives, f′(x). For a test point x∗ and corresponding output f (x∗), the derivatives associated with the GP in Equation (1) are distributed with posterior mean, (cid:21) (cid:20) ∂n f (x∗) (cid:21) ∂xn∗ = ∂2nkx∗x∗ ∂xn∗ ∂xn∗ = ∂nk⊤ xx∗ ∂xn∗ − ∂nk⊤ xx∗ ∂xn∗ E (cid:20) ∂n f (x∗) ∂xn∗ V and posterior covariance, (Kxx + σ 2I)−1y, (Kxx + σ 2I)−1 ∂nkxx∗ ∂xn∗ . (4) (5) 2 -19.56-16.51-13.46-10.40-7.35-4.30-1.251.80 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∇ × V = i ∂ ∂x Vx j ∂ ∂y Vy k ∂ ∂z 0 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) = k (cid:18) ∂Vy ∂x (cid:19) . − ∂Vx ∂y (11) Additionally, by simple application of the appropriate operators, we may readily define the time-varying spatial Laplacian: ∇ · (∇ϕ) ≡ ∇2ϕ. (12) This (time-varying) Laplacian is of key importance as it defines sources and sinks in the spatial domain. It can be thought of as indicative of the flow in a vector field. Positive values denote attrac- tive regions, where the vector field indicates flow towards these regions, whereas negative values denote repulsive regions due to the vector field pointing in the opposite direction. 3 MODEL Our model builds upon the theory introduced in Section 2. The objective is to design a model that can indicate influential features in an agent's environment from observing their trajectories. A trajectory ζa for agent a is defined as a collection of times- tamped locations x ∈ R2 or tuples (x, t). The elements of the vector x are referred to as x and y for the purposes of this model and we continue to use the tuple X = (x, t) to refer to the domain of space and time. We also make the assumption that each agent acts ac- cording to a utility or potential function ϕ(x, t), which is dependent on space and time. Whilst interacting with the environment, each agent aims to maximise this utility function at all times. (cid:21)(cid:19) (cid:18) (cid:20) kx(t, t′) 3.1 Fitting to the agent trajectories The first component of GP-LAPLACE uses Equations (2) and (3) to fit a GP to each trajectory ζa. Using a single GP with a sepa- rable kernel, Equation (13) defines our GP prior over the x and y components of the path (cid:174)f: 0 p((cid:174)f) = GP . 0 0, ky(t, t′) (13) For each of the x and y components of (cid:174)f, a set of hyperparameters are learnt for the separable kernel. The input space of this GP model is time t and the output space consists of the x and y components of (cid:174)f. If an agent trajectory, ζa, consists of N data points, we can then further apply Equation (4) to infer higher order derivatives for each of the n data points, where we denote { (cid:219)fx , (cid:219)fy} and { (cid:220)fx , (cid:220)fy} as the first and second-order time derivatives in the x and y directions. Second-order derivatives are inferred at this stage, as we make the assumption that an agent acts in accordance with a second- order dynamical system, i.e. the agent obeys Newtonian dynamics. This assumption means that an agent's underlying utility induces a "force" of influence on the agent, thus generating an acceleration (we here take the 'influence-mass' of the agent as unity). More formally, this induces an acceleration equal to the derivative of the agent utility or potential: (cid:220)fx = (cid:220)fy = (14) , . ∂ϕ ∂x ∂ϕ ∂y Although we choose to infer second-order derivatives, the model is not limited to the assumption in Equation (14). The flexibility of our model means that we can also infer first-order terms, (cid:219)fx and 3 (cid:219)fy, along with other higher-order terms. Therefore, throughout the rest of this section, references to (cid:220)fx and (cid:220)fy can be considered easily interchangeable with these other derivative terms. When dealing with a multi-agent system of M homogeneous agents, a trajectory model can be calculated for each agent to form the set of joint distributions, (cid:110) p((cid:174)f, (cid:219)fx , (cid:219)fy , (cid:220)fx , (cid:220)fy ζa)(cid:111)M . a=0 From the posterior GP model we are able to jointly predict the ve- locity and acceleration at any point on an agent's trajectory for M agents. At this stage, we now have a collection of posterior deriva- tives and their corresponding location in X. If each of the agent trajectories has length N , then the size of X is M×N . The next layer of our model combines the outputs from the set of posterior distri- butions to construct a probability distribution over the extended agent environment. 3.2 Inferring the vector field and Laplacian In order to infer the gradient of the potential function, ∇ϕ(x, t), the set of inferred second derivatives for all M agents is propagated through a second GP, which also has a separable kernel model, as below: p (cid:32)(cid:34) (cid:16)(cid:174)V(x, t) { (cid:220)fx , (cid:220)fy , ζa}M (cid:35) (cid:34) The vector (cid:174)V(x, t) = (cid:2)Vx Vy post x post y = GP µ µ a=0 k , (cid:17) (cid:3)⊤ consists of two random variables (X,X′) 0 0 (X,X′) (cid:35)(cid:33) post y post x (15) k . that model the acceleration in the two axes and the superscript label 'post' refers to the calculated posterior mean and covariance. Equation (15) combines the M multiple agent paths into one model and enables predictions to be made at different points in space that are not constrained to a single agent trajectory as in Equation (13). The input-output pairs for this GP model are the x, y and t values in each ζa that correspond to the (cid:220)fx and (cid:220)fy values. cluded as The Newtonian assumption made in Section 3.1 is formally in- ∇ϕ(x, t) ∝ (cid:174)V(x, t). The distribution over the partial derivatives, (cid:20) ∂Vx ∂x (cid:21) , ∂Vy ∂y , ∂Vx ∂y , ∂Vy ∂x , can then be calculated from Equation (15) by applying Equations (4) and (5). We thus calculate a distribution over the divergence of (cid:174)V. It follows that this divergence is proportional to the Laplacian under the same assumption, ∇2ϕ(x, t) ∝ ∇ · (cid:174)V(x, t). (16) In particular, our interest lies in the estimation of the Laplacian of the utility function, as it indicates sources and sinks of the poten- tial function in the environment. In this context, we regard sinks as agent attractors and sources as agent repellers. We have therefore in- troduced a novel framework, which enables us to infer sources and sinks, in an unsupervised manner, to offer an explanation behind multiple observed agent trajectories. 3.3 Metric for locating significant attractors and repellers: Kullback -- Leibler divergence We now require a metric that is able to take advantage of having ac- cess to both the posterior mean and variance over sources and sinks in the environment. Therefore, our metric of change from prior field to posterior field is measured via the Kullback -- Leibler (KL) divergence [13]. The motivation for selecting the KL divergence comes from its ability measure a distance between two distributions. This provides a natural indication of the informativeness of spatial locations, at given times, and in the context of our application offers a measure of trajectory-influencing locations. Given the model at time t, each point in space has an associ- ated potential field distribution, defined via the GP posterior as a univariate normal distribution. The KL divergence can be readily calculated as the difference between two univariate normal distri- butions, namely the prior and posterior [8], as below: DKL(pprior pposterior) = 1 2 (µpo − µpr)2 (cid:18) σpo (cid:32) σ 2 − 1 + ln (cid:19)(cid:33) + , σpr pr σ 2 po σ 2 po (17) where (cid:17) , (cid:18) ∂Vx (cid:19) ∼ N(cid:16) pprior = N(µpr, σ 2 pr), pposterior = N(µpo, σ 2 po). following prior Laplacian at location Xi in space-time: We refer back to Equation (10) and (12) in order to calculate the ∂2kx(Xi ,X′ i) ∂2ky(Xi ,X′ i) + + + 0, ∂x ∂y2 ∂x 2 ∂y2 h2 y λ2 y ∂Vy ∂y where, ∂2kx(Xi,X′ i) . The hyperparameters hx and λx are the output and input scale lengths of the x-part of the separable kernel in the GP model, with hy and λy corresponding to the y-part. + ∂2ky(Xi,X′ i) ∂x2 = h2 x λ2 x As our interest lies in determining attractors and repellers in the field, a further addition to the KL divergence in Equation (17) is to multiply it by the sign of the posterior mean of the Laplacian. This multiplication carries over the prediction of negative sinks and positive sources, whilst measuring the divergence from the zero prior mean. We refer to this extension as the signed KL divergence: SDKL(pprior pposterior) = sign(µpo) DKL(pprior pposterior). (18) Large values in the SDKL indicate significant influential features in the agent environment, whereas small values around zero indicate that the model is likely to have reverted to its prior, the sensible prior being that there is no significant feature present. 3.4 Computational complexity In order to use GP-LAPLACE on large data sets, we must overcome the computational complexity associated with inverting the N × N covariance matrix, which is O(N 3). There is a vast amount of literature that aims to overcome this issue, such as [22], and we use the sparse GP approximation built into the python package gpflow [16]. This approximation is based on work by Titsias [28], which we choose to implement when the total number of data points, N , exceeds 1000. Using this sparse approximation allows our model to scale to large data sets, as will be shown in Section 5. 4 APPLICATION TO SYNTHETIC DATA As an illustrative example, we apply GP-LAPLACE to synthetic data, where the true potential function and its derivatives are known. Importantly, this example allows us to evaluate the performance of our approach. We are then able to build on these results for the real-world data set in Section 5, where we cannot possibly have access to the true potential function. This experiment consists of a multi-agent system of homoge- neous agents, whose dynamics we observe. Our goal is to infer, from trajectories alone, the underlying potential value function. We demonstrate that our approach is able to recover the potential field from a small number of agent trajectories by identifying the true sources and sinks. Therefore, we are able to recover trajectory- influencing locations in an unsupervised manner, with no prior knowledge of the environment. 4.1 Agent model Agents are modelled according to a second order dynamical system, whereby, at each time step t, the acceleration x, velocity x and position x, with η as the update increment, are given by: xt +1 = ∇ϕ(xt , t), xt +1 = xt + η xt +1, xt +1 = xt + η xt +1. 4.2 Agent potential function We define the causal potential function for our illustrative example as a Gaussian mixture model, where each Gaussian has both a time- varying mean µi(t) and covariance Σi(t) that change harmonically according to: αiN(cid:0)µi(t), Σi(t)(cid:1), K i =1 ϕ(x, t) = (19) where K defines the number of Gaussians and α is the weight of each corresponding Gaussian. For the purposes of our synthetic data, we can think of each Gaussian as a time-varying source or sink. In order to validate our results, the first and second order deriva- tives of ϕ(x, t) are calculated using the known derivatives of a multivariate normal distribution p(x) [18]: agent potential functions: (1) stationary attractors ϕ1(x, t) = 4 αiN(cid:0)mi , ci I(cid:1) K i =1 ∂p(x) ∂x = −p(x)Σ−1(x − m), ∂x∂x⊤ = p(x)(cid:16)Σ−1(x − m)(x − m)⊤Σ−1 − Σ−1(cid:17) ∂2p(x) . These derivatives are then used in conjunction with the vector calculus operations in Equations (10) and (12) to calculate the true Laplacian of the utility function, which is used as a ground truth in our experiment. For the purposes of our experiment, we define three different (2) varying-strength attractors ϕ2(x, t) = i =1 (3) rotating attractors ϕ3(x, t) = K αiN(cid:0)mi ,(sin(t + βi) + ci)I(cid:1) (cid:21) K , ci I(cid:1) αiN(cid:0)mi ⊙ (cid:20) cos t sin t i =1 where αi, βi and ci are constants, mi is a two-dimensional constant vector, and ⊙ denotes an element-wise product. Here, we set K = 2 for all three potential functions, along with enforcing αi > 0 to define attractors. Furthermore, we display the derivatives of these agent potential functions in Figure 2 to give an understanding of what they look like in practice. (a) Stationary attractors (b) Varying-strength attractors (c) Rotating attractors Figure 2: We display the three example vector fields intro- duced in Section 4.1. Their time-varing properties are dis- played by including three frames at different time-steps. Along with testing the performance of our model, we can also compare the vector fields in Figure 2 to those occurring in nature. As an example, a study by Sommer et al. [27] tracked fruit bats as they moved between their camps and foraging sites. As nocturnal animals, their foraging sites are time-varying attractors, whereby these sites become the most attractive at night. Therefore, it is important to test our model on the time-varying attractors displayed in Figure 2, where we have access to a ground truth, before applying our model to a real-world data set. 5 4.3 Experimental results For each of the three potential functions, we initialised M agents with a velocity of zero at random starting locations. The experiment stepped through 200 time-steps and our model is used to infer the vector field and Laplacian from the agent trajectories {ζa}M a=1 (see Equation (16)). As a baseline, we took a simple parametric function in x- and y-space ∇U = w0 + w1x + w2y + w3xy + w4x2+ w5y2 + w6x2y + w7xy2 + w8x3 + w9y3 (20) of order three to model the gradient of the potential function, com- parable to the approaches of [4, 5, 20]. Table 1 displays the results for the three experimental set-ups, where we have varied the number of M observed agent trajectories from 4 to 16. We vary the number of agents to demonstrate how the models behave and scale as they observe more agents. Each value in the table is the mean squared error between the inferred Laplacian ∇2 ϕ and the true Laplacian ∇2ϕ, along with their standard deviation. The results show that the parametric model was able to recover the general shape of ∇2 ϕ and often summarised the two attrac- tors as a bowl shape in the three experiments. In comparison, GP- LAPLACE was able to recover the exact shape of the attractors for all three experiments and therefore demonstrated the ability to model the non-stationary characteristics of the potential func- tions. A further result is that our model improved its accuracy as it observed more trajectories, which is a desirable property of the model, while the baseline did not consistently. In order to interpret the behaviour of our model, the subset of frames displayed in Figure 3 show how the attractors of the true potential function are tracked across time by both the posterior inferred Laplacian and the signed KL divergence. This figure high- lights how GP-LAPLACE is able to completely characterise rotating attractors from only observing four trajectories over 200 time-steps. In more detail, the signed KL-divergence gives a measure of sig- nificance of the inferred sinks, through taking into account the uncertainty. The black and white markers indicate the location of the rotating attractors given by the ground truth in the first row. For all three rows, regions of attraction are indicated by blue and it can be seen that the model is able to accurately track the true attractors across time. 5 APPLICATION TO REAL-WORLD DATA In this experiment, we investigate how GP-LAPLACE can be used to determine driving forces in the environment that impact an animal's behaviour. We begin with an overview of the data used, present our experimental results, and then conclude with a discussion. Unlike previous techniques for studying how animals interact with the environment, we don't rely on GPS data to build density maps to construct probability distributions of their likely locations [11, 14]. Furthermore, while more recent approaches have incor- porated time into these models [15], current methods do not focus on inferring the driving force behind animal actions and instead simply show where an animal is likely to be found. −202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123−202−3−2−10123 Table 1: Results displaying the mean squared error between the true Laplacian and the inferred Laplacian. Each experiment consisted of 200 time-steps with the listed means and standard deviations calculated over 10 different random initialisations of the agents. Number of agents 4 6.38 ± 2.84 Stationary attractors - GP-LAPLACE 8.27 ± 0.84 Stationary attractors - parametric Varying-strength attractors - GP-LAPLACE 62.37 ± 99.9 23.59 ± 7.23 Varying-strength attractors - parametric 13.72 ± 20.81 Rotating attractors - GP-LAPLACE 10.75 ± 2.50 Rotating attractors - parametric 8 2.20 ± 2.81 8.22 ± 0.48 0.88 ± 0.37 19.15 ± 3.37 2.05 ± 0.96 8.00 ± 1.19 12 0.55 ± 0.27 8.02 ± 0.13 0.64 ± 0.11 17.67 ± 1.95 0.78 ± 0.16 6.73 ± 0.91 16 0.35 ± 0.39 7.99 ± 0.49 0.58 ± 0.14 19.19 ± 2.59 0.51 ± 0.15 6.69 ± 0.61 Figure 3: Top row: Laplacian of true utility function. Middle row: inferred Laplacian of utility function. Bottom row: signed KL divergence. The location of the global minimum of the true Laplacian is indicated via the black and white markers. The predicted locations of the sinks, given by both the signed KL divergence and the posterior Laplacian, align well with their true locations, therefore demonstrating the success of our model on identifying non-stationary attractors. 5.1 Data We apply our model to a subset of Scolopi's shearwaters (Calonec- tris diomedea) [26] GPS data to infer the location of influential features in the environment of a MAS of pelagic seabirds. We use the same data set from Pollonara et al. (2015) [19], made available in a Movebank data package [30]. In their experiment, shearwaters were released 400 km from the colony in the northern Mediterranean Sea. Using GPS trackers, the birds' trajectories were mapped and inferences were made about the way in which they navigated. Importantly, the birds were split into separate groups depending on which senses were inhibited. From these, we focus on two sets of birds consisting of the control set and the anosmic set, with the latter unable to use their sense of smell. Of note is that we do not constrain each trajectory to be equally spaced in time, nor do we require the GPS readings to be time aligned across the trajectories. 5.2 Experimental Results In Figure 4, we present frames at different time-steps since the four control birds were released (in chronological order from left to right). Following previous work in this area [4, 5, 20], we focus on the divergence of the velocities of the birds. The top row is our inferred Laplacian, pointing out possible sources and sinks. The bottom row is the signed KL divergence, giving a measure of the significance of these features. Put into context, the birds' colony is slightly to the east of the northern part of Corsica, which is the island shown in the right side 6 Frame:56Frame:77Frame:97Frame:113Frame:146-5.63-4.55-3.48-2.40-1.32-0.240.831.91TrueLaplacian-5.63-4.55-3.48-2.40-1.32-0.240.831.91InferredLaplacian-44.84-38.94-33.05-27.15-21.25-15.35-9.46-3.56SignedKLdivergence of each frame. Therefore, we expect to see our model placing an attractive region in the vicinity of their nest (marker (5) in figure), which is evident from the dark blue region appearing in the top- right of each of the last three frames, which is an attractor we expect to see as the birds start to approach their nest. Furthermore, the first frame shows that the region in which the birds are released is inferred to be a source as the birds fly outwards from this location (marker 1 in figure). Whereas the control birds in Figure 4 tended to fly directly back to their colony, the anosmic birds flew north until they reached the southern coastline of France (marker (2) in figure). As pointed out in Pollonara et al. (2015) [19], these birds are thought to have relied more on visual cues associated with the coastline, rather than flying straight back to their nest. Figure 5 shows the mean of the signed KL divergence across time for both the anosmic and control set of shearwaters, normalised to be on the same scale. In Figure 5, a direct comparison can be seen between the two sets of birds. The left-hand side plot displays the mean across time for the control set of shearwaters, confirming that the bird colony is an attractor along with parts of the coastline of Corsica (marker (3) and (4) in figure). In contrast, the right-hand side plot for the anosmic shearwaters displays a different behaviour in both the distribution of the sources and sinks and in the trajectories themselves. As previously mentioned, the anosmic birds head North immediately after being released and use the coastline to recover their bearings (marker (1) and (2) in figure). Therefore our GP model, when taking the mean across time, clearly assigns the region along the coastline of southern France as an attractive region. Attributing the coastline as an attractive region to the anosmic birds agrees with the original suggestion by Pollonara et al. [19] that they navigate via 'following coastlines as a form of search strategy, or by recognition of land features previously encountered'. 5.3 Discussion A strength of our model is that there is no requirement to incorpo- rate prior information on the location of environmental features. In our application to the shearwater GPS data set, the model had no prior knowledge of the location of the birds' colony or the coastline of Corsica, yet is still able to identify them as significant features. Furthermore, a strength of our technique is the way it is able to display how attractors and repellers vary with time. It would not be desirable to build a model that labels the birds' release point as a source for the entire duration of the birds' flight, although a simple density map would clearly make this error. As shown in the frames of Figure 4, GP-LAPLACE only describes their release point as a source for the first few hours of the birds' flights and the colony only becomes an attractor towards the end of the time period. The results of this experiment mean that we are now able to take animal GPS data and infer which environment features are influ- encing their movements. We are not constrained by a requirement of modelling any details of the environment and therefore point to the generality of this technique as a flexible method that can be applied to many other data sets. The ability to model time-varying drivers in MASs points to further studies such as in Ellwood et al. [9], where we are interested in setting sampling rates for sensors 7 and also making predictions as to which area of the environment will be attractive at different times of the day. 6 RELATED WORK In this section, we refer to relevant work from both the GP literature and also from work relating to modelling GPS data. As already introduced as a baseline in Section 4.3, there exists other works which model agents as acting according to a potential field [4, 5, 20]. However, we show that GP-LAPLACE outperforms these methods due to the added flexibility of being able to model a time-varying potential function. There also exists alternative tech- niques for studying how animals interact with the environment, which often rely on using GPS data to build density maps to con- struct probability distributions of their likely locations [11, 14]. Although more recent approaches have incorporated time into these models [15], they do not focus on inferring the dynamics and the driving forces behind animal actions, which is one of our motivations for introducing GP-LAPLACE. When relating our use of GPs to previous work with vector fields, Wahlström et al. [29] uses GPs to directly model magnetic fields. This work applies divergence-free and curl-free kernels to enforce linear constraints on their models, where the idea of constraining kernels to be divergence-free and curl-free is extended in [12]. Our work extends on previous work in this area with the introduction of a model that takes advantage of the derivative properties of GPs to give distributions over the operations of vector calculus from lower order observations. We have shown that inferring distributions over these operations results in an interpretable methodology that has not been previously employed in the literature. 7 CONCLUSION AND FUTURE WORK In this paper, we present GP-LAPLACE, a technique for locating attractors from trajectories in time-varying fields. Through apply- ing Gaussian processes combined with vector calculus, we provide a model that is able to infer sources and sinks in the presence of multiple agents from their trajectories alone. Additionally, our prob- abilistic technique enables us to utilise the KL divergence to give a measure of significance of environmental features. To demonstrate the generality of our method, we applied it to two data sets. First, on our synthetic data set, we showed that GP-LAPLACE is able to reconstruct non-stationary attractors ef- fectively, with superior performance over the baseline parametric model. Next, in an unsupervised fashion, we applied our model to a real-world example where we were able to infer features of the environment, such as the release point and bird colony, without prior knowledge of the birds' surroundings. In future work, we will extend GP-LAPLACE to incorporate explicit agent interactions. As an example, work by Preisler et al. [20] included an interaction term in their potential function to measure the strength of disturbances as having an effect on elk movement. We will also look into applying our model to additional real-world data sets, in situations where discovering sources and sinks in the presence of multiple agents will offer further insight into the motivating factors behind agent behaviour. Figure 4: Top row: Inferred Laplacian of utility function. Bottom row: Inferred signed KL divergence. Both rows are superim- posed on a map of the northern Mediterranean Sea. Each frame represents a snapshot of the sources and sinks relating to the velocity flow of the four shearwaters for 48 hours starting from 11:00 pm 21st June 2012. Points of note: (1) Release point, (2) South of France, (3) North of Corsica, (4) South of Corsica, (5) Nest. Best viewed in colour. Figure 5: Left: Mean signed KL divergence for control shearwaters. Right: Mean signed KL divergence for anosmic shearwaters. Both plots contain trajectories of four separate shearwaters released at times similar times. Blue areas show attractive regions and the yellow denotes sources. The black outline corresponds to landmass, where the top is part of the southern French coastline and the island on the right is Corsica. Over a similar time period, the difference in behaviour can be seen from both the routes taken by the birds and the average placement of the sources and sinks. Points of note: (1) Release point, (2) South of France, (3) North of Corsica, (4) South of Corsica, (5) Nest. Best viewed in colour. ACKNOWLEDGMENTS Adam D. Cobb is sponsored by the AIMS CDT (http://aims.robots. ox.ac.uk) and the EPSRC (https://www.epsrc.ac.uk). Richard Everett is sponsored by the UK EPSRC CDT in Cyber Security. We also thank Ivan Kiskin for extensive comments and feedback. REFERENCES [1] Pieter Abbeel and Andrew Y Ng. 2004. Apprenticeship Learning via Inverse Reinforcement Learning. In Proceedings of the twenty-first international conference on Machine learning. ACM, 1. [2] Stefano V Albrecht and Peter Stone. 2017. Autonomous Agents Modelling Other Agents: A Comprehensive Survey and Open Problems. arXiv preprint arXiv:1709.08071 (2017). [3] Mauricio A Alvarez, Lorenzo Rosasco, Neil D Lawrence, et al. 2012. Kernels for Vector-Valued Functions: a Review. Foundations and Trends ® in Machine Learning 4, 3 (2012), 195 -- 266. 8 [4] DR Brillinger, HK Preisler, MJ Wisdom, et al. 2011. Modelling particles moving in a potential field with pairwise interactions and an application. Brazilian Journal of Probability and Statistics 25, 3 (2011), 421 -- 436. [5] David R Brillinger, Brent S Stewart, Charles L Littnan, et al. 2008. Three months journeying of a Hawaiian monk seal. In Probability and statistics: Essays in honor of David A. Freedman. Institute of Mathematical Statistics, 246 -- 264. [6] PR Brook, A Karastergiou, S Johnston, M Kerr, RM Shannon, and SJ Roberts. 2016. Emission-rotation correlation in pulsars: new discoveries with optimal techniques. Monthly Notices of the Royal Astronomical Society 456, 2 (2016), 1374 -- 1393. [7] Wei Chu and Zoubin Ghahramani. 2005. Preference Learning with Gaussian Processes. In Proceedings of the 22nd international conference on Machine learning. ACM, 137 -- 144. [8] John Duchi. 2007. Derivations for Linear Algebra and Optimization. Berkeley, California (2007). [9] Stephen A Ellwood, Chris Newman, Robert A Montgomery, Vincenzo Nicosia, Christina D Buesching, Andrew Markham, Cecilia Mascolo, Niki Trigoni, Bence Pasztor, Vladimir Dyo, et al. 2017. An active-radio-frequency-identification system capable of identifying co-locations and social-structure: Validation with -2.80-2.15-1.51-0.87-0.230.421.061.70Inferred Laplacian12345-4.17-3.00-1.82-0.650.531.702.884.06Signed KL divergence12345Mean signed KL divergence for control shearwatersMean signed KL divergence for anosmic shearwaters-5.38-4.25-3.11-1.97-0.840.301.442.571234512345 a wild free-ranging animal. Methods in Ecology and Evolution 8, 12 (2017), 1822 -- 1831. [10] Tracy Holsclaw, Bruno Sansó, Herbert KH Lee, Katrin Heitmann, Salman Habib, David Higdon, and Ujjaini Alam. 2013. Gaussian Process Modeling of Derivative Curves. Technometrics 55, 1 (2013), 57 -- 67. [11] Jon S Horne, Edward O Garton, Stephen M Krone, and Jesse S Lewis. 2007. Analyzing animal movements using Brownian bridges. Ecology 88, 9 (2007), 2354 -- 2363. [12] Carl Jidling, Niklas Wahlström, Adrian Wills, and Thomas B Schön. 2017. Linearly constrained Gaussian processes. arXiv preprint arXiv:1703.00787 (2017). [13] Solomon Kullback and Richard A Leibler. 1951. On Information and Sufficiency. The annals of mathematical statistics 22, 1 (1951), 79 -- 86. [14] Peter N Laver and Marcella J Kelly. 2008. A Critical Review of Home Range Studies. Journal of Wildlife Management 72, 1 (2008), 290 -- 298. [15] Andrew J Lyons, Wendy C Turner, and Wayne M Getz. 2013. Home range plus: a space-time characterization of movement over real landscapes. Movement Ecology 1, 1 (2013), 2. [16] Alexander G. de G. Matthews, Mark van der Wilk, Tom Nickson, Keisuke. Fujii, Alexis Boukouvalas, Pablo León-Villagrá, Zoubin Ghahramani, and James Hens- man. 2017. GPflow: A Gaussian process library using TensorFlow. Journal of Machine Learning Research 18, 40 (April 2017), 1 -- 6. http://jmlr.org/papers/v18/ 16-537.html [17] Andrew McHutchon. 2013. Differentiating Gaussian Processes. http://mlg.eng. cam.ac.uk/mchutchon/DifferentiatingGPs.pdf. (2013). [18] Kaare Brandt Petersen, Michael Syskind Pedersen, et al. 2008. The Matrix Cook- book. Technical University of Denmark 7 (2008), 15. [19] Enrica Pollonara, Paolo Luschi, Tim Guilford, Martin Wikelski, Francesco Bonadonna, and Anna Gagliardo. 2015. Olfaction and topography, but not mag- netic cues, control navigation in a pelagic seabird: displacements with shearwa- ters in the Mediterranean Sea. Scientific reports 5 (2015). [20] Haiganoush K Preisler, Alan A Ager, and Michael J Wisdom. 2013. Analyzing animal movement patterns using potential functions. Ecosphere 4, 3 (2013), 1 -- 13. [21] Martin L Puterman. 2014. Markov decision processes: discrete stochastic dynamic programming. John Wiley & Sons. [22] Joaquin Quiñonero-Candela and Carl Edward Rasmussen. 2005. A unifying view of sparse approximate Gaussian process regression. Journal of Machine Learning Research 6, Dec (2005), 1939 -- 1959. [23] Carl Edward Rasmussen. 2006. Gaussian Processes for Machine Learning. (2006). [24] Stephen Roberts, M Osborne, M Ebden, Steven Reece, N Gibson, and S Aigrain. 2013. Gaussian processes for time-series modelling. Phil. Trans. R. Soc. A 371, 1984 (2013), 20110550. [25] Stuart Russell. 1998. Learning agents for uncertain environments. In Proceedings of the eleventh annual conference on Computational learning theory. ACM, 101 -- 103. [26] George Sangster, J Martin Collinson, Pierre-André Crochet, Alan G Knox, David T Parkin, and Stephen C Votier. 2012. Taxonomic recommendations for British birds: eighth report. Ibis 154, 4 (2012), 874 -- 883. [27] Philipp Sommer, Jiajun Liu, Kun Zhao, Branislav Kusy, Raja Jurdak, Adam McKe- own, and David Westcott. 2016. Information Bang for the Energy Buck: Towards Energy-and Mobility-Aware Tracking.. In EWSN. 193 -- 204. [28] Michalis K Titsias. 2009. Variational Learning of Inducing Variables in Sparse Gaussian Processes. In AISTATS, Vol. 5. 567 -- 574. [29] Niklas Wahlström, Manon Kok, Thomas B Schön, and Fredrik Gustafsson. 2013. Modeling Magnetic Fields Using Gaussian Processes. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 3522 -- 3526. [30] M Wikelski and R Kays. 2014. Movebank: archive, analysis and sharing of animal movement data. www.movebank.org. (2014). [31] Alan M Wilson, JC Lowe, K Roskilly, Penny E Hudson, KA Golabek, and JW McNutt. 2013. Locomotion dynamics of hunting in wild cheetahs. Nature 498, 7453 (2013), 185. 9
1203.0714
1
1203
2012-03-04T06:19:48
Towards an intelligence based conceptual framework for e-maintenance
[ "cs.MA" ]
Since the time when concept of e-maintenance was introduced, most of the works insisted on the relevance of the underlying Information and Communication Technologies infrastructure. Through a review of current e-maintenance conceptual approaches and realizations, this paper aims to reconsider the predominance of ICT within e-maintenance projects and literature. The review brings to light the importance of intelligence as a fundamental dimension of e-maintenance that is to be led in a holistic predefined manner rather than isolated efforts within ICT driven approaches. As a contribution towards an intelligence based e-maintenance conceptual framework, a proposal is outlined in this paper to model e-maintenance system as an intelligent system. The proposed frame is based on CogAff architecture for intelligent agents. Within the proposed frame, more importance was reserved to the environment that the system is to be continuously aware of: Plant Environment, Internal and External Enterprise Environment and Human Environment. In addition to the abilities required for internal coherent behavior of the system, requirements for maintenance activities support are also mapped within the same frame according to corresponding levels of management. A case study was detailed in this paper sustaining the applicability of the proposal in relation to the classification of existing e-maintenance platforms. However, more work is needed to enhance exhaustiveness of the frame to serve as a comparison tool of existing e-maintenance systems. At the conceptual level, our future work is to use the proposed frame in an e-maintenance project.
cs.MA
cs
Towards an intelligence based conceptual framework for e-maintenance Abdessamad Mouzoune QSM Laboratory - CEDOC / EMI, Mohammed V University – Agdal, Rabat, Morocco [email protected] Abstract. Since time when concept of e-maintenance was the introduced, most of the works insisted on the relevance of the underlying Information and Communication Technologies infrastructure. Through a review of current e-maintenance conceptual approaches and realizations, this paper aims to reconsider the predominance of ICT within e-maintenance projects and literature. The review brings to light the importance of intelligence as a fundamental dimension of e- maintenance that is to be led in a holistic predefined manner rather than isolated efforts within ICT driven approaches. As a contribution towards an intelligence based e-maintenance conceptual framework, a proposal is outlined in this paper to model e-maintenance system as an intelligent system. The proposed frame is based on CogAff architecture for intelligent agents. The architecture decomposes the agent into three layers (perception, central processing and action) with a hierarchical vision of three levels. W ithin the proposed frame, more importance was reserved to the environment that the system is to be continuously aware of: Plant Environment, Internal and External Enterprise Environment and Human Environment. In addition to the abilities required for internal coherent behavior of the system, requirements for maintenance activities support are also mapped within the same frame according to corresponding levels (strategic, tactical and operational management). A case study was detailed in this paper sustaining the applicability of the proposal in relation to the classification of existing e-maintenance platforms. The case study also underlined two issues of existing e- maintenance solutions regarding real integration of the system into human teams and more integration at the management strategic level. However, more work is needed to enhance exhaustiveness of the frame to serve as a comparison tool of existing e-maintenance systems. At the conceptual level, our future work is to use the proposed frame in an e- maintenance project that will have the two mentioned issues as an objective. Keywords: E-maintenance, Artificial Intelligence , Intelligent System , Framework, CogAff 1. Introduction 2 E-maintenance has been discussed in many maintenance related literature with different perspectives. E-maintenance basically refers to the integration of the information and communication technologies (ICT) within the maintenance strategy or plan (Chowdhury and Akram 2011). While perpetual development in ICT is providing new opportunities to the existing cultures of maintenance, e-maintenance seems to be predominately ICT-driven, meaning that the creation of innovative engineering solutions advanced the practice and research of e-maintenance (Haftor et al.2010). Reconsidering the distributed artificial intelligence environment generating e- maintenance system, this work aims firstly to highlight the importance of intelligence as a fundamental dimension that conceptual frameworks for e-maintenance may gain by being based on. The rest of the paper is organized as follows: Section2 reviews e-maintenance as an ICT based system. Section 3 explores e-maintenance as an intelligent system and a frame is then proposed to map it from an intelligence point of view. In section 4 a case study is detailed using the proposed frame. In the last sections, our proposal is discussed defining future work to be done. 2. Background: ICT driven e-maintenance models Maintenance is defined by the European Committee for Standardization (EN 13306:2001) as the combination of all technical, administrative and managerial actions during the life cycle of an item intended to retain it in, or restore it to, a state in which it can perform the required function (function or a combination of functions of an item which are considered necessary to provide a given service). The same standards defines maintenance management as all the activities of the management that determine the maintenance objectives or priorities, strategies, and responsibilities and implement them by means such as maintenance planning, maintenance control and supervision, and several improving methods including economical aspects in the organization. Maintenance Management includes corrective, preventive and proactive maintenance, inventory and procurement, work order system, computerized maintenance management systems (CMMS), reliability centred maintenance, total productive maintenance, financial optimization, technical training, and continuous improvement. From an organizational point of view, maintenance management must align actions at three levels of business Activities. Referring to (Márquez, Adolfo Crespo. 2007) ), this means: The Strategic level establishes maintenance priorities in accordance with business priorities. This priorities transformation materialized by a generic maintenance plan will establish critical targets in current operations. In addition, maintenance management at this level is responsible to decide on skills and technologies requirements to improve maintenance effectiveness and efficiency. The tactical level of maintenance management is responsible of the correct assignment of maintenance resources to fulfill the maintenance plan. Hence, detailed 3 maintenance requirements planning and scheduling are established at this level. Tactical maintenance policies are to be improved with experience. The operational level ensures that the maintenance tasks are carried out by skilled technicians, in the time scheduled, following the correct procedures, and using the proper tools. This level of maintenance management is also responsible of data to be recorded for diagnosis and/or prognosis purposes. In addition, Information and Communication Technologies (ICT) is considered as one of the maintenance pillars beside maintenance engineering methods and organizational ones (Crespo Marquez, Adolfo, and Jatinder N.D. Gupta.2006). In fact, CMMS are among the first historical steps of maintenance information systems (Rasovska et al. 2007). W ith the increasing development of ICT, other steps followed namely tele-maintenance, e-maintenance and semantic e-maintenance (s- maintenance). The main issue of these steps globally referred to as “e-maintenance ” is integrating different systems relative to maintenance into one information system. Since the time when concept of e-maintenance was introduced, most of the works insisted on the relevance of the underlying ITC infrastructure. Referring to (Arnaiz et al. 2010), technology sources are basically : Devices miniaturization increasing the ways data can be acquired including mobile systems. Extension of communication technologies including wireless and usage of the Internet as a main distributed platform for business operation. Supported by specific information standards for systems interoperability, such as MIMOSA and OSA-CBM, ICT, technologies include: - New Sensor Systems such as smart sensors —MEMS, perfo rming Condition- Based e-maintenance and RFID (Radio Frequency Identification Device), storage of conventional data - PDA (Personal Digital Assistant), SmartPhones, Graphic tablets, harden laptops, and other mobile devices, - W ireless technologies mainly Bluetooth (IEEE 802.15.1) and ZigBee (IEEE 802.15.4) , In short, (Muller et al. 2008) attributes the e-maintenance emergence its self to two main factors that are (1) E-technologies allowing optimization of maintenance related workflow; and (2) Integrating business performance, and dealing with openness, integration, and collaboration with the other services of the e-enterprise. Ample literature exists on design, development, and integration of e-maintenance within enterprise processes , including theories and practical applications, without any consistent definition as shown by a set of different e-maintenance definitions listed in (Arnaiz et al. 2010). In relation to our topic, none of those definitions explicitly mention intelligence as a fundamental characteristic of e-maintenance. Nevertheless, each implicitly recognizes such an importance especially when it comes to real time data processing and automation of some maintenance tasks. When explicit mention of intelligence is needed, an adjective is added to corresponding system as in “Intelligent Maintenance System ” reported in an editorial of “Com puters in Industry” (2006)): intelligence is defined as ‘ ‘the ability to monitor plant floor assets, link the production and maintenance operations systems, collect feedbacks from remote customer sites, and integrate it in upper level enterprise applications. ’ ’ In fact, from tele-maintenance to semantic e-maintenance, the major concern was integration, communication and interoperability in an ICT driven e-maintenance development. ICT is a fundamental dimension that enhances cooperative and 4 collaborative characteristics of maintenance activities. Being so, ICT are at the base of every definition of e-maintenance. The predominance of ICT dimension in textual frameworks represented by different definitions of e-maintenance is replicated on conceptual ground. Nevertheless, this predominance is more and more rectified by some conceptual frameworks to include strategic vision, business processes and organizations as in (Iung et al. 2009): Following the Zachman framework founded as an information system architecture framework (Zachman, John A. 1999) and later presented as an enterprise architecture, a comprehensive conceptual e-Maintenance framework is proposed based on five abstraction levels. These are (1) E-maintenance strategic vision (business and goal) which supports the ‘ ‘scope ’ ’, (2) E-maintenance bus iness processes which support the Business view, (3) E-maintenance organization which supports the Architect ’s view, (4)E-maintenance service and data architecture which supports the designer ’s view, and(5) E-maintenance IT infrastructure supporting the builder ’s view. Another conceptual framework aiming same objective to limit such an ICT predominance is presented in (Haftor et al. 2010) based on Information Logistics as a Driver for Development. Information logistics are defined as the provision of information for the knowledge worker within the correct context, enabling him or her to make the right decision (Logistics - W ikipedia. 2012). In general terms, though known frameworks, recognize the need for intelligence within e-maintenance systems, none of them goes beyond a shallow model of that dimension. Meanwhile, several industrial and academic e-maintenance platforms have been developed and are in use today. W ithin such platforms, artificial intelligence in general and machine learning algorithms in particular are by far important enablers to model maintenance tasks such as condition monitoring, prognostics, prognosis and decision support. For PROTEUS platform, a generic artificial intelligence (AI) template is defined in (Déchamp et al. 2004) to specify how AI tools must be integrated into the platform for a given diagnosis or prognosis task. More generally, (Muller et al. 2008) reports a state of the art of contributions in the field of e-maintenance classified according to required capabilities (i.e. Remote, Collaborative, Predictive maintenance and Knowledge capitalization )and needs intended to be responded ( i.e. Security/reliability of data, Interoperability, Maintenance integration, Collaboration/MAS, Processes formalization and Knowledge management). According to the mentioned report, few platforms such as TELMA and DYNAMITE undertake works on the whole specter of the chosen capabilities with respect to corresponding needs. Interesting case of IMS/D2B ™ is reported to b e focusing specifically on predictive maintenance and maintenance integration. The mosaic of contributions to enhance e-maintenance components with new AI based capabilities within known platforms are then rarely held in a holistic predefined manner. The way intelligence dimension is led bears yet a resemblance to a kind of more or less successful montage upon given ICT infrastructure. 5 3. Proposal: Towards intelligence based e-maintenance models Intelligence is the base of capabilities intended from e-maintenance concept at every business level strategic, tactical or operational levels. Hence, a global view of this ubiquitous dimension enhances mastering its contribution to global and even changing goals designed for an e-maintenance system. In this work, our intention is to contribute to converging efforts to satisfy real capabilities expected from e-maintenance as an intelligent system within a holistic approach towards an intelligence based framework. This can be understood as a framework where strategy aliened business view is immediately used to design a platform independent intelligence view and then, platform specific and ICT views identify technical possibilities to implementation. Such a framework is intending consensus between globalism in generally Zachman based frameworks and specialism of those focused on limited capabilities and needs. In this work, we focus on the platform independent intelligence view. In the general Zachman based framework proposed in (Iung et al. 2009), intelligence was mainly mentioned within the organization layer that must support the business process integration. After the mentioned paper, the organization expected for e-maintenance (based on collaborative –cooperative a spects) should be close to the IMS (Intelligent Manufacturing System) paradigm (Hiroyuki, and Yoshikawa. 1995) stating that the system behavior emerges through the dynamics of the interactions of basic maintenance agents within IMS the maintenance environment. Among weaknesses, modeling is mentioned in some literature as in (Thomas, Philippe, and André Thomas. 2011). After these authors, that weakness is due to the lack of uniformity in criteria to achieve modeling which makes it very difficult to compare different applications proposed in literature. Our proposal must then deal with such modeling weakness and permit comparison between different proposed e- maintenance solutions. In (Jacek Jakie ła, Bartosz Pomianek .2009), authors a rgue that agent orientation may be considered as a powerful paradigm for organization modeling and the reference architecture for Management Information Systems, that if properly applied, would lead to firm’s overall performance improvemen t. A Multi-Agent System is defined by the authors as a set (society) of decentralized software components, that are carrying out tasks collaboratively in order to achieve a goal of the whole society: those characteristics are among number of similarities between structural and behavioral characteristics of modern organizations and multi- agent systems. Consequently, we will think the whole e-maintenance system as an intelligent system –i.e. a system with artificial intelligence (Intelligent system – W ikipedia. 2012)- interacting with other constituents of the enterprise as part of its environment to achieve the global enterprise goals. At this point, our work reconsider in a direct and different manner the suggestion of “distributed art ificial intelligence environment ” when referring to e-maintenance in (Crespo Marquez, Adolfo, and Jatinder N.D. Gupta.2006). Agent metaphor will then be used in this paper to model e-maintenance system as a whole. Agent definition as well as agent modeling differs from an AI searcher to another according to their own objectives, presuppositions and conceptual frameworks. Sloman, Aaron, and Matthias Scheutz. (2002) introduce a framework for comparing 6 agent architectures: the general CogAff architecture is based on superimposing (1) the distinction between perceptual, central and action components, and (2) a distinction between types of components which evolve at different stages and provide increasingly abstract and flexible processing mechanisms. The reactive components generate goal seeking reactive behavior, whereas the middle layer components enable decision making, planning, and deliberative behavior. The modules of the third layer support monitoring, evaluation and control of the internal process in other layers and levels. We retain CogAff architecture as the main candidate to stand our proposal due to (1) its founding intention to serve as comparison tool of different solutions, and(2) similarities between its three level hierarchy and the three level of business activities here above mentioned. Furthermore, according to (Yan et al. 2003), agent roles and role models provide a vocabulary for describing agent systems, with each role describing a position and a set of responsibilities within a certain context or role model. This approach encourages us to think of the problem in terms of roles that need to be played, and the responsibilities associated with each role. Hence, in this section, each component of the CogAff architecture (perception, reactive, deliberative and reflexive layers and action) will be thought as the role intended from that component from a conceptual point of view. Multiple such roles may be assigned to a real agent within particular implementation. This way, the main objective of classification to meet the largest ways of implementations is respected. The proposed frame, referred to as E-CogAff in the figure here after (fig.1), summarizes our vision to e-maintenance system as an intelligent system called to be more aware of its entire -if not extended- environment. The rest of this section gives details of the frame. 7 Fig. 1 E-CogAff : an application of CogAff to e-maintenance system as an intelligent system. 3.1. Perception Layer The role of the perception horizontal layer is responsible of providing central processing layer with information based on data received from different Environment sources. Here, data are to be processed in a hierarchical manner and categorized into different levels of abstraction allowing the central layer to assess the situation of its environment and to make appropriate decisions. The most direct intelligent system abilities that are candidates to be classified within the perception horizontal layer are: - Data acquisition and pre-processing to detect and remove discrepancies such as outliers and missing data. - Data reconciliation - Data fusion that will help the planning layer assess the situation of the external environment and to make appropriate decisions. 8 - Database management system In general, the perception layer must deal with all aspects of data processing and categorizing issues. Data are either manually (e.g. Murphy, Glen D. 2009) or automatically (e.g. Gilabert et al. 2011) collected. Therefore, data quality is of a major concern within the perception subsystem. Several research studies have indicated that most organizations do have data quality problems (Lin et al. 2006). Accuracy, Completeness, Currency, Consistency and reliability are some of the common dimensions in literature dealing with data quality assessment within information systems as in (Piprani, Baba, and Denise Ernst. 2008). In fact, data quality dimensions characterize properties that are inherent to data. Such dimensions concern data values as well as logical schema or data format to satisfy specific set of semantic rules. Source reliability, defined as the credibility of a source organization with respect to provided data quality values, depends on the cooperative context in which data are exchanged. In general, security issues are to be tackled within this layer. 3.2. Central Processing Layer The central processing horizontal layer is composed with three hierarchical levels corresponding to strategic, tactical and operational levels of both internal capabilities of the system and different activities of the e-maintenance processes. Strategic/Reflective Level The Strategic/Reflective Layer is responsible of providing the ability to monitor, evaluate, and control other components of the architecture. Assuring required level of awareness of the system environment, this layer is to notice and categorize suspicious situations, and through deliberation or observation over an extended time period develop a strategy to deal with such situations. Furthermore, this level coordinates other modules so as to make the whole system performance more robust and coherent assessing credibility of each module's behavior by monitoring their internal states. In addition to monitoring, evaluating and control abilities regarding both internal behavior and e-maintenance activities performances , this level is also responsible of assistance in a cooperative manner for maintenance strategic managers. Its responsibility field covers maintenance contribution in an Executive Management Information System as well as interactive search for appropriate strategic goals and plans to maintenance activities within changing internal and external enterprise Environment. Such ability is of great help for maintenance managers dealing with uncertainty- especially within a risk based management approach (S öderholm, Peter, and Ramin Karim. 2011)- enabling a linkage of e-maintenance to the strategic goals of an organization. In such a case, artificial intelligence paradigms in this layer are to address issues concerning some kind of subjective and uncertain aspects of strategic management. Probabilistic methods as well as possibilistic ones such as fuzzy logic based algorithms are among solutions to deal with a certain level of such aspects. Tactical/Deliberative Level 9 Proactive behavior is achieved in the system in its deliberative layer, which is responsible for governing the system's actions in normal and abnormal circumstances. The choice of the appropriate artificial intelligence paradigm is very crucial to the high performance and real-time requirements of this layer to be endowed with appropriate abilities of planning, reasoning, learning and problem solving: Expert systems, case- based reasoning systems, neural networks are among solutions for such a requirement with different strengths and weaknesses to be taken into account in a given context. Such artificial intelligence requirements are to address different issues including exceptional processing regarding time or resources required by certain maintenance policies: reliability centered maintenance, opportunistic maintenance, health/care management, knowledge management and asset life cycle management. In general, in addition to the supervision of the system in coordination with the reflective layer, this layer is also responsible of interactive decision support towards tactical maintenance managers. Operational/Reactive Level The reactive layer provides direct responses to events that occur in the environment. Inspection and condition based maintenance is the major element of this layer. Many artificial intelligence paradigms can coexist in this layer with appropriate mechanism for collaborative problem-solving concept. This layer is also to support maintenance staff in their daily activities providing them with the right information at the right time and the right place, asking for required data and alerting in case of errors or lack of provided data among other interactive functionalities. 3.3. Action Layer The action layer concretizes plans that are decided in the central layer within a hierarchically organized manner. Among responsibilities of this layer are Maintenance Planning and scheduling, different presentation tasks towards human Environment, updating adequate internal and external Environment and eventually acting on the plant Environment. 3.4. Environment The intelligent system is intended to act on its perceived environment in a way to achieve its maintenance goals and thereby enterprise common goals. We decompose such an environment into four categories as follows: Human Environment 10 This includes all human agents that are to interact with the system in relation to maintenance. Be it management, executive or functional and technical staff or human experts, contractor ’s team members, constructor ’s a fter-sale responsible and so on. Some interactive activities are listed within the three levels of the central layer. Interactivity can be understood as simple information exchange as well as the way the system enables supporting individual maintenance team members in completion of their own tasks or the team as a whole. Plant Environment This environment includes mainly: - Sensors regarding physical assets condition (vibration, oil analysis …) as well as operational conditions (temperature, voltage,...) - Actuators in case of integrated control (emergency shutdown, …) or self- maintainable assets. Enterprise Environment In the enterprise environment, a distinction is made between internal and external environment to allow useful differentiation in the system perception regarding those environments. External environment needs more prudence such as evaluation of the credibility of a source organization. Internal Enterprise Environment The internal enterprise environment includes every system fully accessible to the maintenance system in a manner to allow it adjust its goals and its way to achieve them, as well as contributing in the achievement of the common goal of the enterprise. The main department in daily direct relation with maintenance are typically: Human resources (availability, skills, training, salaries …), Production (operational plan …), MRO Inventory and Purchasing (Maintenance Repair Operations requirement), Finances (costs ….) Regardless to their geographical position or the level of their intelligence, internal systems include Management and Executive Information Systems, Asset Management Systems, Enterprise Resource Planning and CMMS External Enterprise Environment External environment include every system not owned by the enterprise offering services to the maintenance system or cooperating occasionally or permanently to achieve predefined goals. Following systems are examples: Inter Enterprise databases such as reliability databases of a common industrial sector, external knowledge and experts systems, external catalogues and machines manufacturer’s ser vices that do not introduce human agents. This includes the case of exchange of reliability data for and from maintenance system especially when redesign is needed. 4. Case study: DINAWEB 11 In this section, we ’ll use our proposed frame to de monstrate its applicability in studying the case of Dynaweb platform: an ICT architecture related to software web services and communication architecture that support the e-maintenance concept within an integrated European project Dynamite (Dynamic Decisions in Maintenance). W ith its 16 partners, Dynamite Project is a real leader promoting e-maintenance concept either in (1)developing condition monitoring sensors and smart tags, (2) introducing mobile & wireless devices and technologies to support maintenance and diagnosis and prognosis based on WebServices or (3)developing training and economical studies related to maintenance strategy. This section is mainly based on information given in (Jantunen et al. 2009) as reported within the 4th World Congress on Engineering Asset Management, 28-30 September 2009, Athens, Greece. In that conference, important results of Dynamite were discussed with reference to project deliverables here after referred to as DWC followed by the number of some of them. The software architecture of DynaWeb is based on software components offering intelligent distributed web services and was demonstrated in architectures with logically structured decision layers based on the open systems architecture for CBM definition, from condition monitoring to decision support, and provides automated extraction of results(Irigaray et al. 2009). As explained in the main source of this section, different software modules are able to communicate with each other in order to perform a specific task. Indeed, in this context of Dynaweb, information processing is understood as a distributed and collaborative system, where there are different levels of entities that can undertake intelligent tasks. Hence, this case presents features of e-maintenance as an intelligence system as required by our proposed frame. The perception layer is materialized within Dynaweb by its MIMOSA database which follows the ISO 13374 standard: Machine Condition Assessment Data Processing Information Flow Blocks. The central processing layer is based on corresponding layers of OSA-CBM standard that are condition monitoring , health assessment, Prognostics and Decision support . W ithin this central we can recognize following constituents: The operational/reactive level of our frame that corresponds to DWC19 is related to state detection: Measurements received from sensors and their signal processing software are compared to expected values, and alerts are generated in case of anomaly detection. The tactical/deliberative level is well developed within that project. In case of an anomaly detected by condition monitoring modules DWC20 generates health records. Faults are then identified based on health history, operational status and maintenance tasks history. Primary focus of the prognostic module DWC21 is to calculate the future health of an asset and report remaining useful life, taking into account results from DWC 19 and DWC20. The strategic/reflexive level is yet focusing on the only maintenance costs aspect instead of a more global vision based on what maintenance provides and what are its global purposes and benefits. DWC24 refers to a set of modules developed within the Dynamite project for enabling economical analysis related to maintenance. Action layer in Dynaweb is mainly presentations, messages and generally information submitted to the destination of different environment constituents. In 12 addition to these functionalities, special attention was given to maintenance scheduling in DWC13 and DWC23. Plant Environment is by far the most important field concentrating efforts within dynamite project since its starting in 2005. A number of new sensors were developed in this project including vibration (DWC12) and on-line oil analysis sensors. In DWC3 , a multi sensors approach for monitoring vibration, pressure and temperature was concretized based on MEMS technology. Also, a wireless sensor network system, including ZigBee sensing nodes and Zigbee to W ifi gateways, was developed within DWC15 and DWC18. For on-line monitoring of lubricating oil five different types of sensors were developed within DWC4 to DWC8. Most of the developed sensors are based on optical methods. In addition, RFID tags was studied within Dynamite project for the identification of machines to be maintained (DWC1, DWC10, DWC2 and DWC11) and the report mentioned that more research are still needed for commercial use. In relation to the Human Environment, PDAs play a central role in the Dynamite project. The report explains that the PDA are used for accessing measurements data, studying the measurement results, communicating with the diagnosis and prognosis modules, handling of work orders, studying instructions for maintenance work and so on. Furthermore, in DWC9 it is assumed that it must be possible to use the PDA to support maintenance even if wireless connection is not available. Integrating e-maintenance system with its Enterprise Environment is considered within Dynamite project as a key to the success of current e-Maintenance solutions. Referring to the mentioned report, information integration has been pursued by adopting interoperable XML based data exchange formats, operational level data exchange protocols and maintenance-oriented data format definitions. Finally, networking integration has been also pursued through the combined use of wired and wireless communications. However, issues related to performance degradation due to wireless networking are mentioned in the report. Furthermore, CMMS and ERP as essential constituents of e-maintenance system enterprise environment are reported still not fully addressed. In deed, many CMMS and ERP solutions do not necessarily support required data interoperable formats. Finally, it’s useful to end this case study with so me results of industrial demonstrations related to DynaWeb solution. The aim of such industrial demonstrations was to integrate the technological and information technology strands in a business sense and to verify the effectiveness of the complete DynaWeb solution as reported in (Mascolo et al. 2010): The overall result is reported to be globally positive, with technical and economical feasibility proven. However, in an interesting case where the feasibility of integrating the DynaWeb components to form the e-maintenance architecture has been tested on the TELMA Platform, integration issues were still reported. The TELMA was developed mainly for supporting e-maintenance purposes, from both educational and research points of view. According to the same report, tests of feasibility and architecture aspect were held into (1)Internal test, to test the function of each ICT component of the DynaWeb platform and validate its ability to tackle real data, and (2) Integration test, to integrate all components and validate the ability of the Dynaweb platform to tackle an e-maintenance problem from sensor detection, to high level decision and scheduling. Concerning the internal tests, the results are reported to be positive while the results of the integration tests are less positive. According to the same report, this is mainly due to (1) MIMOSA compliancy was not ensured for all components, and (2) Missing functionalities according to use case requirements. Adjustments were required from the developer ’s or the end-user’s point of vie w to assign the components with the 13 right capacities needed for the final implementation on site. This last issue gives an idea of the further long way ahead to a real integration of e-maintenance as an intelligent system into human teams. 5. Discussion and future work The ISO 13374 is a condition monitoring architecture that consists of 8 functional blocks: The first two blocks are considered within the perception layer of our proposed frame, namely: - Data acquisition: Produces digital records with values and descriptive meta- information like time stamps and quality for the sensor/transducer output. - Data manipulation: Performs any kind of processing (e.g., signal processing) necessary in order for the sensor values to be meaningful with respect to state and health assessment. Follows, a reactive layer component: - State detection: Detects whether the asset is in a normal or abnormal state. The next three blocks implement the diagnosis and remediation intelligence of the system. These blocks are deliberative component: - Health assessment: Rates the current state as asset health and diagnoses any faults. - Prognostic assessment: Predicts the remaining lifetime until the next significant state change. - Advisory generation: Provides the user with recommendations on maintenance actions or changes of operational settings to optimize asset performance in the given state. The last blocks are action responsibilities towards some of the environment composers: - Information presentation: Presents the output of any of the previous stages to the user in easily understandable, textual, and graphical form. This block is among responsibilities of the action layer towards human environment. - External systems: Any external system the asset management application is connected to such as archiving, configuration/engineering and history. This block belongs to responsibilities of the action layer towards internal enterprise environment. External enterprise environment is not necessary excluded. (Naedele, M., P. Sager, and C. Frei.2004) As it is the case of Dynaweb here above studied in detail, this standard is at the base of several condition based maintenance solutions in the e-maintenance field. Thus, the first utility of the proposed frame is to provide some kind of classification - as inherited from the founding intention of its CogAff base - of at least architectures based on the mentioned standard. Focusing on condition monitoring, the standard has evident influence on the intelligence dimension of the corresponding solutions. Indeed, this dimension hardly goes beyond the deliberative layer neither deals with actions toward human environment within a real integration of the intelligent system into human teams. In fact, the predominance of the definition of e-maintenance as a part of e-manufacturing 14 and e-business pushed such architectures to focus on more automation and less human intervention. However, to improve the classification ability of the proposed frame, further work is needed to enhance exhaustiveness regarding responsibilities assigned to each role in the proposed frame. The second usefulness of the frame is to map existing intelligence abilities within an e-maintenance system in a given plant or platform and have an idea about intelligence requirements not satisfied. The projected intelligence level deduced from a requirement study can as well be mapped within that frame. This utility at the conceptual level of an e-maintenance project is at the core of our future work towards an intelligence based framework for e-maintenance.Related to this conceptual helpfulness investigation, we note (Sayda, Atalla F., 2008): one of the rare direct applications of the CogAff approach is described in that paper with an intelligent industrial production control system (ICAM). The proposed architecture of the conceptual system consists of four information processing layers and three vertical subsystems, namely, perception, central processing, and action. The lowest horizontal layer above the distributed control system (DCS) contains semi-autonomous agents that represent different levels of data abstraction and information processing mechanisms of the system. The middle two layers interact with the external environment via the DCS by acquiring perceptual inputs and generating actions. The perceptual and action subsystems are divided into several layers of abstraction to function effectively. While ICAM case comfort the feasibility of using the proposed E- CogAff frame in the conceptual stage of an e-maintenance project, in our future work we will attempt to tackle with the two main issues here above underlined: (1) more integration of the e-maintenance system at the strategic level of the enterprise and (2) more integration of e-maintenance as an intelligent system within human teams. 6. Conclusion This paper underlined the importance of intelligence as a fundamental dimension of an e-maintenance system. First, a review of the three level of maintenance management aligned with European standards is given. Then, e-maintenance is presented as an ICT supported information system. W ith a review of literature and known e-maintenance platforms and framework, we discussed the importance explicitly given to the intelligence of e-maintenance systems. According to our findings, this dimension suffers from the lack of frameworks explicitly dealing with the intelligence of e-maintenance systems in a holistic approach. As our contribution towards intelligence based conceptual framework for e- maintenance, we proposed a frame sustaining the eligibility of CogAff architecture as candidate for such a task. Our proposed frame aims to serve as (1) a classification means of existing e-maintenance solutions and (2) a platform independent conceptual tool within an e-maintenance project. To illustrate classification ability of the proposed frame, an application to the case of an e-maintenance leader –Dynaweb- was detailed. Finally, we discussed opportunities and limitations of our proposal. A brief application to ISO 13374 based e-maintenance solutions allowed us to highlight issues regarding (1) real integration of e-maintenance as an intelligent system into human teams, and (2) more mature implication at the strategic level of management. To serve as an accurate tool for e-maintenance solutions classification, our proposal needs further work to enhance its exhaustiveness. At the conceptual level, in our future work within 15 an e-maintenance project we will attempt to tackle with the two main integration issues here above mentioned (ie- at the strategic level and within human teams). 7. References 1) Arnaiz, Aitor, Beno ît Iung, Adam Adgar, Tonu Naks, Av o Tohver, Toomas Tommingas, and Eric Levrat. Information and Communication Technologies W ithin E-maintenance. In E-Maintenance, edited by S. Mekid K.Holmberg, E. Jantunen, A. Adgar, J. Mascolo, A. Arnaiz, 39 –60. Springer. (2010) 2) Chowdhury, S. and Akram, A. E-Maintenance: Opportunities and Challenges. 68 – 81. Turku Centre for Computer Science. (2011) 3) Crespo Marquez, Adolfo, and Jatinder N.D. Gupta. Contemporary Maintenance Management: Process, Framework and Supporting Pillars. In Omega 34, no. 3: 313 –326.(2006) 4) Déchamp L., Dutech A., Montroig T., Qian X., Racoceanu D., Rasovska B., Charpillet F., Jaffray J.-Y., Moine B., Müller G., Pa lluat N., Pelissier L.. On the Use of Artificial Intelligence for Prognosis and Diagnosis in the PROTEUS E- maintenance platform ”, in: IEEE Mechatronics & Robotics Conference (MECHROB). (2004) 5) Editorial Computers in Industry Special issue: E-maintenance 57, no. 6. 6) EN 13306:2001, (2001) Maintenance Terminology. European Standard. CEN (European Committee for Standardization), Brussels. (2006) 7) Gilabert, E., Jantunen, E, Emmanouilidis, C, Starr, A. and Arnaiz, A. Optimizing e- maintenance through intelligent data processing systems. In WCEAM 2011, the 6th annual World Congress on Engineering Asset Management, 2-5/10/2011, Cincinnati, Ohio, USA (SPRINGER). (2011) 8) Haftor, Darek, Miranda Kajtazi, and Anita Mirijamdotter. Research and Practice Agenda of Industrial e-Maintenance: Information Logistics as a Driver for Development. In Proceedings of the 1st International Congress on eMaintenance, 56 –61. Linnaeus University, School of Computer Scienc e, Physics and Mathematics. (2010) 9) Hiroyuki, and Yoshikawa. Manufacturing and the 21st Century — Intelligent Manufacturing Systems and the Renaissance of the Manufacturing Industry. Technological Forecasting and Social Change 49, no. 2 : 195 – 213. (1995) 10) Jacek Jakie ła, Bartosz Pomianek Agent Orientation as a Toolbox for Organizational Modeling and Performance Improvement. In International Book Series "Information Science and Computing" Book 13 - Intelligent Information and Engineering Systems 113-124. (2009) 11) Jantunen, E., E. Gilabert, C. Emmanoulidis, and A. Adgar. E-Maintenance: a Means to High Overall Efficiency. In Proc. 4th World Congress on Engineering Asset Management (WCEAM 2009), Athens, 28 –30. (2009) 12) Intelligent system - W ikipedia, the free encyclopedia.. Intelligent system - W ikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Intelligent_system . [Accessed 01 March 2012]. 13) Information logistics - Wikipedia, the free encyclopedia. Information logistics - W ikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Information_logistics . [Accessed 01 March 2012]. 16 14)Irigaray, Aitor Arnaiz, Eduardo Gilabert, Erkki Jantunen, and Adam Adgar. Ubiquitous Computing for Dynamic Condition-based Maintenance. In Journal of Quality in Maintenance Engineering 15, no. 2: 151 –16 6. (2009) 15) Iung, B., E. Levrat, A.C. Marquez, and H. Erbe. “Co nceptual Framework for e- Maintenance: Illustration by e-Maintenance Technologies and Platforms. ” Annual Reviews in Control 33, no. 2 : 220 –229. (2009) 16) Lin, Shien, Jing Gao, and Andy Koronios. A Data Quality Framework for Engineering Asset Management. In Engineering Asset Management, edited by Joseph Mathew, Jim Kennedy, Lin Ma, Andy Tan, and Deryk Anderson, 473 –482. London: Springer London (2006) 17) Márquez, Adolfo Crespo. On the Definition of Maintenance Management. In The Maintenance Management Framework, 3 –10. Springer Seri es in Reliability Engineering. Springer London. (2007) 18) Mascolo, Julien, Per Nilsson, Beno ît Iung, Eric Le vrat, Alexandre Voisin, Fernando Garramiola, and Jim Bellew. Industrial Demonstrations of E-maintenance Solutions. In E-Maintenance, edited by S. Mekid K.Holmberg, E. Jantunen, A. Adgar, J. Mascolo, A. Arnaiz, 391 –474. Springer. (2010 ) 19) Muller, A., A. Crespo Marquez, and B. Iung. On the Concept of E-maintenance: Review and Current Research. In Reliability Engineering & System Safety 93, no. 8 : 1165 –1187. (2008) 20) Murphy, Glen D. Improving the Quality of Manually Acquired Data: Applying the Theory of Planned Behaviour to Data Quality. In Reliability Engineering & System Safety 94, no. 12: 1881–1886. (2009) 21) Naedele, M., P. Sager, and C. Frei. Using Multi-agent Systems for Intelligent Plant Maintenance Functionality. 4:3059 –3063. IEEE. (2004) 22) Piprani, Baba, and Denise Ernst. A Model for Data Quality Assessment. In On the Move to Meaningful Internet Systems: OTM 2008 Workshops, edited by Robert Meersman, Zahir Tari, and Pilar Herrero, 5333:750 –7 59. Berlin, Heidelberg: Springer Berlin Heidelberg. (2008) 23) Rasovska, Ivana, Brigitte Chebel-Morello, and Noureddine Zerhouni, Classification Des Différentes Architectures En Maintenance . In proc. 7e Congrès international de génie industriel – 5-8 juin 2007 – Trois-Rivières, Québec (CANADA). (2007) 24) Sayda, Atalla F., Intelligent Control and Asset Management of Oil and Gas Production Facilities. University of New Brunswick, Dept. of Electrical and Computer Engineering. (2008) 25) Sloman, Aaron, and Matthias Scheutz. A Framework for Comparing Agent Architectures. doi=10.1.1.28.1945. (2002) 26) Söderholm, Peter, and Ramin Karim. An Enterprise Ris k Management Framework for Evaluation of eMaintenance. In International Journal of System Assurance Engineering and Management 1, no. 3: 219 –228. (2011) 27) Thomas, Philippe, and André Thomas. De La Nécessité Des Bonnes Informations Dans Les Systèmes Contrôlés Par Les Produits. In 7ème Conférence Internationale Conception Et Production Intégrées, CPI’2011, CDROM. Oujda, Maroc. (2011) 28) Yan, Qi, Li-Jun Shan, Xin-Jun Mao, and Zhi-Chang Qi. RoMAS: A Role-. Based Modeling Method for Multi-Agent. System.. 156 –161. Wo rld Scientific Publishing Co. Pte. Ltd. (2003) 29) Zachman, John A. A Framework for Information Systems Architecture. IBM Systems Journal 38, no. 2/3 : 454 –470. (1999)
1710.10753
2
1710
2017-11-21T19:36:27
Computational Social Choice and Computational Complexity: BFFs?
[ "cs.MA", "cs.AI", "cs.CC", "cs.GT" ]
We discuss the connection between computational social choice (comsoc) and computational complexity. We stress the work so far on, and urge continued focus on, two less-recognized aspects of this connection. Firstly, this is very much a two-way street: Everyone knows complexity classification is used in comsoc, but we also highlight benefits to complexity that have arisen from its use in comsoc. Secondly, more subtle, less-known complexity tools often can be very productively used in comsoc.
cs.MA
cs
Computational Social Choice and Computational Complexity: BFFs?∗ Lane A. Hemaspaandra Department of Computer Science University of Rochester Rochester, NY 14627, USA October 30, 2017; revised November 21, 2017 Abstract We discuss the connection between computational social choice (comsoc) and com- putational complexity. We stress the work so far on, and urge continued focus on, two less-recognized aspects of this connection. Firstly, this is very much a two-way street: Everyone knows complexity classification is used in comsoc, but we also highlight ben- efits to complexity that have arisen from its use in comsoc. Secondly, more subtle, less-known complexity tools often can be very productively used in comsoc. 1 Introduction Even in a work context, friendship is amazingly powerful. We all know how valuable it is to have collaborators who have each other's backs: working closely toward a shared project goal yet each bringing their own skills and perspective to the project, to seek to reach insights and advances that neither researcher could have achieved alone. Research areas can be like that too. Computational social choice (henceforward, comsoc)-which brings a computational-cost lens to such social-choice issues as preference aggregation/elections/manipulation/fair division-certainly has roots tracing far back; but comsoc's existence as a recognized, distinctive research area within AI/multiagent-systems is quite recent. Despite that, its growth as an area during these recent years has been ex- plosive, and we suggest that a synergy between comsoc and complexity has been partially responsible for that growth. At the 2017 AAMAS conference [LWDD17], for example, there were four sessions devoted to Computational Social Choice; no other topic had that many sessions. Those four sessions included 21 papers, and of those 21, 7 had the word "com- plexity" in their titles although in the entire conference only two other papers had the word complexity in their titles. In contrast, at the 2003 AAMAS conference [RWSY03], the string ∗A version of this paper will appear in AAAI-2018 [Hem18]. 1 "social choice" does not even appear in the ACM Digital Library online table of contents; neither does the string "election" or any form of the word "vote," and only three papers in the entire conference have the word "complexity" in their titles. One thing that those numbers are reflecting is the fact that comsoc and complexity have worked together very well. Comsoc research, from the seminal work of Bartholdi, Orlin, Tovey, and Trick [BTT89b, BTT89a, BO91, BTT92] onward, has done an enviably skilled job of interestingly employing complexity classification-which admittedly has strengths and weaknesses, both in its theory and in its application-to reveal a subtle and varied landscape as to what is difficult and what is hard, and how small changes in problems and models can induce seismic changes in complexity. Yet this article's primary goal is not to praise that praiseworthy achievement. It is to recognize two more subtle things that have already happened, but that we think need to be recognized for what they are, and what more can be done. Firstly, the comsoc/computational complexity friendship is truly a two-way street. Al- though everyone knows that complexity classification is widely used in comsoc research, we will stress a direction that is not well-recognized within the AI community or the complexity community: Research in comsoc has often been of great benefit to complexity theory. In par- ticular, complexity classification within comsoc has populated key complexity classes with problems that are undeniably natural and compelling. Why is that important? Complexity theorists like creating complexity classes that capture computational capabilities/resources that seem natural and compelling to the complexity theorists. But if those classes then turn out, for example, to have no natural complete problems, it is like hosting a party and having no one show up. It could even make one wonder whether the classes really were important at all. So complexity owes quite a debt to comsoc, for bringing parties to life. In addition to stressing the two-way street aspect of the comsoc/computational complex- ity friendship, we will also point out how rather subtle, lesser-known complexity notions and machinery have in the comsoc world found fertile ground to actually do important things. Complexity notions ranging from search-versus-decision issues to one-to-one reductions to the join operator have arguably been used in the comsoc world in more natural and more satisfying ways than they have been used within complexity theory itself. We present four different issues where the work in comsoc exemplifies one or both of these themes: comsoc work helping complexity, and lesser-known complexity notions and machinery being used to address comsoc issues. We will particularly stress examples that fall in the area of the complexity of elections/voting, probably the most intense current focus of comsoc and a remarkably challenging, interesting, nuanced area (for a general survey of comsoc see the excellent articles by Chevaleyre et al. [CELM07] and Brandt, Conitzer, and Endriss [BCE13], and for surveys of elections/voting within comsoc see the surveys by Faliszewski et al. [FHHR09], Faliszewski, Hemaspaandra, and Hemaspaandra [FHH10], and Faliszewski and Procaccia [FP10]; and for additional accessible surveys, see the relevant chapters in the important recent textbook edited by Rothe [Rot16]). This article gives just a few examples of these themes, but we try to discuss each of those with some context and care, and in two places our examples will connect complexity with other important AI areas, 2 planning and SAT solvers, once with the comsoc/complexity connection growing from the other AI area and once with it creating an opportunity within the other AI area. Then in the conclusion we will suggest that the two themes we have been stressing and the work to date on them make clear that comsoc experts and complexity experts working more closely and extendedly together will be to the benefit of both fields. 2 Make It a Party: Populating Lonely Complexity Classes As mentioned above, complexity classes are typically defined to capture a certain mode/power/model of computing. For example, the important probabilistic complexity class BPP [Gil77], bounded probabilistic polynomial time, is the class of those sets A for which there is a probabilistic polynomial-time Turing machine that on each input agrees with A with probability at least 75% (or 51%, or 99%; all three of those turn out to de- fine the same class). The class NP is the class of those sets accepted by nondeterministic polynomial-time Turing machines. The class UP [Val76], unambiguous polynomial time, is the class of those sets A accepted by nondeterministic polynomial-time Turing machines whose acceptance is always unambiguous; for inputs not in A the machine has no accept- ing computation paths, and for each input in A, the machine has exactly one accepting computation path (in the lingo, "has a unique succinct certificate"). This section will present a few examples of classes that were not wildly filled with natural sets that seem to capture their nature, yet comsoc provided new, or even the first, such examples. By "capture the nature" of a class, in the dream case we would mean "is complete for the class," i.e., our set is in the class and has the property that each set in the class many-one reduces to our set. But if that can't be achieved, finding a set that falls into a given class and does not seem to fall into any smaller class is the natural fallback step to take. Even readers not very familiar with complexity theory may know that there are thou- sands of known NP-complete problems and indeed a whole book is devoted to such prob- lems [GJ79]; and that there is an entire book devoted even to problems complete for P, with respect to the natural completeness type there [GHR95]; and that even for the levels of the polynomial hierarchy beyond NP and coNP, such as NPNP, coNPNP, NPNPNP , and coNPNPNP , there exists a detailed compendium [SU02]. And from that it would be easy to conclude that it is boring and easy to find natural problems complete for virtually any natural complexity class. But that seems not to be so. For example, NP ∩ coNP (the class of sets that have succinct, easily-checkable proofs both of membership and nonmembership) and two of the classes mentioned above, BPP and UP, are not known to have even one complete set-not a natural one, and not even an unnatural one [Sip82, HH88]. In fact, the just-cited papers and the work of Regan [Reg89] in effect are showing that the existence of a complete set for one of these classes would have sweeping consequences for our understanding of the class: that the issue of whether each of these classes has a complete set is in fact a disguised version of the question of whether there exists a nice enumeration of machines that precisely covers 3 the class, i.e., that provides what Regan calls a "constructive programming system." But things are worse still. It is now know that not only do these classes seem to lack complete sets, but in fact, it is plausible that-indeed there are black boxes (aka oracles) relative to which-even far larger classes than the given class do not contain even a single set that is many-one hard, or indeed even Turing hard, for the class [HJV93]. So it is not at all a sure thing that important classes-and BPP is undeniably important, since some would even argue that BPP rather than P should be the working definition of feasibility-have complete sets at all, much less natural complete sets. And yet some classes that had remained largely or wholly unpopulated by natural sets needing the class's power have had natural examples provided by problems from comsoc, and other less empty but far from crowded classes have also turned out to be what pinpoints the complexity of important comsoc problems. 2.1 Θp 2: Parallel Access to NP 2 ⊆ PNP. Perhaps more naturally, Θp Probably the most striking such example is the Θp 2 level of the polynomial hierarchy. This class was introduced by Papadimitriou and Zachos [PZ83], and is the class of sets that can be accepted by polynomial-time machines allowed to make O(log n) sequential queries to an NP oracle; NP ∪ coNP ⊆ Θp 2 is known to be the class of sets that can be accepted by polynomial-time machines allowed to make (an unlimited number of) nonadaptive (i.e., parallel) queries to an NP oracle [Hem89]. For example, consider the language, ParitySAT, that accepts its input exactly if the input is a list of Boolean formulas and the number of them that is satisfiable is itself an odd number. ParitySAT is clearly in Θp 2, since the polynomial-time machine can in parallel ask its oracle about the membership in SAT of each of its input formulas, and then can see whether the number that are satisfiable is odd. We will come back in a moment to the unnaturalness of this example and the search for natural examples. Θp 2 is a very important class in complexity theory. Briefly put, it has a large number of equivalent characterizations that are quite natural, e.g., it is the class of sets that can be accepted by logspace machines allowed to make an unlimited number of adaptive queries to an NP oracle [Wag90]; it is the class the polynomial hierarchy naturally is shown to collapse to if there are sparse (i.e., having at most a polynomial number of strings at each length) NP-Turing-complete sets [Kad89]; and its relationship to PNP is known to com- pletely characterize whether conversations with NP oracles can manufacture time-bounded randomness [HW91]. This at first sounds like quite a party, if one focuses on the results Θp 2 is central to. But wait. Even when all these results were known, the class was not known to have even one natural complete set. It was known to have a large number of rather unnatural complete sets all having to do with counting the parity of items, e.g., the ParitySAT example given above about telling whether out of a collection of Boolean formulas an odd number of them are satisfiable is known to be complete for Θp 2 [Wag87]. So in fact, as to known natural complete sets, the party was at that time a (complexity- theoretically important but) empty room. However, comsoc put first one and then many 4 people into that room. In particular, Charles Lutwidge Dodgson (aka Lewis Carroll) in the year 1876 had defined a fascinating election system [Dod76]. He was motivated by the idea that it would be nice for an election system to ensure that (a) if (relative to the votes, which are assumed to each be a tie-free total ordering of the candidates) there is a candidate- what is known as a Condorcet winner [Con85]-who is preferred in head-on-head contests against each other candidate, then that candidate is chosen the winner, and (b) otherwise, each candidate who is "closest" to being such a winner (in the sense that the number of adjacent exchanges in preference orders needed to make it become a Condorcet winner is the lowest among the candidates) is named a winner. And Dodgson's system then does just that: It counts distance from being a Condorcet winner, and the candidate(s) with the lowest distance wins. In doing that, Dodgson was in the 1800s already using the notation that in modern computer science is central and known as an edit distance. Although Dodgson's system is mathematically very well defined, one of the seminal papers of comsoc showed that the computational complexity of implementing his system is not low. In particular, Bartholdi, Tovey, and Trick [BTT89b] showed that it is NP-hard to tell if a given candidate wins such an election. They left open whether the problem is NP-complete, but eight years later the problem was proven to be complete for Θp 2 [HHR97a]. Θp 2-complete problems cannot be NP-complete unless the polynomial hierarchy collapses to NP ∩ coNP, and thus the winner problem for Dodgson elections is highly unlikely to be NP-complete. But the most important thing to note here is that the complexity of winner-testing for Dodgson elections is not a problem that was rigged to provide a Θp 2-complete set. The election system was defined in the 1800s for its own interest and importance, long before NP was ever dreamed of, much less Θp 2. This problem-from comsoc-thus provides an extremely natural Θp 2-complete set. This result sparked interest in whether other problems in comsoc and beyond might also be Θp 2-complete. And the floodgates opened. Other important election systems such as those of Kemeny and Young were proven to also be Θp 2-complete [HSV05, RSV03]. General tools were extracted from this approach to try to make it easier to prove such results [SV00], Θp 2-completeness was shown to capture the complexity of how well certain greedy algorithms do [HR98], and a survey was written looking at the meaning of improving from NP-hardness results to Θp 2-completeness results [HHR97b]. Even in the quite different field of automata theory, Θp 2-complete problems were found to capture important, natural notions [HM00]. Briefly put, the party was very much on! 2.2 NPPP and Other Classes There are many other classes that comsoc and other work within AI have helped pop- ulate. One of the most striking examples is the class NPPP, i.e., the sets solvable by nondeterministic polynomial-time Turing machines given access to (their choice of a) set from PP (probabilistic polynomial time, the class of sets for which there is a probabilistic polynomial-time Turing machine that on each input is correct with probability greater than 50%). NPPP is a class of great complexity, and it is not always easy to work with. In terms 5 of descriptive generality and its "location," Toda's [Tod91] Theorem says that PPP contains not just the polynomial hierarchy (PH) but even PPPH. So NPPP contains both of those and even NPPPPH , while being itself contained in PSPACE. It was only in the late 1990s that people started finding natural complete sets for NPPP, and that work came not from complexity issues but from an AI domain, the study of planning and decision processes. There are a number of papers on this and we won't here cite them all, but we mention as a pointer the very impressive work of Goldsmith, Littman, and Mundhenk [LGM98], which shows versions of both the plan-existence problem and the plan-evaluation problem are, for partially ordered plans, NPPP-complete, and of Mundhenk et al. [MGLA00] on Markov decision processes, which also yields natural NPPP-complete problems. Comsoc also has helped populate that party. Although currently its NPPP results are upper bounds-and we commend to the reader the open issue of either proving completeness or of lowering the upper bound-the beautiful work of Mattei, Goldsmith, Klapper, and Mundhenk [MGKM15] shows that NPPP plays an important role in the study of bribery and manipulation in tournaments of uncertain information, by showing that many such problems are in NPPP.1 There are many other parties, some admittedly not so previously poorly attended as 2 and NPPP, where comsoc has provided attendees. Here are just a those thrown by Θp few examples. Nguyen et al. [NNRR14] gave the class DP (all sets that are the symmetric difference of two NP sets) a wide range of new complete sets having to do with social welfare optimization in multiagent resource allocation. The first PNP[1]-completeness result in social choice (which also is perhaps the first natural completeness result anywhere for PNP[1]) and the first PNP-completeness result in social choice both come from a study of the complexity of weighted coalitional manipulation of elections, under the voting system, Veto, where each voter vetos one candidate and whoever has the fewest vetos wins; in an online setting (what in political science is called a roll-call vote), the winner problem here is PNP[1]-complete for 3 candidates and is PNP-complete for 4 or more candidates [HHR14]. Filos-Ratsikas and Goldberg [FG17] have recently proven a natural cake-cutting-related problem to be complete for the lonely class PPA. And a huge number of papers in comsoc contribute 1After doing that, that paper comments that "we have actually shown these problems are in NPPP[1]," which is the class in which the NP machine is allowed at most one query per path to the PP oracle. Simply so that comment in the paper doesn't lead any reader of the present paper to think that NPPP-completeness for that paper's problems is unlikely due to that paper having achieved the seemingly better upper bound of NPPP[1], we claim that in fact NPPP[1] = NPPP. Let us prove that claim. NPPP[1] = NPPP holds via altering the NP machine of NPPP to instead guess the answer to each PP query (without asking the query) and then via a single truth-table (parallel) query round to PP checking that all its guesses were correct, and if a given path would have accepted if its guesses of the answers were correct and that path finds via its truth-table-round access to PP that it guessed correctly, then that path accepts. That as just stated is illegally overly using the PP oracle. But since PP is closed under truth-table reductions [FR96], the truth-table round can be replaced with a single query, and thus we indeed have establishing the claimed class equality. Indeed, since the truth-table yields True for only one known-at-truth-table-query-time setting of answers, even Beigel, Reingold, and Spielman [BRS95, p. 195] would suffice to allow a single query per path. 6 natural problems-often related to manipulative attacks on elections-to other classes such as NPNP, coNPNP, and PSPACE. Also, many counting-based issues in comsoc have been shown to be complete for the counting analogue of NP, the class #P. In summary, there is a two-way street of friendship between comsoc and computational complexity. Complexity benefits since its classes-some of which played central roles in key abstract results yet had few or no natural complete problems-are given quite compelling natural problems based in comsoc. Comsoc in turn has benefited since the machinery of complexity-class classification helps clarify how hard or easy many of its problems are. 3 Complexity Machinery and Notions Find Fertile Ground in Comsoc This section provides a tour of two cases where complexity techniques and notions have found very fertile ground in comsoc research. Although one-to-one (Section 3.2) reductions have been used centrally in complexity theory, in particular in the 1970s, their new use in comsoc is both powerful and quite different than the use they had in complexity. And in another case (Section 3.1), comsoc has given new life to lovely complexity machinery that had been developed in 1976, and yet that even 36 years later had not found a single application in a real-world domain. We will cover each topic but briefly, though we will try to give a sense of how each supports this section's thesis that comsoc has been a fertile ground for complexity techniques and notions, helping comsoc of course, but also in the case of little-used or narrowly used complexity techniques helping establish the value or breadth of the techniques. 3.1 Search versus Decision for NP Problems Everyone knows that SAT is a decision problem, and indeed that the vast majority of complexity classes are defined in terms of decision problems, not search problems. This has been the case for so long that it is easy to forget why this is so. The reason why complexity is largely focused on decision problems is because for almost all natural problems the search problem clearly polynomial-time Turing reduces (and of- ten, for example for SAT, even "polynomial-time 2-disjunctive truth-table" reduces) to the problem's decision version. And so the two problems are inherently of the same complex- ity, give or take composition with a polynomial; it is impossible in these cases for decision to be easy yet for search to be hard. SAT is the classic case: Given a Boolean formula, F (v1, v2, . . .), it is satisfiable exactly if at least one of F (True, v2, . . .) and F (False, v2, . . .) is satisfiable, so given a decision procedure for SAT, one can ask those two questions to it, and thus find a good value for the first variable (if any exists), and then can redo the pro- cess, on the "reduced" formula, to similarly set the second variable and so on. By the end, using as a black-box a decision procedure for SAT, one has found a satisfying assignment in polynomial time, when one exists. 7 Are all natural NP problems so polite as to allow themselves to be fitted into this straitjacket of linked complexities? For decades there have been hints that the answer might be "no." Most powerfully, in 1976 Borodin and Demers [BD76] built lovely, clever machinery that showed that if P 6= NP∩coNP, then there exists an infinite polynomial-time recognizable subset of SAT that has no polynomial-time search algorithm finding solutions for its members. In brief, one could quickly determine with certainty that its members were satisfiable, but one has no idea-it turns out not even a good setting for the first variable of the formula-of what a satisfying assignment would be. (The reason this claim is not precluded by the above discussion of self-reducibility is that the Borodin–Demers subset is so pathological that it has infinitely many members such that the formulas generated at some stage of the above self-reduction process are all not in the subset, and so the above process is rendered invalid on the subset.) Stunning though that result was, the fact that it was achieving its power not on all of SAT (which is impossible), but rather on a somewhat pathological subset of SAT, kept the result and its lovely machinery from gaining traction; it remained only as the above 1976 technical report, and did not have a conference or a journal version. The work was likely-and in the first and second of these four examples the work is explicitly discussed- the inspiration behind some later related work, e.g., that for unambiguous computation the implication mentioned above becomes an "if and only if" characterization [HH88], that under the extremely strong assumption that deterministic and nondeterministic double exponential time differ there exists an (artificial) language in NP for which search does not reduce to decision [BG94], that if P 6= NP then there exist NP-complete languages that are not self-reducible [FO10], and that relative to some oracle there is a search versus decision separation for exponential-time classes [IT89]. Nonetheless, the work found not a single application on natural problems for 36 years. And it was comsoc that finally provided that application. In particular, Hemaspaandra, Hemaspaandra, and Menton [HHM13] proved that of the standard types of attacks on elections, for about half it holds that if P 6= NP ∩ coNP then there is an election system having a polynomial-time winner problem for which the decision problem for that type of attack is in P but the search problem cannot be solved in polynomial time. (For the other half of the attack types, that paper proved unconditionally that search does reduce to decision.) Note that the attack types were not created by that paper; they are the long-standard attack types. And so the problems themselves are not tricks, but are the natural, standard ones, and on these, search and decision are being separated under the given complexity-theoretic assumption, which is widely believed to be true. There are four comments which pretty compellingly need to be made at this point. First, if P = NP ∩ coNP, then integer factoring can be done in polynomial time, and so RSA and much of the foundation of modern computer security falls. So the above results say that either the foundations of cryptography are deeply flawed, or the approach taken within comsoc to defining election-attack problems-namely, they are defined in their decision versions-is defining as tractable some problems whose search version (the issue of finding the attack that works) is not tractable. Second, the reason this separation of search 8 and decision is possible is that, quite unexpectedly, about half of the natural election-attack problems do not seem to be nicely self-reducible. Third, natural is in the eye of the beholder; although the election-attack problems used in the result are the standard, natural ones, the election systems used are indirectly specified by the hypothesized sets in (NP ∩ coNP) − P, and so are likely not very natural. And fourth and finally, this entire approach then found application in a different area of AI, namely, the study of backbones and backdoors of Boolean formulas, where it was shown for example that if P 6= NP ∩ coNP, then search versus decision separations occur for backbones [HN17a, HN17b]. 3.2 Density-of-Hardness Transfer and One-to-One Reductions When one says a problem is NP-complete, that doesn't prove that it is hard. It just proves that if anything in NP is hard, then that problem is hard. This is generally viewed as much better than having nothing to say about the difficulty of the problem. Wouldn't it be lovely to have an analogous type of result for frequency of hardness? For example, in Section 3.1, we discussed work showing that if P 6= NP ∩ coNP, then search and decision separate for many key issues regarding manipulative attacks on elections and backbones of Boolean formulas. But maybe in those examples, for which we know decision is easy, the hardness of search may be a con: Perhaps search is only hard on a very, very, very small portion of the inputs, asymptotically? That is, perhaps it is a worst-case separation that doesn't hold in the typical case. To try to argue against that possibility, it would be wonderful if we could argue that if even one problem A in NP ∩ coNP is hard with a certain frequency h (i.e., each polynomial- time heuristic is wrong on A's membership problem on Ω(h(n)) strings up to length n) then every polynomial-time heuristic for our search problem fails with almost that same frequency, namely, for each polynomial-time heuristic there is an ǫ > 0 such that on our given search problem it fails on Ω(h(nǫ)) of the strings up to length n). This would say that if any set in P 6= NP ∩ coNP is frequently hard (relative to heuristic attacks), then our search versus decision separations are not cons. After all, it is widely be- lieved, most crucially in the cryptography community (due in part to the issue of factoring), that there are sets in NP ∩ coNP that are frequently hard with respect to polynomial-time heuristics. And if one believes that, then the hypothetical machinery discussed above would immediately convert that into a claim of the frequent hardness of the created search prob- lems whose decision problems are easy. In fact, machinery that can do this exists, although it was developed for a completely different purpose in the 1970s. So this is an example where comsoc-and the study of SAT solvers-is giving a fresh use to a complexity-theoretic notion. In particular, every CS undergraduate learns why claims of NP-completeness are cru- cially tied to the tool of many-one polynomial-time reductions; it is how we establish them. In the 1970s, though, there was a sudden moment of focus in theoretical computer science on the notion of one-to-one (aka injective) polynomial-time reductions, i.e., polynomial-time reductions that have no collisions. 9 This moment of intense focus on one-to-one reductions came about to support one of the great complexity goals of the 1970s: to prove that all NP-complete sets were the same set in a transparent disguise, namely, that all NP-complete sets were polynomial-time isomorphic. This is known as the Isomorphism Conjecture (aka the Berman–Hartmanis Isomorphism Conjecture). To this day it remains open. However, using one-to-one reductions, in the 1970s Berman and Hartmanis [BH77] proved that all familiar NP-complete sets indeed were polynomial-time isomorphic, which was a huge revelation. (Their insight in using one-to-one reductions was motivated by the fact that in recursive function theory, recursive one-to-one reductions are central to the proof that all RE-complete sets are recursively isomorphic, a result that follows from the so-called Myhill [Myh55] Isomorphism Theorem.) However, due to challenges such as the potential existence of one-way functions, that 1970s result has not only never been expanded to (under the inherently required assumption that P 6= NP) include all NP-complete sets, but indeed there is evidence that there may well exist nonisomorphic NP-complete sets [JY85, KMR95], i.e., that the Isomorphism Conjecture may fail. These days in complexity theory, many-one reductions remain the standard, and one- to-one reductions are not often discussed. However, one thing that one-to-one reductions do fiendishly well is preserve density. If one has a bunch of strings with a certain behavior, their image when pushed through the reduction cannot possibly jumble them on top of each other, because one-to-one reductions don't jumble anything on top of anything else. It is admittedly true that such reductions can leave "holes" (though injective, they need not be surjective), and can polynomially stretch (and superpolynomially contract, though inherently not too frequently) lengths; and that in fact is what is behind the "ǫ" mentioned above. But one-to-one reductions by definition never have collisions. Exploiting that, the "if anything in NP ∩ coNP is frequently hard relative to polynomial- time heuristics then our search problems are almost as frequently hard relative to polynomial-time heuristics as those" results mentioned above are achieved by ensuring that the entire proof structure in those papers can be made to yield polynomial-time one-to-one reductions. (And the additional related paper mentioned earlier, which adds in results on the case of backdoors of Boolean formulas, and has some related results about backbones of Boolean formulas, in both cases under the weaker assumption P 6= NP, also works by achieving polynomial-time one-to-one reductions.) Thus, to summarize, one-to-one reductions are a tool that was briefly extremely impor- tant in complexity in the 1970s in a brilliant but even forty years later not yet successful attempt to show that there is in effect just one NP-complete set. But comsoc-and also, related to SAT solvers, the study of backbones and backdoors of Boolean formulas-has brought the notion of one-to-one reductions again front-and-center, providing an "if any- thing in the class is frequently hard then this is frequently hard" analogue of the "if anything in the class is hard then this is hard" argument that many-reductions have provided for almost half a century in the case of NP-complete sets. This case makes very clear the two-way street that exists between complexity and comsoc (and also the study of SAT solvers). Complexity benefits in that one of its notions that 10 was a bit covered in cobwebs turned out to yield important frequency-of-hardness results in comsoc, and also relatedly in the study of SAT solvers. And comsoc benefits in that it now has these results, which are quite powerful evidence that the hardness of search that these speak of is in fact not some con job that happens only extremely infrequently. 4 Conclusions We have discussed just a few of the rich collection of interactions between comsoc and com- putational complexity. Many others-from how the complexity-theoretic join operation al- lows proofs in comsoc of the impossibility of proving certain impossibility theorems [HHR09] to how work on online control gives an unexpected new quantifier-alternation characteri- zation of the class coNP [HHR17] to the rich interactions with approximation (see as just one of many examples [FST17]) to the power of dichotomy results to the insights given by parameterized complexity (both these last are on view simultaneously, for example, in [DMN17]) to much more-are not even touched on here. What are the take-aways? The benefits of the friendship between comsoc and com- putational complexity are a two-way street; both comsoc and complexity have benefited. Classes from complexity have been populated, cobweb-covered techniques have been given surprising new life, and interesting results have been obtained in comsoc from the use of those classes and techniques. In light of this, we urge researchers in comsoc and complexity to reach out and work with each other more and more, for the benefit of both fields. And we hope that more Ph.D. programs will encourage and create young researchers who are trained in and simultaneously expert in both areas; that will allow advances far beyond even those that so far have come from this wonderful synergy between areas. Let us hope that the areas become best friends forever. Acknowledgments Warm thanks to the anonymous AAAI-18 reviewers, Aris Filos-Ratsikas, and Paul Goldberg for helpful comments. References [BCE13] [BD76] F. Brandt, V. Conitzer, and U. Endriss. Computational social choice. In G. Weiss, editor, Multiagent Systems, pages 213–284. MIT Press, 2nd edition, 2013. A. Borodin and A. Demers. Some comments on functional self-reducibility and the NP hierarchy. Technical Report TR 76-284, Dept. of Computer Science, Cornell University, July 1976. [BG94] M. Bellare and S. Goldwasser. The complexity of decision versus search. SIAM Journal on Computing, 23(1):97–119, 1994. 11 [BH77] [BO91] L. Berman and J. Hartmanis. On isomorphisms and density of NP and other complete sets. SIAM Journal on Computing, 6(2):305–322, 1977. J. Bartholdi, III and J. Orlin. Single transferable vote resists strategic voting. Social Choice and Welfare, 8(4):341–354, 1991. [BRS95] R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer and System Sciences, 50(2):191–202, 1995. [BTT89a] J. Bartholdi, III, C. Tovey, and M. Trick. The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3):227–241, 1989. [BTT89b] J. Bartholdi, III, C. Tovey, and M. Trick. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6(2):157–165, 1989. [BTT92] J. Bartholdi, III, C. Tovey, and M. Trick. How hard is it to control an election? Mathematical and Computer Modeling, 16(8/9):27–40, 1992. [CELM07] Y. Chevaleyre, U. Endriss, J. Lang, and N. Maudet. A short introduction to computational social choice. In Proceedings of the 33rd International Confer- ence on Current Trends in Theory and Practice of Computer Science, pages 51–69. Springer-Verlag Lecture Notes in Computer Science #4362, January 2007. [Con85] [DMN17] [Dod76] [FG17] J.-A.-N. de Caritat, Marquis de Condorcet. Essai sur l'Application de L'Analyse `a la Probabilit´e des D´ecisions Rendues `a la Pluralit´e des Voix. 1785. Facsimile reprint of original published in Paris, 1972, by the Imprimerie Royale. P. Dey, N. Misra, and Y. Narahari. Parameterized dichotomy of choosing committees based on approval votes in the presence of outliers. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems, pages 42–50, May 2017. C. Dodgson. A method of taking votes on more than two issues. Pamphlet printed by the Clarendon Press, Oxford, and headed "not yet published", 1876. A. Filos-Ratsikas and P. Goldberg. Consensus Halving is PPA-complete. Technical Report arXiv:1711.04503 [cs.CC], Computing Research Repository, arXiv.org/corr/, November 2017. [FHH10] P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Using complexity to protect elections. Communications of the ACM, 53(11):74–82, 2010. [FHHR09] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. A richer understanding of the complexity of election systems. In S. Ravi and S. Shukla, editors, Fundamental Problems in Computing, pages 375–406. Springer, 2009. 12 [FO10] [FP10] [FR96] [FST17] P. Faliszewski and M. Ogihara. On the autoreducibility of functions. Theory of Computing Systems, 46(2):222–245, 2010. P. Faliszewski and A. Procaccia. AI's war on manipulation: Are we winning? AI Magazine, 31(4):53–64, 2010. L. Fortnow and N. Reingold. PP is closed under truth-table reductions. Infor- mation and Computation, 124(1):1–6, 1996. P. Faliszewski, P. Skowron, and N. Talmon. Bribery as a measure of can- didate success: Complexity results for approval-based multiwinner rules. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems, pages 6–14, May 2017. [GHR95] R. Greenlaw, H. Hoover, and W. Ruzzo. Limits to Parallel Computation: P- Completeness Theory. Oxford University Press, 1995. [Gil77] [GJ79] [Hem89] [Hem18] [HH88] J. Gill. Computational complexity of probabilistic Turing machines. SIAM Journal on Computing, 6(4):675–695, 1977. M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. L. Hemachandra. The strong exponential hierarchy collapses. Journal of Com- puter and System Sciences, 39(3):299–322, 1989. L. Hemaspaandra. Computational social choice and computational complexity: BFFs? In Proceedings of the 32nd AAAI Conference on Artificial Intelligence. AAAI Press, February 2018. To appear. J. Hartmanis and L. Hemachandra. Complexity classes without machines: On complete languages for UP. Theoretical Computer Science, 58(1–3):129–142, 1988. [HHM13] E. Hemaspaandra, L. Hemaspaandra, and C. Menton. Search versus decision for election manipulation problems. In Proceedings of the 30th Annual Symposium on Theoretical Aspects of Computer Science, pages 377–388, 2013. [HHR97a] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. Journal of the ACM, 44(6):806–825, 1997. [HHR97b] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Raising NP lower bounds to parallel NP lower bounds. SIGACT News, 28(2):2–13, 1997. [HHR09] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Hybrid elections broaden complexity-theoretic resistance to control. Mathematical Logic Quarterly, 55(4):397–424, 2009. 13 [HHR14] [HHR17] [HJV93] [HM00] [HN17a] [HN17b] [HR98] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. The complexity of online manipulation of sequential elections. Journal of Computer and System Sciences, 80(4):697–710, 2014. E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Online voter control in sequential elections. Autonomous Agents and Multi-Agent Systems, 31(5):1055– 1076, May 2017. L. Hemaspaandra, S. Jain, and N. Vereshchagin. Banishing robust Turing com- pleteness. International Journal of Foundations of Computer Science, 4(3):245– 265, 1993. M. Holzer and P. McKenzie. Alternating and empty alternating auxiliary stack automata. In Proceedings of the 25th International Symposium on Mathemati- cal Foundations of Computer Science, pages 415–425. Springer-Verlag Lecture Notes in Computer Science #1893, August/September 2000. L. Hemaspaandra and D. Narv´aez. The opacity of backbones. In Proceedings of the 31st AAAI Conference on Artificial Intelligence, pages 3900–3906. AAAI Press, February 2017. L. Hemaspaandra and D. Narv´aez. The opacity of backbones and backdoors un- der a weak assumption. Technical Report arXiv:1706.04582 [cs.AI], Computing Research Repository, arXiv.org/corr/, June 2017. E. Hemaspaandra and J. Rothe. Recognizing when greed can approximate maximum independent sets is complete for parallel access to NP. Information Processing Letters, 65(3):151–156, 1998. [HSV05] E. Hemaspaandra, H. Spakowski, and J. Vogel. The complexity of Kemeny elections. Theoretical Computer Science, 349(3):382–391, 2005. [HW91] [IT89] L. Hemachandra and G. Wechsung. Kolmogorov characterizations of complex- ity classes. Theoretical Computer Science, 83:313–322, 1991. R. Impagliazzo and G. Tardos. Decision versus search problems in super- polynomial time. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 222–227. IEEE Computer Society Press, Octo- ber/November 1989. [JY85] D. Joseph and P. Young. Some remarks on witness functions for non-polynomial and non-complete sets in NP. Theoretical Computer Science, 39(2–3):225–237, 1985. [Kad89] J. Kadin. PNP[log n] and sparse Turing-complete sets for NP. Journal of Com- puter and System Sciences, 39(3):282–298, 1989. 14 [KMR95] S. Kurtz, S. Mahaney, and J. Royer. The Isomorphism Conjecture fails relative to a random oracle. Journal of the ACM, 42(2):401–420, 1995. [LGM98] M. Littman, J. Goldsmith, and M. Mundhenk. The computational complexity of probabilistic planning. Journal of Artificial Intelligence Research, 9:1–36, 1998. [LWDD17] K. Larson, M. Winikoff, S. Das, and E. Durfee, editors. Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017, Sao Paulo, Brazil, May 8–12, 2017. International Foundation for Autonomous Agents and Multiagent Systems, 2017. [MGKM15] N. Mattei, J. Goldsmith, A. Klapper, and M. Mundhenk. On the complexity of bribery and manipulation in tournaments with uncertain information. Journal of Applied Logic, 13(4, Part 2):557–581, 2015. [MGLA00] M. Mundhenk, J. Goldsmith, C. Lusena, and E. Allender. Complexity of finite- horizon Markov decision process problems. Journal of the ACM, 47(4):681–720, July 2000. [Myh55] J. Myhill. Creative sets. Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik, 1:97–108, 1955. [NNRR14] N. Nguyen, T. Nguyen, M. Roos, and J. Rothe. Computational complexity and approximability of social welfare optimization in multiagent resource allocation. Autonomous Agents and Multi-Agent Systems, 28(2):256–289, 2014. [PZ83] [Reg89] [Rot16] C. Papadimitriou and S. Zachos. Two remarks on the power of counting. In Proceedings of the 6th GI Conference on Theoretical Computer Science, pages 269–276. Springer-Verlag Lecture Notes in Computer Science #145, January 1983. K. Regan. Manuscript, April 1989. Provable complexity properties and constructive reasoning. J. Rothe, editor. Economics and Computation: An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division. Springer, 2016. [RSV03] J. Rothe, H. Spakowski, and J. Vogel. Exact complexity of the winner problem for Young elections. Theory of Computing Systems, 36(4):375–386, 2003. [RWSY03] J. Rosenschein, M. Wooldridge, T. Sandholm, and M. Yokoo, editors. Pro- ceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2003, Melbourne, Australia, June 14–18, 2003. International Foundation for Autonomous Agents and Multiagent Sys- tems, 2003. 15 [Sip82] [SU02] [SV00] [Tod91] [Val76] [Wag87] [Wag90] M. Sipser. On relativization and the existence of complete sets. In Proceed- ings of the 9th International Colloquium on Automata, Languages, and Pro- gramming, pages 523–531. Springer-Verlag Lecture Notes in Computer Science #140, July 1982. M. Schaefer and C. Umans. Completeness in the polynomial-time hierarchy: Part I: A compendium. SIGACT News, 33(3):32–49, 2002. Updated version available online at ovid.cs.depaul.edu/documents/phcom.pdf. H. Spakowski and J. Vogel. Θp 2-completeness: A classical approach for new results. In Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science, pages 348–360. Springer-Verlag Lecture Notes in Computer Science #1974, December 2000. S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20(5):865–877, 1991. L. Valiant. The relative complexity of checking and evaluating. Information Processing Letters, 5(1):20–23, 1976. K. Wagner. More complicated questions about maxima and minima, and some closures of NP. Theoretical Computer Science, 51(1–2):53–80, 1987. K. Wagner. Bounded query classes. SIAM Journal on Computing, 19(5):833– 846, 1990. 16
1912.04451
1
1912
2019-12-10T02:03:39
ColosseumRL: A Framework for Multiagent Reinforcement Learning in $N$-Player Games
[ "cs.MA" ]
Much of recent success in multiagent reinforcement learning has been in two-player zero-sum games. In these games, algorithms such as fictitious self-play and minimax tree search can converge to an approximate Nash equilibrium. While playing a Nash equilibrium strategy in a two-player zero-sum game is optimal, in an $n$-player general sum game, it becomes a much less informative solution concept. Despite the lack of a satisfying solution concept, $n$-player games form the vast majority of real-world multiagent situations. In this paper we present a new framework for research in reinforcement learning in $n$-player games. We hope that by analyzing behavior learned by agents in these environments the community can better understand this important research area and move toward meaningful solution concepts and research directions. The implementation and additional information about this framework can be found at https://colosseumrl.igb.uci.edu/.
cs.MA
cs
ColosseumRL: A Framework for Multiagent Reinforcement Learning in N -Player Games Alexander Shmakov, John Lanier, Stephen McAleer, Rohan Achar, Cristina Lopes, and Pierre Baldi University of California Irvine, Donald Bren School of Information and Computer Sciences {ashmakov, jblanier, smcaleer, rachar}@uci.edu, {lopes, pfbaldi}@ics.uci.edu Abstract Much of recent success in multiagent reinforcement learning has been in two-player zero-sum games. In these games, algorithms such as fictitious self-play and minimax tree search can converge to an approx- imate Nash equilibrium. While playing a Nash equi- librium strategy in a two-player zero-sum game is op- timal, in an n-player general sum game, it becomes a much less informative solution concept. Despite the lack of a satisfying solution concept, n-player games form the vast majority of real-world multiagent sit- uations. In this paper we present a new frame- work for research in reinforcement learning in n-player games. We hope that by analyzing behavior learned by agents in these environments the community can better understand this important research area and move toward meaningful solution concepts and re- search directions. The implementation and additional information about this framework can be found at https://colosseumrl.igb.uci.edu. Introduction Recently, reinforcement learning has had success beat- ing humans in 2-player zero-sum games such as Go (Sil- ver et al. 2018), Starcraft (Vinyals et al. 2019), and Poker (Brown and Sandholm 2018). Two-player zero sum games have many nice properties that make train- ing a reinforcement learning agent for them relatively straightforward. Mainly, playing a Nash equilibrium strategy in zero-sum two-player games is optimal, and in the worst case results in a tie. This fact forms the basis of most current algorithms in this domain, such as Monte Carlo tree search (Browne et al. 2012) and coun- terfactual regret minimization (Zinkevich et al. 2008). While most empirical and theoretical success has come in zero-sum two-player games, we rarely find ex- amples of these games in practical problems. Much more often we have scenarios with more than two agents, and where one agents success is not necessar- ily another agents failure. These n-player general sum games include scenarios such as self-driving cars, mar- ketplaces, robotic teams, and the global economy. Un- fortunately, the Nash equilibrium solution concept does not provide a satisfying solution to these n-player zero sum games. Besides being intractable to compute, a Nash equilibrium strategy has each player playing a best response to all the other players in that current strategy. Another way to put this is that no player has incentive to unilaterally deviate. However, if two play- ers deviate at the same time, they could be better off than if they hadn't. For example, in three-player Kuhn poker, one Nash equilibrium has the first two players getting negative utility and the third player getting pos- itive utility. Neither the first or second player is incen- tivized to unilaterally deviate, but if they both deviate they could end up with positive utility. Furthermore, even if every player plays a Nash equilibrium strategy, their combined strategy might not be a Nash equilib- rium strategy. Currently, there is no satisfying theoret- ical solution concept in n-player general sum games. Although the theory behind n-player general sum games is lacking, in practice many of the same algo- rithms that find success in two-player zero-sum games such as CFR, tree search and self-play can find very good strategies in n-player general sum games. Per- haps the most well-known example of this is Pluribus (Brown and Sandholm 2019), the algorithm that beat the top human players in multiplayer poker using the same techniques from the two-player superhuman algo- rithm Libratus. Pluribus is conjectured to be highly exploitable, but it is still able to beat the best humans at multiplayer poker. How is this possible? What can we learn from solutions found from traditional meth- ods when used in the n-player general sum setting? We believe that these questions need to be emphasized in the multiagent reinforcement learning community. To that end, we have created a framework for reinforce- ment learning in n-player general sum games. This framework includes a number of new n-player game en- vironments such as Blokus, Tron, and 3/4 player tic- tac-toe as well as traditional normal form games and Kuhn poker. Our hope is that by comparing learning approaches and algorithms against each other in these environments we can better understand the dynamics of n-player games and start to discover relevant solution concepts. one player has no possibility of winning but they may decide which of the other two players would win. This challenges tree search algorithms because it undermines the notion of optimal play in all scenarios. Blokus ColosseumRL We introduce a multi agent framework designed to allow researchers to tackle the challenges presented. Colos- seum is a reinforcement learning framework that in- cludes several environments, a unified format for adding new environments, and a distributed competition server for testing and evaluation. The matchmaking system allows for multi agent competitions to be executed in a distributed manner, allowing the evaluation of large populations of agents. Environments Currently, Colosseum has three implemented compet- itive n-player environments. We also define a generic framework for defining n-player games with potential imperfect information that will automatically integrate with the evaluation features. Tic-Tac-Toe Blokus is a strategy board game where the players' goal is to gain maximum control over the board. Blokus has a maximum of 4 players, each receiving one of every possible polyominos ranging one to five sections each. Players may place these polyominos in any diagonally adjacent location to the pieces they already have. Every time a player places a block, they gain control over the number of sections that block contained; for example, large pentonimos give five control whereas the smaller dominos only give two. Rewards for this game are equal to the amount of control received for each move, or 0 if no more moves are possible. At the end of the game, players are given a ranking from first to fourth based on their total control. The observations for this environ- ment are the entire board and the pieces each player has remaining; and, since it is a sequential board game, it is again fully observable with perfect information. Al- though Blokus only has a maximum of four players, it posses interesting challenges for reinforcement learning due to the area control aspect of the game. It is easy for players to form short term alliances by focusing their control efforts on a single player and avoiding blocking each other's possible moves. Also, although the game is perfect information and sequential, the large action spaces makes simple search algorithm infeasible for find- ing optimal agents. Tron Tron is simple n-player grid based video game. The game consists of an K×M arena with surrounding walls We extend the notion of Tic-Tac-Toe to n-player games by using identical rules to regular tic-tac-toe and introducing additional symbols for players. We create an n × m board use the symbols X, O, Y, Z, . . . in or- der to label the players. The goal for every player is to attain three of their symbols sequentially in any cardi- nal or inter-cardinal direction. The winner of the game is the player that achieves this configuration first, and all of the other players are equal losers. Rewards for this game are r = 0 for a regular action, 1 for win- ning, and −1 for losing. The observation for this game is the entire game board, with no obscured informa- tion. This game is a perfect information game with a relatively small game tree, meaning that agents may search essentially all possibilities given enough compu- tation time. Tic-Tac-Toe represents a good challenge for multi-agent reinforcement learning due to the pres- ence of king-maker scenarios: states of the game where Rock Paper Scissors A classical environment from game theory is Rock Paper Scissors, which servers as a common baselines for evolutionary mechanics. We pro- vide both the traditional two player rock paper scissors as well as a generalization of the game to three players. This generalization, created by Bernard Koven (Koven 2014), extends the rules so that the winner of any game is the player with the single unique action out of the three players. If all three players have the same action or all three are unique, then the game is a tie. We allow for user-defined payoff values for winning, losing, and tying the game. The observation for this environment is the normal form matrix given the payoff values, and the actions for each players are the traditional Rock, Paper, and Scissors. Kuhn Poker A classical example of a partial infor- mation environment from game theory is Kuhn Poker, a simplified version of Texas Hold'em. The original ver- sion of the game designed by (Kuhn 1951) and involves two players with a maximum of three actions in a game. A generalization of the mechanics to three players was defined and studied by (Szafron, Gibson, and Sturte- vant 2013). We further generalize the mechanics to include an arbitrary N players, although the analogy to Texas Hold'em breaks down with enormous player counts. The deck of N player Kuhn Poker consists of N + 1 cards labeled 0 to N . The game consists of two rounds: If there is no outstanding bet, then a player may either bet or check. If there is an outstanding bet, then a player may either call or fold. If all players have checked or a player has bet and at least one other has called, then the participating player with the highest card wins the entire pot. Reward is 0 for each action and the change in net worth at the end of a game. Three player Kuhn poker is one of the few non-trivial multi- player games with known Nash equilibria. Baselines One major difficulty in multi agent reinforcement learn- ing is finding good opponents to collect episodes from. We may only train a competent agent if we have good opponents to train on. We apply several standard mul- tiplayer reinforcement learning techniques to examine the difficulties of training in these MARL environments. All of the agents are optimized using Proximal Policy Optimization (Schulman et al. 2017) using the same neural network, and we only vary the training strategy. We focus on the simultaneous-action fully-observable Tron environment for these test because it has a small enough action and observation space for a network to reliably learn but that is not trivial enough for tree search. We use a tron board with size 15 × 15 and 4 players. Fixed Opponent We first train an agent using single player reinforcement learning against a simple, hand-coded agent. This agent moves forward if the path is clear, or randomly moves and N players initially starting in an circle around the arena. Players may move forward, left, or right and when doing so, leave behind a trailing wall. Players are eliminated if they crash into either the arena wall, another player's wall, or their own wall. The goal of the game is to force your opponents to crash into a wall by limiting their movement options. The game supports arbitrarily high number of players as well as teams of multiple players. The rewards are 1 for sur- viving an action, −1 for crashing, and 10 for achieving first place without a tie. At the end of the game, players are ranked (with possible ties) based on the order that they crashed. The observation for Tron may either be the entire game board or a small window around only the given player. Tron may also either be played se- quentially for a perfect information variant of the game or it can be played simultaneously to mimic the real game. Tron is an interesting game to study MARL on because it is easily extendable to many players, features an area control mechanic that allows players to form short-term alliances, and allows for a large of amount of simple variations. Normal Form Games Random Payoff Matrix For theoretical explo- ration, we implement games with randomly generated payoff matrices. We define each environment with a payoff matrix M ∈ RS1,S2,...,SP ,P , where P is the num- ber of players and Si is the number of possible actions for player i. The payouts for each action are randomly generated from a uniform distribution on [0, 1), and we include an option to ensure that the game will always be zero-sum. The observation for this environment is the entire normal form game matrix, and the action for each agent is a number from 0 to Si. either left or right if the path is clear in either direction. We train a neural network on this fixed opponent to en- sure that our PPO and network are capable of learning the environment and task given a stationary opponent. We test three different variants of these fixed agents. In each variant, we change the probability that the agent will perform a random action instead of the hand-coded action. We set this probability to 5% (Sα), 25% (Sβ), and 100% (Sγ). Self Play We also apply the common two-player tactic of de- layed update self play (SP). In this technique, we train against fixed copies of ourselves until the current agent reaches a specified average win percentage. We then update all of the opponent agents and repeat this train- ing procedure on the new agents. This will allow the agent to learn against better opponents than our hand- coded option, but it also provides stability since we do not update the opponents very often. We find that self play converges to a stable agent within 1 to 2 million time-steps. We try two different minimum win per- centages for the update: 50% (SP α) and 80% (SP β). Lower update percentages produces quicker updates to the opponents. Fictitious Self Play We also use an extended version of self play known as fictitious self play (Heinrich, Lanctot, and Silver 2015). In this variant, instead of only keeping track of the last iteration of the target network, we keep the last K it- erations and play against all of them. In each game, each opponent has an 80% chance of being the latest iteration of the policy and a 20% change of being one of the other K − 1 iterations. This encourages diver- sity in the opponent population and ensures that our agent does not over-fit to itself. We again try update percentages of 50% and 80% and population sizes of K = 4 (F SP α, F SP β) and K = 16 (F SP γ, F SP δ). Higher populations should create more robust agents since they have to maintain dominance against a wider variety of opponents. Evaluation Another major difficulty in multi agent reinforcement learning is the task of ranking a population of trained agents. Simple round robin tournaments may results in non-transitive relations between agents. It may be difficult to find a single agent who beats all others, but simply looking at each agents win count may not always find the intuitively best agent either. We provide a simple measure of agent performance based on the probability of an agent finishing in a given position. We run a tournament of 25, 000 games, in which we uniformly sample the opponents from our 12 variations without replacement. From every game, we receive a ranking for each agent based on when they crashed into a wall. We collect the number of times each Distribution of Rankings Figure 1: The distribution of rankings each agent re- ceived throughout tournament. agent finished first, second, third, and fourth. We then sort these agents based on their first place performance and plot the times each agent achieved each ranking. For model design, we flatten our board representa- tion and stack the last three observations so the agent has access to temporal information about the environ- ment. We then feed this flattened observation into a two layer feed forward network with hidden sizes of 512 and 256. Finally, we split this hidden vector into a policy and value layer. We train each agent for 2.72 million timesteps with 5, 440 timesteps for each train- ing iteration. Our network runs 16 iterations of of the Adam Optimizer with an SGD batch size of 1024 for each training batch. We run a tournament featuring the three agents trained on those fixed opponents, the two self-play agents, and the four variations of fictitious self play agents. We also include three variants of our fixed agent to act as a sanity check for the other agents (F α, F β, F γ). We note that if two players tied, for example if they both crashed into a wall at the same time, their rank is rounded down to the lowest nearest rank. The results of the competition are showing in Figure 1. We see an interesting result that the agents trained against only the fixed opponent with single player re- inforcement learning performed the best. The self play and fictitious self play policies performed less good, and the fixed opponents were always last. This is a prelim- inary analysis, and raises more questions than it an- swers. Koven, B. L. D. 2014. Three-player r/p/s • a playful path. A Playful Path. Kuhn, H. W. 1951. A simplified two-person poker. Con- tributions to the Theory of Games (AM-24), Volume I 97 -- 104. Schulman, J.; Wolski, F.; Dhariwal, P.; Radford, A.; and Klimov, O. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347. Silver, D.; Hubert, T.; Schrittwieser, J.; Antonoglou, I.; Lai, M.; Guez, A.; Lanctot, M.; Sifre, L.; Kumaran, D.; Graepel, T.; et al. 2018. A general reinforcement learning algorithm that masters chess, shogi, and go through self-play. Science 362(6419):1140 -- 1144. Szafron, D.; Gibson, R.; and Sturtevant, N. 2013. A parameterized family of equilibrium profiles for three- player kuhn poker. volume 1, 247 -- 254. Tideman, T. N. 1987. Independence of clones as a criterion for voting rules. Social Choice and Welfare 4(3):185 -- 206. Vinyals, O.; Babuschkin, I.; Czarnecki, W. M.; Math- ieu, M.; Dudzik, A.; Chung, J.; Choi, D. H.; Powell, R.; Ewalds, T.; Georgiev, P.; et al. 2019. Grandmas- ter level in starcraft ii using multi-agent reinforcement learning. Nature 1 -- 5. Zinkevich, M.; Johanson, M.; Bowling, M.; and Pic- cione, C. 2008. Regret minimization in games with incomplete information. In Advances in neural infor- mation processing systems, 1729 -- 1736. As an additional test, we ranked the agents using the ranked pairs voting scheme (Tideman 1987). Ranked pairs constructs an acyclic directed graph by sequen- tially placing directed edges between agents in order of their win percentage, checking that each edge does not create a cycle. The rankings generated by this voting scheme, in order from highest to lowest, are as follows: {Sα, Sβ, F SP α, SP α, F SP δ, SP β, F SP γ, Sγ, F SP β, F β, F α, F γ}. Discussion It is striking that even in the simplest possible n-player games such as three-player tic-tac-toe, we don't know what an optimal strategy for an individual player is. This is concerning because n-player games form the vast majority of real-world multiagent systems. We believe that the multiagent reinforcement learning community needs to put much more emphasis on studying these games and designing algorithms that learn how to play optimally in these games. We also think that much greater emphasis needs to be placed in this area on the theoretical side from game theorists, both in defining ranking and optimality concepts as well as developing algorithms that create agents which achieve them. In this paper we have mainly focused on the question of how to design an optimal agent or rank agents in general sum n-player games. Perhaps this is the wrong question though. Maybe in real-world n-player scenar- ios, finding the optimal strategy for each agent doesn't make sense. For example, in self-driving cars, we don't want to have each car get to their location the fastest by endangering other cars. There is a large literature in economics on social choice theory, which approaches this problem from the perspective of a social planner. It is possible that this is a more useful direction be- cause the price of anarchy can be quite large in n-player games. There is also much work done on cooperative n-player games which might be helpful in this area. Fi- nally, it is interesting to examine connections to other n- player settings that are well-studied in economics such as market design and mechanism design. References Brown, N., and Sandholm, T. 2018. Superhuman ai for heads-up no-limit poker: Libratus beats top profession- als. Science 359(6374):418 -- 424. Brown, N., and Sandholm, T. 2019. Superhuman ai for multiplayer poker. Science 365(6456):885 -- 890. Browne, C. B.; Powley, E.; Whitehouse, D.; Lucas, S. M.; Cowling, P. I.; Rohlfshagen, P.; Tavener, S.; Perez, D.; Samothrakis, S.; and Colton, S. 2012. A survey of monte carlo tree search methods. IEEE Trans- actions on Computational Intelligence and AI in games 4(1):1 -- 43. Heinrich, J.; Lanctot, M.; and Silver, D. 2015. Ficti- tious self-play in extensive-form games. In International Conference on Machine Learning, 805 -- 813.
1903.08228
1
1903
2019-03-19T19:34:49
How to Make Swarms Open-Ended? Evolving Collective Intelligence Through a Constricted Exploration of Adjacent Possibles
[ "cs.MA", "cs.DC", "cs.NE", "nlin.AO" ]
We propose an approach of open-ended evolution via the simulation of swarm dynamics. In nature, swarms possess remarkable properties, which allow many organisms, from swarming bacteria to ants and flocking birds, to form higher-order structures that enhance their behavior as a group. Swarm simulations highlight three important factors to create novelty and diversity: (a) communication generates combinatorial cooperative dynamics, (b) concurrency allows for separation of timescales, and (c) complexity and size increases push the system towards transitions in innovation. We illustrate these three components in a model computing the continuous evolution of a swarm of agents. The results, divided in three distinct applications, show how emergent structures are capable of filtering information through the bottleneck of their memory, to produce meaningful novelty and diversity within their simulated environment.
cs.MA
cs
How to Make Swarms Open-Ended? Evolving Collective Intelligence Through a Constricted Exploration of Adjacent Possibles Olaf Witkowski1,2,∗ and Takashi Ikegami3 1 Earth-Life Science Institute, Tokyo Institute of Technology, Tokyo, Japan 2 Institute for Advanced Study, Princeton, USA 3 University of Tokyo, Tokyo, Japan * [email protected] Abstract. We propose an approach of open-ended evolution via the simulation of swarm dynamics. In nature, swarms possess remarkable properties, which allow many organisms, from swarming bacteria to ants and flocking birds, to form higher-order structures that enhance their behavior as a group. Swarm simulations highlight three important fac- tors to create novelty and diversity: (a) communication generates com- binatorial cooperative dynamics, (b) concurrency allows for separation of timescales, and (c) complexity and size increases push the system to- wards transitions in innovation. We illustrate these three components in a model computing the continuous evolution of a swarm of agents. The results, divided in three distinct applications, show how emergent structures are capable of filtering information through the bottleneck of their memory, to produce meaningful novelty and diversity within their simulated environment. Keywords: Open-ended evolution · continuous swarm evolution · col- lective intelligence · artificial neural networks · evolution of cooperation · intrinsic novelty 2 O. Witkowski and T. Ikegami 1 OEE Life has been evolving on our planet over billions of years, undergoing several major transitions which transformed the way it stored, processed and transmit- ted information. All these transitions, from multicellularity to the formation of eusocial systems and the development of complex brains, seem to lead to the idea that the evolution of living systems is open-ended. In other words, life appears to be capable of increasing its complexity indefinitely Another formulation of open-endedness, echoed by Standish [42] and Soros [41], is that open-endedness depends fundamentally on the continual production of novelty. Life keeps un- covering new inventions, in a process which never seems to stop. Since the 1950's, open-ended evolution (OEE) has been a central topic of research for artificial life approaches to the fundamental principles of life. Soon after, John Von Neumann [51] has contributed to the issue as well, with his early model of self-reproducing automata. Since 2015, a series of workshops have been taking place at Artificial Life conferences [45], the last of which4 was a launchpad for the present special issue. In general, an evolutionary system is considered to be open-ended when it is able to endlessly generate diverse novel entities of growing complexity. Engineering open-ended systems in the lab is not easy, and the main obstacle is that the designed evolutionary systems are subject to a thermodynamic drift making them collapse into equilibrium states. Once local optima are reached, they do not produce novelty anymore, which bounds their complexity and diversity. Innovation seems to emerge from collective intelligence, a phenomenon which refers to groups or networks of agents that develop together the ability to en- hance the group's cognitive capacity or creativity. This is reminiscent of the ongoing innovative process of science, which does not have any other fixed ob- 4 at ALIFE 2018, in Tokyo How to Make Swarms Open-Ended? 3 jective than the production of new knowledge, but makes discoveries mostly through accidents. Stuart Kauffman advocated for the idea of the adjacent pos- sible, claiming that a biosphere can be viewed as a secular or long-term trend and it can maximize the rate of exploration of the adjacent possible of an exist- ing organization [20, 19]. Ikegami et al. (2017) [18] builds on that idea to explain how, in terms of evolutionary transitions [28], a new stage (e.g. multicellular oranism) of evolution may be produced without any information being passed on from the previous stage (e.g. from single cells). Rather, structural properties are assembled, producing a stepping stone to the next level of innovation. These structural properties of a collective group can be compared to a bot- tleneck that acts as a filter on several levels of the system, implementing compu- tation that is not present in any of its parts. Part of this idea is analog to Tishby and Polani (1999) [46], where the information is squeezed through a bottleneck, to extract relevant or meaningful information from an environment. The result- ing "filtered" information through the bottleneck, retains only the features most relevant to general concepts. In this paper, we present three "C" factors that we deem important for nov- elty and diversity. We then introduce a swarm model to study these factors, ap- plied in three different studies. We conclude with a discussion on open-endedness at large, framing the three factors in terms of the emergence of collective intel- ligence in swarm simulations. 2 Conditions for OEE The OEE literature has proposed various conditions that are supposed to lead to the successful production of OEE in a system. Number of studies have attempted to formalize necessary conditions for OEE [16, 6]. Taking a recent example, Soros and Stanley (2014) [41] suggest four conditions at the scale of single reproducing 4 O. Witkowski and T. Ikegami individuals in the system, which should each fulfill some nontrivial minimal criterion, be able to create novelty, act autonomously, and dispose of access to unbounded memory. Such papers have typically been proposing their own model, to demonstrate the importance of the hypothesized conditions for the emergence of OEE within it. However, most evolutionary algorithms seem to either converge very quickly to a solution, or get stuck in a confined area of the search space. Either way, they don't seem to be able to intrinsically generate the amounts of complexity and novelty we find in nature, even at a scale. Although this failure of simulated evolution to match open-ended properties found in natural evolution may be explained by shorter timescales, in principle one would have expected decades of efforts, and increasingly larger resources poured into research in evolutionary computation, to have unlocked more of its potential to create novelty. However, even the latest technologies don't seem to keep their inventivity. In general, promising models [24, 23, 12, 13, 40] that manage to demonstrate at least a few phases transitions or creative leaps -- not necessarily with evolutionary computation -- seem to have one common denom- inator of containing several structural bottlenecks which filter relevant informa- tion through them, as a catalyst of creativity. What seems to be missing to achieve general OEE? We choose to empha- size three "C" candidates which we see as worth pursuing -- Communication, Concurrency, and Complexity: (a) Communication: constricted information flows between parts of the systems allow for synergy and cooperation effects. (b) Concurrency: the creation of separate space and time scales requires concur- rent, nondeterministic, asynchronous models. (c) Complexity: mere system growth can boost novelty and diversity. How to Make Swarms Open-Ended? 5 These are the three C-factors on which we choose to concentrate, in this paper. Next, will expand on each of them a little further, before proposing how to apply them in concrete models. We will now expand on these three points, before presenting concrete exam- ples, with Study 1, 2 and 3. Communication This first point addresses synergies and coordination between components of the systems, using information transfers. One well known example of OEE is combinatorial creativity in human language, where syntactical rules are capable of producing infinite well-formed structures using recursion, thus making the number of potential sentences unbounded [15]. Although these may seem slightly dated remarks, at the advent of language studies based on artificial life systems [22], it is promising to focus on the cultural layer of dynamics, that lives on top of the main layer of entities. For example, in the case of web services (social tagging networks), we can analyze how combinatioral complexity is effective in evoking OEE. In cellular automata, one may want to study the interactions between gliders or other patterns. In artificial chemistry, one may want to look at information flows between types of molecules or replicators. In agent-based modeling, perhaps establishments of protocols between agents or groups of agents can become a factor to focus on. Communication naturally adds relevant computing filters on unexploited in- formation flows, effectively increasing the bandwidth of useful information flows within the system per clock cycle, communication offers a layer for metadynamics at a different timescale from the first-order dynamics. This induces a separation of timescales, thus doubling the system's capacity to implement learning mech- anisms. Designing information to circulate between a sub-entities of the system forces the creation of more structural bottlenecks. 6 O. Witkowski and T. Ikegami We propose information exchanges as a central mechanism promoting open- ended evolution. From information flows in groups of individuals, a system can boost its own production of creativity to achieve indefinite complexity. Examples are detailed in Study 1 and 2, below. Concurrency In many situations, a system cannot scale up to larger space-time scales as it is. We need to add some ingredient to make it work in the larger scales. One such remedy is to give it asynchronous updates. Removing the global clock is needed to make larger systems function consistently without constantly checking local consistency. On the other hand, we know that cellular automata (CA) tend to lose their complexity by adopting asynchronous dynamics. Yet asynchrony is an original natural phenomena difficult to bring to artificial systems. According to Dave Ackley [1], models should be indefinitely scalable, ruling out deterministic, synchronous models (such as simple cellular automata), and suggesting nondeterministic, asynchronous ones. Bersini et al. (1994) [4] pro- posed that asynchronous rather than synchronous updating may be key factor in inducing stability in simulations. Although they were examining a variant of cellular automata, their results, based on an analysis of the Lyapunov exponent, indicated the responsibility of asynchrony for sensitivity of the update function. Ackley and Ackley (2015) [1] propose to use asynchrony. The concurrency is also closely related to the ability a system has to evolve separate timescales. Although highly contingent on other properties of a simula- tion, the capacity to develop heterogeneous timescales often constitutes a barrier to producing intrinsic novelty. Researchers used to separate lifetime learning and evolutionary learning, as two distinct mechanisms [31]. However, the effects of accumulating and filtering information into and out of one system's memory occurs at a much more continuous range of different timescales. In nature, from How to Make Swarms Open-Ended? 7 phenotypic plasticity, to maternal effects, to sexual selection, or to gene flow, many events have their time scales intricately interlaced. We will address this in particular in Study 1 and 2. Complexity We have no grounds to argue that nature is its own only possible realization, since there would be no satisfactory explanation for that. One important feature of nature though, is its complexity, which can translate into both system size and landscape complexity. In the simplest of all cases, complexity can be reached merely with large population sizes. Ikegami et al. (2017) [18] proposed that large groups of individuals, given the right set of structural characteristics, may be the main driver for emergence. They discussed this hypothesis in relation to large-scale boid swarm simulations [37], in which the nucleation, organization and collapse dynamics were found to be more diverse in larger flocks than in smaller flocks. Collective behaviors can be qualitatively different by increasing the number of agents, i.e. a colony or group size. In the actual observation, e.g., the individual bees change their behaviors depending on the colony size. Also the fish change their performance of sensing the environmental gradient depending on the school size. In previous works [30], we simulated half a million birds flock using a boids model [37, 49] and found that qualitatively different behavior emerges when the total number of individuals exceeds a few thousands or so. Flocks of different sizes and different shapes interact to diminish some flocks but to generate new ones. Different types of fluctuation become dominant in different size of flocks. A correlation of the local density fluctuation becomes dominant in the larger size flocks and that of the velocity fluctuation dominates in the smaller size flocks. An example of that is offered in Study 3. 8 O. Witkowski and T. Ikegami Stretching the argument on size, environmental complexity is definitely nec- essary to a certain extent to create complex behaviors. Only with richer envi- ronments, encompassing complex distributions of energy resources and ways for systems to survive, can emerging individuals explore a rich set of strategies and increasingly increasingly complex solutions. As mentioned earlier, evolutionary landscapes have become an important concept in biology to analyze the dynam- ics at play in an ecosystem. The picture to have is the one of a unit of selection (e.g. a gene, among many other options) being represented by a point in a multidimensional search space. That space is typically given as many dimensions as there are degrees of freedom for the entity to vary and evolve in the space (e.g. combination of nucleotide sequences). The search space is mapped onto an additional dimension, which is usually the reproductive success, or fitness. The shape of the fitness across all degrees of freedom of the system have a strong impact on the dynamics that it can achieve. Malan et al. (2013) [26] identifies eleven characteristics of fitness, which make them more or less difficult to solve. These characteristics include the degree of variable inter-dependency, noise, fitness distribution, fitness distribution in search space, modality, information to guide search and deception, global landscape structure, ruggedness, neutrality, symmetry, and searchability. In evolutionary systems, richer environments, benefiting of a complex distri- bution of energy sources and ways for systems to survive, give rise to richer sets of pathways. The larger the search spaces, the more complex fitness functions are potentially evolved. Another way is to make the environment a more com- plex function of time, which the agents will need to learn in order to extract more energy from it. In Study 1 and 2, we present results suggesting that sim- ulations should be ensured to provide sufficient system complexity in terms of the environment of agents. How to Make Swarms Open-Ended? 9 Simulation time and memory, though not mentioned yet, are important com- ponents to consider. Computationally, the whole course of evolution on Earth is like a single run of a single algorithm that invented all of nature, and seems like it will never end. One obvious difference is the size of the systems, which might be the missing element to get ever-greater emergent complexity and nov- elty through very long time. However, we do not insist on this component in this paper, as we consider trivial that a system with too low computational power will not be able to achieve OEE to any extent. Similarly, there is point to be made about endo-OEE, producing novelty from within, against exo-OEE, which makes use of input from outside the sys- tem. Picbreeder [39], for example, explicitly requires external human input to function, which makes it a debatable generator of OEE. Nevertheless, OEE is not about new information, but rather inventions achieved by the system. In that respect, swarms are a promising model: without increasing ensemble size, they let us focus on how coordination patterns self-organize, generating intrin- sic novelty. To give another example, even increasing the number of neurons in a neural network still requires neurons to differentiate themselves, and create coordinated networks before they get to foster innovative ideas. We exemplify the importance of size and complexity in Study 1 and 3, while discussing how to make simulations parallelizable, to save considerable amounts of time and memory by distributing them over many machines. 3 Concurrent evolutionary neural boids model The model we choose to present puts together the abovementioned series of features, as a means to promote the system's open-endedness. We give some details here, and will go over the details of several applications of it in the 10 O. Witkowski and T. Ikegami next section. The evolutionary system is an agent-based simulation, based off Reynolds' boids model [37]. The boids model was based on simple rules computed locally, allowing to simulate flocks of agents moving through artificial environments. As with most artificial life simulations, boids showed emergent behavior, that is, the complexity of boids arises from the interaction of individual agents adhering to a set of simple rules of separation (steer to avoid crowding local flockmates), alignment (steer towards the average heading of local flockmates, and cohesion (steer to move toward the center of mass of local flockmates). In our model, like in Reynolds' model, the population of agents moves around in a continuous three-dimensional space, with periodic boundary conditions (Fig- ure 1). However, instead of using fixed rules to control the boids' motion, we allow agents to evolve their own controllers through concurrent evolutionary computa- tion. Each agent, instead of responding to simple rules, is controlled by its own neural network. The parameters of the neural network are encoded in a genotype vector, which determines the individual's sensorimotor choices at each moment in time. This corresponds to standard evolutionary robotics methodologies [32], although we introduce the following variant. The genotype is evolved through the course of the simulation, via a continuous variant of an evolutionary algo- rithm [54], that is, agents with high level of fitness are allowed at any point to replicate with mutation in the middle of the running simulation. This model also builds up on prior work on the effect of self-organized inter- agent communication and cooperative behavior on the performance of agents to solve tasks [35, 34]. Previous research has shown the difficulty of using commu- nication channels [36, 29] but showed cooperative value of information trans- fers [55]. This will be complemented by the results from previous information- How to Make Swarms Open-Ended? 11 theoretic analyses of learning systems, which managed to shed light on the role of information flows in learning [48, 25, 47]. Fig. 1: Graphical representation of the world in a neural boids simulation. Each agent is represented as an arrow indicating its current direction. The color of an agent indicates the average value of its internal nodes. The green spheres represent the centers for energy sources. Although variants presented later in the paper display slightly different graphics, the backbone is the same. Agents are given a certain energy, that also acts as their fitness. This will be specific to the study cases. Each agent comes with a set of 12 different sensors. The neural network (represented on Figure 2) takes the information from those sensors as inputs, in order to decide the agent's actions at every time step. The possible actions amount to the agent's motion, and in the specific variant shown here, a Prisoner's Dilemma action (cooperate or defect), as well as two output 12 O. Witkowski and T. Ikegami signals. The architecture is composed of a 12 input, 10 hidden, 5 output, and 10 context neurons connected to the hidden layer (see Figure 2). The agents' motion is controlled by M1 and M2, outputting two Euler rota- tion angles: ψ for pitch (i.e. elevation) and θ for yaw (i.e. heading), with floating point values between 0 and π. Even though the agents' speed is fixed, the rota- tion angles still allow the agent to control its average speed (for example, if ψ is constant and theta equals zero, the agents will continuously loop on a circular trajectory, which results in an almost-zero average speed over 100 steps). The outputs S(1) out and S(2) out control the signals emitted on two distinct chan- nels, which are propagated through the environment to the agents within a neighboring radius set to 50. The choice for two channels was made to allow for signals of higher complexity, and possibly more interesting dynamics than greenbeard studies [11]. The received signals are summed separately for each direction (front, back, right, left, up, down), and weighted by the squared inverse of the emitters dis- tance. This way, agents further away have much less impact on the sensors than closer ones do. Every agent is able to receive signals on the two emission chan- nels, from 6 different directions, totalling 12 different values sensed per time step. For example, the input S(6,1) in corresponds to the signals reaching the agent from the neighbors below. The evolution is performed continuously over the population. Agents with negative or zero energy are removed, while agents with energy above a thresh- old are forced to reproduce, within the limits of one infant per time step. The reproduction cost is low enough, considering the threshold, to not put the life of the agent at risk. How to Make Swarms Open-Ended? 13 Fig. 2: Architecture of the agent's controller. The network is composed of 12 input neurons, 10 hidden neurons, 10 context neurons and 5 output neurons. 4 Study cases We go over the application of this model in three selected examples of studies. Each of them highlights a specific property for OEE. The first model shows how agents can form patterns to accelerate their search for energy, distributed over an n-dimensional space, collaborating via local signaling with their neighbors. The second study shows the invention of dynamical group strategies in a spatial prisoner's dilemma, allowing for specific cooperation effects. The third example shows the impact of growth on the emergence of noise-canceling effects. 4.1 OEE via collective search based on communication Since Reynold's boids, coordinated motion has often been reproduced in number of artificial models, but the conditions leading to its emergence are still subject to research, with candidates ranging from obstacle avoidance to virtual leaders. The relation of spatial coordination and group cooperation has long been studied in game theory and evolutionary biology. 14 O. Witkowski and T. Ikegami We here apply our model of agents exchanging signals and moving in a three- dimensional environment, to a task of dynamical search for free energy in space [54, 55]. Each agent's movements are controlled by artificial networks, evolved through generations of an asynchronous selection algorithm. At the term of the evolution, the agents are able to communicate to produce cooperative, coordi- nated behavior. Individuals develop swarming using only their ability to listen to each other's signals. The agents are selected based on their performance at finding invisible resources in space giving them fitness. The agents are shown to use the informa- tion exchanged between them via signaling to form temporary leader-follower relations allowing them to flock together. The swarmers outperform the non- swarmers at finding the resource, thus reaching a neutral evolutionary space which leads to a genetic drift. This work constructs an adaptive system to evolve swarming based only on individual sensory information and local communication with close neighbors. This addresses directly the problem of group coordination without central con- trol, without being aware of the position direct neighbors, nor any use of the substrate where to deposit information (stigmergy) [14]. The approach has also the advantage of yielding original and efficient swarming strategies. A detailed behavioral analysis is then performed on the fittest swarm to gain insight as to the behavior of the individual agents. The results show that agents progressively evolve the ability to flock through communication to perform a foraging task. We observe a dynamical swarming behavior, including coupling/decoupling phases between agents, allowed by the only interaction at their disposal, that is signaling. Eventually, agents come to react to their neighbors' signals, which is the only information they can use to improve their foraging. This can lead them to either head towards or move How to Make Swarms Open-Ended? 15 away from each other. While moving away from each other has no special effect, moving towards each other, on the contrary, leads to swarming. Flocking with each other may lead agents to slow down their pace, which for some of them may keep them closer to a food resource. This creates a beneficial feedback loop, since the fitness brought to the agents will allow them to reproduce faster, and eventually multiply this type of behavior within the total population. The algorithm converges to build a heterogeneous population, as shown on Figure 3. The phylogeny is represented horizontally in order to compare it to the average number of neighbors throughout the simulation. The neighborhood becomes denser around iteration 400k, showing a higher portion of swarming agents. This leads to a firstly strong selection of the agents able to swarm together over the other individuals, a selection that is soon relaxed due to the signaling pattern being largely spread, resulting in a heterogeneous population, as we can see on the upper plot, with numerous branches towards the end of the simulation. In this scenario, agents do not need extremely complex learning to swarm and eventually get more easily to the resource, but rather rely on dynamics emerging from their communication system to create inertia and remain close to goal areas. The simulated population displays strong heterogeneity due to the asyn- chronous reproduction schema, which can be seen in the phylogenetic tree (Fig- ure 3). The principal component analysis plotted on Figure 4 shows a large cluster (left side) in addition to a series of smaller ones (right side). The geno- types in the early stages of the simulation belong to the right clusters, but get to the left cluster later on, reaching a higher number of neighbors. The plot shows a diverse set of late clusters, which translates to numerous distinct behaviors in the late stage of the simulation. 16 O. Witkowski and T. Ikegami Fig. 3: Top: average number of neighbors during a single run. Bottom: agents phylogeny for the same run. The roots are on the left, and each bifurcation represents a newborn agent. Such heterogeneity may suppress swarming but the evolved signaling helps the population to form and keep swarming. The simulations do not exhibit strong selection pressures to adopt specific behavior apart from the use of the signaling. Without high homogeneity in the population, the signaling alone allows for inter- action dynamics sufficient to form swarms, which proves in turn to be beneficial to get extra fitness. These results represent an improvement on previous models using hard-coded rules to simulate swarming behavior, as they are evolved from very simple con- ditions. Our model also does not rely on any explicit information from leaders, How to Make Swarms Open-Ended? 17 Fig. 4: Two principal components of a PCA on the genotypes of all agents of a typical run, over one million iterations. Each circle represents one agent's genotype, the diameter representing the average number of neighbors around the agent over its lifetime, and the color showing its time of death ranging from bright green (at time step 0, early in the simulation) to red (at time step 106, when the simulation approaches one million iterations). like previously used in part of the literature [8, 44]. It does not impose any ex- plicit leader-follower relationship beforehand, letting simply the leader-follower dynamics emerge and self-organize. In spite of being theoretical, the swarming model presented in this paper offers a simple, general approach to the emergence of swarming behavior once approached via the boids rules. This simulation im- proves on previous work because agents naturally switch leadership and follow- ership by exchanging information over a very limited channel of communication. Finally, our results also show the advantage of swarming for resource finding. It's only through swarming, enabled by signaling behavior, that agents are able to reach and remain around the goal areas. 18 O. Witkowski and T. Ikegami In terms of cooperation, this model exemplifies a case of multilevel selection theory [52, 50], which models the layers of competition and evolution, within an ecological system. Our system shows the emergence of different levels which function cohesively to maximize reproductive success. The fitness value of the group level dynamics outweighs the competitive costs, resulting in individuals constantly innovating in ways they are cooperating in a non-trivial way, to create behaviors which are not centrally coded for. This study shows swarming dynamics emerging from a communication sys- tem between agents, immersed in a simulated environment with spatial distribu- tion of energy resource. The concurrent evolution scheme, running at the same time as the simulation itself, led to decentralized leader-follower interactions, which allowed for collective motion patterns, which in turn significicantly im- proved the groups' fitnesses. This model encodes the stochastic evolution of a controller that maps sensory input onto motor output, to optimize the performance on a task, as framed broadly by Nolfi and Floreano (2000) [32]. We capture the fight against a difficult wall [38], which simulations typically fail at because they suddenly hit a so-called "wall of complexity": trivial tasks are solved easily, but it's hard to jump to solving difficult ones. If we take the no-free-lunch argument from Wolpert and Macready (1997) [56] that no optimisation algorithm is at all times superior to others, it is natural that the more specific the algorithm, the more it is likely to fail with new problems. Our results suggest that novelty can be produced by the asynchronous evo- lution of a heterogeneous community of agents, which through their mixture of strategies, may achieve open-ended, uninformed learning. The heterogeneity present in the model also offers an extension to the advantages of particle swarm optimization (PSO) [10]. While PSO only offers one unique objective function How to Make Swarms Open-Ended? 19 to optimize, each agent in the swarm effectively runs its own function, which are combined into a swarm behavior. Although these results suggest open-endedness, it is worth noting we do not bring a proof that the phenomenon is truly open- ended, which may require the emergence of ever-complexifying communication, or an uninterrupted sequence of evolutionary innovations. The information flows were a focus of the original work [55]. From these flows, one can notice three main bottlenecks. The evolutionary computation contains a bottleneck effect, as a result from the selection based on the agents' performance on the task. Another bottleneck can be found between the sensory inputs of each agent, and its motor outputs, as the neural controller acts as a filter for the information. The agents' signaling also naturally contains a bottleneck effect, as the information transmitted from agent to agent is constrained by the physical communication bandwidth. The combination of these three bottlenecks allows for relevant information to be filtered into the swarm, which is able learn certain behaviors (see also next section). 4.2 OEE via cooperative flocking The evolution of cooperation is studied in game theory, and stretches have been made to include spatial dimensions. This problem is often tackled by using simple models, such as considering interactions to be a game of Prisoner's Dilemma (PD). We examined a variation of the model with a distinct fitness function in a separate study, based this time on the agents playing a spatial version of the Pris- oner's Dilemma [53]. We study the impact of the movement control on optimal strategies, and show that cooperators rapidly join into static clusters, creating favorable niches for fast replications. It is also noted that, while remaining inside those clusters, cooperators still keep moving faster than defectors. The system dynamics are analyzed further to explain the stability of this behavior. 20 O. Witkowski and T. Ikegami This work presents, in an even more explicit fashion than the previous study, a model aimed at showing emergent levels of selection for cooperative behavior [52]. At every time step, agents are playing a N-player version of the prisoner's dilemma with their surrounding, meaning that they make a single decision that affects all agents around them. They get reward and/or punishment based on the number of cooperator around them. Their decision is one of the outputs of their neural network. Effectively, the payoff matrix we used is an extension of Chiong and Kirley (2012) [5], where we added the distance to take into account the spatial continuity. Based on the outcome of the match, agents can choose a new direction, which is similar to leaving the group in the walk away strategy [2], the main difference being that, in our case, it is also possible for groups to split. It is also similar in another aspect: there is a cost to leaving a group, as a lone agent may need time to meet others. At the beginning of each run, the environment is seeded with random agents. Since all weights in their neural network are set at random, roughly half of the agents initially choose to cooperate while the other half choose to defect. This leads to a fast extinction of cooperators, until approximately 50000 time steps), until a group emerges strong enough to survive. The second phase follows, in which cooperators are quickly increasing in number due to the autocatalytic na- ture of this strategy. A third step happens eventually, where defectors invade the cluster, followed either by the survival of the cluster due to cooperators running away or a reboot of the cycle. In case of survival, oscillations in the proportion of cooperators can be observed. However, this phenomenon is averaged away over multiple runs, since period and phase of the oscillations are not correlated from one experiment to the other. Were a defector to appear near a cluster of cooper- How to Make Swarms Open-Ended? 21 Fig. 5: Graphical representation of the world in a simulation. Each agent is repre- sented as an arrow indicating its current direction. The color of an agent indicates its current action, either cooperation (blue) or defection (red). Note the cluster of cooperators being invaded by defectors. ators, the cluster would react by "reproducing away". However, the chances to be overtaken by the defectors is much higher than in the dynamic case. From this three-dimensional model of agents playing the Prisoner's Dilemma, the first result is that cooperators, when they are present, quickly evolve to form clusters as they represent a favorable pattern. The clustering behavior can be in- terpreted as a degenerated version of the simulations presented above, since the cooperating agents present the same capacities of information exchange as that model. We note that this solution is evolved through a longer time scale, as it is not always viable locally, depending on the distribution and behavioral thresh- olds of defectors. While the clustering itself can be expected, it is interesting to 22 O. Witkowski and T. Ikegami observe that their overall movement rate is still higher than defectors. This is even more surprising considering that those clusters do not seem to move fast. Instead, analysis shows that cooperators are moving quickly inside the cluster, which may be a way to adapt to an aggressive environment. In addition, comparison with the static case showed that movement made the emergence of cooperators harder, but more stable in the long run. Since it is harder for defectors to overtake a cluster of cooperators, our systems often show a soft bistability, meaning that they will eventually switch from one state to the other. It is even possible to observe a sort of symbiosis, where cooperators are generating more energy than necessary, which is in turn used by peripheral defectors. In this case, replacement rates allow cooperators to stay ahead, keep- ing this small ecosystem stable. This cohesion among cooperators seems to be enhanced by signaling, even though signals might attract defectors. Additional investigation on the transfer entropy, for instance, could be a promising next step. Another result is found in the choice of actions, generated by the neural networks without consideration of the past actions. We notice the emergence of a dynamical memory effect, that otherwise requires to be encoded in each agent, here emerging from the agents' motion in space. Since the Prisoner's Dilemma game has become a common model used in evolutionary biology to study the outcomes depending on the costs that char- acterize an ecosystem, this model, with a fitness based on the results of such game, showed the emergence of spatial coordination based on a the exchange of signals between agents. The signals remained very simple, and the environment was fixed in time. This model's evolutionary computation reached solutions composed of differ- ent parts, including soft bistable strategies, different radiuses of clusters, as well How to Make Swarms Open-Ended? 23 as the use of dynamical patterns to improve their fitness. The solutions were also distributed over different timescales. The communication between agents also allowed them to converge on these behaviors more quickly. These elements refer back to our 3-C arguments earlier, for the discovery of novel solutions to a simple PD game. Lastly, we note that many different neural architectures may coexist as only a part of the neural architecture is used to implement flocking. This neural heterogeneity is something we'd like to insist in the context of OEE. Additionally, communication is important to filter out the neural architecture heterogeneity, which potentially holds the heterogeneity in a community (i.e. agents can stay in a community if they can communicate to each other). The communication may therefore indirectly help preserving the heterogeneity. 4.3 OEE via large scale swarms Studying flocking models can also lead to the emergence of OEE, by focusing on emergent phenomena as macroscopic layers of patterns and structures that appear as a result of cooperative phenomena between autonomously behaving elements. A group of elements creates a self-organizing structure, which gov- erns the individual micro rules and creates a new macro structure. Therefore, consecutive micro -- macro recurrent self-organization is defined as an emergent phenomenon. Here, we describe the contribution of the same swarming simulation, scaled up, showcasing the effect of size on emergence of open-endedness [9]. Before that, we start by presenting a degenerated version of that model, which shows large-scale dynamics in the less computationally costly case of agents that don't preserve any internal state other than position and velocity [18]. Starting with this simpler stateless model, we observe a noticeable change when the total number of boids increases from 2048 to 524,288, while the density 24 O. Witkowski and T. Ikegami is kept constant (Figure 6). In order to compute large swarming behaviour, we parallelized the computational steps using the general-purpose computing on graphics processing units (GPGPU) method. The next step was to extend it to stateful agents. Fig. 6: Visualization of swarming behavior, simulated by a large scale stateless boids model [18]. The total number of boids in each panel is (a) 2048, (b) 16 384, (c) 131 072 and (d) 524 288, respectively. Some flocks are composed of a very large number of boids with narrow filament patterns. The initial velocity of each boid is set at random, and the density of the total number of boids is kept constant at 16,384 (number per cubic unit). The minimum and the maximum speed are set at 0.001 and 0.005 (unit per step), respectively. We explore the effect of reaching a critical mass, and how it impact the ef- ficiency of the swarm's foraging behavior. In particular, we study the problem of maintaining the swarm's resilience to noisy signals from the environment. To do so, we look at stateful boids, i.e. moving agents controlled by neural network How to Make Swarms Open-Ended? 25 controllers, which we evolve through time in order to explore further the emer- gence of swarming, like in the previous two sections. However, we now ground our model in a more realistic setting where information about the resource location made partly accessible to the agents, but only through a highly noisy channel. The swarming is shown to critically improve the efficiency of group foraging, by allowing agents to reach resource areas much more easily by correct individual mistakes in group dynamics. As high levels of noise may make the emergence of collective behavior depend on a critical mass of agents, it is crucial to reach in simulation sufficient computing power to allow for the evolution of the whole set of dynamics. Because this type of simulations based on neural controllers and information exchanges between agents is computationally intensive, it is critical to optimize the implementation in order to be able to analyze critical masses of individ- uals. In this work, we address implementation challenges, by showing how to apply techniques from astrophysics known as treecodes to compute the signal propagation, and efficiently parallelize for multi-core architectures. The results confirm that signal-driven swarming improves foraging performance. The agents overcome their noisy individual channels by forming dynamic swarms. The mea- sured fitness is found to depend on the population size, which suggests that large scale swarms may behave qualitatively differently. The minimalist study presented in this paper together with crucial compu- tational optimizations opens the way to future research on the emergence of signal-based swarming as an efficient collective strategy for uninformed search. Future work will focus on further information analysis of the swarming phe- nomenon and how swarm sizes can affect foraging efficiency. In this model, we specifically focus on the addition of noise to the food detection sense that the agents possess, and hypothesize that it can be overcome 26 O. Witkowski and T. Ikegami by the emergence of a collective behavior involving sufficiently large groups of agents. Many systems, from atomic piles to swarms, seem to work towards preserving a precarious balance right at their critical point [3]. An atomic pile is said to be "critical" when a chain reaction of nuclear fission becomes self-sustaining. A minimal amount of fissionable material has to be compacted together to keep the dynamics from fading away. The notion of critical mass as a crucial factor in collective behavior has been studied in various areas of application [27, 33]. Similarly, the size of the formed groups of agents may be crucial, in order to reach a critical mass in swarms, enough to overcome very noisy environments. Part of the focus will therefore be on the optimization of the computer simulation itself, as large-scale swarms may qualitatively differ in behavior from regular- sized ones. The model extends the original setup described before, which proposed an asynchronous simulation evolving a swarming behavior based on signaling be- tween individuals. However, unlike the original model, where the individuals don't perceive directly either the food patches or the other agents around them, here we give a sense of vision to every agent, allowing them to detect nearby resources. However, we add a high level of noise to make this information highly imperfect. We used an agent-based simulation to show how signal-driven swarming, emerging in an evolutionary simulation such as in Witkowski and Ikegami (2014) [54], allow agents to overcome noisy information channels an improve their per- formance in a resource finding task. Our first contribution is the very intro- duction of noise, demonstrating that the algorithm performs well against noises filling up channels of information almost up to their full capacity, in the inputs of agents. The individuals, by means of a swarming behavior helped by basic How to Make Swarms Open-Ended? 27 signaling, manage to globally filter out the noise present in the information from their sensory inputs, to reach the food sites. We proposed a hierarchical method based on the Barnes-Hut simulation in computational physics and its parallel implementation. We achieved a perfor- mance improvement of a few orders of magnitude over the previous implementa- tion [54]. This implementation is crucial to achieve the simulation of a sufficient number of agents to test for large-scale swarms (i.e. involving a very large num- ber of individuals), which have been suggested to generate qualitatively different dynamics. The optimization of the fitness acquired by phenotypes using efficient pat- terns of behavior (motion and signaling), which themselves are encoded in the weights of agents' neural networks. The real optimization therefore occurs at the higher level of the darwinian-like process in the genotypic search space. Effi- cient genotypes are selected by the asynchronous genetic algorithm throughout a simulation run. We observed that signaling improves the foraging of agents (see Figure 7 for plots from Drozd et al. [9] of efficiency or fitness against simulation time), the average resource retrieved per agent per iteration as a measure of the popula- tion's fitness. Without noise, the agents using signaling are less efficient than their silent counterpart, which we found is not due to the cost of signaling, but rather because of the excess of noise brought by the signal inputs. The difference remains very small between signaling and non-signaling agents. We find however that from a certain noise level, the cost to signal is fully compensated by the benefits of signaling, as it helps the foraging of agents. The average fitness becomes even higher as we increase the noise level, which suggest that the signaling behavior increases in efficiency for high levels of noise, allowing the agents to overcome imperfect information by forming swarms. 28 O. Witkowski and T. Ikegami Fig. 7: Agents' efficiency plot with and without signal, from a stateful (neural- network-controlled) boids model in the original work [9], with mean (central line) and standard deviation range (area plot) over 10 runs. The plots correspond to noiseless (top), constant noise 20 (middle), and constant noise 40 (bottom), respectively. We also observe scale effects in the influence of the signal propagation on the average fitness of the population. For a smaller population, only middle values of signal propagation seem to bring about fitter behaviors, whereas this is not the case for larger sizes of population. On the contrary, larger populations are most efficient for lower levels of signal propagation. This may suggest a phase How to Make Swarms Open-Ended? 29 transition in the agents' behavior for large populations, eventually in the way the swarming itself helps foraging. Understanding criticality seems strongly related to a broad, fundamental theory for the physics of life as it could be, which still lacks a clear description of how it can arise and maintain itself in complex systems. The effects of criticality have recently been investigated futher by one of the authors, using a similar setup [21]. The results showed exploratory dynamics at criticality in the evolution of foraging swarms, and the tension between local and global scale adaptation. Through this work, by increasing the number of simulated boids that main- tain their own states, we may introduce more than the mere number. By allowing for many information exchanges between computing agents, the simulation can effectively take leaps of creativity. In Stanley and Lehman's 2015 book [43], ob- jective functions are presented as a distraction, as novelty and diversity might not be achieved by hard-coding the arrival point. Here, in contrast, we have many evolvable objective functions cooperate in reaching a solution, as a step- ping stone to reach the search for novelty. By letting the swarm grow, we see the emergence of collective intelligence, which corresponds to the invention of signal-based error correction. By exchang- ing signals, the agents are able to correct the error induced by the noise we in- jected in the simulation. Like for the large scale boids simulation, the invention happens after a critical mass of agents is reached, suggesting similar dynamics with stateful agents. 5 Discussion OEE is the everlasting innovative processes found in human technologies and biological evolutions, and we barely observe open-endedness outside these exam- 30 O. Witkowski and T. Ikegami ples. Yet, some artificial systems demonstrate close-to-OEE phenomena, which we have discussed earlier in this paper. Achieving real OEE remains an open challenge, and at this point all works in the literature works fall short of that objective. Although that may be the case with the swarm models presented above, it was one of our goals to emphasize the importance of maintaining the evolvability of a system. In an adversarial game theoretical setup for example, reaching an ESS or a local attractor may keep the system from inventing new solutions. In this sense, explicitly stopping the system from learning too much may allow the system to avoid being stuck in such attractor, and possibly keep innovating forever. In this paper, we propose collective intelligence as a driving force towards open-ended evolution, suggesting that collective groups can develop the ability to be more innovative. Instead of aiming at optimizing one fixed objective function, a collective swarm of agents works with as many competing objectives as there are agents in the swarm. Through information exchanges between a certain number of agents, these objectives, embodied in the agent's behaviors, can collaborate to implement a search for novelty. All agents contribute to the search in behavioral space, as one whole organization, by exploring the adjacent possible. Each novel discovery in the system, or emergent level of organization, can be reached from an adjacent state where the system was previously. The way one moves from one point to the next, which should retain information accumulated in the past, is constrained by the structure of the swarm, in a bottleneck effect. We discuss several instances of bottlenecks in this paper. One is a task or environmental condition which each agent must overcome. In the case of foraging environment, organizing swarming turned out to be a critical step. So it became a major transition from non-swarming to swarming agents. Swarming behavior How to Make Swarms Open-Ended? 31 was obtained by organizing a hill side function by the neural controller. After the swarming behavior has been achieved, other properties (e.g. individual pattern) start to evolve. So for the task, swarming was a necessary behavior to organize and was a bottleneck for the entire evolutionary process. In other words, OEE emerges by setting up a right environmental condition. In case of a game-theoretic situation, such as Study 2, the communication system among all agents constituted a bottleneck to achieve mutual coopera- tion. With the emergence of niche construction, the door opens for regulating mechanisms such as cooperation, reciprocal altruism or social punishment, to get implemented. In this example, the OEE in terms of the invention of cooper- ation mechanisms, can only evolve as a secondary structure once the swarming structure is already established. In the case of large swarm models, the bottleneck is twofold. One is scale itself and also its CPU resource. We discussed the evolution of swarm by increasing its size, showing there is a critical size where the different kinds of fluctuation dominates in larger flocks (i.e. heading direction fluctuation to the density fluc- tuation). If such a transition occurs at the larger size simulation (we expect it can happen in each 3-4 order difference in sizes), we say that OEE is caused by increasing the size. In addition to this point, 3D swarm models require a huge computational power and we need to elaborate programming for a large scale systems. In Study 3, each boid has a list of neighbors and it is updated periodically. This speeds up the calculation of the distance from the one to its neighboring boids. In study 1, each bird can listen to the sound sent unidirectionally from the other boids, so that we don't have to calculate the exact distance. Real birds will never measure the distance to the other individuals. So measuring the distance is an 32 O. Witkowski and T. Ikegami unnecessary bottleneck due to the computational model. Here the OEE is the new computational techniques to overcome this computational bottlenecks. The computation of a swarm displays a bottleneck effect, in the sense that the emergent properties of the swarm and its embodiment in a simulated envi- ronment may constrain the way the information (communication, lineage infor- mation) flows within the system, and the way relevant information (strategies, motion patterns) is progressively retained5 through time in its structure. Never- theless, the simplicity of such information flows may be limiting, more complex information transfer protocols may need to emerge from bottlenecks to bootstrap OEE. For open-endedness, bottlenecks are crucial to, perhaps counterintuitively, act against learning. We observe examples of such bottlenecks in systems like Picbreeder [39], where one must find a way to avoid the system from assuming that the current apparent goal is the ultimate goal, as this would preclude further innovations. Picbreeder-like systems present similarities with our signal-based swarms, as they have communication between many agents filter information to let innovations come about. As suggested in the beginning of the paper, bottlenecks can be caused by dif- ferent components: an explicit communication system, a concurrent evolutionary system, and a greater complexity. These three components are highlighted in the studies described above, and we propose them as the principal ones to create novelty and heterogeneity in solutions. First, the communication between agents is shown to catalyze swarming and cooperation strategies. In previous work of turn-taking interaction between two agents installed with neural networks [17], we noticed that performing demo- cratic turn-taking offers novel styles of motion evolutionarily. Accordingly, here, 5 A swarm can be shown to act as a collective memory, either explicitly/statefully [55] or dynamically/statelessly [7]. How to Make Swarms Open-Ended? 33 the local interactions between agents in a flock allow for the swarm to take par- ticular shapes (Study 1), invent an explicit cooperative protocol (Study 2), and implement a noise-canceling policy (Study 3). To reach OEE, perhaps more than mere signaling, higher complexity levels of language may need to emerge. Second, the concurrent evolution algorithm essentially selects for meaningful information in behavioral space, by squeezing noisy behavior through a selective bottleneck. However, instead of using one unique objective function, the selection is distributed asynchronously in space and time. Differential timescales also helps accelerating the learning, which should happen as fast as possible, while retaining the way to generate the best found patterns discovered in the past. Lastly, once past the selection bottleneck, heterogeneity seems to increase considerably in genotypic space. Third, in terms of complexity, given the population size is large enough, with a consequently large number of degrees of freedom, we notice the swarm dynam- ics significantly change, in various ways. The flock's surface curvature may vary for large or small flocks, as well as the attraction and repulsion induced by the exchange of different signals. The motor responses may be amplified, since the input signals may significantly increase, given a higher density of neighboring agents, as seen in Study 1. Similarly, smaller flocks may display a more ordered behavior, with the trade-off however of being more sensitive to noise, since the critical mass is not reached to implement noise-canceling effects, as demonstrated in Study 3. Larger flocks can also be a source of individual behavioral differenti- ation, when a higher order of organization emerges. The key is not the size nor the amount of new information, but rather the system promoting the invention of new coordination patterns within itself. We have shown how collective intelligence has the ability to augment the creation of new and diverse solutions in a swarm, when given limited channels 34 O. Witkowski and T. Ikegami of communication, a concurrent evolution bottleneck and a large number of constrainted degrees of freedom. It come as an inspiration for scientists: a good way to build an open-ended system, able to indefinitely discover new inventions, seems not to reside in centralized computation, but rather in distributed systems, composed of large collectives of communicating agents. 6 Acknowledgements The authors would like to thank their collaborators who contributed partially to this work: Nathanael Aubert-Kato, Aleksandr Drozd, Yasuhiro Hashimoto, Norihiro Maruyama, Yoh-ichi Mototake and Mizuki Oka. Bibliography [1] Ackley, D. H. and Ackley, E. S. (2015). Artificial life programming in the robust-first attractor. In Andrews, P., Caves, L., Doursat, R., Hickinbotham, S., Polack, F., Stepney, S., Taylor, T., and Timmis, J., editors, Artificial Life Conference Proceedings 13, pages 554 -- 561. Cambridge, MA: MIT Press. [2] Aktipis, C. (2004). Know when to walk away: contingent movement and the evolution of cooperation. Journal of Theoretical Biology, 231(2):249 -- 260. [3] Bak, P. (2013). How nature works: the science of self-organized criticality. Springer Science & Business Media. [4] Bersini, H. and Detours, V. (1994). Asynchrony induces stability in cellular automata based models. In Brooks, R. A. and Maes, P., editors, Artificial Life IV, pages 382 -- 387. Cambridge, MA: MIT Press. [5] Chiong, R. and Kirley, M. (2012). Random mobility and the evolution of cooperation in spatial n-player iterated prisoner's dilemma games. Physica A: Statistical Mechanics and its Applications, 391(15):3915 -- 3923. [6] Conrad, M. and Pattee, H. (1970). Evolution experiments with an artificial ecosystem. Journal of Theoretical Biology, 28(3):393 -- 409. [7] Couzin, I. D., Krause, J., James, R., Ruxton, G. D., and Franks, N. R. (2002). Collective memory and spatial sorting in animal groups. Journal of theoretical biology, 218(1):1 -- 11. [8] Cucker, F. and Huepe, C. (2008). Flocking with informed agents. Mathe- matics in Action, 1(1):1 -- 25. [9] Drozd, A., Witkowski, O., Matsuoka, S., and Ikegami, T. (2016). Critical mass in the emergence of collective intelligence: a parallelized simulation of swarms in noisy environments. Artificial Life and Robotics, 21(3):317 -- 323. 36 O. Witkowski and T. Ikegami [10] Eberhart, R. C. and Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on micro machine and human science, volume 1, pages 39 -- 43. New York, NY: Institute of Electrical and Electronics Engineers. [11] Gardner, A. and West, S. A. (2010). Greenbeards. Evolution, 64(1):25 -- 38. [12] Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014). Generative adversarial nets. In Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N. D., and Weinberger, K. Q., editors, Advances in neural information processing systems, pages 2672 -- 2680. [13] Greenbaum, B. and Pargellis, A. (2016). Digital replicators emerge from a self-organizing prebiotic world. In Gershenson, C., Froese, T., Siqueiros, J. M., Aguilar, W., Izquierdo, E. J., and Sayama, H., editors, Proceedings of the European Conference on Artificial Life 13, pages 60 -- 67. Cambridge, MA: MIT Press. [14] Hauert, S., Zufferey, J.-C., and Floreano, D. (2009). Evolved swarming without positioning information: an application in aerial communication relay. Autonomous Robots, 26(1):21 -- 32. [15] Hauser, M. D., Chomsky, N., and Fitch, W. T. (2002). The faculty of lan- guage: What is it, who has it, and how did it evolve? science, 298(5598):1569 -- 1579. [16] Holland, J. H. (1999). Echoing emergence: Objectives, rough definitions, and speculations for echo-class models. In Cowan, G. A., Pines, D., and Meltzer, D., editors, Complexity, pages 309 -- 342. Cambridge, MA: Perseus Books. [17] Iizuka, H. and Ikegami, T. (2003). Adaptive coupling and intersubjectivity in simulated turn-taking behaviour. In Banzhaf, W., Ziegler, J., Christaller, T., Dittrich, P., and Kim, J. T., editors, Advances in Artificial Life, pages 336 -- 345, Berlin, Heidelberg. Springer Berlin Heidelberg. How to Make Swarms Open-Ended? 37 [18] Ikegami, T., Mototake, Y.-i., Kobori, S., Oka, M., and Hashimoto, Y. (2017). Life as an emergent phenomenon: studies from a large-scale boid simulation and web data. Phil. Trans. R. Soc. A, 375(2109):20160351. [19] Kauffman, S. (2003). The adjacent possible: A talk with stuart kauffman. Retrieved Nov, 30. [20] Kauffman, S. A. (2000). Investigations. Oxford University Press. [21] Khajehabdollahi, S. and Witkowski, O. (2018). Critical learning vs. evolu- tion: Evolutionary simulation of a population of ising-embodied neural net- works. In Ikegami, T., Virgo, N., Witkowski, O., Oka, M., Suzuki, R., and Iizuka, H., editors, Artificial Life Conference Proceedings, pages 47 -- 54. Cam- bridge, MA: MIT Press. [22] Kirby, S. (2002). Natural language from artificial life. Artificial life, 8(2):185 -- 215. [23] Lehman, J. and Stanley, K. O. (2011). Evolving a diversity of virtual crea- tures through novelty search and local competition. In Krasnogor, N., editor, Proceedings of the 13th Annual Conference on Genetic and Evolutionary Com- putation, GECCO '11, pages 211 -- 218, New York, NY, USA. ACM. [24] Lenski, R. E., Ofria, C., Pennock, R. T., and Adami, C. (2003). The evo- lutionary origin of complex features. Nature, 423(6936):139. [25] Lin, H. W., Tegmark, M., and Rolnick, D. (2017). Why does deep and cheap learning work so well? Journal of Statistical Physics, 168(6):1223 -- 1247. [26] Malan, K. M. and Engelbrecht, A. P. (2013). A survey of techniques for characterising fitness landscapes and some possible ways forward. Information Sciences, 241:148 -- 163. [27] Marwell, G. and Oliver, P. (1993). The critical mass in collective action. Cambridge University Press. [28] Maynard-Smith, J. and Sz´athmary, E. (1997). The Major Transitions in Evolution. Oxford University Press, Oxford, United Kingdom. 38 O. Witkowski and T. Ikegami [29] Mitri, S., Wischmann, S., Floreano, D., and Keller, L. (2013). Using robots to understand social behaviour. Biological Reviews, 88(1):31 -- 39. [30] Mototake, Y. and Ikegami, T. (2015). A simulation study of large scale swarms. pages 446 -- 450. [31] Nolfi, S. (1990). Learning and evolution in neural networks. [32] Nolfi, S., Floreano, D., and Floreano, D. D. (2000). Evolutionary robotics: The biology, intelligence, and technology of self-organizing machines. Cam- bridge, MA: MIT press. [33] Oliver, P. E. and Marwell, G. (2001). Whatever happened to critical mass theory? a retrospective and assessment. Sociological Theory, 19(3):292 -- 311. [34] Olson, R. S., Hintze, A., Dyer, F. C., Knoester, D. B., and Adami, C. (2013). Predator confusion is sufficient to evolve swarming behaviour. Journal of The Royal Society Interface, 10(85):20130305. [35] Prokopenko, M., Gerasimov, V., and Tanev, I. (2006). Evolving spatiotem- poral coordination in a modular robotic system. In International Conference on Simulation of Adaptive Behavior, pages 558 -- 569. Springer. [36] Rasmusen, E. and Blackwell, B. (1994). Games and information. Cam- bridge, MA, 15. [37] Reynolds, C. W. (1987). Flocks, herds and schools: A distributed behav- ioral model. In Stone, M. C., editor, ACM SIGGRAPH Computer Graphics, volume 21, pages 25 -- 34. ACM. [38] Schmickl, T., Zahadat, P., and Hamann, H. (2016). Sooner than expected: Hitting the wall of complexity in evolution. arXiv preprint arXiv:1609.07722. [39] Secretan, J., Beato, N., D Ambrosio, D. B., Rodriguez, A., Campbell, A., and Stanley, K. O. (2008). Picbreeder: Evolving pictures collaboratively on- line. In Czerwinski, M., Lund, A., and Tan, D., editors, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08, pages 1759 -- 1768, New York, NY, USA. ACM. How to Make Swarms Open-Ended? 39 [40] Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., Hubert, T., Baker, L., Lai, M., Bolton, A., et al. (2017). Mastering the game of go without human knowledge. Nature, 550(7676):354. [41] Soros, L. B. and Stanley, K. O. (2014). Identifying necessary conditions for open-ended evolution through the artificial life world of chromaria. In Sayama, H., Rieffel, J., Risi, S., Doursat, R., and Lipson, H., editors, Proceedings of the Fourteenth International Conference on the Simulation and Synthesis of Living Systems (Artificial Life 14), pages 793 -- 800. Citeseer. [42] Standish, R. K. (2003). Open-ended artificial evolution. International Jour- nal of Computational Intelligence and Applications, 3(02):167 -- 175. [43] Stanley, K. O. and Lehman, J. (2015). Why greatness cannot be planned: The myth of the objective. London: Springer. [44] Su, H., Wang, X., and Lin, Z. (2009). Flocking of multi-agents with a virtual leader. Automatic Control, IEEE Transactions on, 54(2):293 -- 307. [45] Taylor, T., Bedau, M., Channon, A., Ackley, D., Banzhaf, W., Beslon, G., Dolson, E., Froese, T., Hickinbotham, S., Ikegami, T., McMullin, B., Packard, N., Rasmussen, S., Virgo, N., Agmon, E., Clark, E., McGregor, S., Ofria, C., Ropella, G., Spector, L., Stanley, K. O., Stanton, A., Timperley, C., Vostinar, A., and Wiser, M. (2016). Open-ended evolution: perspectives from the oee workshop in york. Artificial life, 22(3):408 -- 423. [46] Tishby, N., Pereira, F. C., and Bialek, W. (1999). The information bottle- neck method. In Hajek, B. and Sreenivas, R. S., editors, Proceedings of the 37th Annual Allerton Conference on Communication, Control and Computing, pages 368 -- 377. University of Illinois, Urbana-Champaign. [47] Tishby, N. and Polani, D. (2011). Information theory of decisions and ac- tions. In Cutsuridis, V., Hussain, A., and Taylor, J. G., editors, Perception- action cycle, pages 601 -- 636. London: Springer. 40 O. Witkowski and T. Ikegami [48] Tishby, N. and Zaslavsky, N. (2015). Deep learning and the information bottleneck principle. In 2015 IEEE Information Theory Workshop (ITW), pages 1 -- 5. [49] Toner, J. and Tu, Y. (1998). Flocks, herds, and schools: A quantitative theory of flocking. Physical review E, 58(4):4828. [50] Traulsen, A. and Nowak, M. A. (2006). Evolution of cooperation by multilevel selection. Proceedings of the National Academy of Sciences, 103(29):10952 -- 10955. [51] Von Neumann, J., Burks, A. W., et al. (1966). Theory of self-reproducing automata. IEEE Transactions on Neural Networks, 5(1):3 -- 14. [52] Wilson, D. S. and Sober, E. (1994). Reintroducing group selection to the human behavioral sciences. Behavioral and brain sciences, 17(4):585 -- 608. [53] Witkowski, O. and Aubert, N. (2014). Pseudo-static cooperators: Moving isn't always about going somewhere. In Sayama, H., Rieffel, J., Risi, S., Dour- sat, R., and Lipson, H., editors, Proceedings of the Fourteenth International Conference on the Simulation and Synthesis of Living Systems (Artificial Life 14), volume 14, pages 392 -- 397. [54] Witkowski, O. and Ikegami, T. (2014). Asynchronous evolution: Emergence of signal-based swarming. In Sayama, H., Rieffel, J., Risi, S., Doursat, R., and Lipson, H., editors, Proceedings of the Fourteenth International Conference on the Simulation and Synthesis of Living Systems (Artificial Life 14), volume 14, pages 302 -- 309. [55] Witkowski, O. and Ikegami, T. (2016). Emergence of swarming behav- ior: foraging agents evolve collective motion based on signaling. PloS one, 11(4):e0152756. [56] Wolpert, D. H. and Macready, W. G. (1997). No free lunch theorems for optimization. IEEE transactions on evolutionary computation, 1(1):67 -- 82.
1903.05431
1
1903
2019-03-13T11:54:04
Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems
[ "cs.MA", "cs.LG" ]
Real-world congestion problems (e.g. traffic congestion) are typically very complex and large-scale. Multiagent reinforcement learning (MARL) is a promising candidate for dealing with this emerging complexity by providing an autonomous and distributed solution to these problems. However, there are three limiting factors that affect the deployability of MARL approaches to congestion problems. These are learning time, scalability and decentralised coordination i.e. no communication between the learning agents. In this paper we introduce Resource Abstraction, an approach that addresses these challenges by allocating the available resources into abstract groups. This abstraction creates new reward functions that provide a more informative signal to the learning agents and aid the coordination amongst them. Experimental work is conducted on two benchmark domains from the literature, an abstract congestion problem and a realistic traffic congestion problem. The current state-of-the-art for solving multiagent congestion problems is a form of reward shaping called difference rewards. We show that the system using Resource Abstraction significantly improves the learning speed and scalability, and achieves the highest possible or near-highest joint performance/social welfare for both congestion problems in large-scale scenarios involving up to 1000 reinforcement learning agents.
cs.MA
cs
Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems ∗ Kleanthis Malialis Dept. of Computer Science University College London, UK [email protected] Sam Devlin Dept. of Computer Science University of York, UK [email protected] Daniel Kudenko Dept. of Computer Science University of York, UK [email protected] 9 1 0 2 r a M 3 1 ] A M . s c [ 1 v 1 3 4 5 0 . 3 0 9 1 : v i X r a ABSTRACT Real-world congestion problems (e.g. traffic congestion) are typically very complex and large-scale. Multiagent rein- forcement learning (MARL) is a promising candidate for dealing with this emerging complexity by providing an au- tonomous and distributed solution to these problems. How- ever, there are three limiting factors that affect the deploy- ability of MARL approaches to congestion problems. These are learning time, scalability and decentralised coordination i.e. no communication between the learning agents. In this paper we introduce Resource Abstraction, an approach that addresses these challenges by allocating the available re- sources into abstract groups. This abstraction creates new reward functions that provide a more informative signal to the learning agents and aid the coordination amongst them. Experimental work is conducted on two benchmark domains from the literature, an abstract congestion problem and a re- alistic traffic congestion problem. The current state-of-the- art for solving multiagent congestion problems is a form of reward shaping called difference rewards. We show that the system using Resource Abstraction significantly improves the learning speed and scalability, and achieves the highest possible or near-highest joint performance/social welfare for both congestion problems in large-scale scenarios involving up to 1000 reinforcement learning agents. CCS Concepts •Computing methodologies → Multi-agent systems; Multi-agent reinforcement learning; Keywords Multiagent learning; Resource abstraction; Congestion prob- lems 1. INTRODUCTION There has been in recent years an explosion of interest in multiagent systems (MAS) where multiple interacting agents ∗Most of this work was carried out when the author was at the University of York, UK. Appears in: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), J. Thangarajah, K. Tuyls, C. Jonker, S. Marsella (eds.), May 9 -- 13, 2016, Singapore. are situated in a common environment. A larger set of prob- lem domains can be practically modelled using MAS for ex- ample by taking advantage of the geographic distribution and sharing experiences for faster and better learning [8]. MAS often need to be very complex, and MARL is a promis- ing candidate for dealing with this emerging complexity [7]. MARL approaches provide adaptive and autonomous agents that can improve from experience. Congestion problems have been formulated in the past as MARL problems [10, 11, 6, 3]. Congestion problems are typ- ically very complex and large-scale. Real-life examples in- clude traffic congestion, air traffic management and network routing. Despite the benefits offered by MARL approaches there are three limiting factors that affect their deployability to real-world congestion problems; these are, learning time, scalability and decentralised coordination i.e. no communi- cation between learning agents. Firstly, learning time is of particular importance to offline learning and critical to online learning. If a MARL system is slow it may be practically useless even if it eventually achieves a great performance. Furthermore, in real-life com- plex congestion problems, learning time is typically limited. Secondly, the curse of dimensionality [9] refers to the ex- ponential growth of the search space, in terms of the number of states and actions. If a MARL solution is not scalable, it will never be considered, let alone adopted, for deployment by a company or organisation. Lastly, while sharing experiences may be beneficial and even necessary in specific applications, allowing communica- tion between the learning agents is not always desirable or even possible. This is because agents may have been devel- oped by different designers or controlled by different owners. Even if this is not the case, communication messages can be costly, noisy, corrupted, dropped or received out of order [5]. In this paper we introduce Resource Abstraction, an ap- proach that addresses the aforementioned challenges. Ex- periments are conducted on two benchmark domains from the literature; an abstract congestion problem and a realis- tic traffic congestion problem where agents or cars "compete" for traffic lanes. Our contributions are the following. We propose the novel Resource Abstraction approach where its main idea is to allocate the available resources into groups called abstract groups. This grouping provides an abstract (A) reward function that is more informative and aids the coordination among the learning agents to significantly im- prove the learning speed, scalability and agents' final joint performance or social welfare. We compare our approach against systems which learn from local (L), global (G) and difference (D) rewards. The first two are the common approaches while the third is a form of reward shaping that constitutes the state-of-the-art for solving multiagent congestion problems. Like D, the system using A provides decentralised coor- dination. It is further shown that the system using A re- quires significantly fewer time steps per learning episode to achieve the highest system performance or social welfare in large-scale scenarios. The proposed approach scales to a large number of agents and is successfully demonstrated in experiments involving up to 1000 learning agents. The organisation of this paper is as follows. Section 2 describes the background material necessary to understand the contributions made by this work. Section 3 presents a formal definition of congestion problems as multiagent learn- ing and coordination problems. Section 4 introduces in de- tail our proposed Resource Abstraction approach. Section 5 and Section 6 provide the experimental work and results for the abstract and traffic congestion problems respectively. A discussion and conclusion is presented in Section 7. 2. BACKGROUND 2.1 Reinforcement Learning Reinforcement learning is a paradigm in which an active decision-making agent interacts with its environment and learns from reinforcement, that is, a numeric feedback in the form of reward or punishment [9]. The feedback re- ceived is used to improve the agent's actions. The problem of solving a reinforcement learning task is to find a policy (i.e. a mapping from states to actions) which maximises the accumulated reward. The concept of an iterative approach constitutes the back- bone of the majority of reinforcement learning algorithms. These algorithms apply so called temporal-difference up- dates to propagate information about values of states, V (s), or state-action, Q(s, a), pairs. These updates are based on the difference of the two temporally different estimates of a particular state or state-action value. The Q-learning al- gorithm is such a method [12]. After each real transition, (s, a) → (s(cid:48), r), in the environment, it updates state-action values by the formula: Q(s, a) ← Q(s, a) + α[r + γ max (cid:48) a(cid:48) Q(s (cid:48) ) − Q(s, a)] , a (1) where α is the rate of learning and γ is the discount factor. The exploration-exploitation trade-off constitutes a crit- ical issue in the design of a reinforcement learning agent. It aims to offer a balance between the exploitation of the agent's knowledge and the exploration through which the agent's knowledge is enriched. A common method of doing so is -greedy, where the agent behaves greedily most of the time, but with a probability  it selects an action randomly. To get the best of both exploration and exploitation, it is advised to reduce  over time [9]. Applications of MARL typically take one of two approaches; multiple individual learners (ILs) or joint action learners (JALs) [1]. Multiple ILs assume any other agents to be part of the environment and so, as the others simultaneously learn, the environment appears to be dynamic as the prob- ability of transition when taking action a in state s changes over time. To overcome the appearance of a dynamic envi- ronment, JALs were developed that extend their value func- tion to consider for each state the value of each possible combination of actions by all agents. The consideration of the joint action causes an exponential increase in the num- ber of values that must be calculated with each additional agent added to the system. Therefore, as we are interested in scalability and decentralised coordination (i.e. no com- munication between agents), this work focuses on multiple individual learners and not joint action learners. In MARL the typical approach provides agents with one of two types of reward. A local reward (L) is unique to each agent and often promotes "selfish" behaviours since each agent attempts to increase its own reward, potentially at the cost of the system performance. The global reward (G) is in fact the system performance used as a learning signal1. This allows each agent to act in the system's interest and typically, the learnt behaviour is better compared to the case where agents are learning using L. G, however, includes a substantial amount of noise due to other agents acting in the system. This is because an agent may be rewarded for taking a bad action (if the other agents executed a good action), or punished for taking a good ac- tion (if the others performed a bad action). This is known as the multiagent credit assignment problem. The reward signal should reward an agent depending on its individual contribution to the system objective. Difference rewards [13], a form of reward shaping, address this issue and are discussed in the next section. 2.2 Difference Rewards Difference rewards [13] were introduced to address the multiagent credit assignment problem encountered in re- inforcement learning. The difference rewards (Di) is a shaped reward signal that helps an agent i to learn the con- sequences of its actions on the system objective by removing a large amount of the noise created by the actions of other agents active in the system. It is defined as: Di(z) = G(z) − G(z−i) (2) where z is a general term representative of either states or state-action pairs depending on the application, G(z) is the global reward used, and G(z−i) is G(z) for a theoretical system without the contribution of agent i. Difference rewards exhibit the following two properties. Firstly, any action taken that increases Di simultaneously increases G. Secondly, since difference rewards only depend on the actions of agent i, Di provides a cleaner signal with reduced noise. These properties allow for the difference re- wards to significantly boost learning performance in a MAS. The challenge for deriving the difference rewards signal is obviously how to calculate the second term of the equation G(z−i) which is called the counterfactual. In particular do- mains, the counterfactual G(z−i) is possible to be directly calculated [11, 3]. Alternatively, in cases where this is not possible, it has been demonstrated that difference rewards can be estimated [10, 6]. Difference rewards have been successfully applied in dif- ferent domains such as congestion problems [10, 11, 6, 3], network security [4] and distributed sensor networks [2]. 1The terms global reward, system performance and social welfare are used interchangeably. 3. CONGESTION PROBLEMS AS MULTI- AGENT LEARNING PROBLEMS This section provides a formal definition of congestion problems as multiagent learning problems. A congestion problem occurs when multiple entities are competing for a limited amount of available resources. Different congestion problems (traffic congestion, air traffic management, Beach problem, El Farol Bar problem) have been formulated in the past as multiagent learning problems [10, 11, 6, 3]. Formally, there exists a set S of n resources S = {s1, s2, ..., sn}. Each resource s is a 3-tuple s =< ws, ψs, xs,t > where ws ≥ 0 is the weighting or importance of resource s, ψs > 0 is the capacity of resource s, and xs,t ≥ 0 is the consumption of resource s at time t. A resource s at time t is said to be congested if its consumption is higher than its capacity i.e. xs,t > ψs. The local reward (L) of an entity located in resource s at time t depends on the resource's weighting, capacity and consumption as shown in Equation 3: L(s, t) = f (ws, ψs, xs,t) (3) The global reward (G) is defined as the summation over all local rewards and is given by Equation 4. G(t) = L(s, t) (4) (cid:88) s∈S Recall from Section 2.2 that the difference rewards sig- nal is calculated by subtracting the counterfactual from the global reward. Therefore, the difference rewards (D) for agent i located in section s at time t can be calculated using Equation 5. Di(t) = G(t) − G−i(t) = L(s, t) − L−i(s, t) (5) The straightforward approach is to consider the entities which compete for the resources as the learning agents. For instance, in a traffic congestion domain [11] where the enti- ties are cars which compete for traffic lanes, we can install a learning agent on each car. In such domains, there is no need to estimate the counterfactual as it can simply be calculated by decreasing the resource's consumption or attendance by 1 as shown in Equation 6 Di(t) = L(s, t) − L−i(s, t) = f (ws, ψs, xs,t) − f (ws, ψs, xs,t − 1) (6) Alternatively, there exist congestion problems where learn- ing agents are not installed on the entities competing for the resources and in such cases the counterfactual needs to be estimated [10]. Although estimating Di has been success- fully demonstrated in a number of applications this topic is under ongoing research [6]. 4. RESOURCE ABSTRACTION The idea behind our approach is to allocate the available resources into groups called abstract groups which provide a more informative signal to the learning agents. {b1, b2, ..., bp}. Each abstract group b is a 4-tuple: b =< Mb, Wb, Ψb, Xb,t >. Formally, there exists a set B of p abstract groups: B = The set Mb = {m1, m2, ..., mk} is the member set of ab- stract group b that consists of k resources. A resource m can belong only to one abstract group, that is, m ∈ Mi and m ∈ Mj only if i = j. The number of abstract groups (and their members) depends on the application domain. The weight Wb of abstract group b is defined as the average weight of its members as shown in Equation 7. wm (7) The capacity Ψb of abstract group b is the total capacity of its members. Similarly, the consumption Xb,t of abstract group b at time t is the total consumption of its members. These are calculated using Equations 8 and 9. (cid:88) m∈Mb Wb = 1 k (cid:88) (cid:88) m∈Mb m∈Mb Ψb = Xb,t = ψm xm,t (8) (9) As discussed, the straightforward approach is to consider the entities which compete for the resources as the learning agents. However, depending on the application, this may not necessarily be the case, and our proposed approach does not impose any limitations on the agent selection. Let us now introduce the proposed reward functions. We start by extending the local reward L(s, t), and define the signal H(b, t) for an abstract group b at time t. It is cal- culated by taking into account the abstract group's weight, capacity and consumption as shown in Equation 10. It is important to note that the function f (·) is the same which is used to calculate the local reward L (see Equation 3). H(b, t) = −f (Wb, Ψb, Xb,t) (10) The abstract reward (A) is defined as follows. When re- source s which belongs to abstract group b is not congested, we provide a reward from L(s, t). Alternatively, we provide a reward from the abstraction configuration i.e. from H(b, t). This is shown in Equation 11. (cid:40) L(s, t) H(b, t) if xs,t ≤ ψs if xs,t > ψs (11) A(b, s, t) = where s ∈ Mb. The intuition behind this reward function is to facilitate the coordination among the learning agents by providing them with a more informative signal. Assuming a "good" abstraction configuration (as mentioned, this is application domain-specific), the abstract reward (A) will provide a big- ger (than L) punishment to the agents to encourage them to keep resources decongested. Furthermore, as we will later demonstrate, in domains where the number of entities com- peting for the resources is greater than the number of avail- able resources, the desired solution is to congest only a min- imal amount of them (e.g. only one) and leave the rest decongested. The approach will encourage some agents to consume a congested resource. In such cases the agents al- ready receive a punishment, but they will be provided with a bigger punishment if the agents attempt to switch to a decongested abstract group and congest it. 5. BEACH PROBLEM DOMAIN (BPD) 5.1 Domain Description The Beach Problem Domain (BPD) [3] is an abstract con- gestion problem that relates to many real-life congestion problems and allows us to perform a thorough analysis of our proposed approach. In this domain, each tourist (learn- ing agent) gets to choose the beach section it will visit. At each time step each agent knows which beach section it is currently on and must choose to either stay still or move to an adjacent beach section (i.e. left or right). When all the agents have performed their actions, they receive a reward. The highest reward for a beach section is received when the attendance of agents is equal to the capacity of the beach section. If a beach section gets con- gested or overcrowded it is undesirable. Beach sections with low attendance are also undesirable. This constitutes a con- gestion problem when the number of agents is much greater than the total capacity of the beach sections. In this abstract congestion problem it is assumed that all beach sections have an equal weighting of 1 and they all have the same capacity ψ. The local reward function (L) is given by Equation 12: L(s, t) = xs,te −xs,t ψ (12) for timestep = 1 : num timesteps do for agent = 1 : num agents do move to nearest section s(cid:48) ∈ S perceive current beach section s ∈ S choose action a = {−1, 0, +1} using -greedy move to section s(cid:48) = {s − 1, 0, s + 1} if s(cid:48) /∈ S then Algorithm 1 Beach Problem with Resource Abstraction 1: define abstraction configuration B 2: initialise Q-values: ∀s, aQ(s, a) = −1 3: set agents to initial locations 4: for episode = 1 : num episodes do 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: end for end if end for for section = 1 : num sections do calculate A reward (Equation 16) end for reduce α using alpha decay rate reduce  using epsilon decay rate end for for agent = 1 : num agents do end for reset agents to initial locations update Q(s,a) using A (Equation 1) where s is the beach section and xs,t is the attendance of beach section s at time step t. 5.2 Experimental Setup The global reward (G) is a summation over all local re- wards and is given by Equation 13. G(t) = −xs,t ψ xs,te (13) (cid:88) s∈S The difference rewards (D) signal is calculated by apply- ing Equation 6 to Equation 12. This results in Equation 14. Di(t) = xs,te −xs,t ψ − (xs,t − 1)e −(xs,t−1) ψ (14) Similarly to the local reward function, we define the cor- responding reward function for an abstraction configuration B (defined as described in Section 4). Therefore, the appli- cation of Equation 10 to Equation 12 results in Equation 15: H(b, t) = −Xb,te −Xb,t Ψb (15) where b is the abstract group, Xb,t is the attendance at time step t, and Ψb is the capacity of abstract group b. Lastly, the abstract reward (A) is calculated by applying Equation 11 and is shown in Equation 16. xs,te −Xb,te −xs,t ψ −Xb,t Ψb if xs,t ≤ ψ if xs,t > ψ (16) A(b, s, t) = where s ∈ Mb. Algorithm 1 presents what has been described thus far. Before describing the experimental work, we should note that the best solution for this problem is to overcrowd one (any) beach section, and leave ψ number of agents in the rest of the sections. This will give the highest possible sys- tem performance or global reward. Our experimental setup is as follows. The learning rate is set to α = 0.1 and alpha decay rate = 0.9999. The explo- ration parameter is set to  = 0.05 and epsilon decay rate = 0.9999. The discount factor is set to γ = 1.0 and the num- ber of episodes is set to num episodes = 10000. Initially, the agents are uniformly distributed (i.e. it is assumed that there exist hotels for the tourists in each beach section). The rest of the parameters are given later for each experiment. In all experiments, we plot the system performance/global reward G at the last time step of each episode. The values are averaged over 30 statistical runs and error bars showing the standard error around the mean are plotted. In some plots the error bars are very small and hardly visible, but they are present on all plots. 5.3 Experimental Results We have set num agents = 100, num sections = 6, ca- pacity ψ = 6 and num timesteps = 5. The highest social welfare or global reward is 11.04 and occurs when one (any) of the six sections is overcrowded with 70 agents, while each of the remaining five sections have six agents; this is shown with a black dashed line in all figures. The first experimental study investigates how different ab- straction (A) configurations affect the performance, and how they compare to the approaches which use the local (L), global (G) and difference (D) rewards. Figure 1 demon- strates this with abstraction configurations of two and three abstract groups. For example, the plot with label "A-4+2" means that the first four beach sections are grouped into one abstract group, while the remaining two beach sections are grouped into another abstract group. There are four important outcomes from this study: • Abstraction selection does affect the system perfor- mance. Figure 1: Abstraction configurations Figure 2: Impact of episode length on D • However, all the abstractions outperform the system that uses the difference (D) rewards (third plot from the bottom). • The abstraction "A-2+1+3" achieves the highest per- formance while three other achieve a near-highest per- formance. The system using D never achieves the high- est social welfare. • All the abstractions outperform the systems that use the local (L) and global (G) rewards (bottom two plots). The second experimental study examines how the episode length i.e. number of time steps per episode affects the system performance. Recall that at the start of each new episode, that is, after the last time step of the previous episode (Algorithm 1/Line 23) the agents return to their initial location. It is important to note that changing the length of the episode produces a different and independent version of the problem. In Figure 2 we apply D in different versions of the BPD, where we vary the time (episode length) agents are allowed to settle to a beach section within an episode. Note that with five or more time steps per episode, an agent located at the far left (or right) beach section can, in principle, move to the far right (or left) section at the end of an episode. However, D achieves the highest performance only in BPD versions with episode length of 15 time steps or more. We now run the same experiment for the proposed Re- source Abstraction approach. Based on previous findings (Figure 1) we proceed with abstraction "A-2+1+3". Figure 3 depicts the performance of A in different BPD versions. It is observed that the highest social welfare is achieved in all BPD versions except when a single time step is used. Also, A learns faster and achieves a significantly higher final perfor- mance than D in all BPD versions except from versions with episode length of 15 steps or more, where both have a sim- ilar performance. These are important results for potential real-world applications as they show that A is more robust to changes in the problem domain (i.e. episode length) than the current state-of-the-art approach D. The third experimental study of BPD aims at investigat- ing the scalability of the proposed approach. The setup for this study involves num agents = 1000, num sections = Figure 3: Impact of episode length on A 20, capacity ψ = 18 and num timesteps = 5. The highest social welfare is 125.82 and is shown with a black dashed line in all figures. Like before, we have investigated a range of abstraction configurations and many of them are shown in Figure 4. We observe the following. All the abstractions except one (third plot from the bottom) outperform the system that uses the difference (D) rewards (fourth plot from the bottom). All the abstractions outperform the systems that use the lo- cal (L) and global (G) rewards (bottom two plots). Note that no approach manages to achieve the best performance in just five time steps per episode. However, taking into consideration the scale of the scenario (1000 agents, 20 sec- tions), some of the abstractions (see upper plots in Figure 4) perform extremely well. We proceed with abstraction "A-8+1+11" and repeat the same experiment with ten and 20 time steps per episode; results are shown in Figures 5 and 6 respectively. In both figures, the system using A achieves a near-highest perfor- mance. The system using D performs orders of magnitude better than the local (L) and global (G) rewards, but still it is significantly outperformed by the proposed A approach. Figure 4: BPD with 1000 agents, 5 time steps Figure 6: BPD with 1000 agents, 20 time steps The local reward (L) function is given in Equation 17: (cid:40)wse−1 −xs,t ψs wse L(s, t) = if xs,t ≤ ψs if xs,t > ψs (17) where s is the traffic lane, ws is the weighting, xs,t is the attendance at time step t and ψs is the capacity. The global (G) and difference (D) rewards are calculated using Equations 4 and 6 respectively. The application of Equation 10 to Equation 17 is shown in Equation 18: H(b, t) = (cid:40)−Wbe−1 −Wbe −Xb,t Ψb if Xb,t ≤ Ψb if Xb,t > Ψb (18) Figure 5: BPD with 1000 agents, 10 time steps 6. TRAFFIC LANE DOMAIN (TLD) 6.1 Domain Description Despite the BPD being an abstract congestion problem, it is very important as it relates to many real-world congestion problems. One such complex problem is the Traffic Lane Domain (TLD) [11] which is defined as follows. In this domain each car (learning agent) gets to choose which traffic lane to follow. Each agent knows at each time step which lane it currently follows. At each time step, each agent can either stay in the same lane, or move to an ad- jacent lane (i.e. left or right). Once all the agents have executed their actions, they receive a reward. To simulate real-life characteristics there are three major differences with the BPD: 1. traffic lanes have a different weighting (represents the different preference of drivers) 2. lanes have different capacities (represents the fact that lanes are of different sizes, or that there exist restrictions due to construction works, tolls, carpools etc.) and 3. it has a different reward function as it doesn't matter how many cars are on a lane as long as the lane is not congested (as opposed to a beach section which is desirable to have more people as long as it is not overcrowded). where b is the abstract group, Wb is the weighting, Xb,t is the attendance at time step t, and Ψb is the capacity. Lastly, the abstract reward (A) is calculated using Equation 11. 6.2 Experimental Setup We have set α = 0.1, alpha decay rate = 0.9999,  = 0.05, epsilon decay rate = 0.9999, γ = 1.0 and num episodes = 10000. Initially, the agents are uniformly distributed. The rest of the parameters are given below. In all experiments, we plot the system performance/global reward G at the last time step of each episode (except where otherwise is stated). The values are averaged over 30 statistical runs and error bars showing the standard error around the mean are plot- ted. In some plots the error bars are very small and hardly visible, but they are present on all plots. 6.3 Experimental Results For the first experimental study in the TLD we adopt the same traffic scenario as in [11]. In this scenario, there are 500 cars or learning agents and 9 traffic lanes each with capacity 167, 83, 33, 17, 9, 17, 33, 83, 167 (i.e. a total of 609). The weightings for each lane are 1, 5, 10, 1, 5, 10, 1, 5, 10. The highest possible system performance or global reward is 17.66 and is achieved when all the lanes are decongested; this is shown with a black dashed line in all figures. The fact that there are different weightings for each re- source or traffic lane gives us the opportunity to try non- contiguous abstractions i.e. abstract groups with non-adjacent Figure 7: TLD with 500 cars, 5 time steps Figure 9: TLD with accidents The second experimental study in the TLD provides an- swers to these questions. To simulate such a behaviour we assume that two accidents occurred in lanes 3 and 9 at episode 2000. As a result, their capacity is reduced to half. Also, each of the two lanes has swapped weighting (pref- erence) with one of its adjacent lanes. Therefore, the new capacities are 167, 83, 17, 17, 9, 17, 33, 83, 83 (i.e. a total of 509) and the new weightings are 1, 10, 5, 1, 5, 10, 1, 10, 5. We keep the same number of cars i.e. 500 and at the time of the accidents the agents' exploration parameter is reset to the initial. The number of time steps per episode is five. Figure 9 shows the results for the scenario with the ac- cidents. The system using L is affected the most and does not manage to recover i.e. to reach the performance it had achieved before the occurrence of the accidents. Interest- ingly the system using G is not affected at all, but its per- formance is poor. The system using A is affected but man- ages to completely recover and achieve the highest possible welfare as it used to be the case without the occurrence of the accidents. The system using D is also affected but only slightly (it is not visible in the graph as it is out-shaded by the decline of the A plots), however, the only system that achieves the best performance is the one using A. The out- come of this study suggests that a system using the proposed approach is robust and does not need to refine the abstrac- tion configuration if something is altered in due course such as the traffic lane capacities and weightings. It has been assumed so far that all learning agents or cars are participating in the learning scheme. The third exper- imental study for the TLD examines the behaviour of the approaches when this assumption is violated. In practise, 100% compliance by drivers is unlikely to be achieved [11]. This is because some drivers may not be convinced to par- ticipate or even if they are all willing to participate, some of them may come across different problems such as informa- tion and sensing limitations. Figure 10 depicts the system performance (num agents = 500, num timesteps = 5) in the presence of 25% non-compliant drivers. Non-compliant drivers are simulated as agents stick- ing to their initial choice/location. It is observed that the performance of L and G is not affected at all, but it is very poor. The performance of D and A is not affected much and, as a result, the system using A still outperforms the Figure 8: TLD with 500 cars, 10 time steps members. The obvious configuration is to have three ab- stract groups each with three member lanes. The first, sec- ond and third abstract groups include lanes with weight- ing 1, 5, and 10 respectively. We will refer to this abstrac- tion configuration as "A (non-contig)". Moreover, like in the BPD, we have experimented with many abstraction configu- rations and found out that the best performance is obtained with "A-1+8", which we will refer to as "A (contig)". Figure 7 shows the performance for all approaches for five time steps per episode. The system using abstract rewards (A) achieves the highest performance while both A and D completely outperform L and G. The same experiment with ten time steps per episode is repeated in Figure 8 where very similar results are obtained. Note that with ten time steps, an agent located at the far left (or right) lane has, in principle, adequate time to reach the far right (or left) end. Despite the increase in the number of time steps, the system performance using D is only slightly improved. An important question is how will the system perform if the lane weightings and capacities change in due course e.g. because of an accident? Consequently, a crucial question that certainly has deployment implications is will a new ab- straction configuration be needed each time the lane weight- ings and capacities change? Figure 10: TLD with 25% non-compliant drivers Figure 12: TLD (1000 cars) with accidents 7. DISCUSSION AND CONCLUSION We have introduced Resource Abstraction for multiagent coordination problems. Our approach allocates available re- sources into abstract groups to provide a more informative signal to learning agents, significantly improving both learn- ing speed and social welfare. Experimental work was conducted on two benchmark do- mains, an abstract congestion problem and a realistic traffic congestion problem. The state-of-the-art solution to solve multiagent congestion problems is a form of reward shaping called difference rewards. We have shown that our novel approach of resource abstraction requires significantly fewer time steps per learning episode to achieve the highest social welfare. This is important for real-world applications where the availability of learning time is limited. Furthermore, it has been empirically demonstrated in both experimental domains that the proposed approach not only performs better than the two baseline and the difference re- wards approaches, but it achieves the highest possible or near-highest system performance even in experiments in- volving 1000 learning agents. Scalability is another strong aspect of the proposed approach. It has been shown that the proposed approach is robust against changes (e.g. car accidents in the traffic congestion domain) and capable of operating without 100% agent compliance. It has been shown that when the number of learning steps is limited, then in almost every case Resource Abstraction outperforms the state-of-the-art irrespective of the abstrac- tion grouping (Figures 1 and 4). When the number of learn- ing steps is not limited, we suggest some guidelines that help us define the abstraction grouping. Some experimentation is still necessary but the following heuristics simplify this pro- cess: a. three abstract groups typically suffice as this allows more resources to be included in an abstract group, hence, a larger penalty can be provided if the group becomes con- gested b. group resources with similar characteristics e.g. the same weightings; the effectiveness of this heuristic is shown by A (non-contig) in Figures 7 - 12. Moreover, it has been shown that if something unexpected occurs (e.g. accidents in the traffic lane domain) it is highly likely that there will be no need to refine the abstraction grouping, as, given some additional exploration time, the system can recover and still achieve the highest performance. Figure 11: TLD with 4 delivery phases system that uses D. The results suggest that the proposed system works well under non-compliant drivers. The fourth experimental study further investigates the po- tential deployment of such a learning scheme. In practise, it is expected that such a system will be rolled out in phases [11]. For instance, consider a scenario of four delivery phases where the participation is 25%, 50%, 75% and 100% of the drivers. To simulate this situation we vary the rate of non- compliant drivers, for example, the first phase with 25% participation corresponds to 75% non-compliant drivers. Figure 11 shows the converged performance (num agents = 500, num timesteps = 5) for the scenario with four delivery phases where the superiority of the proposed approach is clearly demonstrated, suggesting that the proposed system can be introduced to the public in different stages. In the last study we repeat the experiment with 1000 cars. The highest performance is 17.33 and occurs when the first lane (capacity 167, weighting 1) is overcrowded with 558 agents while the remaining eight lines have full capacity. We repeat the case under accident conditions (as in Figure 9), where the highest performance is 17.31 and occurs when the first lane is overcrowded with 658 agents. Figure 12 shows the results (num timesteps = 5) where the superiority and the ability of the proposed approaches to recover is shown. REFERENCES [1] C. Claus and C. Boutilier. The dynamics of reinforcement learning in cooperative multiagent systems. In Proceedings of the AAAI Conference on Artificial Intelligence, 1998. [2] M. Colby and K. Tumer. Multiagent reinforcement learning in a distributed sensor network with indirect feedback. In Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, pages 941 -- 948, 2013. [3] S. Devlin, L. Yliniemi, K. Tumer, and D. Kudenko. Potential-based difference rewards for multiagent reinforcement learning. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems, 2014. [4] K. Malialis, S. Devlin, and D. Kudenko. Distributed reinforcement learning for adaptive and robust network intrusion response. Connection Science, 27(3):234 -- 252, 2015. [5] M. J. Matari´c. Using communication to reduce locality in distributed multi-agent learning. Journal of Experimental and Theoretical Artificial Intelligence, special issue on Learning in DAI Systems, Gerhard Weiss, ed., 10(3):357 -- 369, 1998. [6] S. Proper and K. Tumer. Multiagent learning with a noisy global reward signal. In Proceedings of the AAAI Conference on Artificial Intelligence, 2013. [7] P. Stone. Learning and multiagent reasoning for autonomous agents. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), pages 12 -- 30, 2007. [8] P. Stone and M. Veloso. Multiagent systems: A survey from a machine learning perspective. Autonomous Robots, 8(3):345 -- 383, 2000. [9] R. S. Sutton and A. G. Barto. Introduction to Reinforcement Learning. MIT Press Cambridge, MA, USA, 1998. [10] K. Tumer and A. Agogino. Distributed agent-based air traffic flow management. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, 2007. [11] K. Tumer, Z. Welch, and A. K. Agogino. Traffic congestion management as a learning agent coordination problem. In A. Bazzan and F. Kluegl, editors, Multiagent Architectures for Traffic and Transportation Engineering, pages 261 -- 279. Lecture notes in AI, Springer, 2009. [12] C. J. Watkins and P. Dayan. Q-learning. Machine learning, 8(3-4):279 -- 292, 1992. [13] K. R. W. Wolpert, David H. and K. Tumer. Collective intelligence for control of distributed dynamical systems. Europhysics Letters, 49(6), 2000.
1711.06871
2
1711
2018-07-25T03:30:42
Anonymous Hedonic Game for Task Allocation in a Large-Scale Multiple Agent System
[ "cs.MA", "cs.AI", "cs.GT" ]
This paper proposes a novel game-theoretical autonomous decision-making framework to address a task allocation problem for a swarm of multiple agents. We consider cooperation of self-interested agents, and show that our proposed decentralized algorithm guarantees convergence of agents with social inhibition to a Nash stable partition (i.e., social agreement) within polynomial time. The algorithm is simple and executable based on local interactions with neighbor agents under a strongly-connected communication network and even in asynchronous environments. We analytically present a mathematical formulation for computing the lower bound of suboptimality of the solution, and additionally show that 50% of suboptimality can be at least guaranteed if social utilities are non-decreasing functions with respect to the number of co-working agents. The results of numerical experiments confirm that the proposed framework is scalable, fast adaptable against dynamical environments, and robust even in a realistic situation.
cs.MA
cs
Anonymous Hedonic Game for Task Allocation in a Large-Scale Multiple Agent System Inmo Jang, Hyo-Sang Shin, and Antonios Tsourdos 1 8 1 0 2 l u J 5 2 ] A M . s c [ 2 v 1 7 8 6 0 . 1 1 7 1 : v i X r a Abstract -- This paper proposes a novel game-theoretical au- tonomous decision-making framework to address a task allo- cation problem for a swarm of multiple agents. We consider cooperation of self-interested agents, and show that our proposed decentralized algorithm guarantees convergence of agents with social inhibition to a Nash stable partition (i.e., social agreement) within polynomial time. The algorithm is simple and executable based on local interactions with neighbor agents under a strongly- connected communication network and even in asynchronous environments. We analytically present a mathematical formu- lation for computing the lower bound of suboptimality of the solution, and additionally show that 50% of suboptimality can be at least guaranteed if social utilities are non-decreasing functions with respect to the number of co-working agents. The results of numerical experiments confirm that the proposed framework is scalable, fast adaptable against dynamical environments, and robust even in a realistic situation. Index Terms -- Distributed robot systems, Networked robots, Task allocation, Game theory, Self-organising systems I. INTRODUCTION Cooperation of a large number of possibly small-sized robots, called robotic swarm, will play a significant role in complex missions that existing operational concepts using a few large robots could not deal with [1]. Even if every single robot (or called agent) in a swarm is incapable of accomplishing a task alone, their cooperation will lead to successful outcomes [2] -- [5]. The possible applications include environmental monitoring [6], ad-hoc network relay [7], dis- aster management [8], cooperative radar jamming [9], to name a few. Due to the large cardinality of a swarm robot system, however, it is infeasible for human operators to supervise each agent directly, but needed to entrust the swarm with certain levels of decision-makings (e.g., task allocation, path planning, and individual control). Thereby, what only remains is to provide a high-level mission description, which is manageable for a few or even a single human operator. Nevertheless, there still exist various challenges in the autonomous decision- making of robotic swarms. Among them, this paper addresses a task allocation problem where the number of agents is higher than that of tasks: how to partition a set of agents into subgroups and assign the subgroups to each task. In the problem, it is assumed that each agent can be assigned to at most one task, whereas each task may require multiple agents: Inmo Jang, Hyo-Sang Shin, and Antonios Tsourdos are with Centre for Autonomous and Cyber-Physical Systems, Cranfield University, MK43 0AL, United Kingdom (e-mail: [email protected]; [email protected]; [email protected]). this case falls into ST-MR (single-task robot and multi-robot task) category [10], [11]. According to [4], [5], [12] -- [14], decision-making frame- works for a robotic swarm should be decentralized (i.e., the desired collective behavior can be achieved by individual information), scalable, predictable agents relying on local (e.g., regarding convergence performance and outcome qual- ity), and adaptable to dynamic environments (e.g., unexpected elimination or addition of agents or tasks). Moreover, the frameworks are also desirable to be robust against asyn- chronous environments because, due to the large cardinality of the system and its decentralization, it is very challenging for every agent to behave synchronously. For synchronization in practice, "artificial delays and extra communication must be built into the framework" [14], which may cause considerable inefficiency on the system. In addition, it is also preferred to be capable of accommodating different interests of agents (e.g., different swarms operated by different organizations [15]). In this paper, we propose a novel decision-making frame- work based on hedonic games [16] -- [18]. The task allocation problem considered is modeled as a coalition-formation game where self-interest agents are willing to form coalitions to improve their own interests. The objective of this game is to find a Nash stable partition, which is a social agreement where all the agents agree with the current task assignment. Despite any possible conflicts between the agents, this paper shows that if they have social inhibition, then a Nash stable partition can always be determined within polynomial times in the proposed framework and all the desirable characteristics mentioned above can be achieved. Furthermore, we analyze the lower bound of the outcome's suboptimality and show that 50% is at least guaranteed for a particular case. Various settings of numerical experiments validate that the proposed framework is scalable, adaptable, and robust even in asyn- chronous environments. This paper is organized as follows. Section II reviews exist- ing literature on decentralized task allocation approaches and introduces a recent finding in hedonic games that inspires this study. Section III proposes our decision-making framework, named GRAPE, and analytically proves the existence of and the polynomial-time convergence to a Nash stable partition. Section IV discusses the framework's algorithmic complexity, suboptimality, adaptability, and robustness. Section V shows that the framework can also address a task allocation problem in which each task may need a certain number of agents for completion. Numerical simulations in Section VI confirm that the proposed framework holds all the desirable characteristics. Finally, concluding remarks are followed in Section VII. II. RELATED WORK A. Decentralized Coordination of Robotic Swarms Existing approaches for task allocation problems can be categorized into two branches, depending on how agents even- tually reach a converged outcome: orchestrated and (fully) self- organized approaches [19]. In the former, additional mech- anism such as negotiation and voting model is imposed so that some agents can be worse off if a specific condition is met (e.g., the global utility is better off). Alternatively, in self-organized approaches, each agent simply makes a decision without negotiating with the other agents. The latter generally induce less resource consumption in communication and computation [20], and hence they are preferable in terms of scalability. On the other hand, the former usually provide a better quality of solutions with respect to the global utility, and a certain level of suboptimality could be guaranteed [21] -- [23]. A comparison result between them [20] presents that as the available information to agents becomes local, the latter becomes to outperform the former. In the following, we particularly review existing literature on self-organized approaches because, for large-scale multiple agent systems, scalability is at least essential and it is realistic to regard that the agents only know their local information but instead the global information. Self-organized approaches can be categorized into top-down approaches and bottom-up approaches according to which level (i.e., between an ensemble and individuals) is mainly focused on. Top-down approaches emphasize developing a macroscopic model for the whole system. For instance, popu- lation fractions associated with given tasks are represented as states, and the dynamics of the population fractions is modeled by Markov chains [12], [24] -- [26] or differential equations [27] -- [31]. Given a desired fraction distribution over the tasks, agents can converge to the desired status by following local decision policies (e.g., the associated rows or columns of the current Markov matrix). One advantage of using top-down approaches is predictability of average emergent behavior with regard to convergence speed and the quality of a stable outcome (i.e., how well the agents converge to the desired fraction distribution). However, such prediction, to the best of our knowledge, can be made mainly numerically. Besides, as top-down generated control policies regulate agents, it may be difficult to accommodate each agent's individual preference. Also, each agent may have to physically move around ac- cording to its local policy during the entire decision-making process, which may cause waste of time and energy costs in the transitioning. Bottom-up approaches focus on designing each agent's individual rules (i.e., microscopic models) that eventually lead to a desired emergent behavior. Possible actions of a single agent can be modeled by a finite state machine [32], and a change of behavior occurs according to a probabilistic thresh- old model [33]. A threshold value in the model determines the decision boundary between two motions. This value is adjustable based on an agent's past experiences such as the time spent for working a task [19], [34], the success/failure rates [32], [35], and direct communication from a central 2 unit [33]. This feature can improve system adaptability, and may have a potential to incorporate each agent's individual interest if required. However, it was shown in [35] -- [41] that, to predict or evaluate an emergent performance of a swarm utilizing bottom-up approaches, a macroscopic model for the swarm is eventually required to be developed by abstracting the microscopic models. B. Hedonic Games Hedonic games [16] -- [18] model a conflict situation where self-interest agents are willing to form coalitions to improve their own interests. Nash stability [18] plays a key role since it yields a social agreement among the agents even without having any negotiation. Many researchers have investigated conditions under which a Nash stable partition is guaranteed to exist and to be determined [18], [42] -- [44]. Among them, the works in [43], [44] mainly addressed an anonymous hedonic game, in which each agent considers the size of a coalition to which it belongs instead of the identities of the members. Recently, Darmann [44] showed that selfish agents who have social inhibition (i.e., preference toward a coalition with a fewer number of members) could converge to a Nash stable partition in an anonymous hedonic game. The author also proposed a centralized recursive algorithm that can find a Nash a · nt) of iterations. Here, na is the stable partition within O(n2 number of agents and nt is that of tasks. C. Main Contributions Inspired by the recent breakthrough of [44], we propose a novel decentralized framework that models the task allocation problem considered as an anonymous hedonic game. The proposed framework is a self-organized approach in which agents make decisions according to its local policies (i.e., indi- vidual preferences). Unlike top-down or bottom-up approaches reviewed in the previous section, which primarily concentrate on designing agents' decision-making policies either macro- scopically or microscopically, our work instead focuses on in- vestigating and exploiting advantages from socially-inhibitive agents, while simply letting them greedily behave according to their individual preferences. Explicitly, the main contributions of this paper are as follows: 1) This paper shows that selfish agents with social inhibi- tion, which we refer to as SPAO preference (Definition 4), can reach a Nash stable partition within less algorith- mic complexity compared with [44]: O(n2 a) of iterations are required1. 2) We provide a decentralized algorithm, which is exe- cutable under a strongly-connected communication net- work of agents and even in asynchronous environments. Depending on the network assumed, the algorithmic complexity may be additionally increased by O(dG), where dG < na is the graph diameter of the network. 3) This paper analyzes the suboptimality of a Nash stable partition in term of the global utility. We firstly present a 1Note that the definition of iteration is described in Definition 5. This comparison assumes the fully-connected communication network because the algorithm in [44] is centralized. mathematical formulation to compute the suboptimality lower bound by using the information of a Nash stable partition and agents' individual utilities. Furthermore, we additionally show that 50% of suboptimality can be at least guaranteed if the social utility for each coalition is defined as a non-decreasing function with respect to the number of members in the coalition. 4) Our framework can accommodate different agents with different interests as long as their individual preferences hold SPAO. 5) Through various numerical experiments, it is confirmed that the proposed framework is scalable, fast adaptable to environmental changes, and robust even in a realistic situation where some agents are temporarily unable to proceed a decision-making procedure and communicate with the other agents during a mission. TABLE I NOMENCLATURE Symbol A ai T ∗ tj tφ T (tj , p) X Pi (cid:31)i ∼i (cid:23)i Π Sj Π(i) dG Ni Description a set of na agents the i-th agent a set of nt tasks the j-th task the void task (i.e., not to work any task) a set of tasks, T = T ∗ ∪ {tφ} a task-coalition pair (i.e. to do task tj with p participants) the set of task-coalition pairs, X = X ∗ ∪ {tφ}, where X ∗ = T ∗ × {1, 2, ..., na} agent ai's preference relation over X the strong preference of agent ai the indifferent preference of agent ai the weak preference of agent ai a partition: a disjoint set that partitions the agent set A, Π = {S1, S2, ..., Snt , Sφ} the (task-specific) coalition for tj the index of the task to which agent ai is assigned given Π the graph diameter of the agent communication network The neighbor agent set of agent ai given a network III. GROUP AGENT PARTITIONING AND PLACING EVENT A. Problem Formulation Let us first introduce the multi-robot task allocation problem considered in this paper and underlying assumptions. Problem 1. Suppose that there exist a set of na agents A = {a1, a2, ..., ana} and a set of tasks T = T ∗ ∪ {tφ}, where T ∗ = {t1, t2, ..., tnt} is a set of nt tasks and tφ is the void task (i.e., not to perform any task). Each agent ai has the individual utility ui : T × A → R, which is a function of the task to which the agent is assigned and the number of its co-working agents (including itself) p ∈ {1, 2, ..., na} (called participants). The individual utility for tφ is zero regardless of the participants. Since every agent is considered to have limited capabilities to finish a task alone, the agent can be assigned to at most one task. The objective of this task allocation problem is to find an assignment that maximizes the global utility, which is the sum of individual utilities of the entire agents. The problem described above is defined as follows: (cid:88) subject to 3 (1) (2) (3) (cid:88) (cid:88) ∀tj∈T max{xij} ∀ai∈A ∀tj∈T ui(tj, p)xij, xij ≤ 1, ∀ai ∈ A, xij ∈ {0, 1}, ∀ai ∈ A,∀tj ∈ T , where xij is a binary decision variable that indicates whether or not task tj is assigned to agent ai. The term social utility is defined as the sum of individual utilities within any agent group. Assumption 1 (Homogeneous agents with limited capabili- ties). This paper considers a large-scale multi-robot system of homogeneous agents since the realisation of a swarm can be in general achieved through mass production [4]. Therefore, each individual utility ui is concerned with the cardinality of the agents working for the task. Note that agents in this paper may have different preferences with respect to the given tasks, e.g., for an agent, a spatially closer task is more preferred, whereas this may not be the case for another agent. Besides, noting that "mass production favors robots with fewer and cheaper components, resulting in lower cost but also reduced capabilities [45]", it is also assumed that each agent can be only assigned to perform at most a single task. According to [10], such a robot is called a single-task (ST) robot. Assumption 2 (Agents' communication). The communication network of the entire agents is at least strongly-connected, i.e., there exists a directed communication path between any two arbitrary agents. Given a network, Ni denotes a set of neighbor agents for agent ai. Assumption 3 (Multi-robot-required tasks). Every task is a multi-robot (MR) task, meaning that the task may require multiple robots [10]. For now, we assume that each task can be performed even by a single agent although it may take a long time. However, in Section V, we will also address a particular case in which some tasks need at least a certain number of agents for completion. Assumption 4 (Agents' pre-known information). Every agent ai only knows its own individual utility ui(tj, p) with regard to every task tj, while not being aware of those of the other agents. Through communication, however, they can notice which agent currently choses which task, i.e., partition (Definition 2). Note that the agents do not necessarily have to know the true partition information at all the time. Each agent owns its locally-known partition information. B. Proposed Game-theoretical Approach: GRAPE Let us transform Problem 1 into an anonymous hedonic game event where every agent selfishly tends to join a coalition according to its preference. a tasks; set of (2) T = T ∗ ∪ {tφ}, Definition 1 (GRAPE). An instance of GRoup Agent Par- titioning and placing Event (GRAPE) is a tuple (A,T ,P) (1) A = {a1, a2, ..., ana}, a set of na that consists of agents; and (3) P = (P1,P2, ...,Pna ), an na-tuple of preference relations of the agents. For agent ai, Pi describes its preference relation over the set of task-coalition pairs X = X ∗ ∪ {tφ}, where X ∗ = T ∗ × {1, 2, ..., na}; a task-coalition pair (tj, p) is in- terpreted as "to do task tj with p participants". For any task-coalition pairs x1, x2 ∈ X , x1 (cid:31)i x2 implies that agent ai strongly prefers x1 to x2, and x1 ∼i x2 means that the preference regarding x1 and x2 is indifferent. Likewise, (cid:23)i indicates the weak preference of agent ai. a partition is defined as Note that agent ai's preference relation can be derived from its individual utility ui(tj, p) in Problem 1. For instance, given that ui(t1, p1) > ui(t2, p2), it can be said that (t1, p1) (cid:31)i (t2, p2). Definition 2 (Partition). Given an instance (A,T ,P) of GRAPE, set Π = {S1, S2, ..., Snt, Sφ} that disjointly partitions the agent set A. Here, Sj ⊆ A is the (task-specific) coalition for executing task tj such that ∪nt j=0Sj = A and Sj ∩ Sk = ∅ for j (cid:54)= k. Sφ is the set of agents who choose the void task tφ. Note that this paper interchangeably uses S0 to indicate Sφ. Given a partition Π, Π(i) indicates the index of the task to which agent ai is assigned. For example, SΠ(i) is the coalition that the agent belongs to, i.e., SΠ(i) = {Sj ∈ Π ai ∈ Sj}. a The objective of GRAPE is to determine a stable partition that all the agents agree with. In this paper, we seek for a Nash stable partition, which is defined as follows: Definition 3 (Nash stable). A partition Π is be Nash stable if, for every agent ai ∈ A, (tΠ(i),SΠ(i)) (cid:23)i (tj,Sj ∪ {ai}), ∀Sj ∈ Π. said to it holds that In other words, in a Nash stable partition, every agent prefers its current coalition to joining any of the other coali- tions. Thus, every agent does not have any conflict within this partition, and no agent will not unilaterally deviate from its current decision. Remark 1 (An advantage of Nash stability: low communica- tion burden on agents). The rationale behind the use of Nash stability among various stable solution concepts in hedonic games [16], [46] -- [48] is that it can reduce communication burden between agents required to reach a social agreement. In the process of converging to a Nash stable partition, an agent does not need to get any permission from the other agents when it is willing to deviate. This property may not be the case for the other solution concepts. Therefore, each agent is only required to notify its altered decision without any negotiation. This fact can reduce inter-agent communication in the proposed approach. C. SPAO Preference: Social Inhibition This section introduces the key condition, called SPAO, that enables our proposed approach to provide all the desirable 4 is said that properties described in Section I, and then explains its impli- cations. Definition 4 (SPAO). Given an instance (A,T ,P) of GRAPE, it the preference relation of agent ai with respect it holds that, for every (tj, p) ∈ X ∗, (tj, p1) (cid:23)i (tj, p2) for any p1, p2 ∈ {1, ..., na} such that p1 < p2. Besides, we say that an instance (A,T ,P) of GRAPE is SPAO if the preference relation of every agent in A with respect to every task in T ∗ is SPAO. is SPAO (Single-Peaked-At-One) to task tj if For an example, suppose that Pi is such that (t1, 1) (cid:31)i (t1, 2) (cid:23)i (t1, 3) (cid:31)i (t2, 1) ∼i (t1, 4) (cid:31)i (t2, 2). This preference relation indicates that agent ai has (t1, 1) (cid:31)i (t1, 2) (cid:23)i (t1, 3) (cid:31)i (t1, 4) for task t1, and (t2, 1) (cid:31)i (t2, 2) for task t2. According to Definition 4, the preference relation for each of the tasks holds SPAO. For another example, given that (t1, 1) (cid:31)i (t1, 2) (cid:23)i (t1, 3) (cid:31)i (t2, 2) ∼i (t1, 4) (cid:31)i (t2, 1), the preference relation regarding task t1 holds SPAO, whereas this is not the case for task t2 because of (t2, 2) (cid:31)i (t2, 1). This paper only considers the case in which every agent has SPAO preference relations regarding all the given tasks. Such agents prefer to execute a task with smaller number of collaborators, namely, they have social inhibition. Remark 2 (Implications of SPAO). SPAO implies that an agent's individual utility should be a monotonically decreasing function with respect to the size of a coalition. In practice, SPAO can often emerge. For instance, experimental and simu- lation results in [49, Figures 3 and 4] show that the total work capacity resulted from cooperation of multiple robots does not proportionally increase due to interferences of the robots. In such a non-superadditive environment [50], assuming that an agent's individual work efficiency is considered as its indi- vidual utility, the individual utility monotonically drops as the number of collaborators enlarges even though the social utility is increased. For another example, SPAO also arises when individual utilities are related with shared-resources. As more agents use the same resource simultaneously, their individual productivities become diminished (e.g., traffic affects travel times [51] [52, Example 3]). As the authors in [50] pointed out, a non-superadditive case is more realistic than a superadditive case: agents in a superadditive environment always attempt to form the grand coalition whereas those in a non-superadditive case are willing to reduce unnecessary costs. Note that social utility functions are not restricted so that they can be either monotonic or non-monotonic. Remark 3 (Cooperation of selfish agents with different in- terests). The proposed framework can accommodate selfish agents who greedily follow their individual preferences as long as the preferences hold SPAO. This implies that the framework may be utilized for a combination of swarm systems from different organisations under the condition that the multiple systems satisfy SPAO. D. Existence of and Convergence to a Nash Stable Partition Let us prove that if an instance of GRAPE holds SPAO, there always exists a Nash stable partition and it can be found within polynomial time. Definition 5 (Iteration). This paper uses the term iteration to represent an iterative stage in which an arbitrary agent compares the set of selectable task-coalition pairs given an existing partition, and then determines whether or not to join another coalition including the void task one. Assumption 5 (Mutual exclusion algorithm). We assume that, at each iteration, a single agent exclusively makes a decision and updates the current partition if necessary. This paper refers to this agent as the deciding agent at the iteration. Based on the resultant partition, another deciding agent also performs the same process at the next iteration, and this process continues until every agent does not deviate from a specific partition, which is, in fact, a Nash stable partition. To implement this the agents need a mutual algorithmic process in practice, exclusion (or called mutex) algorithm to choose the deciding agent at each iteration. In this section, for simplicity of description, we assume that all the agents are fully-connected, by which they somehow select and know the deciding agent. However, in Section III-E, we will present a distributed mutex algorithm that enables the proposed approach to be executed under a strongly-connected communication network even in an asynchronous manner. Lemma 1. Given an instance (A,T ,P) of GRAPE that is SPAO, suppose that a new agent ar /∈ A holding a SPAO pref- erence relation with regard to every task in T joins (A,T ,P) in which a Nash stable partition is already established. Then, the new instance ( A,T ,P), where A = A ∪ {ar}, also (1) satisfies SPAO; (2) contains a Nash stable partition; and (3) the maximum number of iterations required to re-converge to a Nash stable partition is A. Proof. Given a partition Π, for agent ai, the number of additional co-workers tolerable in its coalition is defined as: (cid:8)∆ (tΠ(i),SΠ(i) + ∆) (cid:23)i (tj,Sj ∪ {ai})(cid:9). ∆Π(i) := min Sj∈Π\{SΠ(i)} max ∆∈Z (4) Due to the SPAO preference relation, this value satisfies the following characteristics: (a) if Π is Nash stable, for every agent ai, it holds that ∆Π(i) ≥ 0; (b) if ∆Π(i) < 0, then agent ai is willing to deviate to another coalition at a next iteration; and (c) for the agent ai who deviated at the last iteration and updated the partition as Π(cid:48), it holds that ∆Π(cid:48)(i) ≥ 0. From Definition 4, it is clear that the new instance ( A,T ,P) still holds SPAO. Let Π0 denote a Nash stable partition in the original instance (A,T ,P). When a new agent ar /∈ A decides to execute one of the tasks in T and creates a new partition Π1, it holds that ∆Π1(r) ≥ 0, as shown in (c). If there is no existing agent aq ∈ A whose ∆Π1(q) < 0, then the new partition Π1 is Nash stable. Suppose that there exists at least an agent aq whose ∆Π1(q) < 0. Then, the agent must be one of the existing members in the coalition that agent ar selected in the last iteration. As agent aq moves to another coalition and creates 5 a new partition Π2, the previously-deviated agent ar holds ∆Π2(r) ≥ 1. In other words, an agent who deviates to a coalition and expels one of the existing agents in that coalition will not deviate again even if another agent joins the coalition in a next iteration. This implies that at most A of iterations are required to hold ∆ Π(i) ≥ 0 for every agent ai ∈ A, where the partition Π is Nash stable. Lemma 1 is essential not only for the existence of and convergence to a Nash stable partition but also for fast adaptability to dynamic environments. Theorem 1 (Existence). If (A,T ,P) is an instance of GRAPE holding SPAO, then a Nash stable partition always exists. Proof. This theorem will be proved by induction. Let M (n) be the following mathematical statement: for A = n, if an instance (A,T ,P) of GRAPE is SPAO, then there exists a Nash stable partition. Base case: When n = 1, there is only one agent in an instance. This agent is allowed to participate in its most preferred coalition, and the resultant partition is Nash stable. Therefore, M (1) is true. Induction hypothesis: Assume that M (k) is true for a positive integer k such that A = k. Induction step: Suppose that a new agent ai /∈ A whose preference relation regarding every task in T is SPAO joins the instance (A,T ,P). This induces a new instance ( A,T ,P) where A = A ∪ {ai} and A = k + 1. From Lemma 1, it is clear that the new instance also satisfies SPAO and has a Nash stable partition Π. Consequently, M (k + 1) is true. By mathematical induction, M (n) is true for all positive integers n ≥ 1. Theorem 2 (Convergence). If (A,T ,P) is an instance of GRAPE holding SPAO, iterations re- quired to determine a Nash stable partition is at most A · (A + 1)/2. Proof. Suppose that, given a Nash stable partition in an instance where there exists only one agent, we add another arbitrary agent and find a Nash stable partition for this new instance, and repeat the agents in A are included. From Lemma 1, if a new agent joins an instance in which the current partition is Nash stable, then the maximum number of iterations required to find a new Nash stable partition is the number of the existing agents plus one. Therefore, it is trivial that the maximum number of iterations to find a Nash stable partition of an instance (A,T ,P) is given as the procedure until all then the number of k = A · (A + 1)/2. (5) A(cid:88) k=1 Note that this polynomial-time convergence still holds even if the agents are initialized to a random partition. Suppose that we have the following setting: the entire agents A are firstly not movable from the existing partition, except a set of free agents A(cid:48) ⊆ A; whenever the agents A(cid:48) find a Nash stable partition Π(cid:48), one arbitrary agent in ar ∈ A \ A(cid:48) additionally becomes liberated and deviates from the current coalition SΠ(cid:48)(r) to another coalition in Π(cid:48). In this setting, from the viewpoint of the agents in A(cid:48) \ SΠ(cid:48)(r), the newly liberated agent is considered as a new agent as that in Lemma 1. Accordingly, we can still utilize the lemma for the agents in A(cid:48) \ SΠ(cid:48)(r) ∪ {ar}. The agents also can find a Nash stable partition if one of them moves to SΠ(cid:48)(r) during the process, because, due to ar, it became ∆Π(cid:48)(i) ≥ 1 for every agent ai ∈ SΠ(cid:48)(r) \ {ar}. In a nutshell, the agents A(cid:48) ∪ {ar} can converge to a Nash stable partition within A(cid:48)∪{ar}, which is equivalent to Lemma 1. Hence, Theorem 1 and this theorem are also valid for the case when the initial partition of the agents are randomly given. E. Decentralized Algorithm In the previous section, it was assumed that only one agent is somehow chosen to make a decision at each iteration under the fully-connected network. On the contrary, in this section, we propose a decentralized algorithm, as shown in Algorithm 1, in which every agent does decision making based its local information and affects its neighbors simultaneously under a strongly-connected network. Despite that, we show that Theorems 1 and 2 still hold thanks to our proposed distributed mutex subroutine shown in Algorithm 2. The details of the decentralized main algorithm are as follows. // Initialisation Algorithm 1 Decision-making algorithm for each agent ai 1: satisfied ← f alse; ri ← 0; si ← 0 2: Πi ← {Sφ = A, Sj = φ ∀tj ∈ T } // Decision-making process begins 3: while true do // Make a new decision if necessary if satisfied = f alse then (tj∗,Sj∗) ← arg max∀Sj∈Πi(tj,Sj ∪ {ai}) if (tj∗,Sj∗) (cid:31)i (tΠi(i),SΠi(i)) then 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: Join Sj∗ and update Πi ri ← ri + 1 si ∈ unif[0, 1] end if satisfied = true // Broadcast the local information to neighbor agents end if Broadcast M i = {ri, si, Πi} and receive M k from its neighbors ∀ak ∈ Ni Construct Mi {ri, si, Πi}, satisfied ← D-MUTEX(Mi // Select the valid partition from all the received messages rcv = {M i,∀M k} rcv) 14: 15: 16: end while Each agent ai has local variables such as Πi, satisfied, ri, and si (Line 1 -- 2). Here, Πi is the agent's locally-known partition; satisfied is a binary variable that indicates whether or not the agent is satisfied with Πi such that it does not want to deviate from its current coalition; ri ∈ Z+ is an integer variable to represent how many times Πi has evolved (i.e., the number of iterations happened for updating Πi until that moment); and si ∈ [0, 1] is a uniform-random variable that 6 is generated whenever Πi is newly updated (i.e., a random time stamp). Given Πi, agent ai examines which coalition is the most preferred among others, assuming that the other agents remain at the existing coalitions (Line 5). Then, the agent joins the newly found coalition if it is strongly preferred than its current coalition. In this case, the agent updates Πi to reflect its new decision, increases ri, and generates a new random time stamp si (Line 6 -- 10). In any case, since the agent ascertained that the currently-selected coalition is the most preferred, the agent becomes satisfied with Πi (Line 11). Then, agent ai generates and sends a message M i := {ri, si, Πi} to its neighbor agents, and vice versa (Line 13). Since every agent locally updates its locally-known partition simultaneously, one of the partitions should be regarded as if it were the partition updated by a deciding agent at the previous iteration. We refer to this partition as the valid partition at the iteration. The distributed mutex subroutine in Algorithm 2 enables the agents to recognize the valid partition among all the locally-known current partitions even under a strongly- connected network and in asynchronous environments. Before executing this subroutine, each agent ai collects all the mes- sages received from its neighbor agents ∀ak ∈ Ni (including rcv = {M i,∀M k}. Using this message set, the M i) as Mi agent examines whether or not its own partition Πi is valid. If there exists any other partition Πk such that rk > ri, then the agent considers Πk more valid than Πi. This also happens if rk = ri and sk > si, which indicates the case where Πk and Πi have evolved over the same amount of times, but the former has a higher time stamp. Since Πk is considered as more valid, agent ai will need to re-examine if there is a more preferred coalition given Πk in the next iteration. Thus, the agent sets satisfied as f alse (Line 3 -- 10 in Algorithm 2). After completing this subroutine, depending on satisfied, each agent proceeds the decision-making process again (i.e., Line 4 -- 12 in Algorithm 1) and/or just broadcasts the existing locally-known partition to its neighbor agents (Line 13 in Algorithm 1). if (rk > ri) or (rk = ri & sk > si) then rcv) rcv do satisfied ← true for each message Mk ∈ Mi Algorithm 2 Distributed Mutex Subroutine 1: function D-MUTEX(Mi 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: end function ri ← rk si ← sk Πi ← Πk satisfied ← f alse end for return {ri, si, Πi}, satisfied end if In a nutshell, the distributed mutex algorithm makes sure that there is only one valid partition that dominates (or will finally dominate depending on the communication network) any other partitions. In other words, multiple partitions locally evolve, but one of them only eventually survive as long as a strongly-connected network is given. From each partition's viewpoint, it can be regarded as being evolved by a random sequence of the agents under the fully-connected network. Thus, the partition becomes Nash stable within the polynomial time as shown in Theorem 2. In an extreme case, we may encounter multiple Nash stable partitions at the very last. Nevertheless, thanks to the mutex algorithm, one of them can be distributedly selected by the agents. All the features imply that agents using Algorithm 1 can find a Nash stable partition in a decentralized manner and Theorems 1 and 2 still hold. IV. ANALYSIS A. Algorithmic Complexity (Scalability) Firstly, let us discuss about the running time for the pro- posed framework to find a Nash stable partition. This paper refers to a unit time required for each agent to proceed the main loop of Algorithm 1 (Line 4-15) as a time step. De- pending on the communication network considered, especially if it is not fully-connected, it may be possible that some of the given agents have to execute this loop to just propagate their locally-known partition information without affecting ri as Line 8. Because this process also spends a unit time step, we call it as dummy iteration to distinguish from a (normal) iteration, which increases ri. Notice that such dummy iterations happen sequentially at most dG times before a normal iteration occurs, where dG is the graph diameter of the communication network. Hence, thanks to Theorem 2, the total required time steps until finding a). For the fully-connected a Nash stable partition is O(dGn2 network case, it becomes O(n2 a) because of dG = 1. Note that this algorithmic complexity is less than that of the centralized algorithm, i.e., O(n2 a · nt), in [44]. Every agent at each iteration investigates nt + 1 of se- lectable task-coalition pairs including tφ given a locally-known valid partition (as shown in Line 5 in Algorithm 1). Therefore, the computational overhead for an agent is O(nt) per any iteration. With consideration of the total required time steps, the running time of the proposed approach for an agent can a). Note that the running time in be bounded by O(dGntn2 practice can be much less than the bound since Theorem 2 was conservatively analyzed, as described in the following remark. Remark 4 (The number of required iterations in practice). Algorithm 1 allows the entire agents in A to be involved in the decision-making process, whereas, in the proof for Theorem 2, a new agent can be involved after a Nash stable partition of existing agents is found. Since agents using Algorithm 1 do not need to find every Nash stable partition for each subset of the agents, unnecessary iterations can be reduced. Hence, the number of required iterations in practice may become less than that shown in Theorem 2, which is also supported by the experimental results in Section VI-B. Let us now discuss about the communication overhead for each agent per iteration. Given a network, agent ai should communicate with Ni of its neighbors, and the size of each message grows with regard to na. Hence, the communication overhead of the agent is O(Ni · na). It could be quadratic if Ni increases in proportional to na. However, this would rarely happen in practice due to spatial distribution of agents 7 and physical limits on communication such as range limitation. Instead, Ni would be most likely saturated in practice. Remark 5 (Communication overhead vs. Running time). To reduce the communication overhead, we may impose the maximum number of transactions per iteration, denoted by nc, on each agent. Even so, Theorems 1 and 2 are still valid as long as the union of underlying graphs of the communication networks over time intervals becomes connected. However, in return, the number of dummy iterations may increase, so does the framework's running time. In an extreme case where nc = 1 (i.e., unicast mode), dummy iterations may happen in a row at most na times. Thus, the total required time steps until finding a Nash stable partition could be O(n3 a), whereas the communication overhead is O(na). In short, the running time of the framework can be traded off against the communication overhead for each agent per iteration. B. Suboptimality This section investigates the suboptimality lower bound (or can be called approximation ratio) of the proposed framework in terms of the global utility, i.e., the objective function in Equation (1). Given a partition Π, the global utility value can be equivalently rewritten as J = ui(tΠ(i),SΠ(i)). (6) (cid:88) ∀ai∈A Note that we can simply derive {xij} for Equation (1) from Π for Equation (6), and vice versa. Let JGRAP E and JOP T represent the global utility of a Nash stable partition obtained by the proposed framework and the optimal value, respectively. This paper refers to the fraction of JGRAP E with respect to JOP T as the suboptimality of GRAPE, denoted by α, i.e., α := JGRAP E/JOP T . (7) The lower bound of the suboptimality can be determined by the following theorem. Theorem 3 (Suboptimality lower bound: general case). Given a Nash stable partition Π obtained by GRAPE, its suboptimal- ity in terms of the global utility is lower bounded as follows: α ≥ JGRAP E/(JGRAP E + λ), (8) (cid:8)p·(cid:2)ui(tj, p)−ui(tj,Sj∪{ai})(cid:3)(cid:9) (9) max ai∈A,p≤A where λ ≡ (cid:88) ∀Sj∈Π Proof. Let Π∗ denote the optimal partition for the objective function in Equation (6). Given a Nash stable partition Π, from Definition 3, it holds that, ∀ai ∈ A, ui(tΠ(i),SΠ(i)) ≥ ui(t∗ (10) j←i indicates task tj ∈ T to which agent ai should where t∗ have joined according to the optimal partition Π∗; and Sj ∈ Π is the coalition for task tj whose participants follow the Nash stable partition Π. j←i,Sj ∪ {ai}), 8 and (ii) all the individual utilities can derive SPAO preference relations, then a Nash stable partition Π obtained by GRAPE provides at least 50% of suboptimality in terms of the global utility. (cid:88) Proof. Firstly, we introduce some definitions and notations that facilitate to describe this proof. Given a partition Π of an instance (A,T ,P), the global utility is denoted by V (Π) := (15) We use operator ⊕ as follows. Given any two partitions ∀ai∈A ui(tΠ(i),SΠ(i)). ΠA = {SA 0 , ..., SA nt } and ΠB = {SB 0 ∪ SB j=0SB 1 ∪ SB 0 , SA j = A, 0 , ..., SB nt }, 1 , ..., SA nt ∪ SB }. there may exist nt ΠA ⊕ ΠB := {SA j = ∪nt j=0SA Since ∪nt the same agent ai even in two different coalitions in ΠA ⊕ ΠB. For instance, suppose that ΠA = {{a1},{a2},{a3}} and ΠB = {∅,{a1, a3},{a2}}. Then, ΠA ⊕ ΠB = {{a1},{a1, a2, a3},{a2, a3}}. We regard such an agent as two different agents in ΠA ⊕ ΠB. Accordingly, the operation may increase the number of total agents in the resultant partition. Using the definitions described above, condition (i) implies that V (ΠA) ≤ V (ΠA ⊕ ΠB). From now on, we will show that 1 (16) 2 V (Π∗) ≤ V ( Π), } is an optimal partition and where Π∗ = {S∗ Π = { S0, S1, ..., Snt} is a Nash stable partition. By doing so, this theorem can be proved. From the definition in Equation (15), it can be said that 1 , ..., S∗ 0 , S∗ nt (cid:88) ui(t Π(i), S Π(i) ∪ S∗ (cid:88) ∀ai∈A + ) Π(i) ui(tΠ∗(i), SΠ∗(i) ∪ S∗ Π∗(i)), (17) ∀ai∈A− where A− is the set of agents whose decisions follow not the Nash stable partition Π but only the optimal partition Π∗. Due to condition (ii), the first term of the right-hand side in Equation (17) is no more than ui(t Π(i), S Π(i)) ≡ V ( Π). Likewise, the second term is also at most ui(tΠ∗(i), SΠ∗(i) ∪ {ai}). By the definition of Nash stability (i.e., for every agent ai ∈ A, ui(t Π(i), S Π(i)) ≥ ui(tj, Sj ∪ {ai}), ∀ Sj ∈ Π), the above equation is at most (cid:88) (cid:88) which is also no more than, because of A− ⊆ A, ui(t Π(i), S Π(i)), ∀ai∈A− (20) ui(t Π(i), S Π(i)) ≡ V ( Π). (21) (cid:88) (cid:88) ∀ai∈A ∀ai∈A− (18) (19) ai∈A,p≤A Lij[p] ≡ λ, max (14) V ( Π ⊕ Π∗) = ui(tj,Sj ∪ {al}), ∀ai∈A The right-hand side of the inequality in Equation (10) can be rewritten as ui(t∗ (cid:8)ui(t∗ j←i,Sj ∪ {ai}) = ui(t∗ j←i,S∗ j ) − ui(t∗ j←i,S∗ j←i,Sj ∪ {ai})(cid:9), j )− where S∗ mizes the objective function. j ∈ Π∗ is the ideal coalition of task t∗ (11) j←i that maxi- By summing over all the agents, the inequality in Equation (10) can be said that (cid:88) ∀ai∈A ui(tΠ(i),SΠ(i)) ≥ (cid:88) − (cid:88) ∀ai∈A ∀ai∈A ui(t∗ j←i,S∗ j ) j←i,S∗ {ui(t∗ j ) − ui(t∗ j←i,Sj ∪ {ai})}. (12) The left-hand side of the inequality in Equation (12) represents the objective function value of the Nash stable partition Π, i.e., JGRAP E, and the first term of the right-hand side is the optimal value, i.e., JOP T . The second term in the right-hand side can be interpreted as the summation of the utility lost of each agent caused by the belated decision to its optimal task, provided that the other agents still follow the Nash stable partition. The upper bound of the second term is given by {ui(t∗ j←i,S∗ j )− ui(t∗ j←i,Sj ∪{ai})}. (13) S∗ j · max ai∈S∗ nt(cid:88) This is at most (cid:88) j=1 j ∀Sj∈Π where Lij[p] = p · (ui(tj, p) − ui(tj,Sj ∪ {ai})). Hence, the inequality in Eqn (12) can be rewritten as JGRAP E ≥ JOP T − λ. Dividing both sides by JGRAP E and rearranging them yield the suboptimality lower bound of the Nash stable partition, as given by Equation (8). Although Theorem 3 does not provide a fixed-value lower bound, it can be determined as long as a Nash stable partition and agents' individual utility functions are given. Nevertheless, as a special case, if the social utility for any coalition is non-decreasing (or monotonically increasing) in terms of the number of co-working agents, then we can obtain a fixed-value lower bound for the suboptimality of a Nash stable partition. Theorem 4 (Suboptimality lower bound: a special case). Given an instance (A,T ,P) of GRAPE, if (i) the social utility for any coalition is non-decreasing with regard to the number of participants, i.e., for any Sj ⊆ A and al ∈ A\ Sj, it holds that (cid:88) ui(tj,Sj) ≤ (cid:88) ∀ai∈Sj ∀ai∈Sj∪{al} Accordingly, the left-hand side of Equation (17) holds the following inequality: defined as those in Problem 1. Here, it is considered that, for ∀ai ∈ A and ∀tj ∈ T , 9 V ( Π ⊕ Π∗) ≤ 2V ( Π). Thanks to Equation (16), it follows that V (Π∗) ≤ V ( Π ⊕ Π∗). Therefore, V (Π∗) ≤ 2V ( Π), which completes this proof. (22) ui(tj, p) = 0 if p < Rj (27) because task tj cannot be completed in this case. Note that any task tj without such a requirement is regarded to have Rj = 0. For each task tj having Rj > 0, even if ui(tj, p) is monotonically decreasing at p ≥ Rj, the individual utility can not be simply transformed to a preference relation holding SPAO because of Equation (27). Thus, we need to modify the utility function to yield alternative values for the case when p < Rj. We refer to the modified utility as auxiliary individual utility ui, which is defined as ui(tj, p) = u0 i (tj, p) ui(tj, p) if p ≤ Rj otherwise, (28) (cid:40) where u0 to task tj when p ≤ Rj. i (tj, p) is the dummy utility of agent ai with regard The dummy utility is intentionally used also for the case when p = Rj in order to find an assignment that holds Equation (24). For this, the auxiliary individual utility should satisfy the following condition. Condition 1. For every agent ai ∈ A, its preference relation Pi holds that, for any two tasks tj, tk ∈ T , (tj, Rj) (cid:31)i (tk, Rk + 1). This condition enables every agent to prefer a task for which the number of co-working agents is less than its minimum requirement, over any other tasks whose requirements are already fulfilled. Under this condition, as long as the agent set A is such that A ≥(cid:80)∀tj∈T Rj and a Nash stable partition is found, the resultant assignment satisfies Equation (24). Proposition 1. Given an instance of Problem 2 where ui(tj, p) ∀i ∀j is a monotonically decreasing function with regard to ∀p ≥ Rj, if the dummy utilities u0 i (tj, p) ∀i ∀j in (28) are set to satisfy Condition 1 and SPAO for ∀p ≤ Rj, then all the resultant auxiliary individual utilities ui(tj, p) ∀i ∀j ∀p can be transformed to a na-tuple of preference relations P that hold Condition 1 as well as SPAO for ∀p ∈ {1, ..., na}. In the corresponding instance of GRAPE (A,T ,P), a Nash stable partition can be determined within polynomial times as shown in Theorems 1 and 2 because of SPAO, and the resultant partition can satisfy Equation (24) due to Condition 1. Let us give an example. Suppose that there exist 100 agents A, and 3 tasks T = {t1, t2, t3} where only t3 has its minimum requirement R3 = 5; for every agent ai ∈ A, individual utili- ties for t1 and t2, i.e., ui(t1, p) and ui(t2, p), are much higher than that for t3 in ∀p ∈ {1, ..., 100}. We can find a Nash stable partition for this example, as described in Proposition 1, by i (tj, p)= max∀tj{ui(tj, Rj + 1)} + β for ∀p ≤ Rj, setting u0 ∀ai ∈ A, where β > 0 is an arbitrary positive constant. After a Nash stable partition is found, in order to compute the objective function value in (23), the original individual C. Adaptability Our proposed framework is also adaptable to dynamic environments such as unexpected addition or loss of agents or tasks, owing to its fast convergence to a Nash stable partition. Thanks to Lemma 1, if a new agent additionally joins an ongoing mission in which an assignment was already determined, the number of iterations required for converging to a new Nash stable partition is at most the number of the total agents. Responding to any environmental change, the framework is able to establish a new agreed task assignment within polynomial time. D. Robustness in Asynchronous Environments it In the proposed framework, for every iteration, each agent does not need to wait until nor ensure that its locally-known information has been propagated to a certain neighbor group. Instead, as described in Remark 5, is enough for the agent to receive the local information from one of its neigh- bors, to make a decision, and to send the updated partition back to some of its neighbors. Temporary disconnection or non-operation of some agents may cause dummy iterations additionally. However, the existence of, the convergence toward, and the suboptimality of a Nash stable partition under the proposed framework, which is also supported by Section VI-E. it does not affect V. GRAPE WITH MINIMUM REQUIREMENTS This section addresses another task allocation problem where each task may require at least a certain number of agents for its completion. This problem can be defined as follows. Problem 2. Given a set of agents A and a set of tasks T , the objective is to find an assignment such that subject to (cid:88) (cid:88) ∀ai∈A ∀tj∈T ui(tj, p)xij, xij ≥ Rj, ∀tj ∈ T , xij ≤ 1, ∀ai ∈ A, max{xij} (cid:88) (cid:88) ∀ai∈A ∀tj∈T (23) (24) (25) xij ∈ {0, 1}, ∀(ai, tj) ∈ A × T , (26) where Rj ∈ N ∪ {0} is the number of minimum required agents for task tj, and all the other variables are identically utility function ui should be used instead of the auxiliary one ui. Proposition 2. Given a Nash stable partition Π obtained by implementing Proposition 1, its suboptimality bound α is such that α ≥ JGRAP E JGRAP E + λ · JGRAP E JGRAP E + δ . (29) Here, δ ≡ JGRAP E−JGRAP E, where JGRAP E (or JGRAP E) is the objective function value in (23) using ui (or using ui) given the Nash stable partition. Likewise, λ is the value in (9) using ui. In addition to this, if every ui satisfies the conditions for Theorem 4, then α ≥ 1 2 · JGRAP E JGRAP E + δ . (30) Proof. Since the Nash stable partition Π is obtained by using ui, it can be said from Equations (7) and (8) that JGRAP E JOP T ≥ JGRAP E . JGRAP E + λ (31) Due to the fact that ui(tj, p) ≥ ui(tj, p) for ∀i, j, p, it is clear that JGRAP E ≥ JGRAP E and JOP T ≥ JOP T . By letting that δ := JGRAP E − JGRAP E, the left term in (31) is at most (JGRAP E + δ)/JOP T . Besides, the right term in (31) is a monotonically-increasing function with regard to JGRAP E, and thus, it is lower bounded by JGRAP E/(JGRAP E + λ). From this, Equation (31) can be rewritten as Equation (29) by multiplying JGRAP E/(JGRAP E + δ). Likewise, for the case when every ui satisfies the conditions for Theorem 4, it can be said that JGRAP E ≥ 1/2 · JOP T , which can be transformed into Equation (30) as shown above. 10 (a) Social utility (b) Individual utility Fig. 1. Examples of utility functions used in the numerical experiment are shown, depending on the two different task types (i.e., peaked-reward and submodular-reward): (a) the social utility of a coalition; (b) an agent's individual utility. among the members. Therefore, the individual utility of agent ai executing task tj with coalition Sj is defined as ui(tj,Sj) = r(tj,Sj)/Sj − ci(tj), (32) where r(tj,Sj) is the reward from task tj when it is executed by Sj together, and ci(tj) is the cost that agent ai needs to pay for the task. Here, we simply set the cost as a function of the distance from agent ai to task tj. We set that if ui(tj,Sj) is not positive, agent ai prefers to join Sφ over Sj. This experiment considers two types of tasks. For the first type, a task's reward becomes higher as the number of participants gets close to a specific desired number. We refer to such a task as a peaked-reward task, and its reward can be defined as r(tj,Sj) = rmax j · e−Sj/nd j +1, (33) · Sj nd j Notice that if δ = 0 for the Nash stable partition in Propo- sition 2, then the suboptimality bounds become equivalent to those in Theorems 3 and 4. VI. SIMULATION AND RESULTS This section validates the performances of the proposed framework with respect to its scalability, suboptimality, adapt- ability against dynamic environments, and robustness in asyn- chronous environments. A. Mission Scenario and Settings 1) Utility functions: Firstly, we introduce the social and individual utilities used in this numerical experiment. We consider that if multiple robots execute a task together as a coalition, then they are given a certain level of reward for the task. The amount of the reward varies depending on the number of the co-working agents. The reward is shared with the agents, and each agent's individual utility is considered as the shared reward minus the cost required to personally spend on the task (e.g., fuel consumption for movement). In this experiment, the equal fair allocation rule [53], [54] is adopted. Under the rule, a task's reward is equally shared represents the desired number, and rmax is the where nd j peaked reward in case that nd j of agents are involved in. Consequently, the individual utility of agent ai with regard to task tj becomes the following equation: j ui(tj,Sj) = rmax j nd j · e−Sj/nd j +1 − ci(tj). (34) For the second type, a task's reward becomes higher as more agents are involved, but the corresponding marginal gain decreases. This type of tasks is said to be submodular-reward, and the reward can be defined as j j (35) · logj (Sj + j − 1), r(tj,Sj) = rmin where rmin indicates the reward obtained if there is only one agent is involved, and j > 1 is the design parameter regarding the diminishing marginal gain. The resultant individual utility becomes as follows: · logj (Sj + j − 1)/Sj − ci(tj). (36) ui(tj,Sj) = rmin Figure 1 illustrates examples of the social utilities and individual utilities for the task types introduced above. For simplification, agents' costs are ignored in the figure. We set and j to be 60, 15, 10, and 2, respectively. rmax j Notice that the individual utilities are monotonically decreas- ing in both cases, as depicted in Figure 1(b). Therefore, given j , rmin , nd j j 020406080100# Co-working Agents020406080Social UtilityPeaked-rewardSubmodular-reward020406080100# Co-working Agents0246810Individual UtilityPeaked-rewardSubmodular-reward a mission that entails these task types, we can generate an instance (A,T ,P) of GRAPE that holds SPAO. 11 j j k /(cid:80)∀tk∈T ∗ rmax 2) Parameters generation: In the following sections, we will mainly utilize Monte Carlo simulations. At each run, nt tasks and na agents are uniform-randomly located in a 1000 m × 1000 m arena and a 250 m × 250 m arena within there, respectively. For a scenario including peaked-reward is randomly generated from a uniform distribution tasks, rmax over [1000, 2000] × na/nt, and nd j is set to be the rounded )×na. For a scenario including value of (rmax is uniform- submodular-reward tasks, j is set as 2, and rmin randomly generated over [1000, 2000]× 1/ logj (na/nt + 1). 3) Communication network: Given a set of agents, their communication network is strongly-connected in a way that only contains a bidirectional minimum spanning tree with consideration of the agents' positions. Furthermore, we also consider the fully-connected network in some experiments in order to examine the influence of the network. The communi- cation network is randomly generated at each instance, and is assumed to be sustained during a mission except the robustness test simulations in Section VI-E. j B. Scalability To investigate the effectiveness of nt and na upon the scalability of the proposed approach, we conduct Monte Carlo simulations with 100 runs for the scenarios introduced in Section VI-A with a fixed nt = 20 and various na ∈ {80, 160, 240, 320} and for those with na = 160 and nt ∈ {5, 10, 15, 20}. Figure 2 shows the statistical results using box- and-whisker plots, where the green boxes indicate the results from the scenarios with the peaked-reward tasks and the ma- genta boxes are those with the submodular-reward tasks. The blue and red lines connecting the boxes represent the average value for each test case (na, nt) under a strongly-connected network and the fully-connected network, respectively. The left subfigure in Figure 2(a) shows that the ratio of the number of required (normal) iterations to that of agents linearly increases as more agents are involved. This implies that the proposed framework has quadratic complexity with a), as stated in regard to the number of agents (i.e., C1n2 2, which is Theorem 2, but with C1 being much less than 1 the value from the theorem. C1 can become even lower (e.g., C1 = 5 × 10−4 in the experiments) under the fully-connected network. Such C1 being smaller than 1 2 may be explained by Remark 4: the algorithmic efficiency of Algorithm 1 can reduce unnecessary iterations that may be induced in the procedure of the proof for Theorem 2. On the other hand, the left subfigure in Figure 2(b) shows that the number of required iterations decreases with regard to the number of tasks. This trend may be caused by the fact that more selectable options provided to the fixed number of agents can reduce possible conflicts between the agents. Furthermore, in the two results, the trends regarding either na or nt have higher slopes under a strongly-connected network than those under the fully-connected network. This is because the former condition is more sensitive to conflicts iterations. For between agents, and thus causes additional (a) na ∈ {80, 160, 240, 320} with fixed nt = 20 (b) nt ∈ {5, 10, 15, 20} with fixed na = 160 Fig. 2. Convergence performance of the proposed framework is shown, depending on communication networks (i.e., Strongly-connected vs. Fully- connected) and utility function types (i.e., Peaked-reward vs. Submodular- reward) with different number of agents and tasks: (Left) the number of (normal) iterations happened relative to that of agents; (Right) the number of time steps happened (i.e., normal and dummy iterations) relative to that of iterations. example, agents at the middle nodes of the network may change their decisions (and thus increase the number of iterations) while the local partition information of the agent at one end node is being propagated to the other end nodes. Such unnecessary iterations in the middle might not have occurred if the agents at all the end nodes were directly connected to each other. The right subfigures in Figure 2(a) and (b) indicate that approximately 3 -- 4 times of dummy iterations, compared with the required number of normal iterations, are additionally needed under a strongly-connected network. Noting that the mean values of the graph diameter dG for the instances with na ∈ {80, 160, 240, 320} are 36, 58, 75 and 92, respectively, the results show that the amount of dummy iterations happened is much less than the bound value, which is dG as pointed out in Section IV-A. On the contrary, under the fully-connected network, there is no need of such a dummy iteration, and thus the required number of iterations and that of time steps are the same. C. Suboptimality This section examines the suboptimality of the proposed framework by using Monte Carlo simulations with 100 in- stances. In each instance, there are nt = 3 of tasks and na = 12 of agents who are strongly-connected. Figure 3 presents the true suboptimality of each instance, which is the ratio of the global utility obtained by the proposed framework to that by a brute-force search, i.e., JGRAP E/JOP T , and the lower bound given by Theorem 3. A blue circle and a red cross in the figure indicate the true suboptimality and the 80160240320# Agents (# Tasks = 20)11.522.533.54# Required Iterations / # AgentsPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected80160240320# Agents (# Tasks = 20)123456# Required Time Steps / # IterationsPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected5101520# Tasks (# Agents = 160)11.522.533.54# Required Iterations / # AgentsPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected5101520# Tasks (# Agents = 160)1234567# Required Time Steps / # IterationsPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected 12 (a) Peaked-reward task (b) Submodular-reward task Fig. 3. True suboptimality of a Nash stable partition obtained by GRAPE for each run of the Monte Carlo simulation (denoted by a blue circle) and its lower bound provided by Theorem 3 (denoted by a red cross) under a strongly-connected communication network: (a) the scenarios with peaked- reward tasks; (b) the scenarios with submodular-reward tasks (a) (b) Fig. 4. The suboptimality lower bound, given by Theorem 3, of a Nash stable partition obtained by GRAPE, depending on communication networks (i.e., Strongly-connected vs. Fully-connected) and utility function types (i.e., Peaked-reward vs. Submodular-reward): (a) fixed nt = 20 with varying na ∈ {80, 160, 240, 320}; (b) fixed na = 160 with varying nt ∈ {5, 10, 15, 20} lower bound, respectively. The results show that the framework provides near-optimal solutions in almost all cases and the suboptimality of each Nash stable partition is enclosed by the corresponding lower bound. The suboptimality may be improved if the agents are allowed to investigate a larger search space, for example, possible coalitions caused by co-deviation of multiple agents. However, this strategy in return may increase communication transactions between the agents because they have to notice each other's willingness unless their individual utility func- tions are known to each other, which is in contradiction to Assumption 4. Besides, the computational overhead for each agent per iteration also becomes more expensive than O(nt), which is the complexity for unilateral searching, as shown in Section IV-A. Hence, the resultant algorithm's complexity may hinder its practical applicability to a large-scale multiple agent system. Figure 4 depicts the suboptimality lower bounds for the large-size problems that were previously addressed in Sec- tion VI-B. It is clearly shown that the agent communication network does not make any effect on the suboptimality lower bound of a Nash stable partition. Although there is no universal trend of the suboptimality with regard to na and nt in both utility types, it is suggested that the features of the lower bound given by Theorem 3 can be influenced by the utility functions considered. In the experiments, the suboptimality bound averagely remain above than 60 -- 70 %. D. Adaptability This section discusses the adaptability of our proposed framework in response to dynamic environments such as unexpected inclusion or loss of agents or tasks. Suppose that there are 10 tasks and 160 agents in a mission, and a Nash stable partition was already found as a baseline. During the mission, the number of agents (or tasks) changes; the range of the change is from losing 50% of the existing agents (or tasks) to additionally including new ones as much as 50% of them. For each dynamical environment, a Monte Carlo simulation with 100 instances is performed by randomly including or excluding a subset of the corresponding number of agents or tasks. Here, we consider a strongly-connected communication network. (a) Dynamic Agents (b) Dynamic Tasks Fig. 5. The plot shows the number of additional iterations required for re- converging toward a Nash stable partition relative to the number of agents in the case when some agents or tasks are partially lost or newly involved (Baseline: nt = 10, na = 160, and a Nash stable partition was already found). Negative values in the x-axis indicate that the corresponding number of existing agents or tasks are lost. Positive values indicate that the corresponding number of new agents or tasks are included in an ongoing mission. A strongly- connected communication network is used. Figure 5(a) illustrates that the more agents are involved additionally, the more iterations are required for re-converging to a new Nash stable partition. This is because the inclusion of a new agent may lead to additional iterations at most as much as the number of the total agents including the new agent (as shown in Lemma 1). On the contrary, the loss of existing agents does not seem to have any apparent relation with the number of iterations. A possible explanation is that the exclusion of an existing agent is favorable to the other agents due to SPAO preferences. This stimulates only a limited number of agents who are preferred to move to the coalition where the excluded agent was. This feature induces fewer 050100Monte Carlo Case ID 20% 40% 60% 80%100%Suboptimality (%)050100Monte Carlo Case ID 20% 40% 60% 80%100%Suboptimality (%)80160240320# Agents (# Tasks = 20)55%60%65%70%75%Suboptimality Lower BoundPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected5101520# Tasks (# Agents = 160)50%55%60%65%70%Suboptimality Lower BoundPeaked-rewardSubmodular-rewardStrongly-connectedFully-connected-80-64-48-32-16ref+16+32+48+64+80# Lost or Newly-included Agents00.511.522.53# Addtional Required Iterations / # AgentsPeaked-rewardSubmodular-reward-5-4-3-2-1ref+1+2+3+4+5# Lost or Newly-included Tasks00.511.522.53# Addtional Required Iterations / # AgentsPeaked-rewardSubmodular-reward additional iterations to reach a new Nash stable partition, compared with the case of adding a new agent. Figure 5(b) shows that eliminating existing tasks causes more iterations than including new tasks. This can be ex- plained by the fact that removing any task releases the agents performing the task free and it results in extra iterations as much as the number of the freed agents. On the other hand, adding new tasks induces relatively fewer additional iterations because only some of the existing agents are attracted to these tasks. the number of additional In summary, as the ratio of the number of agents to that of tasks increases, iterations for convergence to a new Nash stable partition also increases. This result corresponds to the trend described in Section VI-B, i.e., the left subfigures in Figure 2(a) and (b). In all the cases of this experiment, the number of additionally induced iterations still remains at the same order of the number of the given agents, which implies that the proposed framework provides excellent adaptability. E. Robustness in Asynchronous Environments This section investigates the robustness of the proposed framework in asynchronous environments. This scenario as- sumes that a certain fraction of the given agents, which are randomly chosen at each time step, somehow can not execute Algorithm 1 and even can not communicate with other normally-working neighbor agents. We refer to such agents as non-operating agents. Given that nt = 5 and na = 40, the fractions of the non-operating agents are set as {0, 0.2, 0.4, 0.6, 0.8}. In each case, we conduct 100 instances of Monte Carlo experiments for which the submodular-reward tasks are used. Figure 6(a) presents that the number of (normal) iterations required for converging to a Nash stable partition remains at the same level regardless of the fraction of the non- operating agents. Despite that, the required time steps increase as more agents become non-operating, as shown in Figure 6(b). Note that time steps growth rate means the ratio of the total required time steps to those for the case when all the agents operate normally. These findings indicate that, due to communicational discontinuity caused by the non-operating agents, the framework may take more time to wait for these agents to operate again and then to disseminate locally-known partition information over the entire agents. As such, dummy iterations may increase in asynchronous environments, though the proposed framework is still able to find a Nash stable partition. Furthermore, the resultant Nash stable partition's suboptimality lower bound obtained by Theorem 3 is not affected, as presented in Figure 6(c). F. Visualization We have na = 320 agents and nt = 5 tasks. The initial locations of the given agents are randomly generated, and the overall formation shape is different in each test scenario such as being circle, skewed circle, and square (denoted by Scenario #1, #2, and #3, respectively). The tasks are also randomly located away from the agents. In this simulation, each agent 13 (b) (a) Fig. 6. Robustness test in asynchronous environments at scenarios with nt = 10, na = 160, and the submodular-reward tasks: the plot shows the effectiveness of the fraction of non-operating agents with regard to: (a) the number of iterations happened until convergence relative to that of agents; (b) the ratio of the time steps happened to those for the normal case; (c) the suboptimality lower bound by Theorem 3. (c) is able to communicate with its nearby agents within a radius of 50 m. Here, the submodular-reward tasks are used. Figure 7 shows the visualized task allocation results, where the circles and the squares indicate the positions of the agents and the tasks, respectively. The lines between the circles represent the communication networks of the agents. The colored agents are assigned to the same colored task, for example, yellow agents belong to the team for executing the yellow task. The size of a square indicates the reward of the corresponding task. The cost for an agent with regard to a task is considered as a function of the distance from the agent to the task. The allocation results seem to be reasonable with consideration of the task rewards and the costs. The number of iterations required to find a Nash stable partition is 1355, 1380, and 1295 for Scenario #1, #2, and #3, respectively. The number of dummy iterations happened is just 20 -- 30% of that of the iterations. This value is much fewer than the results in Figure 2 because the networks considered here are more connected than those in Section VI-B. VII. CONCLUSION This paper proposed a novel game-theoretical framework that addresses a task allocation problem for a robotic swarm consisting of self-interested agents. We showed that selfish agents whose individual interests are transformable to SPAO preferences can converge to a Nash stable partition by us- ing the proposed simple decentralized algorithm, which is executable even in asynchronous environments and under a strongly-connected communication network. We analytically and experimentally presented that the proposed framework provides scalability, a certain level of guaranteed suboptimal- ity, adaptability, robustness, and a potential to accommodate different interests of agents. As this framework can be considered as a new sub-branch of self-organized approaches, one of our ongoing works is to compare it with one of the existing methods. Defining a fair scenario for both methods is non-trivial and requires careful consideration; otherwise, a resultant unsuitable scenario may provide biased results. Secondly, another natural progression of this study is to relax anonymity of agents and thus to con- sider a combination of the agents' identities. Experimentally, 0%20%40%60%80%Fraction of Non-operating Agents11.522.533.54# Required Iterations / # Agents0%20%40%60%80%Fraction of Non-operating Agents010203040Time Steps Growth Rate0%20%40%60%80%Fraction of Non-operating Agents58%60%62%64%66%68%70%Suboptimality Lower Bound 14 we have often observed that heterogeneous agents with social inhibition also can converge to a Nash stable partition. More research would be needed to analyze the quality of a Nash stable partition obtained by the proposed framework in terms of min max because our various experiments showed that the outcome provides individual utilities to agents in a balanced manner. ACKNOWLEDGMENT The authors gratefully acknowledge that this research was supported by International Joint Research Programme with Chungnam National University (No. EFA3004Z) REFERENCES [1] H.-S. Shin and P. Segui-Gasco, "UAV Swarms: Decision-Making John Wiley & Paradigms," in Encyclopedia of Aerospace Engineering. Sons, 2014, pp. 1 -- 13. [2] A. Khamis, A. Hussein, and A. Elmogy, "Multi-robot Task Allocation: A Review of the State-of-the-Art," in Cooperative Robots and Sensor Networks 2015. Cham: Springer International Publishing, 2015, vol. 604, pp. 31 -- 51. [3] A. Jevti´c, ´A. Gutierrez, D. Andina, and M. Jamshidi, "Distributed Bees Algorithm for Task Allocation in Swarm of Robots," IEEE Systems Journal, vol. 6, no. 2, pp. 296 -- 304, 2012. [4] E. Sahin, "Swarm Robotics: From Sources of Inspiration to Domains of Application," in Swarm Robotics. Berlin: Springer, 2005, pp. 10 -- 20. [5] M. Dorigo, M. Birattari, and M. Brambilla, "Swarm robotics," Scholar- pedia, vol. 9, no. 1, p. 1463, 2014. [6] K. Barton and D. Kingston, "Systematic Surveillance for UAVs: A Feedforward Iterative Learning Control Approach," in American Control Conference, Washington, DC, USA, 2013, pp. 5917 -- 5922. [7] I. Bekmezci, O. K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A Survey," Ad Hoc Networks, vol. 11, no. 3, pp. 1254 -- 1270, 2013. [8] M. Erdelj, E. Natalizio, K. R. Chowdhury, and I. F. Akyildiz, "Help from the Sky: Leveraging UAVs for Disaster Management," IEEE Pervasive Computing, vol. 16, no. 1, pp. 24 -- 32, 2017. [9] I. Jang, J. Jeong, H.-S. Shin, S. Kim, A. Tsourdos, and J. Suk, "Cooperative Control for a Flight Array of UAVs and an Application in Radar Jamming," IFAC-PapersOnLine, vol. 50, no. 1, pp. 8011 -- 8018, 2017. [10] B. P. Gerkey and M. J. Matari´c, "A Formal Analysis and Taxonomy of Task Allocation in Multi-robot Systems," International Journal of Robotics Research, vol. 23, no. 9, pp. 939 -- 954, 2004. [11] G. A. Korsah, A. Stentz, and M. B. Dias, "A Comprehensive Taxonomy for Multi-robot Task Allocation," The International Journal of Robotics Research, vol. 32, no. 12, pp. 1495 -- 1512, 2013. [12] S. Bandyopadhyay, S.-J. Chung, and F. Y. Hadaegh, "Probabilistic and Distributed Control of a Large-Scale Swarm of Autonomous Agents," IEEE Transactions on Robotics, vol. 33, no. 5, pp. 1103 -- 1123, 2017. [13] M. Brambilla, E. Ferrante, M. Birattari, and M. Dorigo, "Swarm Robotics: a Review from the Swarm Engineering Perspective," Swarm Intelligence, vol. 7, no. 1, pp. 1 -- 41, 2013. [14] L. Johnson, S. Ponda, H.-L. Choi, and J. How, "Asynchronous Decentralized Task Allocation for Dynamic Environments," in In- fotech@Aerospace, St.Louis, MO, USA, 2011. [15] C. M. Clark, R. Morton, and G. A. Bekey, "Altruistic relationships for optimizing task fulfillment in robot communities," Distributed Au- tonomous Robotic Systems 8, pp. 261 -- 270, 2009. [16] J. H. Dr`eze and J. Greenberg, "Hedonic Coalitions: Optimality and Stability," Econometrica, vol. 48, no. 4, pp. 987 -- 1003, 1980. [17] S. Banerjee, H. Konishi, and T. Sonmez, "Core in a Simple Coalition Formation Game," Social Choice and Welfare, vol. 18, no. 1, pp. 135 -- 153, 2001. [18] A. Bogomolnaia and M. O. Jackson, "The Stability of Hedonic Coalition Structures," Games and Economic Behavior, vol. 38, no. 2, pp. 201 -- 230, 2002. [19] A. Brutschy, G. Pini, C. Pinciroli, M. Birattari, and M. Dorigo, "Self- organized Task Allocation to Sequentially Interdependent Tasks in Swarm Robotics," Autonomous Agents and Multi-Agent Systems, vol. 28, no. 1, pp. 101 -- 125, 2014. (a) Scenario #1 (b) Scenario #2 (c) Scenario #3 Fig. 7. Visualized task allocation results are shown with different geographic scenarios (nt = 5, na = 320). Each square and its size represent each task's position and its reward (or demand), respectively. The circles and the lines between them indicate the positions of agents and their communication network, respectively. The color of each circle implies that the corresponding agent is assigned to the same colored task. 15 [43] A. Darmann, E. Elkind, S. Kurz, J. Lang, J. Schauer, and G. Woeginger, "Group Activity Selection Problem," in Proceedings of the 8th Interna- tional Conference on Internet and Network Economics, Liverpool, UK, 2012, pp. 156 -- 169. [44] A. Darmann, "Group Activity Selection from Ordinal Preferences," in Algorithmic Decision Theory. ADT 2015. Lecture Notes in Computer Science, ser. Lecture Notes in Computer Science, T. Walsh, Ed. Berlin, Heidelberg: Springer Cham, 2015, vol. 9346, pp. 35 -- 51. [45] M. Rubenstein, A. Cornejo, and R. Nagpal, "Programmable Self- assembly in a Thousand-robot Swarm," Science, vol. 345, no. 6198, pp. 795 -- 799, 2014. [46] S. C. Sung and D. Dimitrov, "On Myopic Stability Concepts for Hedonic Games," Theory and Decision, vol. 62, no. 1, pp. 31 -- 45, 2007. [47] M. Karakaya, "Hedonic Coalition Formation Games: A New Stability Notion," Mathematical Social Sciences, vol. 61, no. 3, pp. 157 -- 165, 2011. [48] H. Aziz and F. Brandl, "Existence of Stability in Hedonic Coalition Formation Games," in Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Valencia, Spain, 2012, pp. 763 -- 770. [49] J. Guerrero and G. Oliver, "Multi-robot Coalition Formation in Real- time Scenarios," Robotics and Autonomous Systems, vol. 60, no. 10, pp. 1295 -- 1307, 2012. [50] O. Shehory and S. Kraus, "Feasible Formation of Coalitions Among Autonomous Agents in Nonsuperadditive Environments," Computational Intelligence, vol. 15, no. 3, pp. 218 -- 251, 1999. [51] C. Nam and D. A. Shell, "Assignment Algorithms for Modeling Re- source Contention in Multirobot Task Allocation," IEEE Transactions on Automation Science and Engineering, vol. 12, no. 3, pp. 889 -- 900, 2015. [52] L. B. Johnson, H.-L. Choi, and J. P. How, "The Role of Information As- sumptions in Decentralized Task Allocation: A Tutorial," IEEE Control Systems, vol. 36, no. 4, pp. 45 -- 58, 2016. [53] W. Saad, Z. Han, M. Debbah, and A. Hjørungnes, "A Distributed Coalition Formation Framework for Fair User Cooperation in Wireless Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4580 -- 4593, 2009. [54] W. Saad, Z. Han, T. Basar, M. Debbah, and A. Hjørungnes, "Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents," IEEE Transactions on Mobile Computing, vol. 10, no. 9, pp. 1327 -- 1344, 2011. IEEE Copyright Notice c(cid:13) 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Accepted to be Published in: IEEE Transactions on Robotics [20] N. Kalra and A. Martinoli, "A Comparative Study of Market-Based and Threshold-Based Task Allocation," in Distributed Autonomous Robotic Systems 7, Tokyo, Ed. Springer Japan, 2006, pp. 91 -- 101. [21] Y. Zhang and L. E. Parker, "Considering Inter-task Resource Constraints in Task Allocation," Autonomous Agents and Multi-Agent Systems, vol. 26, no. 3, pp. 389 -- 419, 2013. [22] H. L. Choi, L. Brunet, and J. P. How, "Consensus-based Decentralized Auctions for Robust Task Allocation," IEEE Transactions on Robotics, vol. 25, no. 4, pp. 912 -- 926, 2009. [23] P. Segui-Gasco, H.-S. Shin, A. Tsourdos, and V. J. Segui, "Decentralised Submodular Multi-Robot Task Allocation," in IEEE/RSJ International Conference on Intelligent Robots and Systems, Hamburg, Germany, 2015, pp. 2829 -- 2834. [24] B. Acikmese and D. S. Bayard, "Markov Chain Approach to Proba- bilistic Guidance for Swarms of Autonomous Agents," Asian Journal of Control, vol. 17, no. 4, pp. 1105 -- 1124, 2015. [25] I. Chattopadhyay and A. Ray, "Supervised Self-Organization of Homo- geneous Swarms Using Ergodic Projections of Markov Chains," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 39, no. 6, pp. 1505 -- 1515, 2009. [26] N. Demir and B. Acikmese, "Probabilistic Density Control for Swarm of Decentralized ON-OFF Agents with Safety Constraints," in American Control Conference, Chicago, IL, USA, 2015, pp. 5238 -- 5244. [27] S. Berman, A. Halasz, M. A. Hsieh, and V. Kumar, "Optimized Stochastic Policies for Task Allocation in Swarms of Robots," IEEE Transactions on Robotics, vol. 25, no. 4, pp. 927 -- 937, 2009. [28] A. Halasz, M. A. Hsieh, S. Berman, and V. Kumar, "Dynamic Redis- tribution of a Swarm of Robots among Multiple Sites," in IEEE/RSJ International Conference on Intelligent Robots and Systems, San Diego, CA, USA, 2007, pp. 2320 -- 2325. [29] M. A. Hsieh, A. Halasz, S. Berman, and V. Kumar, "Biologically Inspired Redistribution of a Swarm of Robots among Multiple Sites," Swarm Intelligence, vol. 2, no. 2-4, pp. 121 -- 141, 2008. [30] T. W. Mather and M. A. Hsieh, "Macroscopic Modeling of Stochastic Deployment Policies with Time Delays for Robot Ensembles," The International Journal of Robotics Research, vol. 30, no. 5, pp. 590 -- 600, 2011. [31] A. Prorok, M. A. Hsieh, and V. Kumar, "The Impact of Diversity on Optimal Control Policies for Heterogeneous Robot Swarms," IEEE Transactions on Robotics, vol. 33, no. 2, pp. 346 -- 358, 2017. [32] T. H. Labella, M. Dorigo, and J.-L. Deneubourg, "Division of Labor in a Group of Robots Inspired by Ants' Foraging Behavior," ACM Transactions on Autonomous and Adaptive Systems, vol. 1, no. 1, pp. 4 -- 25, 2006. [33] E. Castello, T. Yamamoto, Y. Nakamura, and H. Ishiguro, "Foraging Op- timization in Swarm Robotic Systems Based on an Adaptive Response Threshold Model," Advanced Robotics, vol. 28, no. 20, pp. 1343 -- 1356, 2014. [34] H. Kurdi, J. How, and G. Bautista, "Bio-Inspired Algorithm for Task Al- location in Multi-UAV Search and Rescue Missions," in AIAA Guidance, Navigation, and Control Conference, San Diego, CA, USA, 2016. [35] W. Liu, A. F. T. Winfield, J. Sa, J. Chen, and L. Dou, "Towards Energy Optimization: Emergent Task Allocation in a Swarm of Foraging Robots," Adaptive Behavior, vol. 15, no. 3, pp. 289 -- 305, 2007. [36] W. Liu and A. F. T. Winfield, "Modeling and Optimization of Adaptive Foraging in Swarm Robotic Systems," The International Journal of Robotics Research, vol. 29, no. 14, pp. 1743 -- 1760, 2010. [37] A. Martinoli, K. Easton, and W. Agassounon, "Modeling Swarm Robotic Systems: a Case Study in Collaborative Distributed Manipulation," The International Journal of Robotics Research, vol. 23, no. 4, pp. 415 -- 436, 2004. [38] K. Lerman, A. Martinoli, and A. Galstyan, "A Review of Probabilistic Macroscopic Models for Swarm Robotic Systems," in Swarm Robotics. Berlin: Springer, 2005, pp. 143 -- 152. [39] N. Correll and A. Martinoli, "System Identification of Self-Organizing Robotic Swarms," in Distributed Autonomous Robotic Systems 7. Tokyo: Springer Japan, 2006, pp. 31 -- 40. [40] A. Prorok, N. Correll, and A. Martinoli, "Multi-level Spatial Modeling for Stochastic Distributed Robotic Systems," The International Journal of Robotics Research, vol. 30, no. 5, pp. 574 -- 589, 2011. [41] A. Kanakia, J. Klingner, and N. Correll, "A Response Threshold Sigmoid Function Model for Swarm Robot Collaboration," Distributed Autonomous Robotic Systems, pp. 193 -- 206, 2016. [42] D. Dimitrov and S. C. Sung, "Top responstiveness and Nash stability in coalition formation games," Kybernetika, vol. 42, no. 4, pp. 453 -- 460, 2006.
1910.11027
2
1910
2019-11-15T15:02:18
Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support
[ "cs.MA", "cs.CY", "eess.SY", "eess.SY" ]
Demand for health care is constantly increasing due to the ongoing demographic change, while at the same time health service providers face difficulties in finding skilled personnel. This creates pressure on health care systems around the world, such that the efficient, nationwide provision of primary health care has become one of society's greatest challenges. Due to the complexity of health care systems, unforeseen future events, and a frequent lack of data, analyzing and optimizing the performance of health care systems means tackling a wicked problem. To support this task for primary care, this paper introduces the hybrid agent-based simulation model SiM-Care. SiM-Care models the interactions of patients and primary care physicians on an individual level. By tracking agent interactions, it enables modelers to assess multiple key indicators such as patient waiting times and physician utilization. Based on these indicators, primary care systems can be assessed and compared. Moreover, changes in the infrastructure, patient behavior, and service design can be directly evaluated. To showcase the opportunities offered by SiM-Care and aid model validation, we present a case study for a primary care system in Germany. Specifically, we investigate the effects of an aging population, a decrease in the number of physicians, as well as the combined effects.
cs.MA
cs
Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support Martin Comis · Catherine Cleophas · Christina Busing Received: date / Accepted: date Abstract Demand for health care is constantly in- creasing due to the ongoing demographic change, while at the same time health service providers face difficulties in finding skilled personnel. This cre- ates pressure on health care systems around the world, such that the efficient, nationwide provision of primary health care has become one of society's greatest challenges. Due to the complexity of health care systems, unforeseen future events, and a fre- quent lack of data, analyzing and optimizing the performance of health care systems means tackling a wicked problem. To support this task for primary care, this paper introduces the hybrid agent-based simulation model SiM-Care. SiM-Care models the interactions of patients and primary care physicians on an individual level. By tracking agent interac- tions, it enables modelers to assess multiple key in- dicators such as patient waiting times and physician utilization. Based on these indicators, primary care systems can be assessed and compared. Moreover, changes in the infrastructure, patient behavior, and service design can be directly evaluated. To show- case the opportunities offered by SiM-Care and aid model validation, we present a case study for a pri- mary care system in Germany. Specifically, we in- This work is supported by the Freigeist-Fellowship of the Volkswagen Stiftung. This work is supported by the German research council (DFG) Research Training Group 2236 UnRAVeL. Christina Busing · Martin Comis () Lehrstuhl II fur Mathematik, RWTH Aachen University, Pontdriesch 10 -- 12, 52062 Aachen, Germany E-mail: {buesing, comis}@math2.rwth-aachen.de Catherine Cleophas Working Group Service Analytics, Christian-Albrechts- Universitat zu Kiel, Westring 425, 24118 Kiel, Germany E-mail: [email protected] vestigate the effects of an aging population, a de- crease in the number of physicians, as well as the combined effects. Keywords Hybrid Simulation · ABM · DES · Primary Care · Decision Support 1 Introduction Health is one of the most important factors for the prosperity and well-being of a society. Therefore, all member states of the World Health Organiza- tion (WHO) made the commitment to ensure ev- eryone's access to health services [21]. The foun- dation of universally accessible health services is usually laid by a primary care system. Following the definition of the American Academy of Family Physicians [6], primary care systems "serve as the patient's first point of entry into the health care sys- tem and the continuing focal point for all needed health services". To that end, they feature a set of primary care physicians (PCPs) who provide "pri- mary care services to a defined population of pa- tients". Such primary care services include "health promotion, disease prevention, health maintenance, counseling, patient education, diagnosis and treat- ment of acute and chronic illnesses". Demographic change poses serious challenges to primary care systems: Medical and technological progress paired with improved living conditions and reduced birth rates lead to a rise in the share of elderly citizens. In the United States, the percent- age of individuals aged 65 and older is predicted to exceed 21% of the total population by 2030 [65]. 2 Martin Comis et al. In Germany, this demographic shift is even more severe with elderly citizens (aged 65 and above) being expected to account for more than 26% of the total population by 2030 [9]. As populations age, their demand for primary care services tends to increase. This is primarily due to the prevalence of chronic illnesses which disproportionately affect older adults [46,4]. On the supply side, primary care physicians are also aging, e.g., 34.1% of all primary care physicians in Germany were 60 years or older by the end of 2017 [2] and thus about to retire. Moreover, fewer medical students are will- ing to practice primary care [46], let alone open a private primary care practice [35]. This leads to re- duced treatment capacities and exacerbates the risk for supply disruptions. In the United States, the "confluence of a rising de- mand for primary care services and a decreasing supply of professionals providing these services" is considered a "crisis in primary care" [46]. In order to manage this crisis, existing primary care systems have to be fundamentally adjusted [53]. Various new concepts and policies to maintain the standard of health care provision are discussed by the statu- tory health insurances, the governments, and the Associations of Statutory Health Insurance Physi- cians [59,46]. However, all such concepts call for validation and evaluation prior to their potentially costly implementation [53]. Naturally, this leads to the pressing question: How can the quality of pri- mary care systems and the effect of changes to them be quantified? In German legislation, this question is answered by the 2012 GKV-Versorgungsstrukturgesetz [24] which defines adequate health care supply on the basis of profession-specific ratios. The law subdi- vides the country into zones and specifies the re- quired population-to-provider ratio for each med- ical specialization. For example, the predefined nominal ratio of primary care physicians is one PCP per 1,671 inhabitants [24, §11(4)]. This base indi- cator can be adjusted to account for a zone's in- dividual demographic and geographic characteris- tics [24, §2]. If the actual ratio of a zone is signif- icantly higher than the nominal ratio, closing prac- tices will not be replaced. If it is significantly lower, new practices are permitted to be opened. Beyond Germany, we can find similar ratio-based measures in other European countries like Bul- garia, Estonia, Italy, and Spain [43]. But also in the United States, the Health Resources and Services Administration (HRSA) defines adequate health care supply based on profession- and region- specific population-to-provider ratios. If the pre- defined population-to-provider ratio (for primary care 3,500 to 1; or 3,000 to 1 for unusually high needs [16]) of a geographic area is exceeded, HRSA designates it a health professional shortage area to which National Health Service Corps personnel is directed with priority. Obviously all ratio-based assessments have several shortcomings: Even after adjustment, population- to-provider ratios can only provide a very rough estimate for the actual demand. Furthermore, ad- justment rules are highly dependent on the defini- tion of the underlying zones or geographic areas. Factors such as the accessibility of practices and the PCP's individual workload are completely ne- glected. Finally, ratio-based assessments cannot ac- count for new health care concepts such as tele- medicine, mobile medical units, or centralized ap- pointment scheduling. To overcome these limitations, a new approach to model dynamic effects in primary care systems is required. However, analyzing and evaluating health care systems is a complex and complicated task due to the large number of involved individuals and uncertain nature of health care processes, e.g., fluctuating demand, arrival time of patients, emer- gency patients, and durations of treatments. To model such "wicked problems" [57], researchers have achieved promising results using agent-based modeling (ABM), which account for individual agents and their interactions on the micro-level. A general introduction to the concept of ABM is pro- vided in [26]. Existing studies implementing ABM have considered diverse social systems. Examples include matters such as tobacco control [55] and educational policy research [47]. But there are also numerous applications of ABM in field of health care [7], e.g., for accountable care organizations [5, 44], for medical workforce forecasting [45], and in epidemiology [52,50]. This paper introduces the hybrid agent-based sim- ulation tool SiM-Care (Simulation Model for pri- mary Care) to model the dynamics of primary care systems. SiM-Care models patients and PCPs on an individual level as illustrated by Figure 1: Patients and primary care physicians are modeled via a geo-social system, in which patients decide whether and where to request an appointment based on their state of health and PCPs handle appoint- ment requests, manage patient admission, and treat patients. By tracking the resulting interactions in Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 3 PCPs Patients Fig. 1 Geo-social system of patients and physicians.1 SiM-Care, planners can identify dependencies of different subproblems, evaluate new planning ap- proaches, and quantify the effects of interventions on the basis of multiple meaningful performance measurements. From empirical data, we develop re- alistic test scenarios including a controllable degree of uncertainty realized via stochastic simulation ex- periments. The main contribution of this paper can be sum- marized as follows: We introduce the simulation model SiM-Care, which provides decision makers with a versatile decision support tool for primary care planning. SiM-Care is very generic and can be easily modified and extended to meet each mod- eler's needs. Patients and physicians are modeled as individuals who follow their own objectives, learn, and adapt. To ensure computational tractability, the model incorporates a global event queue at its core. As such, SiM-Care can be considered an integrated hybrid simulation model that combines paradigms from agent-based modeling and discrete event sim- ulation. Based on empirical data for a German pri- mary care system, we illustrate how scenarios for the simulation model can be generated. Finally, we showcase the opportunities of SiM-Care through a case study. To the best of our knowledge, SiM-Care is the first model of its kind that captures entire pri- mary care system with all physicians and patients as individual agents and allows for the simultane- ous consideration of microsystem improvements as well as macrosystem reforms. 1 Map tiles by Stamen Design, under CC BY 3.0. Data by OpenStreetMap, under ODbL. The remainder of this paper is structured as fol- lows: Section 2 discusses related work on agent- based simulations with a focus on health care ap- plications. Section 3 introduces SiM-Care based on the ODD framework by Grimm et al. [27]. Section 4 presents a case study based on real-world data to aid model validation and showcase how SiM-Care can be applied to support health care planning. Sec- tion 5 discusses the potential applications and entry requirements of SiM-Care. Finally, Section 6 con- cludes and provides directions for future work. 2 Related Work Decision support for health care planning is an area with increasing importance [30]. To analyze health care systems, decision support tools have to deal with the detail complexity that is inherent to the health care sector [23]: Patients schedule appoint- ments based on their preferences and state of health, while PCPs offer appointments and treat patients. Thereby, micro-interactions affect macro-level in- dicators as agents observe, learn and adapt, decide and act, and - as a group - determine the system's behavior [26]. When a system's status depends on such micro-interactions, its behavior becomes diffi- cult to predict and a "wide range of possible out- comes may arise from any policy change" [23]. Simulation modeling can deal with this kind of complexity by "simulating the life histories of in- dividuals and then estimating the population effect from the sum of the individual effects" [23]. As such, simulation models represent a powerful tool to inform policy makers: They can provide valuable insights into the dependencies within health care systems and allow for the prediction of the outcome of a change in strategy ahead of a potentially costly and risky real-world intervention [23,30]. Given these potentials, the use of computer simula- tion to study health care delivery systems has sig- nificantly increased over the recent years [68]. The resulting body of literature on applications of simu- lation in health care is rich and can, from a method- ological point of view, be classified into four main groups [14]: System dynamics [32,11], discrete- event simulations [30,36], agent-based models [7, 64], and hybrid simulations that combine two or more of the former paradigms [13,12]. To catego- rize related work on the study of primary care sys- tems even further, we distinguish in the following models that focus on microsystem improvements and models that aim at macrosystem reforms. PCPsPatients 4 Martin Comis et al. Simulation models aimed at studying microsystem improvements in primary care systems mostly in- clude a detailed model of a single (specific) outpa- tient practice and focus on a predefined subset of potential improvements. Zong et al. [68] present a discrete event simulation for a pediatric clinic at the University of Wisconsin Health. Their model includes a very detailed representation of the se- quential stages during a patient's visit. In a set of "what-if'" scenarios, the authors investigate how the overall performance of the clinic is impacted by different scheduling templates, a change in the medical assistant to physician ratio, and the pairing of resident doctors with clinicians. Shi et al. [62] developed a discrete event simulation model for a primary care clinic of the Department of Vet- eran Affairs. Within the model, the different patient flow routes for appointment patients, walk-ins, and nurse-only patients are distinguished. In a scenario analysis, the authors investigate how the clinic's performance is affected by six distinct factors that include walk-in and no-show rates as well as the double booking of appointments. Cayirli et al. [18] used empirical data collected at a primary care clinic in New York to devise a discrete event simu- lation of a generic single-server primary care prac- tice. The model distinguishes new and returning pa- tients and accounts for walk-ins, no-shows, patient punctuality, and service time variations. In a sim- ulation study, the authors evaluate 42 appointment systems that vary in the implemented sequencing- and appointment rules. A similar discrete event sim- ulation of a generic single-server primary care prac- tice is introduced by Schacht [61]. In his model, all arriving patients have a stochastic willingness to wait and always request an appointment. If the indirect waiting time for this appointment exceeds a patient's willingness to wait, they become walk- ins. The arrival rate of patients depends on the ses- sion, day, and month to model seasonality. In a case study, the author evaluates a class of appoint- ment systems that can account for seasonal varia- tions in demand through reconfigurations. Further simulation models aimed at the study of microsys- tem improvements in primary care practices can be found in [67,51,25]. In contrast to SiM-Care, all of the models above include only one single pri- mary care practice out of the many providers that make up a primary care system. Moreover, all of these models adopt a different approach to the rep- resentation of patients: While SiM-Care models a persistent patient population that is shared by all providers, the previous models perceive patients as non-persistent, i.e., patients are generated as they arrive at the practice and cease to exist as soon as they are discharged. As a result, the previous mod- els cannot account for the effects of individual mi- crosytem improvements on the entire primary care system itself. Simulation models aimed at investigating macrosys- tem reforms of primary care systems mostly include an entire primary care system, however they are usually much more high level. Matchar et al. [48] use the methodology of system dynamics to de- velop a simulation model to aid primary care plan- ning in Singapore. The model captures the causal relationships between the stakeholders' aims and the provision of services in an analytical frame- work. The authors evaluate three policy changes that constitute in reducing the service gap, reduc- ing the out-of-pocket costs, and increasing the num- ber of physicians. Through the use of system dy- namics, the model is much more high level than SiM-Care and does not model patients or physi- cians as individuals. Consequently, the model can- not account for the objectives and satisfaction of in- dividual stakeholders which limits the possibilities for evaluation. Homa et. al [31] present an agent- based model to investigate the paradox of primary care. Their model features patients, PCPs, and spe- cialists as individual agents. Every patient has a health status that changes over time: The contrac- tion of illnesses leads to a (temporary) decrease in the patients' health; the treatment of acute illnesses by PCPs and specialists as well as regular check- ups (performed exclusively by PCPs) lead to an in- crease in the patients' health. Tracking the evolu- tion of the patients' average health status over time, the authors investigate how public health is posi- tively affected by the interplay of different mecha- nisms in primary care. As such, the model of Homa et. al has a different objective than SiM-Care: While Homa et al. investigate the external effects of treat- ments in primary care on the entire health care sys- tem, SiM-Care focuses on the processes within pri- mary care systems. To that end, SiM-Care models the scheduling of appointments, the patients' actual practice visits that result in waiting times through the interaction of patients, and the physicians' treat- ments of patients with variable service times which are not part of the model by Homa et al. To the best of our knowledge, there is no previ- ous work on simulation models for the evaluation of primary care systems that allow for the simulta- neous consideration of microsystem improvements and macrosystem reforms as in SiM-Care. Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 5 3 Simulation Model SiM-Care models the interaction of patients and primary care physicians in a restricted geographical area over a given period of time; compare Figure 1. The model features two types of agents: a popu- lation of potential patients P and a population of primary care physicians G. Every patient ρ ∈ P re- sides at a specific location, belongs to a certain age group, has an individual health status, as well as in- dividual treatment preferences; compare Figure 2. Patients continuously develop acute illnesses that depend on their age and health status and require treatment until they subside. Additionally, patients may suffer from long term chronic illnesses which need to be monitored by a physician on a regular basis. To receive medical attention, patients either schedule an appointment or visit a PCP's practice without prior notice. Thereby, the patients' decision making process depends on their individual prefer- ences and health status which determine the choice of physician, the type of the visit (walk-in/ appoint- ment), as well as the time of the visit. Physicians φ ∈ G practice at a certain location and have weekly opening hours during which they admit patients for treatment; see Figure 2. Moreover, every physician φ ∈ G follows individual strategies that govern how they manage appointments, admit patients, and per- form treatments. As patients and physicians inter- act, they influence each other and adapt by adjust- ing their preferences and strategies. The simulation's purpose is to model trade-offs between the objectives pursued by three stake- holder groups: patients, primary care physicians, and policy makers. These objectives are assumed by the model as follows: While PCPs strive to effi- ciently utilize their time, patients strive for a quick response to their health concerns. Thereby, the model illustrates the trade-off between efficiency and patient-centered care. The objectives pursued by policy makers can range from minimizing the cost of health care to maximizing the degree of patient-centered care. Policy makers are not repre- sented by agents within SiM-Care. Instead, policy decisions set relevant model parameters such as the number of physicians in the area, treatment stan- dards, and the financial reimbursement system. To describe the simulation model in detail, we rely on guidance from the ODD framework de- scribed by Grimm et al. [27]. To concisely high- light the interaction of relevant components in that framework, we order and group the design ques- tions given by this framework as follows: First, Section 3.1 defines the temporal and geographical scales within SiM-Care. Second, Section 3.2 de- scribes the representation of the relevant entities and state variables, including patients and physi- cians with their sensing, predicting, adapting, in- teracting, and learning actions. Third, Section 3.3 provides process overviews and describes matters of scheduling. Fourth, Section 3.4 explains how and where the model captures the uncertain nature of health care systems through stochastic parame- ters. Fifth, Section 3.5 briefly reviews the indica- tors that result from running the simulation and ex- plains their emergent properties. Sixth, Section 3.6 discusses the initialization of a simulation experi- ment. Seventh, Section 3.7 documents the submod- els that implement, e.g., the PCP's strategies to han- dle appointments. Finally, Section 3.8 describes our structural validation as well as our approach to ver- ification taken when implementing the model. 3.1 Simulation Environment SiM-Care's environment entails the geographical and temporal structure as well as policy effects. Within the model, locations (cid:96) ∈ L := [−90,90] × [−180,180] are represented using the geographic coordinates latitude and longitude indicating the north-south and east-west position, respectively. The modeled time period is considered as a con- tinuum structured by points in time and durations. For any time object (point in time or duration) t = (δ,η) ∈ T := N× [0,1), δ ∈ N indicates the day and η ∈ [0,1) =: H specifies the time as an increment of day known as decimal time. That is, we use the same encoding for points in time and durations as context uniquely defines which of the former a time object refers to. For example, (38,0.55) ∈ T corre- sponds to day 38 and 24· 60· 0.55 = 792 minutes, i.e., 1:12 p.m. as a point in time or, analogously, to a duration of 38 days, 13 hours, and 12 minutes. To ease notation, we associate every point in time and duration (δ,η) ∈ T with the non-negative value δ+η∈ R≥0 which yields a bijection between T and R≥0. In addition to the continuous representation of time, we structure each day into a morning and an after- noon session as it is common practice in primary care [40]. Each session λ = (δ,γ) ∈ Λ := N×{0,1} is uniquely defined by a day δ ∈ N and a binary indicator γ ∈ {0,1}. Thereby, the binary indicator γ 6 Martin Comis et al. Patients • location • age class • health status • preferences (cid:8) develop illnesses → request appointments → visit with appointment → vist as walk-ins ↔ adjust preferences and strategies ← assign appointments ← manage admission ← perform treatments Physicians • location • opening hours • strategies Fig. 2 Concept of SiM-Care showing both types of agents with their main attributes as well as interactions between agents. defines whether it is the morning (γ = 0) or the after- noon (γ = 1) session. Sessions reoccur on a weekly basis which yields an equivalence relation ∼ on the set of sessions Λ via (δ1,γ1) ∼ (δ2,γ2) :⇔ δ1 ≡ δ2 mod7 ∧ γ1 = γ2. The resulting equivalence class for a session λ ∈ Λ defined as [λ] := {λ(cid:48) ∈ Λ : λ(cid:48) ∼ λ} contains all ses- sions sharing the same day of the week and time of the day, e.g., all Thursday afternoon sessions. Thus, we can associate the set of all equivalence classes Λ/∼ := {[λ] : λ ∈ Λ} with the 14 sessions of the week, i.e., Monday to Sunday with a respec- tive morning and afternoon session. 3.2 Entities and State Variables Modeled as interacting agents, patients ρ ∈ P and PCPs φ ∈ G are the active entities in the simula- tion. Their interaction is motivated by patients' suf- fering from illnesses and therefore seeking treat- ment with PCPs via appointments or walk-in vis- its. Both patients and PCPs are complex individu- als featuring characteristics that represent entities themselves. Going from simple to more elaborated, we begin by describing the self-containing entities of SiM-Care and end with the description of the agents representing patients and physicians. 3.2.1 Objectives When patients suffer from an acute illness, they want to be treated as soon as possible, ideally by their preferred physician. For the continuous treat- ment of chronic illnesses and the follow-up care of acute illnesses, patients prefer treatment by the same physician through appointments in regular in- tervals. Physicians, on the other hand, aim at effi- ciently utilizing their available time while minimiz- ing overtime. Thus, patients' and physicians' objec- tives are in conflict as it is ineffective for physicians to fully comply with patient demands: To ensure that all short-notice appointment requests can be accommodated, PCPs would have to withhold too much treatment time. Providing follow-up appoint- ments in strict intervals would prevent PCPs from reacting to demand fluctuations. Policy makers, while not explicitly modeled, fol- low a multitude of conflicting objectives. On the one hand, they need to ensure a certain minimum standard in health care quality to guarantee patients are treated when necessary. On the other hand, they cannot afford to subsidize an excessive number of physicians. Thus, policy makers necessarily aim at a trade-off: A purely patient-based system that dis- regards efficiency is likely to turn out to be unaf- fordable, a health system optimized only for effi- ciency might lead to unacceptable waiting and ac- cess times. SiM-Care represents policy decisions through their resulting parameter values, e.g., the number of physicians and their distribution. 3.2.2 Illnesses and Families of Illnesses Illnesses are health concerns that cause discomfort to patients and require treatment. They belong to a certain illness family (e.g. cold or heartburn), have a certain seriousness (e.g. mild or severe), persist over a certain period of time, and require an initial treatment within an acceptable time frame as well as subsequent follow-up visits in regular time inter- vals. In SiM-Care, we formalize illnesses as tuples 7 Unit [days] [days] [days] Type si ∈ [0,1] fi ∈ F di ∈ T ωi ∈ T νi ∈ T Table 1 Attributes of illnesses i ∈ I . Attribute seriousness illness family duration willingness to wait follow-up interval Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support i = (si, fi,di,ωi,νi) ∈ I with attributes as shown in Table 1. Thereby, si ∈ [0,1] defines the seriousness of the illness, fi ∈ F defines the illness family of the illness, and di ∈ T defines the duration of the illness. The parameter ωi ∈ T defines the illness' willingness to wait, which is the patient's maximum accepted waiting time for the initial treatment. The parameter νi ∈ T defines the illness' follow-up in- terval, which specifies the frequency of the required aftercare that follows the initial treatment. When we use this representation to model health concerns that are not strictly illnesses like the need for vac- cination, the characteristics duration and follow-up interval may not apply. In such cases, setting pa- rameter values di = /0 and νi = /0 indicates that the respective characteristic is not applicable for i ∈ I . Table 2 Attributes of families of illnesses f ∈ F . Type Attribute D f : [0,1] → T linear function for expected duration linear function for expected willingness Wf : [0,1] → T Nf : [0,1] → T linear function for follow-up interval κ f ∈ {0,1} chronic attribute Families of illnesses serve as the classification sys- tem of illnesses within SiM-Care. While emerg- ing illnesses vary in their manifestation, families of illnesses define the common constant traits of all illnesses belonging to the same illness family. In our model, the common constant traits of all ill- nesses i ∈ I with seriousness si ∈ [0,1] belong- ing to illness family fi ∈ F are the expected du- ration D fi(si) ∈ T , the expected willingness to wait Wfi(si) ∈ T , and the follow-up interval Nfi(si) ∈ T . The expected duration D fi(si) and expected willing- ness to wait Wfi(si) are exclusively used during the generation of new emerging illnesses and serve as the means for distributions from which we sample each illness' stochastic duration di and stochastic willingness to wait ωi. Thus for all emerged ill- nesses i ∈ I , it generally holds that di (cid:54)= D fi(si) and ωi (cid:54)= Wfi(si). Only the follow-up interval of emerged illnesses i ∈ I derives from the illness family in a deterministic way, i.e., νi = Nfi(si). In order to define the common traits of emerg- ing illnesses, families of illnesses f ∈ F are for- mally specified by three functions: A linear func- tion D f : [0,1] → T that defines the expected dura- tion D f (s) in days for all emerging illnesses with seriousness s ∈ [0,1] that derive from illness family f ∈ F . Moreover, linear functions Wf : [0,1] → T and Nf : [0,1] → T that analogously define the ex- pected willingness to wait in days and follow-up in- terval in days; see Table 2. As above, we indicate the inapplicability of the characteristics duration or follow-up interval to families of illnesses by setting D f = /0 and Nf = /0, respectively. To illustrate the concept of illnesses and families of illnesses, consider the illness family "common cold" with expected illness duration defined by D f (s) = 10s + 3, expected willingness to wait de- fined by Wf (s) = −3s + 3, and follow-up interval defined by Nf (s) = −2s + 7. When a patient de- velops a mild (si = 0.2) "common cold", the ill- ness family "common cold" defines the expected duration, expected willingness to wait, and follow- up interval of the mild cold as D f (si) = 5 days, Wf (si) = 2.4 days, and Nf (si) = 6.6 days. The ac- tual duration and willingness to wait of the devel- oped mild "common cold" are stochastic and vary around their expected counterparts, e.g., di = 5.5 days and ωi = 2.7 days. The illness' follow-up in- terval is deterministic and derives from the illness family via νi = Nfi(si) = 6.6 days. To model chronic health concerns such as diabetes that persist over an extended period of time, a chronic attribute κ f ∈ {0,1} identifies families of chronic illnesses. Thereby, κ f partitions F into the set of acute families of illnesses F act := { f ∈ F : κ f = 0} and the set of chronic families of illnesses F chro := { f ∈ F : κ f = 1}. This directly induces a partition of the set of illnesses I into the set of acute I act and the set of chronic illnesses I chro. Acute illnesses i ∈ I act develop and subside over time and patients can simultaneously suffer from an arbitrary number of acute illnesses I act ⊆ I act. Chronic illnesses ς ∈ I chro are conceived as static by the model -- they neither develop nor heal in the modeled time period. Instead, each patient ρ ∈ P either suffers from exactly one chronic illness ςρ ∈ I chro throughout the modeled time period, ρ = {ςρ} ⊆ I chro, or no chronic illness at i.e., I chro ρ = /0. To distinguish patients suffering all, i.e., I chro from a chronic illness from those who do not, we refer to the former as chronic patients. 8 Table 3 Attributes of age classes a ∈ A. Attribute lin. function exp. annual acute illnesses dev. from exp. illness duration dev. from exp. willingness to wait probability to cancel appointments Type Ia : [0,1] → R≥0 ∆d a > 0 a ≥ 0 ∆ω pa ∈ [0,1] 3.2.3 Appointments Appointments specify the point in time at which the treatment of a specific patient is scheduled to take place. To that end, appointments b ∈ B are defined by the time of the appointment tb ∈ T , the attend- ing primary care physician φb ∈ G, and the patient ρb ∈ P receiving treatment. At any point in time, non-chronic patients can have at most one sched- uled appointment bact ∈ B, called the acute appoint- ment. Acute appointments are intended for the ini- tial treatment of acute illnesses, the follow-up treat- ment of acute illnesses, or both. Chronic patients, may have a regular appointment breg ∈ B to treat their chronic illness in addition to the acute appoint- ment to treat their acute illnesses. While chronic illnesses are only treated during regular appoint- ments, acute illness are treated during any appoint- ment. Thus, all of a patients' acute illnesses I act are treated during every appointment. 3.2.4 Age Classes Age classes group the modeled set of patients and serve the purpose of defining the common charac- teristics of patients within the respective classes. For patients of age class a ∈ A, these characteristics are the deviation from the expected illness duration ∆d a > 0, the deviation from the expected willingness a ≥ 0, the probability to cancel an appoint- to wait ∆ω ment after full recovery pa ∈ [0,1], and the expected number of annual acute illnesses defined through the linear function Ia : [0,1] → R≥0; see Table 3. The deviation from the expected illness duration ∆d a is a multiplicative factor, that determines whether the expected illness duration D fi(si) ∈ T extends a > 1) or shortens (∆d (∆d a < 1) for patients of age class a ∈ A. Analogously, the deviation from the expected willingness to wait ∆ω a , determines how the expected willingness to wait Wfi(si) ∈ T of an illnesses changes for patients of age class a ∈ A. The linear function Ia : [0,1] → R≥0 defines the ex- pected number of annual acute illnesses Ia(c)∈ R≥0 for patients in age class a ∈ A which depends on Martin Comis et al. the patient's individual health condition c ∈ [0,1] which can range from perfectly healthy (c = 0) to extremely delicate (c = 1). 3.2.5 Age Class-Illness Distribution The age class-illness distribution πact : A × F act → [0,1] builds the connection between the set of age classes A and the set of acute families of illnesses F act. To that end, πact defines the expected distri- bution of acute illness families for each age class, i.e., among all developed acute illnesses by patients of age class a ∈ A, a fraction πact(a, fi) ∈ [0,1] is expected to belong to illness family fi ∈ F act. As a result, πact defines a discrete probability distribu- tion on the set of acute families of illnesses F act for fixed age class a ∈ A, i.e., ∑ fi∈F act πact(a, fi) = 1. 3.2.6 Patients Patients are the driving force of the simulation, as their health concerns trigger the events that underly most of the simulation's processes. All non-chronic patients ρ ∈ P are characterized by their geograph- ical location (cid:96) ∈ L, health condition c ∈ [0,1], acute illnesses I act ⊆ I act, age class a ∈ A, acute ap- pointment bact ∈ B, and preferences. While the lo- cation, health condition, and age class of each pa- tient remain constant throughout a simulation ex- periment, a patient's acute illnesses, acute appoint- ment and preferences are variable and change over time. Chronic patients possess all the characteristics of non-chronic patients, but are additionally identi- fied by a constant chronic illness ς ∈ I chro and a variable regular appointment breg ∈ B. Patients' preferences determine when, where and how they pursue treatment. Specifically, each pa- tient considers a set of PCPs G con ⊆ G and never seeks treatment with PCPs outside the considera- tion set. Since continuity in the treatment of chronic illnesses is particularly important, chronic patients select a distinguished family physician φfam ∈ G con with whom all regular appointments breg ∈ B are exclusively arranged. While every patients' consid- eration set G con remains constant throughout the modeled time period, patients reevaluate and vary their family physician. Naturally, patients have per- sonal schedules and cannot attend all weekly ses- sions. Thus, the model assumes that each patient has a constant set of weekly-reoccurring session availabilities given by α: Λ/∼ → {0,1}, where 0 Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 9 ρ encodes unavailability. Finally, patients maintain ρ (φ) ≥ 0 as well individual appointment ratings rapp (φ, [λ]) ≥ 0 as session-specific walk-in ratings rwalk for every weekly session [λ] ∈ Λ/∼ and every con- sidered physician φ ∈ G con. Ratings are the means by which patients express their satisfaction with a physician's services. When- ever a patient seeks consultation, the choice of physician is determined by the patient's current ratings. To that end, ratings incorporate patients' sense of geographic distance, matching of opening hours with availabilities, and previous positive and negative experiences. As patients adjust their rat- ings over time, they adjust their choice of PCP. If a physician is unable to meet an appointment re- quest, incurs excessive waiting time, or rejects pa- tients due to capacity overruns, patients reduce their rating. Positive experiences such as successful ap- pointment arrangements or short waiting times in- crease ratings. In other terms, through their sens- ing of the quality of treatment and the adaptation of their ratings, patients learn about the quality of PCPs throughout the simulation cycle. When patients begin to suffer from a new illness, they always seek treatment. To that end, patients first request an appointment from the set of con- sidered PCPs G con. Appointment requests are one of the ways in which patients and PCPs interact. Patients attempt up to two appointment requests in ρ (φ) ≥ 0 they order of the appointment rating rapp assign to the considered primary care physicians φ ∈ G con. If both requested PCPs fail to offer a fea- sible appointment within the patient's willingness to wait, patients resort to their second way of in- teracting with physicians: They forgo an appoint- ment and visit a PCP as a walk-in patient. The se- lection of the PCP for the walk-in visit is based on the corresponding walk-in rating rwalk (φ, [λ]) of the targeted session λ ∈ Λ. Upon arrival, patients may be rejected by physi- cians due to, e.g., capacity overloads. Following a rejection, patients update their rating of the reject- ing PCP and attempt a new visit as walk-in patient at the then-highest-rated PCP. Rejected patients are flagged as emergencies (ε = 1) for as long as they unsuccessfully continue to seek treatment. In our model, this emergency state does not enforce a par- ticular PCP behavior. Instead, PCPs may include the emergency state in their decision making. Until an illness i ∈ I act subsides, patients continu- ously try to arrange follow-up appointments to the initial treatment with the attending physician in the ρ Table 4 Attributes of (chronic) patients ρ ∈ P . Attribute location health condition age class acute illnesses emergency flag acute appointment considered PCPs availabilities appointment ratings walk-in ratings Domain (cid:96) ∈ L c ∈ [0,1] a ∈ A I act ⊆ I act ε ∈ {0,1} bact ∈ B G con ⊆ G α: Λ/∼ → {0,1} ρ (φ) ≥ 0, ∀φ∈G con rapp (φ, [λ]) ≥ 0, rwalk ρ ∀φ∈G con, ∀[λ]∈Λ/∼ I chro = {ς} ⊆ I chro breg ∈ B φfam ∈ G con chronic illness regular appointment family physician Type constant constant constant variable variable variable constant constant variable variable constant variable variable follow-up interval νi ∈ T . Analogously, chronic pa- tients continuously try to arrange regular appoint- ments with their family physician φfam ∈ G con in the follow-up interval νς ∈ T of their unique chronic illness ς ∈ I chro. Only if the arrangement of a follow-up or regular appointment fails and the after- care of the patients is endangered, do patients seek follow-up treatment as walk-in patients. As a result, a chronic patient's chronic illness ς ∈ I chro can be treated by a physician other than the family physi- cian φfam ∈ G con, but only through a walk-in visit triggered by the unavailability of a regular appoint- ment. In SiM-Care, patients do not directly interact with other patients. However, an indirect form interac- tion emerges as patients compete with each other for timely treatment by their preferred PCP. The attributes shared by all patients as well as the attributes specific to chronic patients are summa- rized in Table 4. 3.2.7 Primary Care Physicians Primary care physicians operate practices featur- ing an uncapacitated waiting room to offer medical services to patients in need. The model character- izes physicians φ ∈ G by their geographic location (cid:96) ∈ L, opening hours, as well as an individual set of strategies to schedule appointments, manage patient admission, and organize treatments. SiM-Care assumes that all physicians operate in clinical sessions. Opening hours for these sessions are weekly-reoccurring and therefore defined over the session of the week via o: Λ/∼ → H × H where H denotes the set of decimal times defined in 10 Martin Comis et al. Section 3.1. Opening hours specify for each session λ∈ Λ the time window o([λ]) := [o([λ]),o([λ])] dur- ing which a physician generally admits patients for treatment. The beginning of session λ = (δ,γ) ∈ Λ is defined as o(λ) := (δ,o([λ]) ∈ T , the session's end as o(λ) := (δ,o([λ]) ∈ T . To encode that a PCP is closed for a weekly session [λ] ∈ Λ/∼, we set o([λ]) = /0. Physicians utilize the first hour after the end of each session as time buffer to compensate for possible delays and walk-in patients. Buffers are considered anticipated working time so that only service time that extends beyond the buffer consti- tutes overtime. Figure 3 provides a schematic visu- alization of a PCP's working day. Primary care physicians implement a set of strate- gies to schedule appointments, decide on patient admissions, and organize the treatment of patients. These strategies govern the physicians' interactions with patients and incorporate all of their sensing, predicting, adapting, and learning. The PCP's appointment scheduling strategy S ∈ S app defines how consultation time is allocated to appointment slots and how the resulting slots are assigned to requesting patients. The feasible set of appointment scheduling strategies S app is defined via the interface shown in Figure 4. That is, ev- ery appointment scheduling strategy S ∈ S app has to provide the functionality to answer appointment re- quests with an appointment suggestion (that can be empty). Thereby, every appointment request speci- fies the requesting patient, earliest possible appoint- ment time, willingness to wait, whether the request is for a regular appointment, and whether patient's availabilities have to be respected. Furthermore, ev- ery appointment scheduling strategy S ∈ S app has to provide the functionality to schedule previously of- fered appointments as well as the functionality to cancel previously scheduled appointments. Finally, every appointment scheduling strategy S ∈ S app has to be able to compute the number of upcoming ap- pointments within a session that are scheduled to take place after specified point in time. The PCP's treatment strategy S ∈ S tmt defines the order of treatment among patients from the wait- ing room. Physicians sense their patients' waiting times as input for their strategy. To account for the observation that physicians consciously or uncon- sciously adjust service times depending on demand [29], treatment policies define when and how physi- cians adjust their consultation speed and thereby service times. The feasible set of treatment strate- gies S tmt is defined via the interface shown in Fig- Table 5 Attributes of PCPs φ ∈ G. Attribute location opening hours appointment scheduling strategy admission strategy treatment strategy Type (cid:96) ∈ L o: Λ/∼ → H × H S ∈ S app S ∈ S adm S ∈ S tmt ure 4. That is, every treatment strategy S ∈ S tmt has to keep track of admitted patients, count the number of waiting patients with and without appointment, and define how the treatment strategy is affected by the beginning of a session. Moreover, every treat- ment strategy S ∈ S tmt has to determine the next pa- tient to be treated (that might not exist) as well as the PCP's current consultation speed which is thor- oughly discussed in Section 3.7.4. The PCP's admission strategy S ∈ S adm determines whether a physician admits or rejects an arriving patient based on the current workload. Admitted patients await their treatment in the physician's waiting room. In SiM-Care, PCPs are required to treat all admitted patients. Thus, physicians under- estimating their workload due to faulty predictions might have to work overtime as they accept too many patients. On the other hand, physicians that overestimate their workload reject too many pa- tients and fail to fully utilize their available time. At the end of every session's buffer, physicians learn by reevaluating their predictions and adapt- ing their admission policy. The feasible set of ad- mission strategies S adm is defined via the interface shown in Figure 4. That is, every admission strategy S ∈ S adm has to be able to decide whether an arriv- ing patient is admitted or not given the PCP's treat- ment and appointment scheduling strategy. More- over, every admission strategy S ∈ S adm has to de- fine the adaptive traits that are performed at the end of every session's buffer and depend on the PCP's treatment strategy. Physicians do not directly interact with other physi- cians. However, an indirect form of interaction emerges as PCPs compete for the patients' favor while striving for optimal utilization. The attributes of PCP's are summarized in Table 5. 3.3 Process Overview and Scheduling Within SiM-Care, the progression of time is mod- eled via the discrete event paradigm. That is time Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 11 Buffer time Closed Service time Idle time Overtime o(λ0) o(λ0) o(λ1) o(λ1) Fig. 3 Schematic representation of a PCP's morning (λ0) and afternoon (λ1) session visualizing service-, idle- and overtime. Working Day I IAppointmentSchedulingStrategy Optional(cid:104)Appointment(cid:105) findAppointment( AppointmentRequest request) void scheduleAppointment(Appointment b) void cancelAppointment(Appointment b) int upcomingAppointmentsAfter(Time t) ITreatmentStrategy I void handleArrival(ArrivalEvent ae) int[] waitingPatients() void sessionStarted() Optional(cid:104)ArrivalEvent(cid:105) getNextPatient() float getConsultationSpeed() IAdmissionStrategy I boolean acceptPatient(IAppointmentSchedulingStrategy as, ITreatmentStrategy ts, ArrivalEvent ae) void adaptStrategy(Session session, ITreatmentStrategy ts) Fig. 4 Interfaces implemented by strategies. is a continuum which is traversed between discrete events at which the system state is updated. The model stores events of the form (t,e) in a sequential queue Q where t ∈ T is the point in time an event of type e ∈ E occurs. Events in Q happen chronologically, i.e., Q = {(t1,e1), . . . , (tn,en)} with ti ≤ ti+1 for 1 ≤ i ≤ n−1. As soon as an event (ti,ei) ∈ Q occurs, the simu- lation advances from time ti−1 to time ti, compare Figure 5. The simulation terminates at a specified point in time T ∈ T , i.e., when the first element (ti,ei) ∈ Q with ti ≥ T occurs. Any event (t,e) ∈ Q can generate new events or delete existing ones. To be introduced or affected by event (t,e) ∈ Q , events (t(cid:48),e(cid:48)) ∈ Q must hap- pen after time t, i.e., we require t(cid:48) > t, so that time progresses in a consistent fashion. By construction, event queue Q never runs empty. Every simulation run follows the structure depicted in Figure 6, chronologically processing the events in Q until time T ∈ T is reached. In this, the spe- cific process depends on the event type e ∈ E. We now describe the different event types. Arrival events are indicated by earv(φ,ρ). As illus- trated in Figure 7(a), they mark the event of patient ρ arriving at physician φ's practice, either for an ap- pointment or as a walk-in. The physician's decision to admit or reject arriving patients depends on φ's admission strategy. Every admitted patient is guar- anteed to receive treatment and enters the physi- cian's waiting room. If the physician is currently idle, this triggers the physician's treatment strategy and treatment commences. Follow-up events are indicated by efol(φ,ρ,i). Some families of illnesses fi ∈ F cannot be treated via a single visit. Instead, the related illnesses i ∈ I re- quire follow-up treatments in intervals defined by the parameter νi (cid:54)= /0. Ensuring continuous follow- up treatments, patients always try to arrange a follow-up appointment immediately after the treat- ment of illnesses requiring follow-up consultation. To account for the fact that no feasible follow-up appointment might be available, SiM-Care gener- ates a follow-up event efol(φ,ρ,i) at time ttreat + νi every time illness i ∈ I with νi (cid:54)= /0 suffered by pa- tient ρ ∈ P is treated by physician φ ∈ G at time ttreat ∈ T . Follow-up events serve as the patient's reminder to actively re-pursue follow-up consulta- tion for illness i after the duration of the follow-up interval. Triggered by a follow-up event efol(φ,ρ,i), patient ρ reattempts to arrange a follow-up appoint- ment with physician φ. Should φ once again be unable to provide a suitable appointment, ρ seeks follow-up consultation as a walk-in patient. Every follow-up treatment of an illness i∈ I invalidates all associated existing follow-up events, as the follow- up interval is reset. Therefore, SiM-Care deletes all existing follow-up events efol(φ,ρ,i) ∈ Q associ- ated with illnesses i ∈ I that were treated during a visit before the new follow-up events are gener- ated. As a result, follow-up events only trigger if an illness has not been treated for the duration of its follow-up interval νi ∈ T . Release events are indicated by erel(φ,ρ). As il- lustrated in Figure 7(b), release events mark the event of physician φ releasing patient ρ after a 12 Martin Comis et al. Q = {(t1,e1), (t2,e2), (t3,e3),(t4,e4), (t5,e5), (t6,e6), (t7,e7)} Past e1 e2 Now e4 e3 t4 −t3 e5 e6 Future e7 Fig. 5 Progression of time induced by the processing of event queue Q via the discrete event paradigm. initialize evaluators initialize agents no warm-up? yes perform warm-up poll first element (t,e) from Q no t < T yes process e poll next element (t,e) from Q evaluate simulation Fig. 6 Structure of simulation run with time horizon T . treatment is performed. Whenever a new treatment begins, the sampled service time determines the time of the subsequent release event erel(φ,ρ). All treated illnesses i ∈ I act without duration (di = /0) are cured through a one-time treatment and thus re- moved from I act. Subsequently, all existing follow- up events corresponding to treated illnesses are deleted and new follow-up events are generated in the previously described manner. The success- ful treatment revokes existing emergency flags, i.e., we set ε = 0. If the patient's chronic illness ς ∈ I was treated, the next recurrent regular appointment breg ∈ B with physician φfam is requested at time ttreat + νς. Then, patients request an acute appoint- ment bact ∈ B with physician φ for the follow- up treatment of the persisting acute illness i∗ = argmini∈I act:νi(cid:54)=/0 νi with smallest follow-up interval. The requested appointments ensure the follow-up treatment of all illnesses suffered by patient ρ and will preempt the previously generated follow-up events. Finally, physicians implement their treat- ment strategy to select the next patient from the waiting room if the latter is non-empty. Otherwise, physicians remains idle until the next arrival event triggers the treatment strategy. As a result of this behavior, physicians are never intentionally idle. Illness events are indicated by eill(ρ). As illustrated in Figure 7(c), they describe that patient ρ starts to suffer from a new acute illness. This means that the model generates a new acute illness i ∈ I act with stochastic qualities that depend on the patient's age and health condition and adds it to their set of ill- nesses I . To treat the emerged illness, patients re- quest an appointment from their preferred physi- cians or, in case this does not succeed, directly visit the preferred physician as a walk-in. As a result, each illness event generates a corresponding arrival event earv(φ,ρ) and adds it to the queue Q . Finally, each illness event generates a future illness event eill(ρ) for patient ρ and adds it to the queue Q to mark the next point in time patient ρ develops an acute illness. Recovery events are indicated by erec(ρ,i). They mark the event of patient ρ recovering from acute illness i ∈ I act. Whenever the model generates a new acute illness i ∈ I act with di (cid:54)= /0, it also gen- erates a corresponding recovery event erec(ρ,i) at time till + di, where till ∈ T is the point in time illness i is developed. Illnesses without duration (di = /0) do not require a recovery event as they are immediately cured through their initial treatment. A recovery event removes illness i from I and deletes any associated follow-up event efol(φ,ρ,i) ∈ Q . If patient ρ does not suffer from acute illnesses fol- lowing the removal of illness i, i.e., I act = /0, the model revokes existing emergency flags by set- ting ε = 0 and assumes that ρ may cancel sched- uled acute appointments. Such cancellations oc- Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 13 yes φ accepts ρ according to admission policy no admit ρ reject ρ φ currently idle? no yes initiate treatment of next patient ρ φ treats illnesses of ρ ρ arranges follow-up ∃ waiting patients? no yes initiate treatment of next patient ρ(cid:48) generate new illness i for ρ yes ∃ appointment satisfying patient ρ's requirements? no make appointment walk-in generate next illness event eill(ρ) (a) (b) (c) Fig. 7 Processing of (a) arrival events earv(φ,ρ), (b) release events erel(φ,ρ), and (c) illness events eill(ρ); ρ ∈ P and φ ∈ G. cur with the patient's age-class-specific probability pa ∈ [0,1] and consequently delete the associated arrival event earv(φ,ρ). As a result, some patients keep their existing acute appointment for a final debriefing. Should patient ρ be currently seeking walk-in treatment due to persisting chronic illness ς ∈ I , this effort is continued. Otherwise, current walk-in attempts are canceled and the associated ar- rival event earv(φ,ρ) is deleted. Open- and close events are indicated by eopn(φ) and eclo(φ), respectively. They mark the beginning and ending (including buffer) of a session λ ∈ Λ op- erated by physician φ. They ensure that treatment strategies become aware of a session's beginning, e.g., to allow for strategies that do not treat early- arriving patients before o(λ), and that overtime is incurred for all treatments performed beyond the anticipated buffer time of λ. 3.4 Modeling Variability SiM-Care relies on stochastic values to both ap- proximate real-world variability and control the frequency of events. This applies to aspects of illnesses as well as to patient arrivals, appoint- ment cancellations and service times. In conse- quence, every simulation experiment includes mul- tiple stochastic repetitions of the modeled time pe- riod, termed simulation runs. When examining sim- ulation output, we account for the resulting variabil- ity through confidence intervals. In the following, we highlight the aspects of the model that are probabilistic rather than determinis- tic and discuss how the distributions underlying the random values are parameterized. Frequency of Acute Illnesses. The occurrence of acute illnesses in SiM-Care is modeled via a Pois- sion process. Patients develop acute illnesses at a frequency that depends on their age and health con- dition. For patients ρ ∈ P of age class a ∈ A with health condition c ∈ [0,1], the expected number of acute illnesses per year is given by the parameter Ia(c). The intensity (or rate) of the Poission proc- cess is thus Ia(c)/364 per day. Moreover, the dura- tion between two consecutive illness events eill(ρ) for patient ρ can be sampled from an exponential distribution with rate Ia(c)/364; see [20, chapter 2]. Type of Acute Illnesses. Whenever an illness event eill(ρ) occurs and patient ρ ∈ P falls ill, the model generates an acute illness i ∈ I act according to the patients' age class a ∈ A and health condition c ∈ [0,1]. The model assumes a probabilistic link between illness family fi ∈ F act and the patient's age class a that is expressed via the age class-illness distribution πact; see Section 3.2.5. To that end, any emerging acute illness of patient ρ is randomly as- signed to an illness family according to the discrete probability distribution f (cid:55)→ πact(a, f ) for f ∈ F act. Qualities of Acute Illnesses. For any new illness i ∈ I act of family fi ∈ F generated through SiM- Care, its seriousness si ∈ [0,1] depends on a tri- angular distribution defined on the closed interval [0,1]. The distribution's mode is the health condi- tion c ∈ [0,1] of the patient ρ ∈ P developing illness Eω a ( fi,si) = 14 Eω a ( fi,si) = 10 Eω a ( fi,si) = 6 Eω a ( fi,si) = 2 14 y t i s n e D 3 0 . 2 0 . 1 0 . 0 0 . 0 10 5 20 Willingness to wait [days] 15 25 Fig. 8 Weibull distributions of ωi ∈ T for different values of patient's age adjusted expected willingness to wait Eω a ( fi,si). a( fi,si) := ∆d a( fi,si))− σ2/2. i. Thus, patients with a bad health condition tend to develop more serious illnesses. The duration di ∈ T of illness i depends on a log- normal distribution. Given i's family of illnesses fi ∈ F , seriousness si ∈ [0,1], and the patient's age class a ∈ A, we define the age-adjusted expected a · D fi(si). duration of illness i as Ed Therefore, SiM-Care samples the illness' duration di from a log-normal distribution with sdlog σ = 0.3 and meanlog µ = log(Ed Patient ρ's willingness to wait for the initial treat- ment of illness i as specified by ωi ∈ T depends on a Weibull distribution. Given i's family of ill- ness fi ∈ F , seriousness si ∈ [0,1], and the devel- oping patient's age class a ∈ A, the age-adjusted expected willingness to wait of illness i is defined a ·Wfi(si). Analogous to Wiesche as Eω et. al [67], we sample ωi from a Weibull distribu- tion with shape parameter p = 2 and derive the scale parameter from the age adjusted expected willing- ness to wait as q = Eω a ( fi,si)/Γ(1 + (1/p)) where Γ denotes the gamma function. Figure 8 visualizes the resulting density functions for various choices of the age-adjusted expected willingness to wait. a ( fi,si) := ∆ω Patient Punctuality. Patients do not always arrive on time for their scheduled appointments b ∈ B. In- stead, SiM-Care allows for patient arrivals to vary around the scheduled time tb ∈ T of the appoint- ment by including an arrival deviation. As sug- gested by Cayirli et al. [18], the arrival devia- tion from tb depends on a normal distribution. We choose a mean arrival deviation of µ = −5 minutes and standard deviation of σ = 6 minutes such that roughly 20% of all patients are expected to arrive late for their appointments which is consistent with the observations reported in [22]. Martin Comis et al. Empirical rates Beta(1.93,2.94) y t i s n e D 5 . 1 0 . 1 5 . 0 0 . 0 0.0 0.2 0.4 0.6 Relative arrival 0.8 1.0 Fig. 9 Histogram and beta distributed maximum-likelihood fit for empirical walk-in arrival rates from [66]. Walk-in Arrivals. Walk-in patients have no pre- specified time at which they are expected to arrive. Instead, SiM-Care defines for every walk-in patient an earliest arrival time a ∈ T as well as a latest arrival time b ∈ T which are both situational and thoroughly discussed in Section 3.7.3. The walk-in patients' actual arrival within the given feasible ar- rival interval [a,b] depends on a beta distribution. Specifically, we fit a beta distribution using maxi- mum likelihood estimation to the empirical arrival rates reported by Shan et al. [66]. As a result, we sample the arrival times of walk-in patients from the interval [a,b] of feasible arrival times according to a beta distribution with shape parameters p = 1.93 and q = 2.94; cf. Figure 9. Service Time. SiM-Care treats the service time per patient, i.e., the duration of treatments, as a random parameter. To sample service times, we collected a set of 21 service times in a local primary care practice. As suggested in literature [67,17], we di- vide the sample into patients with and without ap- pointment and apply a log-normal maximum likeli- hood fit. Histograms of our empirical samples and the resulting distributions for walk-ins and patients with appointment are depicted in Figures 10 and 11. Based on the fitted distributions, we sample the ser- vice times of patients with appointment from a log- normal distribution with meanlog µ = 1.82 and sd- log σ = 0.692 and the service times for walk-in pa- tients from a log-normal distribution with a mean- log µ = 1.254 and sdlog σ = 0.723. As our collected data set does not incorporate transition times, we prolong all sampled service times by one minute. Appointment Cancellations. Patients that recover from all their current acute illnesses, i.e., I act = /0, cancel their existing acute appointment bact ∈ B Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 15 y t i s n e D 5 2 0 . 0 2 0 . 5 1 0 . 0 1 0 . 5 0 0 . 0 0 0 . Empirical data Fitted log-normal meanlog sdlog mean sd median 1.82 0.692 7.843 6.144 6.174 0 5 10 15 Service times [min] 20 Fig. 10 Histogram and log-normal maximum-likelihood fit for empirical service times of patients with appointment. y t i s n e D 5 2 0 . 0 2 0 . 5 1 0 . 0 1 . 0 5 0 . 0 0 0 . 0 Empirical data Fitted log-normal meanlog sdlog mean sd median 1.254 0.723 4.551 3.768 3.505 0 5 10 15 Service times [min] 20 Fig. 11 Histogram and log-normal maximum-likelihood fit for empirical service times of walk-in patients. with the age-class-specific probability pa ∈ [0,1]; compare Section 3.2.4. As long as patients suffer from acute illnesses, they only cancel their acute ap- pointment if they require earlier treatment due to a newly emerged acute illness. All patients that have not canceled their appointment will arrive for it. As chronic illnesses are static within the model, regular appointments are never canceled. 3.5 Emergence and Observation SiM-Care tracks key performance indicators from the point of view of patients, primary care physi- cians, and policy makers. Thereby, it aims to illus- trate the trade-offs between the stakeholders' objec- tives. As these indicators emerge from agent inter- actions based on patients' evolving preferences and physicians' evolving strategies, they are difficult to predict in general. From the patients' point of view, key performance indicators include access time, travel distance, and waiting time. Access time measures the time a pa- tient has to wait for an appointment, i.e, given the earliest acceptable appointment time t ∈ T and the time of the arranged appointment tb ∈ T it is de- fined as ac-time := tb − t. The travel distance mea- sures the one-way distance patient ρ ∈ P has to travel when visiting physician φ ∈ G, i.e., tr-dist := dist((cid:96)ρ, (cid:96)φ), where dist((cid:96)1, (cid:96)2) denotes the driving distance between locations (cid:96)1 ∈ L and (cid:96)2 ∈ L in kilometers. The patient's waiting time measures the time spent on-site before the actual treatment com- mences. For walk-in patients, we define the waiting time for given walk-in arrival tarr ∈ T and treatment commencement ttreat ∈ T as wait-time := ttreat−tarr. For patients with appointment, we define the wait- ing time for given time of the appointment tb ∈ T , patient's arrival at the practice tarr ∈ T , and treatment commencement ttreat ∈ T as wait-time := max{ttreat − max{tb,tarr}, 0}. To evaluate patient's indicators, SiM-Care keeps track of the total access time of arranging acute and regular appointments, the total number of arranged acute and regular ap- pointments, the total number of attended appoint- ments, the total number of walk-in patients, the total distance traveled by patients to access physicians, and the total waiting time for both patients with ap- pointment and walk-ins. From the physicians' point of view, key perfor- mance indicators include the utilization, overtime, number of treatments, and number of rejected pa- tients with and without appointment. A physician's utilization describes the percentage of the available working time spent treating patients, i.e., for a ses- sion λ ∈ Λ with total treatment duration t ∈ T it is defined as util := t/(o(λ)− o(λ) + 1 24 ). Note that our definition of utilization clearly underestimates a physician's actual utilization as we do not account for additional tasks such as reporting, accounting, and answering phone calls that are not modeled in SiM-Care. Overtime describes the physician's working time beyond the anticipated buffer, i.e., if the last patient in session λ ∈ Λ is released at time trel ∈ T it is defined as over := max{trel − o(λ)− 24 , 0}; see Figure 3. To evaluate the physician's in- 1 dicators, SiM-Care collects on physician level the total service time spent treating patients, the total number of performed treatments, the total overtime, and the total number of rejected patients with and without appointment. The total available working time per PCP required to compute the utilization, can be derived from the opening hours o and the modeled time horizon T . 16 add φ to G con else if dist((cid:96)ρ, (cid:96)φ) < 15km then Algorithm 1 Determine patient's considered PCPs. Require: patient ρ ∈ P , set of primary care physicians G 1: set G con = /0 2: for φ ∈ G do 3: 4: 5: 6: 7: 8: end if 9: 10: end for 11: return G con if rand(20) < 1 then add φ to G con end if 3.6 Input, Initialization, and Warm-Up SiM-Care codes a large number of values as flexi- ble parameters. Setting up a simulation experiment requires an input scenario to specify these param- eter values. Each simulation scenario represents a particular setting, in which a specific set of patients interacts with a specific set of physicians under spe- cific circumstances. As part of every simulation scenario, the modeler specifies the families of illness F , the age classes A, the age class-illness distribution πact, and the set of physicians G with all their attributes. The set of patients P is only partially defined through the simulation scenario: Each scenario specifies the total number of chronic and non-chronic patients. Moreover, every patient's location (cid:96) ∈ L, health condition c ∈ [0,1], age class a ∈ A, availabili- ties α: Λ/∼ → {0,1}, and, for chronic patients, a chronic illness ς ∈ I chro are given. The remaining attributes of patients, e.g., ratings and illnesses, are initialized as described below. At initialization, patients do not suffer from acute illnesses, i.e., I act = /0 and are not considered emer- gencies, i.e., ε = 0. Furthermore, all patients are ini- tialized without scheduled appointments, i.e., bact = breg = /0. The consideration set of physicians G con ⊆ G per patient ρ ∈ P is determined according to Al- gorithm 1 where rand(x) for x > 0 denotes a uni- formly distributed float from the half-closed inter- val [0,x). As a result, each patient considers all physicians within a 15km driving radius. Physi- cians outside this radius are considered with a 5% chance as some patients may choose their physician according to criteria other than proximity to their home, e.g., for historical reasons or personal rec- ommendations. To initialize patients' appointment ratings rapp and walk-in ratings rwalk ρ (φ) (φ, [λ]) for every con- ρ Martin Comis et al. sidered physician φ ∈ G con and weekly session [λ] ∈ Λ/∼, we denote the number of matches be- tween the physician's opening hours and patient ρ's availabilities by m(ρ,φ) := {[λ] ∈ Λ/∼ : α([λ])∧ o([λ]) (cid:54)= /0} and the maximal shortest access dis- tance by distmax := maxρ∈P minφ∈G dist((cid:96)ρ, (cid:96)φ). The model then initializes appointment ratings as 3m(ρ,φ)− dist((cid:96)ρ, (cid:96)φ) + rand(2distmax) + 100 0 rapp ρ (φ) = if m(ρ,φ)>0 else. ρ Walk-in ratings rwalk (φ, [λ]) are session specific as immediate care requires physicians to be in service. Thus, sessions in which a physician is closed are not feasible for walk-in visits which is encoded by an empty rating. The model initializes walk-in ratings as rand(distmax) − dist((cid:96)ρ, (cid:96)φ) + 100 if o([λ]) (cid:54)= /0 /0 else. rwalk ρ (φ, [λ]) = From the initialized ratings, SiM-Care subsequently determines the family physician for chronic pa- tients as the physician from the consideration set that has the highest appointment rating, i.e., φfam = argmaxφ∈G con rapp ρ (φ) which completes the setup of all simulation entities. At this point in the initialization process, the global event queue Q is still empty and therefore running a simulation experiment would result in no agent actions. To make physicians take up their work, the model generates open- and close events eopn(φ) and eclo(φ) for every session operated by physician φ ∈ G and adds these to Q . To start the process of patients continuously developing acute illnesses, the model generates an initial illness event eill(ρ) for every patient ρ ∈ P and adds it to Q . Finally, to start the regular treatments of chronic illnesses ς ∈ I chro, an initial follow-up event efol(φfam,ρ,ς) is generated at a randomly chosen point in time within ς's follow-up interval νς ∈ T according to a uni- form distribution and subsequently added to Q . As discussed previously, several aspects of the sim- ulation model rely on emergent values that require a "warm-up" period before producing meaningful results for decision support. Therefore, we precede every simulation experiment with a warm-up dur- ing which patients develop acute illnesses, physi- cians fill their appointment books, and patients ad- just their ratings. The duration of the warm-up and the length of the modeled time horizon are both variable and specified by the modeler through the Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 17 input scenario. Note, that this does not correspond to solely analyzing a steady state, as the agents' emergent interactions can result in the development of meaningful trends in the data. 3.7 Submodels We consider different aspects of SiM-Care that rely on an internal logic as submodels. One of the most basic submodels describes the logic of distances and travel times. More complex exam- ples include the logic underlying patients' behav- ior when requesting appointments and visiting prac- tices as walk-ins, as well as the physician's strate- gies which are submodels by themselves. As SiM- Care allows for modular PCP strategies, we exem- plify each strategy through the specific approach that is used in the case study. Further submodels describe the consequences of rejecting patients, ser- vice time reductions, patients' rating adjustments, patients' choice of their family physician, and treat- ment effects. 3.7.1 Distances and Travel Times SiM-Care does not feature a road network to com- pute travel distances and travel times. Instead, it ap- proximates the driving distance dist: L × L → R between two locations in kilometers using the great circle distance computed through the haversine for- mula with a detour factor of 1.417 as determined by Boscoe et al. [10]. These authors also point out, that driving distances provide good approxima- tions for travel times in minutes, i.e., we compute travel times by assuming a constant driving speed of 60km/h. As a result we define the travel time τ: L × L → T as τ((cid:96)1, (cid:96)2) := dist((cid:96)1,(cid:96)2) 60·24 . 3.7.2 Patients Requesting Appointments Patient agents ρ ∈ P request an appointment with a physician φ ∈ G, by specifying the earliest ac- ceptable appointment time t ∈ T and their willing- ness to wait for this appointment ω ∈ T . As a re- sult, newly-arranged appointments are feasible, if and only if they are scheduled in the time interval [t,t + ω]. The earliest acceptable appointment time t ∈ T de- pends on the request. The initial treatment of acute illnesses i ∈ I act is urgent, so that patients seek to schedule an appointment as soon as possible. Thus, for these initial treatments, the earliest ac- ceptable appointment time is the time of the request treq ∈ T plus a 30 minute buffer (corresponding to 1 48 in decimal time) plus the direct travel time, i.e., t = treq + 1 48 + τ((cid:96)ρ, (cid:96)φ). Follow-up treatments are planned at regular intervals specified by the pa- rameter νi ∈ T . Patients request follow-up appoint- ments in two ways: First, at the very beginning of the follow-up interval as every patient requests a follow-up appointment directly after the treatment of illnesses that require aftercare. Second, at the very end of the follow-up interval (triggered by a follow-up event) in case no feasible appointment was available at the time of the previous treatment. In the latter case, the request is urgent and there- fore the earliest acceptable appointment time is de- fined as above, i.e., t = treq + 1 48 + τ((cid:96)ρ, (cid:96)φ). If the follow-up appointment is requested at the begin- ning of the follow-up interval, the next follow-up appointment for illness i ∈ I should be scheduled after the follow-up interval has passed, i.e., we set t = treq + νi. The willingness to wait ω ∈ T defines the maxi- mum acceptable waiting period between the earli- est appointment time and the actual time of the ap- pointment. As a result, it serves as an upper bound to the patient's access time defined in Section 3.5. Patients' willingness to wait for the initial treatment of acute illness i ∈ I act is illness specific and given by ω = ωi. Analogously, the maximum duration chronic patients are willing to wait for their reg- ular appointment depends on their chronic illness ς ∈ I chro, i.e., ω = ως. If patients request a follow- up appointment for acute illness i ∈ I act, the will- ingness to wait is proportional to the length of the follow-up interval νi ∈ T . To ensure that the follow- up interval is not exceeded by an excessive time span, the willingness to wait for follow-up appoint- ments regarding i∈ I act is ω = νi 5 +1. Finally, emer- gency patients who were denied treatment are ex- ceptionally impatient and their willingness to wait is ω = 0. Algorithm 2 describes how a patient requests an initial appointment for a newly emerged acute illness. First, patients check whether they have a pre-existing appointment within the acceptable time frame. From the patients' point of view, pre- existing appointments are particularly convenient as they require no further actions. Therefore, pa- tients accept pre-existing appointments as feasible, even if they exceed their willingness to wait by up 2 in decimal time); see lines 1− 2. to 12 hours (or 1 18 Martin Comis et al. Algorithm 2 Arranging appointment for acute illness. Require: patient ρ ∈ P , willingness to wait ω ∈ T , earliest 1: if ρ has acute or regular appointment before appointment time t ∈ T time t + ω + 1 return true 2 then cancel acute appointment delete associated arrival event earv(φ,ρ) 2: 3: else 4: 5: 6: end if 7: determine preferred physicians φ1,φ2 ∈ G con such that ρ (φ1) ≥ rapp rapp 8: for j = 1,2 do 9: 10: query φ j for an appointment if physician φi offers appointment within [t,t + ω] ∧ (satisfying ρ's availabilities α∨ ω ≤ 3) then ρ (φ) ∀φ ∈ G con \{φ1,φ2}. ρ (φ2) ≥ rapp accept appointment add earv(φ j,ρ) to Q return true refuse appointment continue else 11: 12: 13: 14: 15: 16: end if 17: 18: end for 19: return false # adapt rapp ρ (φ j) # adapt rapp ρ (φ j) If the patient's existing appointments are infeasible for the newly emerged illness, the existing acute ap- pointment is canceled to make room for a new, ear- lier, acute appointment (compare line 4 and 5). Patients ρ ∈ P request appointments from the two currently highest rated physicians φ1,φ2 ∈ G con in their consideration set (compare line 7). Physicians φ1 and φ2 are queried in order of their rating, i.e., patients first request an appointment with the higher rated PCP φ1 and only resort to φ2 if the request is unsuccessful. When a physician cannot offer a fit- ting slot, patients reduce their rating for the respec- tive PCP. When their willingness to wait is at least 3 days (compare line 10), patients only accept appoint- ments that fit their personal availability α: Λ/∼ → {0,1} (cf. Section 3.2). In case ω ≤ 3, the request is so urgent that patients are always available. If neither φ1 nor φ2 offer a feasible slot, the search for a feasible appointment is deemed unsuccessful and patients resort to a walk-in visit. When patients request follow-up appointments, they mostly follow the steps outlined in Algorithm 2. The main difference concerns the inquiry process (cf. line 7 and 8), as new follow-up appointments are exclusively arranged with the physician that per- formed the previous treatment. Only pre-existing appointments can be used for follow-up visits al- though they are not with the physician that per- formed the previous treatment; compare line 1. If the follow-up appointment request is made at the end of the follow-up interval triggered by a follow- up event, a failure initiates a walk-in attempt to ensure the patient's aftercare. If the follow-up ap- pointment is requested immediately after treatment at the beginning of the follow-up interval, a fail- ure does not lead to a walk-in attempt as the cor- responding follow-up event will eventually lead to a reattempt at arranging a follow-up appointment. Chronic patients' regular appointments are essen- tially follow-up appointments and thus arranged ac- cording to the same logic. The only difference con- cerns the evaluation of pre-existing appointments: As regular appointments are exclusively arranged with the patient's family physician φfam ∈ G con, pre- existing acute appointments are only perceived as feasible if they are with the family physician φfam (cf. line 1 and 2). Infeasible pre-existing acute ap- pointments are not canceled but instead an addi- tional regular appointment is arranged with the fam- ily physician φfam (cf. line 4 and 5). Only if the newly arranged regular appointment is before or at most 12 hours after an existing acute appointment, i.e., tbreg ≤ tbact + 1 2, the latter is canceled as all acute illnesses will be treated at the regular appointment. 3.7.3 Walk-in Decision Making Within SiM-Care, all walk-in visits are preceded by an unsuccessful appointment request. As walk-in visits are per se urgent, the earliest possible time t ∈ T for a walk-in visit of patient ρ ∈ P at physi- cian φ ∈ G con is, analogous to Section 3.7.2, de- fined as the current time tcurr ∈ T plus a 30 minute buffer plus the direct travel time, i.e., t = tcurr + 1 48 + τ((cid:96)ρ, (cid:96)φ). The patients' willing to wait for the walk-in visit is the willingness to wait ω ∈ T of the preceding appointment request. As a result, the pa- tient's walk-in visit takes place in the time interval [t,t + ω], unless this is impossible due to the physi- cians' opening hours. As part of the walk-in decision making, patients de- cide on a physician φ∗ ∈ G con and session λ∗ ∈ Λ for their walk-in visit. To that end, SiM-Care computes all physician-session combinations W ⊆ G con × Λ that fall into the interval [t,t + ω] and thus can be targeted for a walk-in visit. If W = /0, the model gradually increases the willingness to wait ω until W (cid:54)= /0. Patients select the physician-session combination (φ∗,λ∗) ∈ W targeted for their walk-in visit on the Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 19 ρ ρ via (φ, [λ]), basis of their walk-in ratings rwalk (φ∗,λ∗) = argmax(φ,λ)∈W 0.95wt (λ) · rwalk where wt (λ) := o(λ)−t denotes the time difference between the earliest possible walk-in time t ∈ T and the end of session λ ∈ Λ. This takes into ac- count that walk-in patients urgently want to visit a physician by discounting the ratings based on the approximate access time wt (λ) ≥ 0. Note that this discounting model yields undesired results if we al- low for negative ratings, motivating the models lim- itation to non-negative ratings. Given the targeted physician-session combination (φ∗,λ∗) ∈ W for the walk-in visit, the time interval during which the actual visit at φ∗ may take place is defined as follows: The earliest time for walk-in patients to arrive in session λ∗ ∈ Λ is 15 minutes before its beginning o(λ∗) ∈ T , but obviously not before the earliest possible arrival t ∈ T . The lat- est possible arrival in session λ∗ ∈ Λ is its ending o(λ∗) ∈ T , but not after the latest possible arrival t + ω. The resulting time interval for the patient's walk-in arrival is (cid:2)max(o(λ∗)− 1 96 , t), min(o(λ∗),t + ω)(cid:3) . The patient's actual arrival within the feasible time interval is stochastic and sampled according to the distribution specified in Section 3.4. As long as patients actively pursue walk-in treat- ment, they never arrange new appointments. That is if a walk-in patient develops a new acute illness or seeks an immediate follow-up appointment trig- gered by a follow-up event, their need for medical attention is met through the ongoing walk-in visit. 3.7.4 Service Time Reduction Physicians' treatment strategies let them reduce service times to prevent congestion and minimize overtime. Within the model, the service time re- duction operationalizes via a multiplicative factor ζ ∈ [0,1]. Thus, a treatment with an original service time of 10 minutes (sampled from the log-normal distribution described in Section 3.4) takes only 8 minutes when performed by a physician with cur- rent consultation speed ζ = 0.8. When there is no effort to reduce service times, i.e., ζ = 1, the ac- tual services time coincide with the sampled origi- nal service times. Table 6 Adaptation of patient ratings rapp ρ and rwalk ρ . Adjustment Positive Event +5 waiting time < 7min +4 successful arrangement of appointment +3ζ successful treatment as walk-in +2ζ successful treatment with appointment Adjustment Negative Event −10 waiting time > 30min −ω no appointment within willingness available −10 rejected as walk-in −20 rejected with appointment Parameter ω ∈ T describes patient's willingness to wait and ζ ∈ [0,1] the physician's consultation speed. 3.7.5 Consequences from Rejection of Patients ρ or rwalk Whenever a patient visits a physician either with an appointment or as a walk-in, the physician's admis- sion strategy determines whether the patient is ad- mitted or rejected. Following a rejection, patients reduce their personal ratings rapp depend- ρ ing on whether they arrived for an appointment or as a walk-in. As rejected patients have been denied treatment, they are subsequently flagged as emer- gencies, i.e, ε = 1. In order to be treated, rejected patients then start a walk-in attempt with reduced willingness to wait ω = 0, i.e., they visit their pre- ferred physician according to the updated walk-in preferences rwalk in the earliest possible session; compare Section 3.7.3. A patient's emergency flag is only revoked after the next successful treatment or if the patient fully recovers from all acute ill- nesses. ρ 3.7.6 Rating Adjustments Throughout the simulation, patients adjust their rat- ings of physicians according to their experiences via additive factors. To that end, patients increase ratings based on positive experiences and decrease ratings following negative experiences. Thereby, patients with appointment update their appoint- ment ratings rapp ρ while walk-in patients update their walk-in ratings rwalk . Table 6 lists all events that trigger a rating adjustment. ρ In SiM-Care, only the effect of a failed appointment request and the effect of a successful treatment are parameterized. All other event effects are hard- coded to represent the following intuition about patient perceptions: Unanticipated events cause a stronger adjustment, while anticipated events only 20 Martin Comis et al. Algorithm 3 Reevaluation of family physician. Require: chronic patient ρ ∈ P 1: let φ∗ = argmaxφ∈G con rapp ρ (φ) 2: if rapp 3: 4: end if ρ (φ∗) ≥ 1.2· rapp φfam = φ∗ ρ (φfam) then cause a slight adjustment. For example, visiting a physician with an appointment and not being ad- mitted is considered highly unlikely and therefore highly penalized. Furthermore, patients react more strongly to negative experiences, reflecting the so- called negativity bias [8]. When a physician fails to offer a fitting appoint- ment, the negative adjustment depends on the pa- tient's associated willingness to wait ω ∈ T . As ω ≥ 0, the adjustment −ω is always non-positive. When the willingness to wait is high, the expecta- tion of receiving a fitting slot is also high, so that the resulting disappointment leads to a stronger nega- tive adjustment. When physicians reduce their service time as part of their treatment strategy, patients feel rushed. There- fore, the model scales the positive adjustment fol- lowing a successful treatment as dependent on the physician's current consultation speed. For exam- ple, at a consultation speed of ζ = 0.5 a successful treatment with appointment increases rapp only by ρ a value of 0.5· 2 = 1. To ensure the desired behavior of discounting rat- ings as described in Section 3.7.3, we bound all rat- ρ (φ) ≥ ings from below by zero, i.e., we enforce rapp (φ, [λ]) ≥ 0 for all ρ ∈ P , φ ∈ G, [λ] ∈ 0 and rwalk Λ/∼. As a result, negative adjustments have no ef- fect on physicians with a rating of zero. ρ 3.7.7 Family Physician Adjustments Every time chronic patients adjust their appoint- ρ (φ) for any φ ∈ G con, they simul- ment ratings rapp taneously reevaluate their family physician φfam ac- cording to Algorithm 3. Thereby, chronic patients change their family physician when another physi- cian from the consideration set has a rating that is at least 20% higher than the current family physi- cian's rating. 3.7.8 Treatment Effects Physicians treat all of a patient's current acute ill- nesses i ∈ I act during the same appointment. As a result, all scheduled follow-up events efol(φ,ρ,i) for i ∈ I act are deleted. Moreover, all illnesses i ∈ I act that require only a single treatment, as indicated by di = /0, are cured and thus removed from I act. Fi- nally, new follow-up events are scheduled for all illnesses i ∈ I act that still require follow-up consul- tation as indicated by a positive follow-up interval νi > 0. Chronic illnesses are only treated during the recur- rent regular appointments or during walk-in visits triggered by the unavailability of a feasible regu- lar appointment. If ς ∈ I chro is treated, any existing follow-up event efol(φ,ρ,ς) ∈ Q is deleted and re- placed by a new, updated one. Finally, the successful treatment revokes any emer- gency flag the patient may have. 3.7.9 PCP Strategies PCP Strategies determine physicians' decision mak- ing through exchangeable submodels, that are de- fined as part of every scenario. For illustration, we describe the exemplary strategies implemented and evaluated in our case study. Appointment scheduling strategy: Individual-block/ Fixed-interval (IBFI) evenly spaces out appoint- ments throughout each session; see [17,40]. To that end, it divides the opening hours of each session in a 140 day rolling horizon into slots of 15 minutes length. Each slot can accommodate one appoint- ment and slots are offered to patients on a first- come-first-served (FCFS) basis. Thus, no appoint- ments are withheld and every patient is offered the earliest feasible appointment at the time of inquiry. Treatment strategy: Priority first come, first served (PFCFS) is popularly used in studies of health sys- tems [17]. In PFCFS, patients with appointment are prioritized over walk-ins and within their respective groups, patients are served in order of their arrival, i.e., FCFS; compare [56,19]. Patients that arrive be- fore the beginning o(λ) ∈ T of session λ ∈ Λ have to wait and the physician does not start treatments until the session has officially begun. The PCP's standard consultation speed in PFCFS is ζ = 1.0, which is adjusted to ζ = 0.8 whenever more than 3 patients await treatment; compare Section 3.7.4. Admission strategy: Priority threshold (PT) admits patients up to a certain utilization threshold; com- pare [39,54]. PT differentiates between appoint- ment, walk-in, and emergency patients: Emergency Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 21 patients are always admitted, i.e., they have an infi- nite admission threshold. Patients with an appoint- ment in session λ ∈ Λ are admitted as long as their time of arrival tarr ∈ T is before the end of the session's buffer, i.e., tarr ≤ o(λ) + 1 24. Appoint- ment patients that arrive after the session's antic- ipated buffer are rejected. For the admittance of walk-in patients, physicians predict their remain- ing workload by multiplying an expected service time with the number of currently waiting patients and upcoming scheduled appointments. If this esti- mated workload is lower than the remaining dura- tion of the current session including buffer, walk-in patients are admitted, otherwise rejected. The ex- pected service time is initialized to 7 minutes and adjusted at the end of each session as follows: On the one hand, the expected service time is increased by one minute if three or more patients are awaiting treatment at the end of the anticipated buffer. On the other hand, the expected service time is reduced by 20 seconds if the physician is idle at the end of the anticipated buffer although walk-ins were pre- viously rejected. 3.8 Structural Validation and Verification In SiM-Care, validation and verification were car- ried out according to the best practices docu- mented in the literature [41,60]. To ensure that our model implementation is correct (verification), we followed established good programming practices. That is, we used object oriented programming to write modular code. SiM-Care is implemented in Java 8. All random distributions are implemented using the Apache Common Math library [49]. Each module is individually verified through unit testing. Assertions ensure that variables remain within their specifications at runtime. As an additional mean to detect undesired model behavior, SiM-Care can trace the entire simulation process. Traces are spe- cialized logs that contain all information about the model's execution. In SiM-Care, traces are textual and comprehensible to modelers. They enable the tracking of agents through the overall model and contain all the information that would be required to animate the model. Analyzing traces and input output relationships, we performed dynamics tests for multiple simulation scenarios of various sizes with different system set-ups. To ensure that our conceptional model serves as an adequate representation of real primary care sys- tems (validation), we took several measures. With regard to face validity, we presented the concep- tual model to physicians and decision makers from health insurers as well as public authorities. Fur- thermore, SiM-Care builds on data from the liter- ature as well as empirical data collected on-site. Moreover, we visited a primary care practice and in- terviewed staff to capture and understand the daily processes and routines of PCPs. For the specific scenarios featured in the case study, we validated the simulation output with available empirical data. Details on this historical validation can be found in the baseline analysis of the following case study. 4 Case Study To demonstrate the potential of SiM-Care, we present a case study evaluating the effects of changes in the population of a primary care system. Specif- ically, we create a baseline scenario representing a real-world primary care system in the district of Aachen and investigate two possible changes in the primary care system's population from the status quo: On the one hand, a decline in the number of PCPs as a result of a decreasing interest in opening a primary care practice in rural areas; see [35]. On the other hand, an aging of the population causing a shift in the quality and intensity of illnesses and the resulting health care requirements. By considering both of these changes individually and in combi- nation, we create three "what-if" scenarios that we compare to the baseline scenario. Each scenario models a time period of one year pre- ceded by warm-up period. As SiM-Care relies on stochastic values, every simulation experiment in- cludes 20 independent runs. Section 4.1 details how the baseline scenario is derived from empirical data. Section 4.2 documents the analysis and validation of the baseline scenario. Sections 4.3, 4.4, and 4.5 describe how the considered changes in the three "what-if" scenarios are implemented in SiM-Care and subsequently benchmark these against the base- line scenario. 4.1 Baseline Scenario The real-world primary care system that serves as the template for our study comprises three predom- inantly rural municipalities (Roetgen, Simmerath, and Monschau) in western Germany with a total population of approximately 35,000 inhabitants and 22 20 primary care physicians. In order to capture a real-world primary care system in the form of a sim- ulation scenario, empirical data is required. Most of this data is specific to a primary care system or its country of origin such that data collection has to be carried out for each system individually. For the considered primary care system, empirical data concerning the physicians' distribution and open- ing hours was provided by the responsible depart- ment of public health or obtained from the responsi- ble association of statutory health insurance physi- cians [37]. The distribution of patients and their de- mographic composition is available from the na- tional census [33] and official population projec- tions by the federal state [34]. The distribution of illnesses and their characteristics can be estimated from publications of health insurances and federal government agencies [28,58]. All unavailable data was either empirically collected in a primary care practice or, where this was not possible, inferred. In the following, we discuss how the available em- pirical data translates into a simulation scenario. To that end, we detail the input parameter choices, i.e., the modeled physicians, patients, age classes, fami- lies of illnesses, and age class-illness distributions. 4.1.1 Primary Care Physicians The population of primary care physicians G in our baseline scenario aims to model the actual pri- mary care physicians in the considered primary care system. According to data provided by the Aachen department of public health in 2017, there are 20 primary care physicians with health insur- ance accreditation in the three municipalities under consideration. The physicians' exact locations are specified as part of the provided dataset (cf. Fig- ure 12) and the physicians opening hours were ob- tained from the Association of Statutory Health Insurance Physicians Nordrhein [37]. Concerning the employed strategies, all physicians φ ∈ G ap- ply the individual-block/fixed-interval appointment scheduling strategy (IBFI), priority first come, first served treatment strategy (PFCFS), and priority threshold admission strategy (PT); cf. Section 3.7.9. 4.1.2 Patients Martin Comis et al. PCPs Population 0− 20 20− 40 40− 60 60− 80 80− 100 Fig. 12 Locations of PCPs with health insurance accredita- tion and population cells reported by the 2011 census [33] publicly available high resolution population data for the considered region is the German Census conducted in 2011 [33]. At a resolution of 2,754 population cells measuring one hectare each, the 2011 Census reports a total population of 35,542 for the three municipalities Roetgen, Simmerath, and Monschau; compare Figure 12. This population includes children under the age of 16 who are ex- cluded from our considerations, as children mainly consult pediatricians who are not modeled in this study. Census data does not state the exact number of under 16-year-olds in each population cell. In- stead, the Census reports the total number of under 16-year-olds on municipality level: Roetgen 1,390, Simmerath 2,383, and Monschau 1,794. To exclude children under the age of 16, we proceed as fol- lows: First, we fix one adult per population cell as we assume that children under the age of 16 do not live on their own. Then, we sample the num- ber of under 16-year-olds from the remaining pop- ulation of each municipality according to a uniform distribution. Exemplifying this procedure for Roet- gen, the Census reports a total population of 8,288 distributed over 534 population cells. We fix one adult per population cell, and uniformly distribute the 1,390 under 16-year-olds among the 7,754 re- maining inhabitants. Performing this procedure for each municipality individually, we obtain the final patient population P consisting of 29,975 patient agents distributed over 2,754 population cells. The population of patient agents P in the base- line scenario aims to reflect the actual population in the considered primary care system. The latest The age-class independent attributes of each patient agent ρ ∈ P are determined as follows: The location (cid:96) ∈ L for each patient is sampled from the associ- Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 23 ated population cell according to a uniform distribu- tion. Patients' health conditions c ∈ [0,1] are sam- pled from a beta distribution with shape parameters p = q = 25 such that all patients have an expected health condition of E(c) = 0.5. 4.1.3 Age classes SiM-Care accounts for the age dependency of var- ious patient characteristics through the concept of age classes. The baseline scenario differentiates three patient age classes: young (16-24), middle- aged (25-65), and elderly (>65). The characteris- tics of the modeled age classes A are shown in Ta- ble 7. Young patients (16-24) are, on average, the healthiest among all patients. Thus, they are ex- pected to develop the fewest acute illnesses per year from which they recover relatively quickly. Their expected willingness to wait is prolonged and they are very unlikely to visit a PCP unless it is nec- essary. Middle aged patients (25-65) represent the working share of the population and we consider them to be our "nominal" patients. They thus do not deviate from the expected illness duration and the expected willingness to wait as specified by fami- lies of illnesses. On average, middle-aged patients (25-65) develop more acute illnesses per year than young patients (16-24) while keeping slightly more appointments after recovery. Elderly patients (>65) are expected to develop the most annual acute ill- nesses and it takes them more time to recover from these. Their expected willingness to wait is the low- est among all age classes and they are most likely to visit a PCP after all symptoms have subsided. Based on Census data [33], the age class a ∈ A of each patient depends on the discrete probabil- ity distribution shown in Table 8. The age-class de- pendent attributes of each patient agent ρ ∈ P are subsequently determined as follows: Each patient's session availabilities α are determined by perform- ing a Bernoulli trial for every session of the week [λ]∈ Λ/∼ based on the age-class dependent success probabilities from Table 8. To decide whether a pa- tient is chronically ill, we perform a Bernoulli trial using the age class dependent success probabilities from Table 8 that were estimated based on [58]. 4.1.4 Families of Illnesses The most important classification system for ill- nesses world-wide is the International Classifica- tion of Diseases and Related health Problems (ICD) Table 7 Age classes A. exp. illnesses dev. duration dev. willingness prob. cancel 16-24 Ia(c)=6c ∆d a=0.8 ∆ω a =1.2 pa=0.95 25-65 Ia(c)=7c+1 ∆d a=1.0 ∆ω a =1.0 pa=0.8 >65 Ia(c)=9c+1 ∆d a=1.2 ∆ω a =0.8 pa=0.7 Table 8 Age specific parameters for patient generation. age class distribution availability probability chronic illness probability 16-24 0.1196 0.85 0.12 25-65 0.6318 0.55 0.33 >65 0.2486 0.95 0.52 maintained by the World Health Organization. In its current revision, ICD-10 [3] distinguishes more than 14,000 codes. For the purpose of SiM-Care, such a granular illness distinction is generally not necessary. Thus, we can aggregate ICD-10 codes, e.g., using the 22 chapters of ICD-10, or consider- ing only a subset of all ICD-10 codes, e.g., the ones most frequently reported. In the baseline scenario, we consider a subset of the 100 ICD-10 codes most frequently reported to the Association of Statutory Health Insurance Physicians Nordrhein [38]. The attributes of families of illnesses can be estimated based on historical treatment data which is com- monly available to health insurers. Yet, such data is naturally protected by confidentiality and cannot be published. Thus, we choose a less elaborate ap- proach and only estimate all attributes which yields the families of illnesses F listed in Table 9. 4.1.5 Age Class-Illness Distributions Age class-illness distributions define the expected occurrence of acute families of illnesses fi ∈ F act per age class a ∈ A. For this distribution, the base- line scenario relies on the reported incidence rates of 8.2 million customers of a large German health insurer published in [28]. We aggregate this data by gender and age to obtain the age class-illness dis- tribution πact : A ×F act → [0,1] shown in Table 10. Analogously, we determine the expected distribu- tion of chronic families of illnesses F chro among the modeled age-classes A denoted by πchro : A × F chro → [0,1] shown in Table 10. The distribution πchro is not part of the baseline sce- nario itself. Instead, it is only required to gener- ate the unique chronic illness of chronically ill pa- tients. In the baseline scenario, we generate every chronic patient's chronic illness ς ∈ I chro analo- 24 Martin Comis et al. Table 9 Characteristics of considered families of illnesses f ∈ F . ICD I10 E11 I25 E78 M54 Z25 J06 Exp. willingness Wf Name Wf (s) = −10s + 20 high blood pressure Wf (s) = −4s + 14 diabetes ischemic heart disease Wf (s) = −4s + 10 Wf (s) = −5s + 8 high cholesterol level Wf (s) = −3s + 4 back pain Wf (s) = 40 vaccination Wf (s) = −2s + 2 cold Exp. duration D f not applicable not applicable not applicable D f (s) = 4s + 8 D f (s) = 9s + 5 not applicable D f (s) = 5s + 4 Table 10 Age class-illness distributions πact and πchro. high cholesterol level back pain vaccination cold high blood pressure diabetes ischemic heart disease 16-24 0.02 0.32 0.14 0.52 0.17 0.33 0.5 25-65 0.24 0.38 0.14 0.24 0.65 0.16 0.19 >65 0.36 0.28 0.27 0.09 0.61 0.2 0.19 e u l a V d e z i d r a d n a t S Treatment frequency Nf Nf (s) = −20s + 100 Nf (s) = −10s + 90 Nf (s) = −30s + 100 Nf (s) = −2s + 11 Nf (s) = −4s + 11 not applicable Nf (s) = −s + 6 Is chronic true true true false false false false Avg. access time Avg. daily overtime Avg. waiting time walk-in gously to the process of generating acute illnesses as described in Section 3.4: Given the patient's age class a ∈ A, the illness family fς ∈ F chro of ς de- pends on the discrete probability distribution f (cid:55)→ πchro(a, f ) for f ∈ F chro. The seriousness sς ∈ [0,1] of ς is sampled from a triangular distribution us- ing the patient's health condition c ∈ [0,1] as mode. In turn, the seriousness defines ς's treatment fre- quency via νς = Nfς(sς) and willingness to wait as ως = Wfς(sς). 4.1.6 Duration of Warm-up Every run of SiM-Care contains a warm-up pe- riod; compare Section 3.6. To determine an appro- priate length for the warm-up period, we simulate the baseline scenario for a time period of 70 years and track all performance indicator for each year individually. Figure 13 shows the resulting evolu- tion for the average access time of appointments, average daily overtime of physicians, and average waiting time of walk-in patients. As we can see, all performance indicators are evolving in the first 30 to 50 years before they stabilize. Similar behav- iors can be observed for all other measured perfor- mance indicators. Therefore, we set the duration of the warm-up period in each scenario to 60 years. 4.2 Baseline Analysis Table 11 reports the resulting expected key per- formance indicators as well as the associated ex- 0 10 20 30 40 50 60 70 Year Fig. 13 Evolution of performance indicators in the baseline scenario for every year in a 70 year time period. act 95%-confidence intervals for each tracked per- formance indicator; compare Section 3.5. The re- sults show that in the status quo, each physician in our primary care system performs, on average, 10,122.16 treatments per year. This amounts to an average number of 6.75 physician contacts per pa- tient which is slightly above the 6.6 annual PCP contacts reported back in 2006 [1]. Roughly 47% of patients visiting a physician in our baseline sce- nario are walk-in patients, which is consistent with the observed 48% share of walk-ins in our collected empirical dataset of service times; compare Sec- tion 3.4. Concerning overtimes, we were unable to obtain empirical data as most primary care physi- cians are self-employed and even the definition of overtime is unclear. However, the estimated average daily overtime per physician (according to our def- inition) seems to be too low at just 0.8 minutes per day. This can be explained by the fact that we incor- porate buffers at the end of each session and do not include additional mandatory physician's activities such as reporting and accounting into our simula- tion model. Patients in our baseline scenario are expected to travel almost 5km to visit a physician and have to wait an average number of 2.46 days for their ap- pointments. With regard to waiting times, we ob- tain an average expected waiting time of 2.09 min- Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 25 ] 8 7 . 2 3 2 , 0 1 , 4 5 . 1 1 2 , 0 1 [ 6 1 . 2 2 2 , 0 1 ] 5 9 . 9 1 0 , 5 1 , 1 6 . 2 9 9 , 4 1 [ 8 2 . 6 0 0 , 5 1 ] 3 7 . 4 2 4 , 2 1 , 7 8 . 9 9 3 , 2 1 [ t f i h S m r e t - t r o h S s t n e i t a P g n i g A t f i h S m r e t - m u i d e M s P C P n i e n i l c e D t f i h S m r e t - t r o h S s P C P n i e n i l c e D o i r a n e c S e n i l e s a B I - C % 5 9 n a e M I - C % 5 9 n a e M I - C % 5 9 n a e M I - C % 5 9 n a e M ] 2 0 . 2 4 8 , 4 ] 8 5 . 5 9 1 , 3 ] 6 1 . 8 9 1 , 2 , , , 9 7 . 0 2 8 , 4 [ 2 4 . 2 9 1 , 3 [ 5 3 . 5 9 1 , 2 [ 4 . 1 3 8 , 4 4 9 1 , 3 5 7 . 6 9 1 , 2 ] 5 6 . 2 7 , 4 5 . 2 7 [ ] 1 8 . 0 , 3 7 . 0 [ ] 8 1 . 6 1 , 5 9 . 3 1 [ ] 3 5 . 2 ] 3 5 . 1 , , 1 5 . 2 [ 8 4 . 1 [ ] 1 0 . 5 ] 2 1 . 2 , , 0 . 5 [ 1 . 2 [ ] 5 0 . 0 4 ] 1 0 . 1 6 , , 4 7 . 9 3 [ 6 8 . 0 6 [ 6 . 2 7 7 7 . 0 5 . 4 1 2 5 . 2 1 5 . 1 5 1 1 . 2 9 . 9 3 4 9 . 0 6 ] 1 1 . 5 7 3 , 9 ] 9 7 . 7 3 3 , 2 ] 5 2 . 9 1 3 , 3 , , , 7 7 . 7 4 3 , 9 [ 6 6 . 5 2 3 , 2 [ 8 9 . 6 0 3 , 3 [ ] 3 0 . 8 6 3 , 2 9 . 6 4 3 [ ] 9 5 . 8 8 , 4 4 . 8 8 [ ] 7 2 . 0 1 , 9 7 . 9 [ ] 2 1 . 4 ] 9 8 . 1 , , 5 0 . 4 [ 8 7 . 1 [ ] 2 5 . 7 , 5 . 7 [ ] 2 . 2 , 6 1 . 2 [ ] 6 9 . 5 6 ] 6 6 . 8 5 , , 6 5 . 5 6 [ 2 4 . 8 5 [ 1 5 . 8 8 3 0 . 0 1 1 . 7 5 3 9 0 . 4 4 8 . 1 1 5 . 7 8 1 . 2 6 7 . 5 6 4 5 . 8 5 4 4 . 1 6 3 , 9 2 7 . 1 3 3 , 2 2 1 . 3 1 3 , 3 ] 1 8 . 7 4 9 , 6 ] 7 7 . 0 7 7 , 2 ] 5 2 . 4 1 7 , 2 , , , 2 0 . 3 2 9 , 6 [ 8 7 . 2 6 7 , 2 [ 8 9 . 5 0 7 , 2 [ ] 9 7 . 0 8 , 5 6 . 0 8 [ ] 2 0 . 3 , 5 7 . 2 [ ] 2 9 . 2 7 , 1 2 . 7 6 [ ] 4 6 . 1 ] 6 6 . 6 ] 2 . 3 , , , 6 1 . 3 [ 6 5 . 1 [ 5 6 . 6 [ ] 3 2 . 2 , 2 . 2 [ ] 5 6 . 1 5 ] 3 0 . 9 5 , , 6 3 . 1 5 [ 6 8 . 8 5 [ 3 . 2 1 4 , 2 1 2 4 . 5 3 9 , 6 7 7 . 6 6 7 , 2 1 1 . 0 1 7 , 2 2 7 . 0 8 9 8 . 2 6 . 9 6 8 1 . 3 6 . 1 6 6 . 6 2 2 . 2 1 5 . 1 5 4 9 . 8 5 ] 2 2 . 2 3 1 , 0 1 ] 6 4 . 1 4 7 , 4 ] 5 0 . 7 1 2 , 3 , , , 1 . 2 1 1 , 0 1 [ 1 6 . 1 2 7 , 4 [ 4 1 . 4 1 2 , 3 [ ] 7 4 . 6 7 1 , 2 , 6 . 3 7 1 , 2 [ 6 1 . 2 2 1 , 0 1 3 5 . 1 3 7 , 4 9 5 . 5 1 2 , 3 3 0 . 5 7 1 , 2 ] 2 2 . 2 7 , 8 0 . 2 7 [ ] 6 8 . 0 , 4 7 . 0 [ ] 3 5 . 5 1 , 6 1 . 3 1 [ ] 7 4 . 2 ] 1 5 . 1 ] 6 9 . 4 ] 1 . 2 , , , , 5 4 . 2 [ 8 4 . 1 [ 4 9 . 4 [ 8 0 . 2 [ ] 5 8 . 9 3 ] 4 2 . 1 6 , , 4 6 . 9 3 [ 2 0 . 1 6 [ 5 1 . 2 7 8 . 0 5 8 . 3 1 6 4 . 2 9 4 . 1 5 9 . 4 9 0 . 2 5 7 . 9 3 3 1 . 1 6 ] 9 . 3 3 0 , 8 3 1 , 8 . 2 9 6 , 7 3 1 [ 5 3 . 3 6 8 , 7 3 1 ] 7 9 . 0 5 6 , 6 3 1 , 2 1 . 8 4 3 , 6 3 1 [ 5 5 . 9 9 4 , 6 3 1 ] 3 2 . 0 0 7 , 6 3 1 , 7 2 . 4 3 3 , 6 3 1 [ 5 2 . 7 1 5 , 6 3 1 ] 2 5 . 4 2 6 , 6 3 1 , 9 8 . 3 8 2 , 6 3 1 [ 2 . 4 5 4 , 6 3 1 -- -- 6 7 7 , 0 1 7 1 6 , 2 3 -- -- 2 6 6 , 0 1 9 3 1 , 2 2 -- -- 2 6 6 , 0 1 5 5 4 , 6 2 -- -- 2 6 6 , 0 1 7 1 6 , 2 3 t f i h S m r e t - m u i d e M s t c e f f E d e n i b m o C t f i h S m r e t - t r o h S s t c e f f E d e n i b m o C t f i h S m r e t - m u i d e M s t n e i t a P g n i g A I - C % 5 9 E I - C % 5 9 E I - C % 5 9 n a e M ] 8 7 . 5 6 2 , 2 ] 5 3 . 6 9 3 , 3 , , 5 8 . 8 4 2 , 2 [ 7 3 . 9 7 3 , 3 [ ] 9 4 . 5 3 6 , 9 , 2 . 3 1 6 , 9 [ 4 3 . 4 2 6 , 9 2 3 . 7 5 2 , 2 6 8 . 7 8 3 , 3 ] 4 0 . 3 7 0 , 7 ] 1 7 . 8 4 7 , 2 ] 1 7 . 7 3 7 , 2 , , , 4 1 . 5 4 0 , 7 [ 4 2 . 9 3 7 , 2 [ 5 2 . 8 2 7 , 2 [ 9 0 . 9 5 0 , 7 8 9 . 3 4 7 , 2 8 9 . 2 3 7 , 2 ] 6 6 . 0 2 9 , 4 ] 7 1 . 4 6 1 , 3 ] 6 5 . 0 3 2 , 2 , , , 2 6 . 7 9 8 , 4 [ 3 7 . 0 6 1 , 3 [ 9 9 . 6 2 2 , 2 [ ] 5 7 . 0 8 2 , 5 1 , 9 2 . 8 5 2 , 5 1 [ 2 5 . 9 6 2 , 5 1 ] 5 9 . 9 4 5 , 2 1 , 4 1 . 2 2 5 , 2 1 [ 5 0 . 6 3 5 , 2 1 ] 1 9 . 1 1 3 , 0 1 , 2 8 . 8 8 2 , 0 1 [ 7 3 . 0 0 3 , 0 1 ] 3 4 . 9 8 ] 7 5 . 1 1 , , 7 2 . 9 8 [ 8 0 . 1 1 [ ] 2 . 7 3 4 , 1 4 . 1 2 4 [ ] 1 0 . 2 ] 4 5 . 7 ] 6 1 . 2 , , , 8 8 . 1 [ 3 5 . 7 [ 4 1 . 2 [ ] 8 3 . 4 , 3 . 4 [ ] 9 3 . 7 6 , 1 0 . 7 6 [ ] 7 7 . 8 5 , 6 . 8 5 [ 5 3 . 9 8 2 3 . 1 1 9 . 8 2 4 4 3 . 4 4 9 . 1 4 5 . 7 5 1 . 2 2 . 7 6 8 6 . 8 5 ] 2 . 1 8 , 3 0 . 1 8 [ ] 8 0 . 3 , 1 8 . 2 [ ] 2 1 . 9 7 , 1 0 . 2 7 [ ] 2 3 . 3 ] 3 7 . 1 ] 5 7 . 6 ] 2 2 . 2 , , , , 7 2 . 3 [ 3 6 . 1 [ 3 7 . 6 [ 9 1 . 2 [ ] 3 2 . 2 5 ] 7 0 . 9 5 , , 1 9 . 1 5 [ 9 8 . 8 5 [ 1 1 . 1 8 4 9 . 2 5 1 . 5 7 8 6 . 1 4 7 . 6 1 2 . 2 3 . 3 7 0 . 2 5 8 9 . 8 5 ] 3 0 . 3 7 , 8 8 . 2 7 [ ] 6 8 . 0 , 4 7 . 0 [ ] 3 6 . 7 1 , 9 8 . 5 1 [ ] 8 5 . 2 ] 4 5 . 1 ] 5 0 . 5 , , , 7 5 . 2 [ 9 4 . 1 [ 4 0 . 5 [ ] 2 1 . 2 , 1 . 2 [ ] 4 2 . 0 4 ] 3 9 . 0 6 , , 7 9 . 9 3 [ 6 7 . 0 6 [ 4 1 . 9 0 9 , 4 5 4 . 2 6 1 , 3 8 7 . 8 2 2 , 2 5 9 . 2 7 4 . 6 1 8 5 . 2 1 5 . 1 4 0 . 5 1 1 . 2 8 . 0 1 1 . 0 4 5 8 . 0 6 ] 2 2 . 1 0 8 , 8 3 1 , 8 4 . 4 3 5 , 8 3 1 [ 5 8 . 7 6 6 , 8 3 1 ] 2 5 . 2 0 0 , 8 3 1 , 8 . 7 5 6 , 7 3 1 [ 5 1 . 0 3 8 , 7 3 1 ] 6 0 . 1 8 8 , 8 3 1 , 5 5 . 6 1 5 , 8 3 1 [ 8 . 8 9 6 , 8 3 1 -- -- 1 3 9 , 0 1 9 3 1 , 2 2 -- -- 6 7 7 , 0 1 5 5 4 , 6 2 -- -- 1 3 9 , 0 1 7 1 6 , 2 3 ] n i m [ n i - k l a w e m ] n i m [ . t p p a e m i t g n i t i a w i t g n i t i a w ] d [ r a l u g e r ] d [ e m e m i t i t s s e c c a s s e c c a ] m k [ e c n a t s i d s s e c c a s n i - k l a w d e t c e j e r # ] n i m [ . s t p p a d r a d n a t s # . s t p p a r a l u g e r # ] % [ n o i t a z i l i t u e m i t r e v o y l i a d s t n e m t a e r t # s n i - k l a w # . g v a . g v a . g v a . g v a . g v a . g v a . g v a . g v a . g v a . g v a . g v a . g v a ] h [ y t i c a p a c P C P l a t o t ] % [ . s t p p a e m i t - n o s t n e i t a p c i n o r h c s e s s e n l l i e t u c a # # ] n i m [ n i - k l a w e m ] n i m [ . t p p a e m i t i t g n i t i a w g n i t i a w ] d [ r a l u g e r ] d [ e m e m i t i t ] m k [ e c n a t s i d s s e c c a s s e c c a s s e c c a s n i - k l a w d e t c e j e r # ] n i m [ . s t p p a d r a d n a t s # . s t p p a r a l u g e r # ] % e m [ n o i t a z i l i t u i t r e v o y l i a d s t n e m t a e r t # s n i - k l a w # . . . . . . . . . . . . g v a g v a g v a g v a g v a g v a g v a g v a g v a g v a g v a g v a ] h [ y t i c a p a c P C P l a t o t ] % [ . s t p p a e m i t - n o s t n e i t a p c i n o r h c s e s s e n l l i e t u c a # # Table 11 Mean performance indicators and 95%-confidence intervals obtained by repeating each simulation experiment 20 times for each simulation scenario variant. 26 Martin Comis et al. utes for patients with appointment and 39.75 min- utes for walk-in patients. In comparison to the av- erage waiting times observed when recording our service time dataset (4 minutes with appointment, 15 minutes without appointment), our simulated waiting times are strikingly unfavorable for walk- in patients which suggests that physicians avoid ex- cessive waiting times for walk-in patients through more sophisticated treatment strategies, e.g., accu- mulating priority queues [63]. 4.3 Scenario One: Decline in PCPs Scenario one models a decline in the number of pri- mary care physicians for a short- and a medium- term shift in time. To that end, we exclude all pri- mary care physicians from our baseline PCP popu- lation G that reached the statutory retirement age of 65 by this point. Specifically, we consider the year 2023 by which 4 out 20 PCPs will have reached the statutory retirement age as well as the year 2027 by which 7 out 20 PCPs will have reached the statutory retirement age. Assuming that none of the excluded physicians are replaced by a successor, we obtain our decimated population of primary care physi- cians G s for the short-term and G m for the medium- term shift. By replacing the physician population G in our baseline scenario by G s and G m, respectively, we obtain two scenarios variants for scenario one. The patient and physician populations used in each scenario variant are summarized in Table 12. The simulation results for scenario one in Ta- ble 11 show a severe deterioration of all patient and physician indicators compared to the baseline scenario. The physicians' expected workload mea- sured through the average number of treatments in- creases by 23% for the short-term and 48% for the medium-term shift. Due to the increased scarcity of appointments, more and more patients are forced to visit physicians as walk-in patients (56% for short- term and 62% for medium-term shift). The average daily overtime for physicians (that neglects all the physicians' administrative and organizational tasks) increases by 2.09 minutes for the short-term and 9.23 minutes for the medium-term shift. On aver- age, patients wait 29% longer for their appoint- ments in the short-term and even 66% longer in the medium-term shift scenario variant. Similar in- creases can be observed for the patients' average ac- cess distance, which increases by 35% to 6.66km for the short-term and by 51% to 7.51km for the medium-term shift. The average waiting time for Table 12 Populations in each simulation scenario variant. Decl. PCPs Aging Patients Comb. Effects s P patients physicians G s m P m G m m P m G m P G m s P s G s P s G s s = short-term shift, m = medium-term shift. Table 13 Age class distributions for aged patient population. short-term shift medium-term shift 16-24 0.1051 0.1025 25-65 0.6283 0.6033 >65 0.2666 0.2942 patients with appointment is almost unaffected by the decline in the number of physicians, which can be explained by the strict prioritization in PFCFS. The average waiting time for walk-in patients in- creases by 30% for the short-term and 65% for the medium-term shift. 4.4 Scenario Two: Aging Patients Scenario two models the ongoing aging of the pa- tient population for a short- and medium-term shift in time. For this purpose, we adjust the discrete probability distribution determining the patients' age classes to generate two new patient populations. More precisely, we use current population projec- tions [34] for the years 2025 and 2030 to obtain the two adjusted discrete probability distributions for the patients' age classes shown in Table 13. Us- ing these distributions, we generate the aged patient population P s for the short-term and P m for the medium-term shift. By replacing the patient popu- lation P in our baseline scenario by P s and P m, re- spectively, we obtain two scenario variants for sce- nario two; compare Table 12. The simulation results for scenario two (Table 11) paint a similar picture as in scenario one, i.e., the majority of patient and physician indicators deteri- orate, albeit far less severe. As a result of the ag- ing of the patient population, the average number of treatments per physician increases by 1% and 2% for the short-term and medium-term shift, re- spectively. However, in contrast to scenario one, additional treatments distribute more evenly be- tween appointment and walk-in patients and thus the expected ratio of walk-in patients remains al- most unchanged (47% for short-term and 48% for Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 27 medium-term shift). Judging from the almost unaf- fected average overtime, physicians manage to ac- commodate the additional treatments mostly within their regular opening hours. As a result of the in- creased treatment demand, patients wait on average 2% longer for their appointments in the short-term and 5% longer in the medium-term shift scenario variant. Moreover, they are willing to accept 1% (2%) longer average access distances in the short- term (medium-term) shift scenario to receive more timely treatment or avoid longer waiting times. Pa- tient waiting times with appointment are unaffected by the increased patient demand. The average wait- ing times of walk-in patients in the short-term shift scenario variant remain almost unchanged, while they increase by 1% for the medium-term shift. 4.5 Scenario Three: Combined Effects Scenario three models a combined decline in the number of primary care physicians and aging of the patient population for a short- and medium-term shift in time. By replacing both, the patient and the physician population in our baseline scenario with the adjusted patient and physician populations from scenarios one and two, we obtain two scenario vari- ants for scenario three; compare Table 12. Analyzing our simulation results in Table 11 for scenario three, we can confirm that the combined effects of a decline in the number of PCPs and an aging population lead to the greatest deterio- ration of patient and physician indicators among all scenarios. However, the effect of the combined changes compared to the combination of the indi- vidual effects from scenarios one and two varies be- tween indicators: For the average number of treat- ments and the ratio of walk-in patients, the effects of the combined changes correspond to the sum of the effects for the individual changes, e.g., a 24% increase in the average number of treatments in short-term shift variant of scenario three versus a 23% and 1% increase in the respective variants of scenarios one and two. Concerning the physicians' average overtime, we can observe that a combined consideration of both changes has an amplifying ef- fect. For example, in the medium-term shift variants of scenarios one and two the average overtime in- creases by 9.23 and 0 minutes, respectively, while the combined changes in scenario three lead to an increase of 10.52 minutes. Similar amplifying ef- fects can be observed for the patients' average ac- cess time and walk-in waiting time. Considering the patients' average access distance, the combination of both changes leads to different effects in the two scenario variants. In the short-term shift variant, the effect of the combined changes corresponds to the sum of the effects for the individual changes. In the medium-term shift variant, we can observe a slight dampening effect resulting from a combined con- sideration of both changes, i.e., while the individual changes lead to a respective 52% and 2% increase of the expected average access distance, the com- bined effects lead to an increase of 52%. 5 Discussion The aim of SiM-Care is to provide decision mak- ers with a tool to analyze and optimize primary care systems. SiM-Care produces meaningful per- formance indicators that enable a far more detailed assessment of primary care systems compared to the current approaches based on patient-physician ratios. Next to more accurate evaluation of the sta- tus quo, SiM-Care can predict and quantify the in- fluence of policy decisions and changes in the sys- tems population, e.g., an aging of the population or a decline in the number of PCPs as illustrated in Section 4. Thereby, the model can particularly take several system changes into account at the same time which enables the analysis of combined ef- fects. As all components of a simulation scenario can be easily adjusted, this opens up a broad field of potential applications ranging from physicians' location planning to the evaluation of specific PCP strategies, e.g., in the field of appointment schedul- ing. Finally, the modular design of SiM-Care per- spectively allows for easy model extensions, e.g., to model prospective new supply concept such as mobile medical units or telemedicine. The greatest entry requirement to using SiM-Care is the complex and time consuming task of generat- ing and validating the input scenarios. As SiM-Care models each agent individually, it requires detailed empirical data which has to be obtained from var- ious parties or, even worse, could be unavailable. Moreover, some model components such as the ser- vice time distributions are tailored to the German system and thus might have to be adjusted when using SiM-Care to analyze, e.g., a primary care system in the United States. Each of these model changes, potentially change the model's behavior and thus require a new validation process to ensure that insights derived from SiM-Care are viable for the studied primary care system. 28 Martin Comis et al. To help overcoming this entry requirement, we ex- emplified the scenario generation and validation process for a real-world primary care system in Ger- many. Particularly, we detailed the generation pro- cess of all simulation entities and provided avail- able empirical data sources. Although data avail- ability may vary for other primary care systems, this may hint at where the required empirical data can be obtained. We validated our simulation scenario by comparing its output to available empirical data. To show internal validity, we performed 20 indepen- dent runs for each simulation experiment and cap- tured the resulting model variability through confi- dence intervals. However, we need to stress that ad- ditional validation should be performed before ac- tual policy decisions are derived from the presented case study. Such validation measures should partic- ularly include a sensitivity analysis as well as an expert validation which were out of scope for the purpose of this study. In summary, SiM-Care can serve as a versatile de- cision support tool in primary care planning when it is used with adequately validated simulation sce- narios. The process of generating and validating simulation scenarios is both challenging and time- consuming. However, once this process is com- plete, SiM-Care enables a detailed analysis and op- timization of primary care systems that is superior to basic ratio-based approaches. As a final motiva- tion to use SiM-Care, we present a potential real- world use-case from Germany: At the beginning of 2019, the German Bundestag passed the law for faster appointments and better care (TSVG) [15] that increased the minimum weekly opening hours for physicians with statutory health insurance ac- creditation from 20 to 25 hours [15, Art. 15]. The law is controversial, among other things, because there are doubts about the consequences of this pol- icy decision [42]. Using SiM-Care, decision mak- ers could have obtained insights into the effects of increased minimal opening hours from both the pa- tients' and the physicians' perspective before its im- plementation. 6 Conclusion and Further Steps In this paper, we presented the hybrid agent-based simulation model SiM-Care that serves as a deci- sion support tool in primary care. SiM-Care does not hard-code a specific primary care system, but requires an input scenario which encodes the speci- fics of the primary system the modeler wishes to evaluate. The generation of a simulation scenario is non-trivial and we exemplified this process for real- world primary care system in Germany. Based on this scenario, we performed a case study that serves as a proof of concept showcasing the capabilities of SiM-Care. Besides, it exemplifies the complex vali- dation and calibration process that has to be carried out for each simulation scenario individually. Future work will include further effort towards model validation and calibration as well as the implementation model extensions. Currently, ill- ness distributions are considered static by SiM- Care. By modeling dynamic illness distributions, we can make them dependent on seasonality or the patients' previous history of illnesses. In the cur- rent model, the duration of an illnesses is indepen- dent of the actual treatment. Interestingly, the re- sults are convincing even without this causal link. In the future, we want to compare whether imple- menting this link in the conceptual model signif- icantly affects our findings. A similar comparison shall investigate the influence of no show-patients, who introduce unexpected idle time into the physi- cians' schedules and require more sophisticated PCP strategies. Yet other possible model extensions include: Illness specific appointments such that not all acute illnesses are treated during every appoint- ment, intentional physicians' breaks, implementa- tion of additional patient attributes such as gender, and mobile patient agents that move between dif- ferent locations, e.g., their home and work. Finally, we plan to release our implementation of SiM-Care as open source software such that it can be easily accessed, studied, and adapted to the individual re- quirements of all modelers. Acknowledgements During the development of SiM-Care and the simulation scenarios in our case study, we received numerous support that we wish to acknowledge. We thank the city region Aachen and the Actimonda health insurance who provided both data and the decision makers' expertise. We are grateful to all physicians, who provided their perspec- tive and allowed us to collect empirical data in their prac- tices. We appreciate the help of Marcia Ruckbeil who ad- vised us on statistics as well as our (former) students Tabea Krabs, Stephan Marnach, and Mariia Anapolska who con- tributed towards the implementation of the simulation model. Finally, we want to thank Sebastian Rachuba for his helpful remarks on an early version of this manuscript. References 1. Bei Arztbesuchen sind die Deutschen Weltmeister. Arztliche Praxis p. 18 (2006) Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 29 2. Statistische Informationen aus dem Bundesarztregister. Kassenarztliche Bundesvereinigung (2017) 3. World Health Organization : ICD-10 : international sta- tistical classification of diseases and related health prob- lems, 10th revision, 2nd edn. World Health Organiza- tion, Geneva (2004) 4. Alemayehu, B., Warner, K.E.: The lifetime distribu- tion of health care costs. Health Services Research 39(3), 627 -- 642 (2004). DOI 10.1111/j.1475-6773. 2004.00248.x 5. Alibrahim, A., Wu, S.: An agent-based simulation model of patient choice of health care providers in ac- countable care organizations. Health Care Manage- ment Science 21(1), 131 -- 143 (2018). DOI 10.1007/ s10729-014-9279-x 6. American Academy of Family Physicians: Primary care. https://www.aafp.org/about/policies/all/primary- care.html (2019). Accessed: 2019-10-18 7. Barnes, S., Golden, B., Price, S.: Applications of Agent- Based Modeling and Simulation to Healthcare Opera- tions Management, pp. 45 -- 74. Springer New York, New York, NY (2013). DOI 10.1007/978-1-4614-5885-2 3 8. Baumeister, R., Bratslavsky, E., Finkenauer, C., Vohs, K.: Bad is stronger than good. Review of Gen- eral Psychology 5(4), 323 -- 370 (2001). DOI 10.1037/ /1089-2680.5.4.323 9. Bechtold, S., Sommer, B., Potzsch, O., Burg, F.: Bevolkerung im Wandel -- Annahmen und Ergebnisse der 14. koordinierten Bevolkerungsvorausberechnung. Statistisches Bundesamt, Wiesbaden (2019) 10. Boscoe, F.P., Henry, K.A., Zdeb, M.S.: A nationwide comparison of driving distance versus straight-line dis- tance to hospitals. The Professional Geographer 64(2), 188 -- 196 (2012). DOI 10.1080/00330124.2011.583586 11. Brailsford, S.C.: System dynamics: Whats in it for healthcare simulation modelers. In: Proceedings of the 2008 Winter Simulation Conference, pp. 1478 -- 1483 (2008). DOI 10.1109/WSC.2008.4736227 12. Brailsford, S.C., Desai, S.M., Viana, J.: Towards the holy grail: Combining system dynamics and discrete- event simulation in healthcare. In: Proceedings of the 2010 Winter Simulation Conference, pp. 2293 -- 2303 (2010). DOI 10.1109/WSC.2010.5678927 13. Brailsford, S.C., Eldabi, T., Kunc, M., Mustafee, N., Os- orio, A.F.: Hybrid simulation modelling in operational research: A state-of-the-art review. European Journal of Operational Research 278(3), 721 -- 737 (2019). DOI https://doi.org/10.1016/j.ejor.2018.10.025 14. Brailsford, S.C., Harper, P.R., Patel, B., Pitt, M.: An analysis of the academic literature on simulation and modelling in health care. Journal of Simulation 3(3), 130 -- 140 (2009). DOI 10.1057/jos.2009.10 15. Bundestag: Gesetz fur schnellere Termine und bessere Versorgung (Terminservice- und Versorgungsgesetz TSVG). Bundesgesetzblatt 1(18), 646 -- 691 (2019) 16. Bureau of Health Workforce, Health Resources and Ser- vices Administration (HRSA): Designated Health Pro- fessional Shortage Areas Statistics. U.S. Department of Health & Human Services (2019) 17. Cayirli, T., Veral, E.: Outpatient scheduling in health care: A review of literature. Production and Operations Management 12(4), 519 -- 549 (2003). DOI 10.1111/j. 1937-5956.2003.tb00218.x 18. Cayirli, T., Veral, E., Rosen, H.: Designing appointment scheduling systems for ambulatory care services. Health Care Management Science 9(1), 47 -- 58 (2006). DOI 10.1007/s10729-006-6279-5 19. Cox, T.F., Birchall, J.P., Wong, H.: Optimising the queu- ing system for an ear, nose and throat outpatient clinic. Journal of Applied Statistics 12(2), 113 -- 126 (1985). DOI 10.1080/02664768500000017 20. Daley, D., Vere-Jones, D.: An Introduction to the Theory of Point Processes: Volume I: Elementary Theory and Methods, 2 edn. Springer-Verlag New York, New York, NY (2003). DOI 10.1007/b97277 21. Dye, C., Reeder, J.C., Terry, R.F.: Research for univer- sal health coverage. Science Translational Medicine 5(199), 199ed13 (2013). DOI 10.1126/scitranslmed. 3006971 22. Fetter, R.B., Thompson, J.M.D.: Patients' waiting time and doctors' idle time in the outpatient setting. Health services research 1(1), 66 -- 90 (1966) 23. Fone, D., Hollinghurst, S., Temple, J., Round, A., Lester, N., Weightman, A., Roberts, K., Coyle, E., Be- van, G., Palmer, S.: Systematic review of the use and value of computer simulation modelling in population health and health care delivery. Journal of Public Health Medicine 25(4), 325 -- 335 (2003). DOI 10.1093/ pubmed/fdg075 24. Gemeinsamer Bundesausschuss: Bedarfsplanungs- richtlinie. Bundesanzeiger, Bekanntmachung BAnz AT 31.12.20102 B7 (2012) 25. Giachetti, R.E., Centeno, E.A., Centeno, M.A., Sun- daram, R.: Assessing the viability of an open access policy in an outpatient clinic: a discrete-event and con- tinuous simulation modeling approach. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2246 -- 2255 (2005). DOI 10.1109/WSC.2005.1574513 26. Gilbert, N.: Agent-based models. No. 153 in Quantita- tive Applications in the Social Sciences. Sage Publica- tions, Thousand Oaks, CA (2008) 27. Grimm, V., Berger, U., DeAngelis, D.L., Polhill, J.G., Giske, J., Railsback, S.F.: The ODD protocol: A re- view and first update. Ecological Modelling 221(23), 2760 -- 2768 (2010). DOI http://dx.doi.org/10.1016/j. ecolmodel.2010.08.019 28. Grobe, T., Dorning, H., Schwartz, F.: BARMER GEK Arztreport 2011. Asgard-Verlag, St. Augustin (2011) 29. Gupta, D., Denton, B.: Appointment scheduling in health care: Challenges and opportunities. IIE Transactions 40(9), 800 -- 819 (2008). DOI 10.1080/ 07408170802165880 30. Hamrock, E., Paige, K., Parks, J., Scheulen, J., Levin, S.: Discrete event simulation for healthcare organiza- tions: a tool for decision making. Journal of Health- care Management 58(2), 110 -- 124 (2013). DOI 10.1097/ 00115514-201303000-00007 31. Homa, L., Rose, J., Hovmand, P.S., Cherng, S.T., Ri- olo, R.L., Kraus, A., Biswas, A., Burgess, K., Aungst, H., Stange, K.C., Brown, K., Brooks-Terry, M., Dec, E., Jackson, B., Gilliam, J., Kikano, G.E., Reichsman, A., Schaadt, D., Hilfer, J., Ticknor, C., Tyler, C.V., Van Der Meulen, A., Ways, H., Weinberger, R.F., Williams, C.: A participatory model of the paradox of primary care. An- nals of Family Medicine 13(5), 456 -- 465 (2015). DOI 10.1370/afm.1841 32. Homer, J.B., Hirsch, G.B.: System dynamics modeling for public health: background and opportunities. Amer- ican Journal of Public Health 96(3), 452 -- 458 (2006). DOI 10.2105/AJPH.2005.062059 33. Information und Technik Nordrhein-Westfalen: Zensus 2011: Vielfaltiges Deutschland. Statistische Amter des Bundes und der Lander (2016) 30 Martin Comis et al. 34. Information und Technik Nordrhein-Westfalen: Bevolkerungsentwicklung 2018 -- 2060 nach Alters- gruppen am 1. Januar . https://www.it.nrw/node/971/pdf (2019). Accessed: 2019-10-18 35. Jacob, R., Kopp, J., Schultz, S.: Berufsmonitoring Medi- zinstudenten 2014. Kassenarztliche Bundesvereinigung (2015) 36. Jacobson, S.H., Hall, S.N., Swisher, J.R.: Discrete-event simulation of health care systems. In: R.W. Hall (ed.) Patient Flow: Reducing Delay in Healthcare Delivery, International Series in Operations Research & Man- agement Science, vol. 91, pp. 211 -- 252. Springer US, Boston, MA (2006). DOI 10.1007/978-0-387-33636-7 8 37. Kassenartzliche Vereinigung Nordrhein: Suche nach Arzten und Psychotherapeuten in Nordrhein. https://www.kvno.de/20patienten/10arztsuche/. Ac- cessed: 2019-10-18 38. Kassenartzliche Vereinigung Nordrhein: Die 100 haufigsten ICD-10-Schlussel und Kurztexte (nach Fach- gruppen) - 4. Quartal 2018. pp. 1 -- 125 (2018) 39. Kim, S.H., Chan, C.W., Olivares, M., Escobar, G.: ICU Admission Control: An Empirical Study of Capacity Al- location and Its Implication for Patient Outcomes. Man- agement Science 61(1), 19 -- 38 (2015). DOI 10.1287/ mnsc.2014.2057 40. Klassen, K.J., Rohleder, T.R.: Scheduling outpatient ap- pointments in a dynamic environment. Journal of Op- erations Management 14(2), 83 -- 101 (1996). DOI https://doi.org/10.1016/0272-6963(95)00044-5 41. Kleijnen, J.P.: Verification and validation of simulation models. European Journal of Operational Research 82(1), 145 -- 162 (1995). DOI https://doi.org/10.1016/ 0377-2217(94)00016-6 42. Korzilius, H.: Terminservice- und Versorgungsgesetz: Deutsche Bundestag billigt umstrittenes Gesetz. Arzteblatt 116(12), A555 -- A557 (2019) 43. Kringos, D.S., Boerma, W.G., Hutchinson, A., Saltman, R.B.: Building primary care in a changing Europe: case studies. World Health Organization (2015) 44. Liu, P., Wu, S.: An agent-based simulation model to study accountable care organizations. Health Care Man- agement Science 19(1), 89 -- 101 (2016). DOI 10.1007/ s10729-014-9279-x 45. Lopes, M.A., Almeida, ´A.S., Almada-Lobo, B.: Fore- casting the medical workforce: a stochastic agent-based simulation approach. Health Care Management Science 21(1), 52 -- 75 (2018). DOI 10.1007/s10729-016-9379-x 46. Mann, E., Schuetz, B., Rubin-Johnston, E.: Remaking Primary Care. New England Healthcare Institute, Cam- bridge, MA (2010) 47. Maroulis, S., Guimer`a, R., Petry, H., Stringer, M.J., Gomez, L.M., Amaral, L.A.N., Wilensky, U.: Com- plex systems view of educational policy research. Sci- ence 330(6000), 38 -- 39 (2010). DOI 10.1126/science. 1195153 48. Matchar, D.B., Ansah, J.P., Hovmand, P., Bayer, S.: Simulation modeling for primary care planning in sin- gapore. In: Proceedings of the 2016 Winter Simulation Conference, pp. 2123 -- 2134 (2016). DOI 10.1109/WSC. 2016.7822255 49. Math Commons: The apache commons mathematics li- brary. Apache Commons (2016) 51. Oh, H.J.A., Muriel, A., Balasubramanian, H.: A user- friendly excel simulation for scheduling in primary care practices. In: Proceedings of the 2014 Winter Simula- tion Conference, pp. 1177 -- 1185 (2014). DOI 10.1109/ WSC.2014.7019975 52. Patlolla, P., Gunupudi, V., Mikler, A.R., Jacob, R.T.: Agent-based simulation tools in computational epidemi- In: T. Bohme, V.M. Larios Rosillo, H. Unger, ology. H. Unger (eds.) Innovative Internet Community Sys- tems, pp. 212 -- 223. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). DOI 10.1007/11553762 21 53. Pfaff, H., Neugebauer, E., Glaeske, G., Schrappe, M., Rothmund, M., Schwartz, W.: Lehrbuch Versorgungs- forschung: Systematik - Methodik - Anwendung. Schat- tauer, Stuttgart (2017) 54. Qu, X., Peng, Y., Shi, J., LaGanga, L.: An MDP model for walk-in patient admission management in primary care clinics. International Journal of Production Eco- nomics 168, 303 -- 320 (2015). DOI https://doi.org/10. 1016/j.ijpe.2015.06.022 55. Rigotti, N., Wallace, R.: Using agent-based models to address "wicked problems" like tobacco use: A re- port from the institute of medicine. Annals of Inter- nal Medicine 163(6), 469 -- 471 (2015). DOI 10.7326/ M15-1567 56. Rising, E.J., Baron, R., Averill, B.: A systems analy- sis of a university-health-service outpatient clinic. Op- erations Research 21(5), 1030 -- 1047 (1973). DOI 10.1287/opre.21.5.1030 57. Rittel, H.W.J., Webber, M.M.: Dilemmas in a general Policy Sciences 4(2), 155 -- 169 theory of planning. (1973). DOI 10.1007/BF01405730 58. Robert Koch-Institut: Chronisches Kranksein. Fakten- blatt zu GEDA 2012: Ergebnisse der Studie Gesundheit in Deutschland aktuell 2012 pp. 1 -- 4 (2014) 59. Rosenbrock, R., Gerlinger, T.: Gesundheitspolitik. Eine systematische Einfuhrung. Verlag Hans Huber, Bern (2014) 60. Sargent, R.G.: Verification and validation of simulation models. Journal of Simulation 7(1), 12 -- 24 (2013). DOI 10.1057/jos.2012.20 61. Schacht, M.: Improving same-day access in primary care: Optimal reconfiguration of appointment system se- tups. Operations Research for Health Care 18, 119 -- 134 (2018). DOI https://doi.org/10.1016/j.orhc.2017.09.003 62. Shi, J., Peng, Y., Erdem, E.: Simulation analysis on patient visit efficiency of a typical VA primary care clinic with complex characteristics. Simulation Mod- elling Practice and Theory 47, 165 -- 181 (2014). DOI https://doi.org/10.1016/j.simpat.2014.06.003 63. Stanford, D.A., Taylor, P., Ziedins, I.: Waiting time dis- tributions in the accumulating priority queue. Queue- ing Systems 77(3), 297 -- 330 (2014). DOI 10.1007/ s11134-013-9382-6 in 64. Tracy, M., Cerd, M., Keyes, K.M.: Agent-based applica- Annual Review modeling tions of Public Health 39(1), 77 -- 94 (2018). 10.1146/annurev-publhealth-040617-014317 and future directions. health: Current public DOI States Census Na- 65. United tional Tables. https://census.gov/data/tables/2017/demo/popproj/2017- summary-tables.html (2017). Accessed: 2019-10-19 Bureau: Projections Population 2017 50. Meng, Y., Davies, R., Hardy, K., Hawkey, P.: An appli- cation of agent-based simulation to the management of hospital-acquired infection. Journal of Simulation 4(1), 60 -- 67 (2010). DOI 10.1057/jos.2009.17 66. Wang, S., Liu, N., Wan, G.: Managing appointment- based services in the presence of walk-in customers. Management Science, Forthcoming pp. 1 -- 41 (2018). DOI 10.1287/mnsc.2018.3239 Patients, Primary Care, and Policy: Simulation Modeling for Health Care Decision Support 31 67. Wiesche, L., Schacht, M., Werners, B.: Strategies for in- terday appointment scheduling in primary care. Health Care Management Science 20(3), 403 -- 418 (2017). DOI 10.1007/s10729-016-9361-7 68. Zhong, X., Williams, M., Li, J., A. Kraft, S., S. Sleeth, J.: Discrete-event simulation for primary care redesign: Review and a case study. In: H. Yang, E.K. Lee (eds.) Healthcare Analytics: From Data to Knowledge to Healthcare Improvement, pp. 361 -- 388. John Wiley & Sons, Inc., Hoboken, NJ (2016). DOI https://doi.org/ 10.1002/9781118919408.ch12
1901.03258
1
1901
2019-01-10T16:36:22
Sample Greedy Based Task Allocation for Multiple Robot Systems
[ "cs.MA", "cs.RO" ]
This paper addresses the task allocation problem for multi-robot systems. The main issue with the task allocation problem is inherent complexity that makes finding an optimal solution within a reasonable time almost impossible. To hand the issue, this paper develops a task allocation algorithm that can be decentralised by leveraging the submodularity concepts and sampling process. The theoretical analysis reveals that the proposed algorithm can provide approximation guarantee of $1/2$ for the monotone submodular case and $1/4$ for the non-monotone submodular case in average sense with polynomial time complexity. To examine the performance of the proposed algorithm and validate the theoretical analysis results, we design a task allocation problem and perform numerical simulations. The simulation results confirm that the proposed algorithm achieves solution quality, which is comparable to a state-of-the-art algorithm in the monotone case, and much better quality in the non-monotone case with significantly less computational complexity.
cs.MA
cs
JOURNAL OF LATEX CLASS FILES 1 Sample Greedy Based Task Allocation for Multiple Robot Systems Hyo-Sang Shin*, Teng Li and Pau Segui-Gasco Abstract This paper addresses the task allocation problem for multi-robot systems. The main issue with the task allocation problem is inherent complexity that makes finding an optimal solution within a reasonable time almost impossible. To hand the issue, this paper develops a task allocation algorithm that can be decentralised by leveraging the submodularity concepts and sampling process. The theoretical analysis reveals that the proposed algorithm can provide approximation guarantee of 1/2 for the monotone submodular case and 1/4 for the non-monotone submodular case in average sense with polynomial time complexity. To examine the performance of the proposed algorithm and validate the theoretical analysis results, we design a task allocation problem and perform numerical simulations. The simulation results confirm that the proposed algorithm achieves solution quality, which is comparable to a state-of-the-art algorithm in the monotone case, and much better quality in the non-monotone case with significantly less computational complexity. Task allocation, Multi-robot system, Approximation guarantee, Submodularity, Sampling greedy Index Terms I. INTRODUCTION Multi-Robot Systems (MRS) have been gaining increasing attention thanks to their ability to coordinate simultaneous or co-operate to achieve common goals. MRS provides some fundamental strengths that could not be achieved with single agent systems, e.g., increased flexibility, enhanced reliability and resilience, simultaneous broad area coverage or capability to operate outside the communication range of base stations. Specific applications under consideration include surveillance and monitoring [1] -- [4], Hyo-Sang Shin, Teng Li and Pau Segui-Gasco are with the School of Aerospace, Transport and Manufacturing, Cranfield University, Cranfield MK43 0AL, UK (email: {h.shin,tengli}@cranfield.ac.uk) *Corresponding author. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 2 border patrol [5] -- [7], police law enforcement [8], [9], forest-fire localisation [10], [11] and precision agriculture [12]. Efficient cooperation of MRS is a vital part for their successful operations and effective assignment, termed as task allocation, of the available resources is the key enabler of such cooperation. This is because the strength of MRS hinges on the distributed nature of the sensing resources available, making the successful assignment of these resources key to maximise its operational advantages. The main issue with the task allocation problem is that it has been proven to be NP-hard in general [13]. This means that task allocation problems require exponential time to be solved optimally, thus require a careful craft of approximation strategies. A key trade-off that must be performed concerns the optimality of the solution versus the computational complexity. There have been extensive studies to handle the NP-hardness issue in task allocation. The represen- tative task allocation algorithms can be generally classified into three categories: exact approach [14] -- [16], heuristic approach [17] -- [19] and approximation approach [20] -- [22]. Exact algorithms find optimal solutions, but they cannot normally guarantee polynomial time complexity. When the problem complexity becomes high or limited time is available for a solution, exact algorithms are often inapplicable. Heuristic algorithm can deliver good feasible solutions with certain convergence speed for the tested objective functions. As a consequence, most of the algorithms presented in this case are heuristic in their nature, see for example [23] for a classic review on market based algorithms, [24] and [13] for recent surveys. The issue with the heuristic approach is that they can guarantee neither optimality, nor the quality of the solution. Approximation algorithms find an approximated solution that balances optimality and the computational complexity. Moreover, they typically provide mathematical guarantee on the quality of solution and computational complexity if the problem satisfies certain conditions, e.g., submodularity condition. Note that some approaches exploit advantages of two or more different types of approaches and hence those are called hybrid approach [25]. Task allocation algorithms under consideration in this paper are the ones that exploit the approximation approach and also that can be leveraged for decentralised task allocation. Note that the centralised solution of the task allocation problem involves having to communicate all the agents and environment data to a centralised entity. This may not be possible in some realistic scenarios because relying on a central entity could remove resilience or the bandwidth to communicate all the information may not be available. Capability to be decentralised can relax such issues and thus enabling decentralisation provides an option that could be beneficial for extending MRS operations in practice. Most of the decentralised task algorithms have taken two qualitatively different approaches. The first approach targets a trivial instance by assuming linearity of the utility function, enabling optimal January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 3 algorithms [26] -- [30]. The second approach is the heuristic approach [31] -- [33]. A great breakthrough was the introduction of a new distinct approach: an algorithm that used non-trivial properties on the objective function to enable decentralised constant-factor approximation algorithms. In [28], Choi et al presented the Consensus-Based Bundle Auction (CBBA) algorithm, which was the first decentralised approximate algorithm that provided a solution guaranteed to be within a constant factor of the optimal. By assuming that the utility functions of the agents are monotone non-decreasing and submodular, whose definitions will be given in Section II, their algorithm is proven to provide a solution with guarantee of at least 50% of the value of the optimal solution. There are deep theoretical reasons behind the choice of submodularity, and they are intimately con- nected with the tractability of the task allocation problem. Note that submodularity means that the marginal value that an agent obtains by executing an extra task diminishes as the tasks that need to be carried out by the agent increases. The formal definition and its meaning will be discussed in detail in Section III. The task allocation problem can be viewed as optimisation of a set function subject to a matroid constraint. Hence, submodularity plays a key role defining the tractability boundaries of the task allocation problem. The matroid constrained optimisation problem is generally NP-Hard and inapproximable [34]. Although it remains NP-hard, the matroid constrained maximisation problem becomes approximable if submodularity is assumed. In the late 1970s, a seminal paper by Nemhauser et. al. [35] proved that the greedy algorithm achieves a 1/2 approximation guarantee with monotone submodular functions. This factor lies at the core of the reason why CBBA provides a constant factor approximation with monotone submodular functions as it is essentially a decentralised implementation of greedy algorithm. Immediate research questions would be whether 1/2 is the best constant factor approximation that can be achieved for the task allocation problem with monotone submodular functions and what about non-monotone submodular functions. Answering these two questions, Segui-Gasco and Shin developed a decentralised task allocation algorithm that can achieve (1 − 1/e − ǫ) approximation guarantee for monotone submodular functions and (1/e−ǫ) for non-monotone submodular functions [36]. The proposed algorithm leveraged a recent breakthrough in submodular optimisation, that is called measured continuous greedy algorithm. This algorithm, which is originally proposed by Feldman et al [37], obtains (1 − 1/e) approximation for matroid-constrained monotone submodular maximisation and a 1/e factor for the non- monotone case. The issue is that the measured greedy algorithm might be computationally too complex to be directly utilised for task allocation. Therefore, Segui-Gasco and Shin [36] developed a smoother version of measured continuous greedy and mitigated the computational complexity issue. Although the smoother version relaxes the computational complexity in orders of magnitude to the original measured continuous greedy, the complexity is still high compared with CBBA and it might be inefficient to be January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 4 used for large scale MRS. This paper aims to develop a decentralised task allocation algorithm that can be implemented in practice for large scale MRS based on submodular maximisation. The main objective is to provide mathematical guarantees on optimality not only for monotone submodular functions, but also for non- monotone ones with light computational complexity. To achieve the main objective, this paper proposes to leverage a sampling process and the main concepts of CBBA. The proposed algorithm is named as DSTA (Decentralised Sample-based Task Allocation). In DSTA, each agent first randomly selects tasks from the ground task set with a probability of p ∈ (0, 0.5]. Then, each agent selects the task that provides the maximum marginal gain only from the task samples, not from all the tasks. Next, all agents agree on one optimal task-agent pair through maximum consensus protocol. The greedy selection process repeats until it reaches certain stop criteria. The proposed DSTA algorithm unlocks three types of advantages. First, the algorithm achieves approximation guarantees in expectation for both monotone and non-monotone submodular functions. Second, the computational complexity can be relaxed as the algorithm considers only sampled tasks, not all tasks in the greedy selection phase. Third, DSTA enables the trade-off between the approximation guarantee and computational complexity by adjusting the sampling probability p. The advantages of the proposed algorithm are examined mainly by theoretical analysis. To demonstrate and confirm the analysis results, this paper defines a simple benchmark mission scenario and performs numerical simulations. The benchmark scenario selected is a multi-UAV surveillance mission and two different types of submodular functions to be maximised are defined in the scenario. From the simu- lation results, performance, i.e. optimality and computational complexity, of the proposed algorithm is thoroughly investigated and compared with that of CBBA. The rest of paper is organised as follows. Section II presents some preliminaries and backgrounds which will be essential for algorithm development and analysis. Section III develops a new task allocation algorithm, namely DSTA algorithm, and its analysis is detailed in Section IV. The performance and validity of the analysis results are investigated through numerical simulations in Section V. Section VI offers some conclusions and discusses future research directions. II. PRELIMINARIES This section provides some necessary preliminaries for the development and analysis of the proposed decentralised task allocation algorithm. Following general definition of the task allocation problem from [23], the particular instance of the task allocation problem under consideration in this paper is defined as: January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 5 Definition 1 (Task allocation). Given a set of tasks T , a set of agents A, and a non-negative submodular function for each agent a ∈ A specifying the utility of completing each subset of tasks fa : 2T → R+, find a non-overlapping allocation, S ∗ ∈ AT , that maximises a global objective function F : AT → R+ defined as F(S) =Pa∈A fa(Sa). The utility for each agent a is submodular of which definition given in the following. Definition 2 (Submodularity [38]). Let N be a finite set. A real-valued set function f : 2N → R is submodular if, for all X, Y ⊆ N , f (X) + f (Y ) ≥ f (X ∩ Y ) + f (X ∪ Y ). Equivalently, for all A ⊆ B ⊆ N and u ∈ N \B, f (A ∪ {u}) − f (A) ≥ f (B ∪ {u}) − f (B). (1) (2) Note that the submodular function considered in this paper is normalised (i.e. f (∅) = 0) and non- negative (i.e. f (S) ≥ 0 for all S ⊆ N ). This is because the submodular maximisation problem is inapproximable if the submodular function can take negative values [39]. Submodularity is quite an intuitive notion. It simply requires that the marginal value that an agent obtains by executing an extra task diminishes as the tasks that ought to be carried out by the agent increases. Many engineering problems such as control and estimation problems are not obviously convex; but scientists and engineers have devised useful models to "convexify" the problem, to enable practical algorithms that result in immensely useful applications. Like convexity, we believe that submodularity is a good modelling tool in designing utility functions for the task allocation problem. In our opinion, submodularity could be seen from the same perspective: a useful model that can be leveraged to induce the desired behaviour in MRS. In the machine learning community, there has been a great effort spearheading this idea: finding suitable submodular models to solve inherently discrete tasks, such as summarising documents, scene segmentation, or pattern discovery [40] -- [42]. Task allocation is an inherently discrete problem and thus "submodularising" task allocation problems should yield useful applications of efficient MRS cooperation. Eqn. (2) is known as the diminishing returns which is one of core properties of submodular functions. The diminishing return means that the marginal gain of a given element u will never increase as more elements have already been added into the set S. The range of applications holding this property could be wide [28], e.g. a surveillance mission in which the time that an agent will be able to monitor an additional January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 6 point decreases as a given agent is assigned more points to monitor. of The definition of marginal gain is provided in Definition 3. Definition 3 (Marginal gain [38]). For a set function f : 2N → R, S ⊆ N and u ∈ N , the marginal gain of f at S with respect to u is defined as ∆f (uS) := f (S ∪ {u}) − f (S). (3) As discussed in introduction, developing an algorithm that works with non-monotone submodular utilities could be of significant importance since non-monotonicity is a feature that arises naturally in many practical scenarios. For example, in a multi-robot surveillance mission, if a robot is assigned too many targets to track it is possible that it might end up spending its time travelling between targets and not gathering enough useful information at the targets' locations. Therefore, adding tasks to a robot's assignment could, indeed, reduce the utility obtained. Monotone submodular functions are structurally ill-suited to model such a scenario since, by definition, they do not contemplate a reduction in value due to an excessively large number of tasks. Therefore, this paper considers the submodular function that could be either monotone and non-monotone as described in Definition 1. Definition 4 (Monotonicity [38]). A set function f : 2N → R is monotone if, for every A ⊆ B ⊆ N , f (A) ≤ f (B). And f is non-monotone if it is not monotone. In Definition 1, the non-overlapping allocation implies that one task can be allocated at most to one agent, but one agent can take more than one tasks. Hence, the task allocation problem described in Definition 1 can be reduced to submodular maximisation subject to a partition matroid constraint. The definition of matroid is given in Definition 5. Definition 5 (Matroid [20]). A matroid is a pair M = (N , I) where N is a finite set and I ⊆ 2N is a collection of independent sets, satisfying: • ∅ ∈ I • A ⊆ B, B ∈ I ⇒ A ∈ I • A, B ∈ I, A < B ⇒ ∃ b ∈ B\A such that A ∪ {b} ∈ I Representative matroid constraints are uniform matroid and partition matroid constraints. In the uniform matroid constraint, which is also called cardinality constraint, any subset S ⊆ N satisfying S ≤ k is independent. The partition matroid constraint means that a subset S can contain at most one element from each partition. Therefore, in our task allocation problem, each partition is a set of agent-task pairs January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 7 for each task. The following is an important claim [21] that provides the mathematical foundation for the analysis of the proposed task allocation algorithm, especially for the non-monotone submodular case. Claim 1. Let h : 2N → R≥0 be non-negative and submodular, and let S be a random subset of N where each element appears with probability at most p (not necessarily independently). Then, E[h(S)] ≥ (1 − p)h(∅). III. ALGORITHM This section develops a decentralised task allocation algorithm and provides an equivalent centralised version that will be useful for the theoretical analysis. Algorithm 1 DSTA for Agent a Input: fa : 2T → R≥0, T , p Output: A set Ta ⊆ T 1: Na ← ∅, Ta ← ∅ 2: for j ∈ T do 3: 4: with probability p, Na ← Na ∪ {j} 5: end for 6: while ∃ j ∈ Na such that ∆fa(jTa) > 0 do fa(jTa) a∗ ← M axCons(a, j∗ a, ω∗ a) 7: 8: 9: j∗ a ← arg max j∈Na ω∗ a ← ∆fa(j∗ a∗, j∗ aTa) 10: 11: 12: 13: 14: 15: 16: 17: if a∗ == a then Ta ← Ta ∪ {j∗ a} Na ← Na\{j∗ a} else if j∗ a∗ ∈ Na then Na ← Na\{j∗ a∗ } end if end if 18: end while 19: return Ta The proposed DSTA algorithm is summarised in Algorithm 1. The main proposition in this paper is inclusion of a sampling process at the beginning the algorithm and integrate with the main concepts of CBBA. Therefore, in the proposed algorithm, each agent first randomly samples tasks from the ground task set with a probability p to form its own set of task samples, Na (lines 2 -- 5). Then, each agent selects a task that provides the maximum marginal gain from its own task samples Na using the auction process (line 7) and saves the corresponding marginal gain (line 8). Once each agent selects a task at each step, they communicate agent id, the selected task and the corresponding marginal gain with January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 8 their neighbour agents. Then, they negotiate and agree on one task-agent pair that provides the largest marginal gain through maximum consensus protocol. M axCons(a, j∗ a, ω∗ a) in the line 9 of Algorithm 1 is the max-consensus function, which represents the negotiation among all agents. For the max-consensus, each agent a sends its current best marginal value ω∗ a together with corresponding agent id a and task id j∗ a to neighbour agents. At the same time, each agent receives the same information from all other neighbour agents. After agreeing through max-consensus, the agent of the best agent-task pair adds the corresponding task to its task bundle and remove the task from the task samples (lines 10 -- 12). If any agent includes the task of the best agent-task pair in the task samples, they remove that task from their task samples (lines 14 -- 16). Each agent repeats these procedures until there is no task to be allocated. Remark 1. Thanks to sampling, each agent in DSTA is required to evaluate the function values only for a portion of entire tasks, i.e. only for sampled tasks. This should enable to accelerate task allocation by some degree, which will depend on the sampling probability p. Note that each agent in CBBA first constructs a bundle of tasks such that it optimises the score function, by continuously adding tasks until the algorithm is no longer able to add any other task. The score function considered in CBBA is a monotone submodular function that is a function of the task bundle and the path [28] . Then, CBBA applies a consensus strategy to enable convergence on the list of winding bids and agents. For the consensus strategy, a set of sophisticated decision rules was proposed and the convergence characteristics were analysed. The consensus strategy in [28] allows conflict resolution over all tasks and does not limit the network to a specific structure. Different from CBBA, our proposed algorithm utilises a simple strategy to build a bundle of tasks for each agent: each agent finds one best task and then applies a simple consensus strategy on the best tasks at each step. Following this strategy, all agents agree on one best task-agent pair and only the agent in the best task-agent pair adds the corresponding task to its bundle. By repeating the process until no agent can add anymore task to its bundle, each agent is able to construct individual bundles that are conflict-free. If necessary, the proposed algorithm can also use the same consensus strategy as CBBA. Remark 2. Once the bundles are constructed, CBBA initiates the consensus procedure and it might be able to reduce communication burden. However, the consensus strategy in CBBA could require a high number of function evaluations. Note that if a bundle of an agent includes any of tasks updated during consensus iterations in CBBA, the agent must release all of the tasks that were added to the bundle after the updated task and reconstruct the bundle at each iteration. Reconstructing the bundle requires function evaluations. On the other hand, our strategy and requires the same number of consensus procedures as the number of tasks. However, the strategy is relatively simple and doesn't require the agents to reconstruct January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 9 their task bundles. Consequently, the number of function evaluations in our proposed strategy could be reduced, compared with the consensus strategy in CBBA. Remark 3. Developing a max-consensus protocol is beyond the scope of this study. Hence, a simple max-consensus protocol is utilised for case studies in Section V. There are many max-consensus algo- rithms available in existing literature. Also, the convergence characteristics of such algorithms are well studied, considering various practical aspects of communication, e.g. dynamic network, asynchronous communication, time delay, etc. [43] -- [46]. For the application of the proposed DSTA algorithm, one can select an efficient consensus protocol suitable for the communication network placed. Algorithm 2 A Centralised Version of DSTA Input: fa : 2T → R≥0 ∀a ∈ A, T , p Output: Sets Ta ⊆ T ∀a ∈ A 1: for a ∈ A do 2: 3: 4: 5: 6: Na ← ∅, Ta ← ∅ for j ∈ T do with probability p, Na ← Na ∪ {j} end for 7: end for 8: while ∃ a ∈ A and j ∈ Na such that ∆fa(jTa) > 0 do for a ∈ A do if ∃ j ∈ Na s.t. ∆fa(jTa) > 0 then j∗ a ← arg max j∈Na ω∗ a ← ∆fa(j∗ aTa) fa(jTa) end if 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: end for a∗, j∗ a∗ ← arg max a ∈Na a∈A,j ∗ for a ∈ A do ω∗ a(a, j∗ a) if a∗ == a then Ta ← Ta ∪ {j∗ a} Na ← Na\{j∗ a} else if j∗ a∗ ∈ Na then Na ← Na\{j∗ a∗ } end if end if end for 26: end while 27: return Ta ∀a ∈ A Under the convergence of the max-consensus, the decentralised algorithm can be understood in an equivalent centralised version for the ease of analysis. Algorithm 2 summarises this equivalent centralised version of DSTA. Note that Algorithm 1 is for each agent, whereas Algorithm 2 is for all the agents since it is the centralised version. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 10 IV. ANALYSIS This section analyses the performance, especially optimality and computational complexity, of the DSTA algorithm. Assuming convergence of the max-consensus, which is well studied in many existing literature [43] -- [46], we perform analysis on the centralised version of DSTA. A. Algorithm Analysis Consider the ground set as a set of task-agent pairs (N := T × A) and each task-agent pair as an element of the ground set (uj,a := j × a ∀j ∈ T , a ∈ A). Then, the task-agent pairs can be considered as set elements and the task allocation problem can be understood as a submodular maximisation problem subject to a partition matroid constraint. Consequently, Algorithm 2 can be further simplified to Algorithm 3. The resultant algorithm given in in Algorithm 3 is equivalent to the sampling greedy algorithm for submodular maximisation subject to a partition matroid constraint. Algorithm 3 Sample Greedy Input: f : 2N → R≥0, N , I, p Output: A set S ⊆ I 1: Ns ← ∅, S ← ∅ 2: for u ∈ N do 3: 4: with probability p, Ns ← Ns ∪ {u} 5: end for 6: while ∃ u ∈ Ns such that S ∪ {u} ∈ I and ∆f (uS) > 0 do 7: 8: u∗ ← arg max u∈Ns\S S ← S ∪ {u∗} f (uS) 9: end while 10: return S This paper considers Algorithm 3 as the baseline algorithm for the performance analysis. Note that [47] provided a good analysis scheme for the sample greedy for k-extendable systems. Since the partition matroid constraint is a special case of k-extendable systems, the analysis scheme in [47] can be leveraged to prove the proposed DSTA algorithm. Therefore, we follow the analysis scheme in [47], but make necessary modifications to facilitate the partition matroid constraint. To ease the analysis, we can transform Algorithm 3 into an equivalent version, which is summarised in Algorithm 4. Algorithm 4 introduces four variables C, Sc, Q and Kc just for the convenience of analysis. It is clear that theses variables have no effect on the final output S and thus Algorithm 4 is equivalent to Algorithm 3. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 11 Algorithm 4 Equivalent Sample Greedy Input: f : 2N → R≥0, N , I, p Output: A set S ⊆ I 1: S ← ∅, R ← N , C ← ∅, Q ← OP T 2: while ∃ u ∈ R such that S ∪ {u} ∈ I and ∆f (uS) > 0 do c ← arg max f (uS) u∈R Sc ← S C ← C ∪ {c} with probability p do S ← S ∪ {c}, Q ← Q ∪ {c} 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: otherwise if c ∈ Q then Kc ← {c} else Kc ← ∅ end if Q ← Q\Kc R ← R\{c} Let Kc ⊆ Q\S be the smallest set such 17: end while that Q\Kc ∈ I 18: return S The meanings and roles of the four variables are given as follows. The variable C is the set that contains all task-agent pairs that have already been considered by Algorithm 4 no matter whether they are added to S or not. Sc is the set that contains the selected task-agent pairs at the beginning of the current iteration. At the end of the current iteration, Sc = S\{c} if c is added into S and Q, otherwise Sc = S. Q is the set that bridges the solution S and the optimal solution OP T . Q is initialised as OP T at the beginning of the algorithm and updates over time. Every task-agent pair that is added into S is also added into Q. At the same time, a set Kc is removed from Q at each iteration to keep the independence of Q if a task-agent pair c is added into Q. Notice that, if a task-agent pair c is already in Q and is considered but not added into S at the current iteration, then this task-agent pair c should be removed from Q. Kc is the set that is introduced to keep Q independent. According to the matroid properties, the Algorithm 4 is able to remove a set Kc ⊆ Q\S which contains at most one task-agent pair from Q if a task-agent pair is added into the currently independent set Q. B. Performance Analysis The main performance characteristics of the proposed DSTA algorithm are summarised in Theorem 1. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 12 Theorem 1. Suppose the max-consensus in Algorithm 1 assures the convergence. Then, the DSTA algorithm achieves an expected approximation guarantee of p p+Pmax for monotone submodular objective functions and of p(1−p) p+Pmax for non-monotone submodular utility functions with an expected total com- putational complexity of O(pnr) and individual complexity of O(pr2) for each agent, where p is the sampling probability, Pmax = max(p, 1 − p), r is the number of tasks, i.e. r = T , and n is the number of task-agent pairs i.e. n = T × A. The computational complexity of DSTA can be easily proven. As shown in Algorithm 2, there are at most r rounds of auctions. In each round, each agent requires function evaluations at most pr times. Since there are A number of agents, the total number of value oracle calls in each auction is O(pn). Therefore, the total time complexity is O(pnr). For each agent, the individual time complexity is equivalent to the total complexity divided by the number of agents i.e. O(pr2). Let us now investigate the approximation guarantee of DSTA through Algorithm 4. Since the task-agent pairs that have never been considered by Algorithm 4 have no contribution to the approximation guarantee, we only need to focus on the task-agent pairs that are contained in C. To prove the approximation guarantee, we will first show the bound of expectation of f (S), i.e. E [f (S)], with respect to E[f (S ∪ OP T )] in Lemma 3. Lemmas 1 and 2 will be required to prove the bound of E [f (S)] in Lemma 3. Lemma 1. E[Kc\S] ≤ Pmax where Pmax = max(p, 1 − p). Proof: For the proof, we have two cases to analyse, depending on whether the current task-agent pair c is already in Q at the beginning of the iteration in Algorithm 4. 1. If c ∈ Q at the beginning of the iteration, then Kc = ∅ if c is added to S and Kc = {c} if c is not added to S. As c is added to S with probability p, the law of total probability yields: E[Kc\S] = p · ∅ + (1 − p){c} = 1 − p (4) 2. If c /∈ Q at the beginning of the iteration, then Kc contains at most one element if c is added to S. This is because of the property of independent systems. If c is not added to S then Kc = ∅. Therefore, we have E[Kc\S] ≤ p · 1 + (1 − p)∅ = p (5) In summary, E[Kc\S] ≤ max(p, 1 − p). Lemma 2. E[f (S)] = p Pc∈C ∆f (cSc) . January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 13 Proof: According to the order by which the task-agent pairs are added into S, f (S) can be written as Note that the second equality is because f is assumed to be normalised, i.e. f (∅) = 0. Moreover, we have f (S) = f (∅) +Xc∈S ∆f (cSc) =Xc∈S ∆f (cSc) (6) the same number of Sc sets to the number of c elements by Algorithm 4. In each iteration, the task-agent pair c that is being considered is added to S with probability p. If this task-agent pair c is added to S, then its marginal value ∆f (cSc) will be added to the current function value f (Sc). Otherwise, the contribution of c is 0. Therefore, By the law of total probability, we have f (S) =Xc∈C [∆f (cSc)c∈S + 0 · ∆f (cSc)c∈C\S] E[f (S)] = p ·Xc∈C ∆f (cSc) + (1 − p) · 0 = p ·Xc∈C ∆f (cSc) (7) (8) Lemma 3. E[f (S)] ≥ p p+Pmax E[f (S ∪ OP T )]. Proof: From Algorithm 4 and definition of Q, it is clear that the set Q is independent, i.e. Q ∈ I and S is a subset of Q i.e. S ⊆ Q. Therefore, from Definition 5, we have S ∪ {q} ∈ I ∀q ∈ Q\S. By the termination condition, at the termination of Algorithm 4, ∆f (qS) ≤ 0 ∀q ∈ Q\S . Hence, Let Q\S = {q1, q2, · · · , qQ\S}, then ∆f (qS) ≤ 0 Xq∈Q\S (9) Q\S Q\S Xi=1 Xi=1 f (S) = f (Q) − ≥ f (Q) − ≥ f (Q) ∆f (qiS ∪ {q1, · · · , qi−1}) ∆f (qiS) (submodularity) If c is being considered, it implies that the marginal value of c is no less than any other element from Kc\S at that iteration, i.e. ∆f (cSc) ≥ ∆f (qSc), ∀q ∈ Kc\S (10) Additionally, any task-agent pair can be removed from Q at most once. In other words, the task-agent pair that is contained in Kc at one iteration is always different from other iterations when Kc is not January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 14 empty. Therefore, the sets {Kc}c∈C and sets {Kc\S}c∈C are disjoint. From the definition of Q, Q can be expressed as Q = (OP T \ ∪c∈C Kc) ∪ S = (S ∪ OP T )\ ∪c∈C (Kc\S) (11) Denote C as {c1, c2, · · · , cC}. Then, it holds that Sci ⊆ S ⊆ (S ∪OP T )\∪c∈C (Kc\S). From Eqn. (11), we obtain f (Q) = f ((S ∪ OP T )\ ∪c∈C (Kc\S)) = f (S ∪ OP T ) − ∆f (∪c∈C(Kc\S)(S ∪ OP T )\ ∪c∈C (Kc\S)) C = f (S ∪ OP T ) − ∆f ((Kci\S)(S ∪ OP T )\ ∪1≤j≤i (Kcj \S)) ∆f ((Kci\S)Sci) (submodularity) ∆f (qSci) (submodularity) C C ≥ f (S ∪ OP T ) − ≥ f (S ∪ OP T ) − Xi=1 Xi=1 Xi=1 Xq∈Kci \S = f (S ∪ OP T ) −Xc∈C Xq∈Kc\S ≥ f (S ∪ OP T ) −Xc∈C Xq∈Kc\S = f (S ∪ OP T ) −Xc∈C ∆f (qSc) ∆f (cSc) Kc\S∆f (cSc) By taking expectation over f (S), we have E[f (S)] ≥ E[f (Q)] (inequality (10)) (Lemma 1) Kc\S∆f (cSc)# ≥ E"f (S ∪ OP T ) −Xc∈C = E[f (S ∪ OP T )] − E[Kc\S] ·Xc∈C ≥ E[f (S ∪ OP T )] − Pmax ·Xc∈C ∆f (cSc) ∆f (cSc) = E[f (S ∪ OP T )] − Pmax · E[f (S)] (Lemma 2) 1 p The result is clear by rearranging the above inequation. We are now ready to complete the proof of Theorem 1. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 15 Proof of Theorem 1: In order to get the approximation guarantees for both monotone and non- monotone submodular utility functions, we need to analyze the relationship between f (S ∪ OP T ) and f (OP T ) respectively. If f is monotone, then From Lemma 3 and Eqn. (12), it is clear that f (S ∪ OP T ) ≥ f (OP T ) E[f (S)] ≥ ≥ p p + Pmax p p + Pmax · E[f (S ∪ OP T )] (Lemma 3) · E [f (OP T )] (12) (13) For the non-monotone case, define a new submodular and non-monotone function h : 2N → R≥0 as h(X) = f (X ∪ OP T ) ∀X ⊆ N . Since S contains every element with probability at most p, Claim 1 yields Hence, E[f (S ∪ OP T )] = E[h(S)] ≥ (1 − p)h(∅) = (1 − p)f (OP T ) E[f (S)] ≥ p(1 − p) p + Pmax · E [f (OP T )] (14) (15) Corollary 1. The trade-off between approximation guarantee and computational complexity can be controlled by adjusting the sampling probability p. When p = 1/2, the DSTA algorithm achieves the best approximation guarantee of 1 2 for the monotone case and of 1 4 for the non-monotone case. Proof: Recalling that Pmax = max(p, 1 − p), we have Therefore, for p ∈ (0, 0.5], the expected approximation ratios are obtained as: 1 − p for p ∈ (0, 0.5] p for p ∈ (0.5, 1] Pmax =  In case where p ∈ (0.5, 1], it is trivial that (16) (17) (18) E[f (S)] ≥  E[f (S)] ≥  p · f (OP T ) p(1 − p) · f (OP T ) if f is monotone if f is non-monotone 1 2 f (OP T ) 1−p 2 f (OP T ) if f is monotone if f is non-monotone As shown in Eqns. (17) and (18), there is no advantage in average sense to set the sampling probability bigger than 0.5. For p ∈ (0.5, 1], Eqn. (18) clearly shows that the expected approximation ratio becomes stagnated in the monotone case and is monotonically decreasing for the non-monotone case as the January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 16 sampling probability increases. Moreover, it is clear that the computational complexity increases as the sampling probability gets larger. On the other hand, for p ∈ (0, 0.5], the sampling probability provides trade-off capability between the approximation ratio and computational complexity. As the probability increases for p ∈ (0, 0.5], the expected approximation ratios improve for both monotone and non-monotone cases, but the computational complexity also increases. From Eqns. (17) and (18), the best expected approximation guarantees can be readily obtained as: E[f (S)] =  1 2 1 4 if f is monotone if f is non-monotone V. NUMERICAL SIMULATIONS (19) This section verifies the proposed DSTA algorithm and compare its performance with that of a benchmark task allocation algorithm through numerical simulations. The benchmark algorithm selected is CBBA since it is one of most well known and widely applied decentralised task allocation algorithms. The application scenario considered is a multi-UAV surveillance mission. To demonstrate the applica- bility of the submodular maximisation based task allocation algorithms such as CBBA and DSTA, this paper formulates the multi-UAV surveillance problem as submodular maximisation problems subject to the matroid constraint. Hence, the utility function of each UAV is formulated as a submodular function. To examine the performance of the proposed DSTA in comparison with CBBA also in the non-monotone case, a value function is formulated, considering various different factors. In the simulations, it is assumed that there are 300 tasks to be carried out by different numbers of UAVs from 10 to 50 denoted as Na. One task can be allocated to at most one agent, but one agent can carry out multiple tasks. The aim of the task allocation is to achieve the largest overall objective function value. The sampling probability used throughout the simulations is 0.5. A. Monotone Case This subsection investigates the performance of the proposed DSTA algorithm in the monotone case. For fair comparison, this paper adopts a simple monotone value function utilised in [28]. Suppose that, both agents and tasks are homogeneous. For each agent a ∈ A, the value function is given as [28] where Ta is the task set allocated to agent a, λj < 1 is the discounting factor for each task j ∈ T , τ (pa) fa(Ta) = Xj∈Ta λτ (pa) j bj (20) is the estimated distance of the path pa, and bj is the static score associated with performing task j. In the simulations, λ = 0.95 and bj = 1 January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 17 l e u a V y t i l i t U 200 175 150 125 100 75 50 25 0 10 15 20 25 30 Na 35 40 45 50 CBBA DSTA i ) c e s ( e m T l a n o i t a t u p m o C 4.0 3.5 3.0 2.5 2.0 1.5 1.0 0.5 0.0 CBBA DSTA 10 15 20 25 30 Na 35 40 45 50 (a) Utility function (b) Computational time Fig. 1: Performance comparison for the monotone submodular function (Nt = 200) We run 10 Monte Carlo simulations in which agents and tasks are randomly placed on a W × W 2-D space (W = 10 km). Depending on the number of tasks, there are two simulations cases: the number of tasks is 200 in the first case and 300 in the second case. The number of agents incrementally increases from 10 to 50 in both cases. The simulation results are depicted in Figs. 1 and 2. Note that the values in all figures in this subsection and the following subsection are the average values of the Monte Carlo simulation results. On the one hand, as shown in the figures, the proposed DSTA algorithm achieves comparable quality of solutions, i.e. comparable values of the utility function, to CBBA , in both simulation cases. In average, the quality of DSTA solution is around 95%, reaching to 97%, in the first simulation case and is around 94%, approaching to around 97%, in the second case. On the other hand, computational time of the DSTA algorithm is significantly less compared with that of CBBA. Note that computational time is measured as the total time taken to complete task allocation for all the agents. The simulation codes are written in Python 3.3.1 and the Monte Carlo simulations were run in late 2014 Mac Mini with an Intel i7 3.0 GHz processor and 16Gb of RAM, running OSX 10.13.5, running both algorithms sequentially in a single core without any parallelism. It is worth noting that as the size of the problem increases, the difference between the two algorithms on the function value becomes tighter, but the difference on computational time becomes more significant. B. Non-monotone Case For the non-monotone case, this paper adapts a surveillance mission in which a group of UAVs are deployed to explore an enemy area. The problem formulation and modelling are adapted in [48]. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 18 l e u a V y t i l i t U 300 250 200 150 100 50 0 10 15 20 25 30 Na 35 40 45 50 CBBA DSTA i ) c e s ( e m T l a n o i t a t u p m o C 8 6 4 2 0 CBBA DSTA 10 15 20 25 30 Na 35 40 45 50 (a) Utility function (b) Computational time Fig. 2: Performance comparison for the monotone submodular function (Nt = 300) The utility function adapted is non-monotone submodular and consists of various components. For the completeness, let us describe all the components of utility function and the resultant utility function. 1) Values: Each task could require different abilities or resources for its execution and might have different importance for the completion of mission. Considering these aspects, the value that an agent a can obtain by performing task j is formulated as waj =: σjmaj (21) where σj ∈ R+ is the importance factor of task j ∈ T , maj ∈ R≥0 is the task-agent fitness factor. For the simulations, this paper generates maj for each task-agent pair in a randomly or arbitrary manner. However, the fitness match maj can be defined arbitrarily as long as it is a positive real. By completing a set of tasks Ta ∈ T , the agent a can obtain a value of: v(Ta) = Xj∈Ta waj (22) 2) Probability of Mission Success: The probability of being detected generally increases as an UAV is exposed longer in the enemy environment, i.e. as it carries out more tasks. Hence, the probability of being detected at the (n + 1)th task, given that the UAV has executed previously n tasks, is modelled as [48]: PD,a(n + 1) = Pr(detection of a at the n + 1th taskn) , P0,a 1 − αanP0,a (23) where P0,a ∈ (0, 1) denotes the probability of UAV a being detected by the enemy when it executes a single task without any previous tasks being executed. αa ≥ 1 is a parameter that governs how January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 19 fast the detection probability increases. To guarantee PD(T ) < 1, α should be designed such that P0 1−α(T −1)P0 < 1. Then, for the agent a executing n number of tasks, the probability of being detected can be quantified as: PD,a(n) = PD,a(n − 1) + (1 − PD,a(n − 1)) P0,a 1 − αa(n − 1)P0,a (24) where P0,a = PD,a(0) by convention. For simplicity, it is assumed that if an UAV has been detected, the mission has failed and thus produced a zero value [48]. Then, we can define the probability of surviving, PS,a : 2T → (0, 1], during executing Ta task set as: PS,a(Ta) , 1 − PD,a(Ta). (25) 3) Inter-Task Effect: As discussed, the probability of an UAV being detected increases as the UAV is exposed more to the adversarial mission environment. Therefore, it is risky to allocate too many important tasks to one single agent. To remove this fragility, inter-task penalties are introduced. Define da ij as the penalty of UAV a when executing each pair i, j ∈ T of distinct tasks in its task set. Then, the total penalty function, ga : 2T → R+, for a given task set Ta ⊆ T is defined as: To discourage concentration of important tasks in a single UAV, we set da ij = eσiσj . g(Ta) = Xi,j∈Ta,i6=j da ij (26) 4) Utility Function: The utility function is obtained by combining all the terms described in Eqns. (22), (25) and (26). That is, the value of a task set Ta ⊆ T in agent a ∈ A is defined as the expected value obtained minus by inter-task penalties: fa(Ta) = ES[va(Ta)] − λaga(Ta) (27) where λa is a scaling factor ensuring that the value function is non-negative and ES[·] denotes the expected value that accounts the probability of the agent being detected and thus the corresponding value becoming zero. Plugging in all the definitions into Eqn. (27), the final value function is given as: fa(Ta) = PS,a(Ta)Xj∈Ta waj − λa Xi,j∈Ta,i6=j da ij (28) 5) Simulation Results: Initial parameter setting is as follows: αa = 1, λa = 0.01 for all a ∈ A. To guarantee PD(T ) < 1, the initial detection probability is defined as P0,a = 1 1+α(T ) for all a ∈ A. Assuming that there are certain tasks that are more important than other tasks, the importance factors of tasks are randomly drawn from two uniform distributions. The importance factors of Na number of tasks are drawn from a continuous uniform distribution between 5 and 7, i.e. U (5, 7). It is assumed that January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 20 200 175 150 125 100 75 50 25 l e u a V y t i l i t U CBBA DSTA i ) c e s ( e m T l a n o i t a t u p m o C 300 250 200 150 100 50 0 CBBA DSTA 10 15 20 25 30 Na 35 40 45 50 10 15 20 25 1.5 1.0 0.5 30 Na 20 40 35 40 45 50 (a) Utility function (b) Computational time Fig. 3: Performance comparison for the non-monotone submodular function (Nt = 200) each of these Na tasks is suitable for one agent and hence we set the corresponding task-agent fitness factor, waj , as 0.3 while setting other factors related to each of these tasks as 0.1. The importance factors of rest of tasks are randomly drawn from U (0.5, 1.5), implying that they are less important than the Na tasks. All task-agent fitness factors corresponding to these tasks are randomly selected from a continuous uniform distribution between 0.1 and 1. First, let us compare the performance, especially the quality of solution and computational time, of the proposed DSTA algorithm with CBBA. Like for the monotone submodular function, we have two simulations cases depending on the number of tasks. For each case, we run 10 Monte Carlo simulations. The number of agents incrementally increases from 10 to 50 in both cases. The sampling probability p is set to be equal to 1/2. The simulation results are depicted in Figs. 3 and 4. The results confirm that the proposed DSTA achieves much better function values than CBBA: the function values of CBBA achieves around 50% and 40% of DSTA for 200 and 300 tasks, respectively. The potential attribute the relatively poor performance of CBBA is that it makes the agents greedily select more important tasks at early iterations. If the agents select more tasks in CBBA, the total function values could start to decrease. Hence, CBBA seems to get trapped in local optima with a few tasks per agent. Note that CBBA only has constant factor guarantees for monotone submodular functions. By contrast, it may exhibit arbitrarily poor performance with non- monotone utility functions, which is confirmed by the simulation results. On the other hand, the sampling procedure in the proposed DSTA might enable abandoning important tasks with a certain probability and hence utilising most of the available tasks to find solutions without getting trapped in local optima. Also, the computational time of the proposed is less than that of CBBA. This could be attributed to the January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 21 300 250 200 150 100 50 l e u a V y t i l i t U l e u a V y t i l i t U 180 160 140 120 100 80 60 CBBA DSTA i ) c e s ( e m T l a n o i t a t u p m o C 1200 1000 800 600 400 200 0 CBBA DSTA 10 15 20 25 30 Na 35 40 45 50 10 15 20 25 3 2 1 20 40 35 40 45 50 30 Na (a) Utility function (b) Computational time Fig. 4: Performance comparison for the non-monotone submodular function (Nt = 300) i ) c e s ( e m T l a n o i t a t u p m o C 2.0 1.5 1.0 0.5 0.0 P=1/10 P=1/5 P=1/2 10 15 20 25 30 Na 35 40 45 50 P=1/10 P=1/5 P=1/2 10 15 20 25 30 Na 35 40 45 50 (a) Utility function (b) Computational time Fig. 5: Performance of the DSTA algorithm with respect to different sampling probabilities fact that CBBA requires reconstruction of task bundles and hence function evaluations whenever there exists a conflict. If the number of conflicts increases, the consensus strategy in CBBA might require more steps for conflict resolution, which results in increased computational complexity. To validate the analysis results in Section IV, we also run another set of simulations with respect to different sampling probabilities for the DSTA algorithm. The sampling probability is set to 1/10, 1/5 and 1/2, respectively, for 200 tasks. Fig. 5 shows the simulation results. As demonstrated in Fig. 5, the quality of solutions improves, but the computational time also increases as the sampling probability increases to 1/2. These results coincide with the analysis results in Section IV and hence confirm the analysis results. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 22 VI. CONCLUSIONS AND FUTURE WORK This paper presents an efficient decentralised task allocation algorithm for MRS. Considering the task allocation problem can be viewed as optimisation of a set function subject to a matroid constraint, we leveraged the submodular maximisation concepts for the theoretical tractability. The CBBA algorithm, which is one of the most applied and practical task allocation algorithms, also utilises the submodularity concept and hence provides an approximation guarantee. The issue is that it only provides an approxi- mation guarantee for monotone submodular utility functions. To overcome this issue, this paper utilises a sampling process, i.e. drawing task samples from the set of all tasks. Consequently, the proposed task allocation algorithm achieves an expected approximation guarantee not only for monotone submodular utility functions, but also for general non-monotone submodular utility functions. Moreover, the com- putational complexity of the proposed algorithm can be further relaxed and adjusted as introduction of the sampling process allows reduction of function evaluations: it requires to evaluate function values for only task samples, not for all the tasks. The performance of the proposed task allocation algorithm is investigated through theoretical analysis. The results of numerical simulations conform the validity of the theoretical analysis results. A future research direction would be improving the approximation ratio for both monotone and non- monotone submodular utility functions. There are some gaps between theoretically achievable approxi- mation guarantee and that of our algorithm. The key challenge will be how to improve the approxima- tion guarantee for both monotone and non-monotone cases while maintaining reasonable computational complexity. Another research direction would be further relaxing the computational complexity while guaranteeing the same or similar approximation guarantee. In our opinion, this could be achieved by introducing the lazy greedy concept to the proposed algorithm. REFERENCES [1] D. T. Cole, S. Sukkarieh, and A. H. Goktogan, "System Development and Demonstration of a UAV Control Architecture for Information Gathering Missions," Journal of Field Robotics, vol. 23, no. 6/7, pp. 417 -- 440, 2006. [2] R. R. Pitre, X. R. Li, and R. Delbalzo, "{UAV} Route Planning for Joint Search and Track Mission - An Informative-Value Approach," IEEE Transactions on Aerospace and Electronic Systems, vol. 48, no. 3, pp. 2551 -- 2565, 2012. [3] B. H. Lim, J. W. Kim, S. W. Ha, and Y. H. Moon, "Development of software platform for monitoring of multiple small UAVs," in AIAA/IEEE Digital Avionics Systems Conference - Proceedings, vol. 2016-Decem, 2016. [4] P. Li and H. Duan, "A potential game approach to multiple UAV cooperative search and surveillance," Aerospace Science and Technology, vol. 68, pp. 403 -- 415, 2017. [5] D. Kingston, R. W. Beard, and R. S. Holt, "Decentralized Perimeter Surveillance Using a Team of {UAVs}," IEEE Transactions on Robotics, vol. 24, no. 6, pp. 1394 -- 1404, 2008. January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 23 [6] D. Bein, W. Bein, A. Karki, and B. B. Madan, "Optimizing Border Patrol Operations Using Unmanned Aerial Vehicles," in Proceedings - 12th International Conference on Information Technology: New Generations, ITNG 2015, 2015, pp. 479 -- 484. [7] S. Minaeian, J. Liu, and Y.-J. Son, "Vision-Based Target Detection and Localization via a Team of Cooperative UAV and UGVs," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 7, pp. 1005 -- 1016, 2016. [8] A. Puri, "A survey of Unmanned Aerial Vehicles ({UAV}) for Traffic Surveillance," Department of Computer Science and Engineering, University of South Florida, Tech. Rep., 2004. [9] E. M. Carapezza and D. B. Law, "Sensors, C3I, Information, and Training Technologies for Law Enforcement," in Proc. SPIE, jan 1999. [10] L. Merino, F. Caballero, J. R. M.-d. Dios, J. Ferruz, and A. Ollero, "A Cooperative Perception System for Multiple UAVs: Application to Automatic Detection of Forest Fires," Journal of Field Robotics, vol. 23, no. 3/4, pp. 165 -- 184, 2006. [11] A. Belbachir and J.-A. Escareno, "Autonomous decisional high-level planning for UAVs-based forest-fire localization," in ICINCO 2016 - Proceedings of the 13th International Conference on Informatics in Control, Automation and Robotics, vol. 1, 2016, pp. 153 -- 159. [12] A. Barrientos, J. Colorado, J. del Cerro, A. Martinez, C. Rossi, D. Sanz, and J. Valente, "Aerial Remote Sensing in Agriculture: A Practical Approach to Area Coverage and Path Planning for Fleets of Mini Aerial Robots," Journal of Field Robotics, vol. 28, no. 5, pp. 667 -- 689, 2011. [13] H.-S. Shin and P. Segui-Gasco, "UAV Swarms: Decision-Making Paradigms," in Encyclopedia of Aerospace Engineering. John Wiley & Sons, Ltd, 2014. [14] E. A. Humo, "On a direct method of optimization," Mathematics and Computers in Simulation, vol. 12, no. 3, pp. 122 -- 129, 1970. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0378475470800106 [15] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, 1999. [16] P. T. Boggs and J. W. Tolle, "Sequential quadratic programming for large-scale nonlinear optimization," Journal of computational and applied mathematics, vol. 124, no. 1-2, pp. 123 -- 137, 2000. [17] S. M. Elsayed, R. A. Sarker, and D. L. Essam, "A new genetic algorithm for solving optimization problems," Engineering Applications of Artificial Intelligence, vol. 27, pp. 57 -- 69, 2014. [18] S. Rathi, V. S. Rajput, and S. Gupta, "An improved evolution based optimization algorithm originated from the concept of sfla and simulated annealing," in Industrial and Information Systems (ICIIS), 2016 11th International Conference on. IEEE, 2016, pp. 193 -- 198. [19] K.-L. Du and M. Swamy, "Ant colony optimization," in Search and Optimization by Metaheuristics. Springer, 2016, pp. 191 -- 199. [20] A. Badanidiyuru and J. Vondr´ak, "Fast algorithms for maximizing submodular functions," in Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms. SIAM, 2014, pp. 1497 -- 1514. [21] N. Buchbinder, M. Feldman, J. S. Naor, and R. Schwartz, "Submodular maximization with cardinality constraints," in Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, 2014, pp. 1433 -- 1452. [22] M. Sviridenko, J. Vondr´ak, and J. Ward, "Optimal approximation for submodular and supermodular optimization with bounded curvature," Mathematics of Operations Research, vol. 42, no. 4, pp. 1197 -- 1218, 2017. [23] M. B. Dias, R. Zlot, N. Kalra, and a. Stentz, "Market-Based Multirobot Coordination: A Survey and Analysis," Proceedings of the IEEE, vol. 94, no. 7, pp. 1257 -- 1270, jul 2006. [24] Z. Yan, N. Jouandeau, and A. Ali, "A Survey and Analysis of Multi-Robot Coordination," January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 24 International Journal of Advanced Robotic Systems, vol. 10, p. 1, 2013. [Online]. Available: http://www.scopus.com/inward/record.url?eid=2-s2.0-84890512866{&}partnerID=tZOtx3y1 [25] X. Yuan, J. Zhao, Y. Yang, and Y. Wang, "Hybrid parallel chaos optimization algorithm with harmony search algorithm," Applied Soft Computing, vol. 17, pp. 12 -- 22, 2014. [26] D. P. Bertsekas and D. A. Castanon, "Parallel synchronous and asynchronous implementations of the auction algorithm," Parallel Computing, vol. 17, no. 6-7, pp. 707 -- 732, sep 1991. [Online]. Available: http://dl.acm.org/citation.cfm?id=1746086.1746168 [27] L. Liu and D. A. Shell, "An anytime assignment algorithm: From local task swapping to global optimality," Autonomous Robots, vol. 35, no. 4, pp. 271 -- 286, jul 2013. [Online]. Available: http://link.springer.com/10.1007/s10514-013-9351-2 [28] H.-l. Choi, L. Brunet, J. P. How, and S. Member, "Consensus-Based Decentralized Auctions for Robust Task Allocation," IEEE Transactions on Robotics, vol. 25, no. 4, pp. 912 -- 926, 2009. [29] S. Ismail and L. Sun, "Decentralized hungarian-based approach for fast and scalable task allocation," in Unmanned Aircraft Systems (ICUAS), 2017 International Conference on. IEEE, 2017, pp. 23 -- 28. [30] S. Moon, E. Oh, and D. H. Shim, "An Integral Framework of Task Assignment and Path Planning for Multiple Unmanned Aerial Vehicles in Dynamic Environments," Journal of Intelligent & Robotic Systems, vol. 70, no. 1-4, pp. 303 -- 313, sep 2012. [Online]. Available: http://www.springerlink.com/index/10.1007/s10846-012-9740-3 [31] L. E. Parker, "ALLIANCE: An architecture for fault tolerant multirobot cooperation," IEEE transactions on robotics and automation, vol. 14, no. 2, pp. 220 -- 240, 1998. [32] M. B. Dias, "Traderbots: A new paradigm for robust and efficient multirobot coordination in dynamic environments," Robotics Institute, p. 153, 2004. [33] B. P. Gerkey and M. J. Mataric, "Sold!: Auction methods for multirobot coordination," IEEE transactions on robotics and automation, vol. 18, no. 5, pp. 758 -- 768, 2002. [34] Z. Svitkina and L. Fleischer, "Submodular approximation: Sampling-based algorithms and lower bounds," SIAM Journal on Computing, vol. 40, no. 6, pp. 1715 -- 1737, 2011. [35] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of approximations for maximizing submodular set functions -- I," Mathematical Programming, vol. 14, no. 1, pp. 265 -- 294, dec 1978. [Online]. Available: http://link.springer.com/10.1007/BF01588971 [36] P. Segui-Gasco and H.-S. Shin, "Fast non-monotone submodular maximisation subject to a matroid constraint," arXiv preprint arXiv:1703.06053, 2017. [37] M. Feldman, J. Naor, and R. Schwartz, "A Unified Continuous Greedy Algorithm for Submodular Maximization," in 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. IEEE, oct 2011, pp. 570 -- 579. [Online]. Available: http://www.computer.org/csdl/proceedings/focs/2011/4571/00/4571a570-abs.html [38] A. Krause and D. Golovin, "Submodular function maximization," in Tractability: Practical Approaches to Hard Problems. Cambridge University Press, 2014, pp. 71 -- 104. [39] U. Feige, V. S. Mirrokni, and J. Vondrak, "Maximizing non-monotone submodular functions," SIAM Journal on Computing, vol. 40, no. 4, pp. 1133 -- 1153, 2011. [40] H. O. Song, Y. J. Lee, S. Jegelka, and T. Darrell, "Weakly-supervised discovery of visual pattern configurations," in Advances in Neural Information Processing Systems, 2014, pp. 1637 -- 1645. [41] B. Mirzasoleiman, A. Badanidiyuru, and A. Karbasi, "Fast constrained submodular maximization: Personalized data summarization," in ICLM'16: Proceedings of the 33rd International Conference on Machine Learning (ICML), 2016. [42] J. Bilmes and W. Bai, "Deep Submodular Functions," jan 2017. [Online]. Available: http://arxiv.org/abs/1701.08939 January 11, 2019 DRAFT JOURNAL OF LATEX CLASS FILES 25 [43] J. Cort´es, "Distributed algorithms for reaching consensus on general functions," Automatica, vol. 44, no. 3, pp. 726 -- 737, 2008. [44] S. Giannini, A. Petitti, D. Di Paola, and A. Rizzo, "Asynchronous max-consensus protocol with time delays: Convergence results and applications," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 63, no. 2, pp. 256 -- 264, 2016. [45] F. Iutzeler, P. Ciblat, and J. Jakubowicz, "Analysis of max-consensus algorithms in wireless channels," IEEE Transactions on Signal Processing, vol. 60, no. 11, pp. 6103 -- 6107, 2012. [46] R. Olfati-Saber and R. M. Murray, "Consensus problems in networks of agents with switching topology and time-delays," IEEE Transactions on automatic control, vol. 49, no. 9, pp. 1520 -- 1533, 2004. [47] M. Feldman, C. Harshaw, and A. Karbasi, "Greed is good: Near-optimal submodular maximization via greedy optimization," arXiv preprint arXiv:1704.01652, 2017. [48] P. Segui-Gasco, "Decentralised multi-robot task allocation algorithms," Ph.D. dissertation, SATM, Cranfield University, 2018. January 11, 2019 DRAFT